Powered by Deep Web Technologies
Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

2

National Security Information Systems (NSIS) -National Security Systems &  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

3

Recommended Security Controls for Federal Information Systems...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NIST 800-53 Revision 3 + Draft Revision 4 Recommended Security Controls for Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines...

4

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Energy Savers [EERE]

SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS...

5

Argonne's National Security Information Systems National  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security National Security Information Systems National Security The NSIS team has worked with various government agencies and programs over the past 15 years to create customized technological solutions that meet specific needs, while also fulfilling national security objectives, improving efficiency and reducing costs. Applying a broad range of expertise and experience, the Argonne team develops both unclassified and classified information technology (IT) systems for national security and nonproliferation programs, with a focus on security operations, international treaty implementation, export control and law enforcement support. Some examples of NSIS-developed systems include:  Electronic Facility Clearance (e-FCL) System for the U.S. Department of Defense (DOD)

6

Electronic DOE Information Security System (eDISS) PIA, Office...  

Office of Environmental Management (EM)

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

7

Classified Automated Information System Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

1994-07-15T23:59:59.000Z

8

Security Controls for Unclassified Information Systems Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

2009-01-05T23:59:59.000Z

9

Security Controls for Unclassified Information Systems Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-05T23:59:59.000Z

10

Security Controls for Unclassified Information Systems Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

2009-01-05T23:59:59.000Z

11

Classified Information Systems Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

1999-08-03T23:59:59.000Z

12

Information System Security Manager (ISSM) | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

ISSM Core Competency Training Worksheet More Documents & Publications Information System Security Officer (ISSO) Cybersecurity Program Manager (CSPM) Authorizing Official (AO)...

13

An ontology-based approach to information systems security management  

Science Journals Connector (OSTI)

Complexity of modern information systems (IS), impose novel security requirements. On the other hand, the ontology paradigm aims to support knowledge sharing and reuse in an explicit and mutually agreed manner. Therefore, in this paper we set the foundations ... Keywords: IS security, security management, security ontology, security policy

Bill Tsoumas; Stelios Dritsas; Dimitris Gritzalis

2005-09-01T23:59:59.000Z

14

List of Major Information Systems,National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

List of Major Information Systems,National Nuclear Security List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network Infrastructure: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. .major_information_systems.pdf List of Major Information Systems,National Nuclear Security Administration ADaPT Networked:

15

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS  

E-Print Network [OSTI]

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

16

SP 800-128. Guide for Security-Focused Configuration Management of Information Systems  

Science Journals Connector (OSTI)

The purpose of Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems, is to provide guidelines for organizations responsible for managing and administering the security of federal information systems ... Keywords: Configuration management, SecCM, control, information systems, monitoring, risk management framework, security content automation protocol (SCAP), security program, security-focused continuous monitoring

L. Arnold Johnson; Kelley L. Dempsey; Ronald S. Ross; Sarbari Gupta; Dennis Bailey

2011-08-01T23:59:59.000Z

17

Interpreting Deep Structures of Information Systems Security  

Science Journals Connector (OSTI)

......network, infrastructure and regulatory) of the organization...adopting stringent regulatory review of the security policies...present ways to deal with regulatory actions such as developing contingency plans (disaster recovery in......

Manoj Thomas; Gurpreet Dhillon

2012-10-01T23:59:59.000Z

18

Manual of Security Requirements for the Classified Automated Information System Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

1994-07-15T23:59:59.000Z

19

Security Certification & Accreditation of Federal Information Systems A Tutorial  

E-Print Network [OSTI]

& Accreditation ? Certification Accreditation Information + Evidence Risk Thresholds 1. Security Plan 2. C Output of C&A Process Security Plan Risk Assessments Contingency Plans Incident Response Plans Security Does the potential risk to the agency operations, assets or individuals described in the Security Plan

Madisetti, Vijay K.

20

Certification and Accreditation Process for Information Systems Including National Security Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

2004-02-19T23:59:59.000Z

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network [OSTI]

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

22

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

23

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

24

Study on security based on PKI for e-commerce of statistics information system  

Science Journals Connector (OSTI)

In this paper, issues about the trend of statistics information merchandizing, and the present situation of statistics information network and statistics information system security, are analyzed. Security construction scheme is put forward, which is ... Keywords: PKI, e-commerce, security, statistics information

Min Liu; Shudong Sun; Miaotiao Xing

2005-08-01T23:59:59.000Z

25

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

26

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

27

Zicom Electronic Security Systems Ltd | Open Energy Information  

Open Energy Info (EERE)

Zicom Electronic Security Systems Ltd Zicom Electronic Security Systems Ltd Jump to: navigation, search Name Zicom Electronic Security Systems Ltd. Place Mumbai, Maharashtra, India Zip 400093 Sector Solar, Wind energy Product Mumbai-based electronic security systems integrator. The firm plans to sell its security business and foray into solar and wind power. Coordinates 19.076191°, 72.875877° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":19.076191,"lon":72.875877,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

28

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network [OSTI]

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

29

Information Security Policy Policy Title Information Security Policy  

E-Print Network [OSTI]

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

30

An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions  

E-Print Network [OSTI]

This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the ...

Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

2006-01-01T23:59:59.000Z

31

Information Technology Management ((Information Security))  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as an Information Technology Specialist (Information Security) with responsibility for the implementation of a wide range of technically complex...

32

Security in Information Systems: New Challenges and Opportunities  

E-Print Network [OSTI]

systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment. This Special Issue of the international Journal of Universal Computer Science includes papers received from

Jurjens, Jan

33

Information Security Guide  

E-Print Network [OSTI]

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

34

Future directions for behavioral information security research  

Science Journals Connector (OSTI)

Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a predominant weakness ... Keywords: Behavioral information security, Deviant security behavior, Future research, Information security, Research challenges

Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, Richard Baskerville

2013-02-01T23:59:59.000Z

35

Office of Information Security  

Broader source: Energy.gov [DOE]

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

36

Cyber Security Requirements for Wireless Devices and Information Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-11T23:59:59.000Z

37

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect (OSTI)

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

38

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

39

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

40

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

SP 800-37 Rev. 1. Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach  

Science Journals Connector (OSTI)

The purpose of SP 800-37 Rev 1 is to provide guidelines for applying the Risk Management Framework to federal information systems to include conducting the activities of security categorization, security control selection and implementation, security ... Keywords: FISMA, Risk management framework, categorize, common controls, continuous monitoring, information systems, roles and responsibilities, security authorization, security controls

Joint Task Force Transformation Initiative

2010-02-01T23:59:59.000Z

42

CPSC 601.xx: Information Systems Security Analysis Statement of Ethical Considerations  

E-Print Network [OSTI]

permission and informed consent of the system's owner. Ethical Hacking Principles Hacking is, unfortunately misuse of the special skills they possess. Similarly, hacking is a special technological skill that can the term "hacking" to refer to the skill to question security and trust assumptions expressed in software

Locasto, Michael E.

43

Information System Security Officer (ISSO) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

system. ISSO Core Competency Training Worksheet More Documents & Publications Cybersecurity Program Manager (CSPM) Authorizing Official Designated Representative (AODR)...

44

Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

2004-02-19T23:59:59.000Z

45

The Center for Information Systems Security Studies and  

E-Print Network [OSTI]

composition; functional mechanisms; & lifecycle assurance techniques. CS3695 Network Vulnerability Assessment assessment & vulnerability tools; (5) describe the motivations & different types of hackers. CS4652 Applied, describe the inherent trust problems relating to the composition of systems and components, & perform

46

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

47

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

48

Enterprise Information Security Management Framework [EISMF  

E-Print Network [OSTI]

There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

49

INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS  

E-Print Network [OSTI]

INFORMATION SECURITY GUIDELINES #12;CONSISTENT, EFFECTIVE INFORMATION SECURITY To respond to societal-to-date information security standards. Should we fail to do so, in the event

Prodiæ, Aleksandar

50

Physical Security Systems | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

51

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

52

Emergency Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Emergency Information Home > Field Offices > Welcome to the Sandia Field Office > Emergency Information Emergency Information The Sandia Field Office (SFO) Emergency Management System is designed to

53

Cyber Security Guidelines, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

54

Secure video communications system  

DOE Patents [OSTI]

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

55

Securing Control Systems Modems  

Broader source: Energy.gov (indexed) [DOE]

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

56

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

57

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

58

Information Security: Coordination of Federal Cyber Security Research and  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

59

Security systems engineering overview  

SciTech Connect (OSTI)

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

60

The Economics of Information Security  

Science Journals Connector (OSTI)

...with wide variation in consumer valuation for services, where personalized...complex networks is an emerging tool for analyzing information security...theory, and in turn provides tools for modeling and investigating such...The causes of insurgency, and tools for understanding and dealing...

Ross Anderson; Tyler Moore

2006-10-27T23:59:59.000Z

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

06 DEC 2013 1 Information Security Guideline  

E-Print Network [OSTI]

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

62

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

63

AT&TSecurity Consulting Information Assurance Federal Information Security  

E-Print Network [OSTI]

and procedures include: · Interviews with agency personnel associated with the security aspects of the system, firmware and operations · Conducting demonstrations and exercises If needed, we will create tailored agency's information systems are implemented correctly, operating as intended and producing the desired

Fisher, Kathleen

64

Building an Information Technology Security Awareness  

E-Print Network [OSTI]

Building an Information Technology Security Awareness and Training Program Mark Wilson and Joan Hash C O M P U T E R S E C U R I T Y NIST Special Publication 800-50 Computer Security Division

65

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

66

Formal specification of role-based security policies for clinical information systems  

Science Journals Connector (OSTI)

Many healthcare organizations have transited from their old and disparate business models based on ink and paper to a new, consolidated ones based on electronic patient records. There are significant demands on secure mechanisms for collaboration and ... Keywords: LTL, authorisation constraints, healthcare environments

Karsten Sohr; Michael Drouineaud; Gail-Joon Ahn

2005-03-01T23:59:59.000Z

67

RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS  

E-Print Network [OSTI]

organizational managers in making informed decisions regarding the security of their information systems. NIST agencies implementing risk-based planning and management also must consider effectiveness, efficiency for their information and information systems with the gains in capabilities and improved support of organizational

68

Control Systems Cyber Security: Defense in Depth Strategies ...  

Broader source: Energy.gov (indexed) [DOE]

that use control system networks while maintaining a multi-tier information architecture. Control Systems Cyber Security: Defense in Depth Strategies More Documents &...

69

NMMSS Information, Reports & Forms | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Information, Reports & Forms | National Nuclear Security Information, Reports & Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NMMSS Information, Reports & Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms NMMSS Information, Reports & Forms

70

Security services architecture for Secure Mobile Grid Systems  

Science Journals Connector (OSTI)

Mobile Grid, is a full inheritor of the Grid with the additional feature that it supports mobile users and resources. Security is an important aspect in Grid based systems, and it is more complex to ensure this in a mobile platform owing to the limitations of resources in these devices. A Grid infrastructure that supports the participation of mobile nodes and incorporates security aspects will thus play a significant role in the development of Grid computing. The idea of developing software through systematic development processes to improve software quality is not new. However, many information systems such as those of Grid Computing are still not developed through methodologies which have been adapted to their most differentiating features. The lack of adequate development methods for this kind of systems in which security is taken into account has encouraged us to build a methodology to develop them, offering a detailed guide for their analysis, design and implementation. It is important to use software V&V techniques, according to IEEE Std. 1012 for Software Verification and Validation, to ensure that a software system meets the operational needs of the user. This ensures that the requirements for the system are correct, complete, and consistent, and that the life-cycle products correctly design and implement system requirements. This paper shows part of a development process that we are elaborating for the construction of information systems based on Grid Computing, which are highly dependent on mobile devices in which security plays a highly important role. In the design activity of the process, we design a security architecture which serves as a reference for any mobile Grid application that we wish to build since this security architecture defines a complete set of security services which will be instantiated depending on the requirements and features found in previous activities of the process. A V&V task is also defined in the design activity to validate and verify both the architecture built and the traceability of the artifacts generated in this activity. In this paper, we will present the service-oriented security architecture for Mobile Grid Systems which considers all possible security services that may be required for any mobile Grid application.

David G. Rosado; Eduardo Fernndez-Medina; Javier Lpez

2011-01-01T23:59:59.000Z

71

Security Modeling of Grid Systems Using Petri Nets  

Science Journals Connector (OSTI)

The paper reviews the security problem with computing and information resources in Grid systems. It discusses security relative characteristics of Grid architecture and provides a common threat model of Grid. It ...

Peter D. Zegzhda; Dmitry P. Zegzhda; Maxim O. Kalinin

2012-01-01T23:59:59.000Z

72

University of Connecticut Information Technology Security  

E-Print Network [OSTI]

University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision, including the University of Connecticut. Furthermore, as more personally identifiable information which University of Connecticut incident handlers can work to ensure a complete and consistent approach

Alpay, S. Pamir

73

A Virtual Environment for Interactive Visualization of Power System Economic and Security Information  

E-Print Network [OSTI]

. In contrast, the purpose of the work presented here is to use a VE to interactively visualize more abstract of Illinois at Urbana-Champaign Urbana, IL 61801 USA Abstract Simulation and analysis of power systems often power system data. Thus this work is more akin to scientific visualization. An overview of using VEs

74

Cyber Security Incidents, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

75

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Broader source: Energy.gov (indexed) [DOE]

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

76

Threats to financial system security  

SciTech Connect (OSTI)

The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.

McGovern, D.E.

1997-06-01T23:59:59.000Z

77

MN Office of Energy Security | Open Energy Information  

Open Energy Info (EERE)

MN Office of Energy Security MN Office of Energy Security Jump to: navigation, search Name MN Office of Energy Security Place St. Paul, MN Website http://www.mnofficeofenergysec References MN Office of Energy Security[1] Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building Systems Integration LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! MN Office of Energy Security is a company located in St. Paul, MN. References ↑ "MN Office of Energy Security" Retrieved from "http://en.openei.org/w/index.php?title=MN_Office_of_Energy_Security&oldid=379158" Categories: Clean Energy Organizations Companies Organizations

78

Information Resources Security Planning and Policy Committee -UTDPP1003  

E-Print Network [OSTI]

Information Resources Security Planning and Policy Committee - UTDPP1003 Policy Charge IR Security Planning and Policy Committee Policy Statement The Information Resources Planning, and Policy a security plan to protect information identified as confidential, sensitive or both. 3. Assign management

O'Toole, Alice J.

79

ETTP Security Access Control System (ESACS) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

80

DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING  

E-Print Network [OSTI]

DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING TEST METHOD SELECTION LIST ­ CRYPTOGRAPHIC AND SECURITY TESTING NVLAP CRYPTOGRAPHIC AND SECURITY TESTING APPLICATION FORM (REV. 2013 and Security (BCS)" testing and is considered the foundation of all scopes of accreditation

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

PARS II New Contractor Information for Interconnection Security Agreement  

Broader source: Energy.gov (indexed) [DOE]

New Contractor Information for Interconnection Security Agreement New Contractor Information for Interconnection Security Agreement V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System (PARS) II System Owner and the contractor sign an Interconnection Security Agreement (ISA). The requirement for an Interconnection Security Agreement can be found on page 182 of the PCSP. The ISA template is available for review on the PARS II portal (http://management.energy.gov/online_resources/pars2.htm) under Contractor Documents. Before the contractor begins sending data to PARS II, DOE will send the ISA to the contractor for review and signature. In order to prepare the ISA for review and signature, the PARS II Support Team needs

82

Safeguards and Security Systems | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safeguards and Security Systems SHARE Safeguards and Security Systems Safeguards training class. ORNL is a leader in providing technologies and services for the global safeguards...

83

Integrated Security System | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

intrusion detection and security management for a networked energy control systems architecture Integrated Security System More Documents & Publications Cybersecurity for Energy...

84

Port security and information technology  

E-Print Network [OSTI]

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

85

Contact Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Contact Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Contact Information Contact Information At each of NNSA's eight sites, leading-edge research and development is

86

Site Information | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Site Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Site Information Site Information The NNSA's nuclear security enterprise spans eight sites, including three national laboratories, with more than six decades of cutting-edge nuclear

87

Site Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Site Information Home > About Us > Our Programs > Defense Programs > Military Academic Collaborations > Site Information Site Information The NNSA's nuclear security enterprise spans eight sites, including three national laboratories, with more than six decades of cutting-edge nuclear

88

Security Forms and Information | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Services » New Employee Orientation » Security Forms and Services » New Employee Orientation » Security Forms and Information Security Forms and Information Homeland Security Presidential Directive HSPD-12 established new policy for a common identification standard for Federal Employees and contractors. As of October 27, 2005, all new Federal employees assigned to the DOE Headquarters complex are required to present two identity source documents (i.e., U.S. Passport, driver's license, identification card with photograph issued by a Federal, state, or local government agency, etc.), have their fingerprints taken, and undergo a background investigation (the identity proofing process) prior to reporting for duty or being issued a DOE standard badge (identity or PIV badge). Most likely, your HR representative and/or administrative personnel have

89

OFFICE OF HEALH, SAFETY AND SECURITY INFORMATION COLLECTION PACKAGE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

HEALH, SAFETY AND SECURITY HEALH, SAFETY AND SECURITY INFORMATION COLLECTION PACKAGE OMB 1910-0300: ES&H Reporting Systems Description of Collections April 10, 2012 The information obtained from DOE contractors by this information collection is used by Department management at the appropriate levels to manage the work pertaining to environment, safety and health throughout DOE and will include automated reporting of information into the following systems: Computerized Accident/Incident Reporting System (CAIRS) - The CAIRS is a database used to collect and analyze DOE and DOE contractor reports of injuries, illnesses, and other accidents that occur during DOE operations as described in DOE O 231.1B, Environment, Safety and Health Reporting. This system contains information from reporting contractors and

90

A multidimensional approach to information security risk management using FMEA and fuzzy theory  

Science Journals Connector (OSTI)

Abstract Because of the evolution and widespread use of the Internet, organisations are becoming more susceptible to attacks on Information Technology Systems. These attacks result in data losses and alterations, and impact services and business operations. Therefore, to minimise these potential failures, this paper presents an approach to information security risk management, encompassing Failure Mode and Effects Analysis (FMEA) and fuzzy theory. This approach analyses five dimensions of information security: access to information and systems, communication security, infrastructure, security management and secure information systems development. To illustrate the proposed model, it was applied to a University Research Group project. The results show that the most important aspects of information security risk are communication security, followed by infrastructure.

Maisa Mendona Silva; Ana Paula Henriques de Gusmo; Thiago Poleto; Lcio Camara e Silva; Ana Paula Cabral Seixas Costa

2014-01-01T23:59:59.000Z

91

Principles of Secure Information Flow Analysis Geoffrey Smith  

E-Print Network [OSTI]

Principles of Secure Information Flow Analysis Geoffrey Smith School of Computing and Information to explain the #12;2 Geoffrey Smith principles underlying secure information flow analysis and to discuss

Smith, Geoffrey

92

Mobile RFID Security Issues -ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Security  

E-Print Network [OSTI]

Mobile RFID Security Issues - ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Engineers Mobile RFID Security Issues Divyan M. Konidala, Kwangjo Kim Cryptology and Information Security #12;Mobile RFID Security Issues - ICU 2 RFID Technology (1/2) Radio Frequency Identification (RFID

Kim, Kwangjo

93

Security Control Assessor | Department of Energy  

Energy Savers [EERE]

Training Worksheet More Documents & Publications Information System Security Manager (ISSM) Cybersecurity Program Manager (CSPM) Information System Security Officer (ISSO)...

94

Optimal Information Security Investment with Penetration Testing  

E-Print Network [OSTI]

gathering prior to investing into protection against so-identified threats. Penetration testing is alsoOptimal Information Security Investment with Penetration Testing Rainer B¨ohme and M´ark F´elegyh´azi International Computer Science Institute, Berkeley, California {rainer.boehme|mark}@icsi.berkeley.edu Abstract

Bencsáth, Boldizsár

95

SIA: Secure information aggregation in sensor networks  

Science Journals Connector (OSTI)

In sensor networks, data aggregation is a vital primitive enabling efficient data queries. An on-site aggregator device collects data from sensor nodes and produces a condensed summary which is forwarded to the off-site querier, thus reducing the communication ... Keywords: Sensor networks, approximate interactive proofs, information aggregation, security

Haowen Chan; Adrian Perrig; Bartosz Przydatek; Dawn Song

2007-01-01T23:59:59.000Z

96

Information Resources Security Planning and Policy Committee -UTDPP1003  

E-Print Network [OSTI]

Information Resources Security Planning and Policy Committee - UTDPP1003 Policy Charge IR Security it is confidential, sensitive, both or neither. 2. Prepare a security plan to protect information identified as confidential, sensitive or both. 3. Assign management responsibility for implementing the security plan. 4

O'Toole, Alice J.

97

CrySTINA: Security in the Telecommunications Information  

E-Print Network [OSTI]

CrySTINA: Security in the Telecommunications Information Networking Architecture L.Butty'an, S.Wilhelmg@epfl.ch Abstract TINA specifies an open architecture for telecommunication services in the broadband, multimedia are increasingly used for the control of telecommunication systems. The use of computers enables more flexibility

Bencsáth, Boldizsár

98

THE UNIVERSITY OF TEXAS AT DALLAS INFORMATION SECURITY  

E-Print Network [OSTI]

. Instead, these requirements should be integrated into a comprehensive system security plan. II. Scope

O'Toole, Alice J.

99

The Economics of Information Security  

Science Journals Connector (OSTI)

...away with claiming that their automated teller machine (ATM) system...early adoption gives way to rapid deployment once the number...in turn provides tools for modeling and investigating such networks...replace them. Using multiround simulations to study how attack and defense...

Ross Anderson; Tyler Moore

2006-10-27T23:59:59.000Z

100

Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Broader source: Energy.gov (indexed) [DOE]

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

102

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network [OSTI]

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director cai@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Squicciarini, Anna Cinzia

103

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network [OSTI]

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Giles, C. Lee

104

Enforcement of DOE Classified Information Security Requirements Under Title  

Broader source: Energy.gov (indexed) [DOE]

of DOE Classified Information Security Requirements of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 Enforcement of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 In publishing 10 CFR Part 824, DOE has determined that civil penalties under Part 824 will only be assessed for violations of requirements for the protection of classified information (Restricted Data, Formerly Restricted Data and National Security Information). The rule does not include civil penalties relating to failure to protect sensitive but unclassified information. IMPLEMENTATION GUIDANCE More Documents & Publications Safety and Security Enforcement Process Overview Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01

105

Modeling behavioral considerations related to information security.  

SciTech Connect (OSTI)

The authors present experimental and simulation results of an outcome-based learning model for the identification of threats to security systems. This model integrates judgment, decision-making, and learning theories to provide a unified framework for the behavioral study of upcoming threats.

Martinez-Moyano, I. J.; Conrad, S. H.; Andersen, D. F. (Decision and Information Sciences); (SNL); (Univ. at Albany)

2011-01-01T23:59:59.000Z

106

TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH  

SciTech Connect (OSTI)

The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

Lee, Hsien-Hsin S

2010-05-11T23:59:59.000Z

107

National Security Information Classification Guidance Fundamental Review, June 2012  

Broader source: Energy.gov (indexed) [DOE]

Security Security Information Fundamental Classification Guidance Review Report to the Information Security Oversight Office June 2012 United States Department of Energy Washington, DC 20585 Department of Energy | June 2012 National Security Information Fundamental Classification Guidance Review | Page iii Executive Summary Section 1.9 of Executive Order (E.O.) 13526, Classified National Security Information, dated December 29, 2009, directs agency heads to complete a comprehensive review of agency classification guides to ensure they reflect current circumstances and to identify classified information that no longer requires protection and can be declassified. To meet this requirement, the Department of Energy (DOE), under the direction of the Senior Agency Official, devoted

108

Pantex Occupational Health System (OHS), National Nuclear Security...  

Energy Savers [EERE]

Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security...

109

Control Systems Security Standards: Accomplishments And Impacts |  

Broader source: Energy.gov (indexed) [DOE]

Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts This report describes the accomplishments and impacts of the standards team towards achieving these three goals and describes the follow-on efforts that need to be made toward meeting the priority strategies defined in the DOE/DHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards: Accomplishments & Impacts More Documents & Publications A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan

110

Information security knowledge sharing inorganizations: Investigating the effect ofbehavioral information security governance andnational culture  

Science Journals Connector (OSTI)

Abstract This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries namely, USA and Sweden allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledge sharing differs based on national culture. The study followed a mixed methods research design, wherein qualitative data was collected to both establish the study's research model and develop a survey instrument that was distributed to 578 information security executives. The results suggest that processes to coordinate implemented security knowledge sharing mechanisms have a major direct influence on the establishment of security knowledge sharing in organizations; the effect of organizational structure (e.g., centralized security function to develop and deploy uniform firm-wide policies, and use of steering committees to facilitate information security planning) is slightly weaker, while business-based information security management has no significant direct effect on security knowledge sharing. A mediation analysis revealed that the reason for the nonsignificant direct relation between business-based information security management and security knowledge sharing is the fully mediating effect of coordinating information security processes. Thus, the results disentangles the interrelated influences of behavioral information security governance factors on security knowledge sharing by showing that information security governance sets the platform to establish security knowledge sharing, and coordinating processes realize the effect of both the structure of the information security function and the alignment of information security management with business needs. A multigroup analysis identified that national culture had a significant moderating effect on the association between four of the six proposed relations. In Sweden which is seen as a less individualist, feminine country managers tend to focus their efforts on implementing controls that are aligned with business activities and employees' need; monitoring the effectiveness of the implemented controls, and assuring that the controls are not too obtrusive to the end-user. On the contrary, US organizations establish security knowledge sharing in their organization through formal arrangements and structures. These results imply that Swedish managers perceive it to be important to involve, or at least know how their employees cope with the decisions that have been made, thus favoring local participation in information security management, while US managers may feel the need to have more central control when running their information security function. The findings suggest that national culture should be taken into consideration in future studies in particular when investigating organizations operating in a global environment and understand how it affects behaviors and decision-making.

Waldo Rocha Flores; Egil Antonsen; Mathias Ekstedt

2014-01-01T23:59:59.000Z

111

The Relationship Between Information Security and Fraud Risk Management  

E-Print Network [OSTI]

of Regional Security & Fraud Risk HSBC THE CHINESE UNIVERSITY OF HONG KONG Department of Information current role in HSBC, as the Head of Regional Security & Fraud for Asia Pacific involves financial crime

Huang, Jianwei

112

Rethinking information privacy-security: does it really matter?  

Science Journals Connector (OSTI)

This paper reports some of the findings of a bigger study that examined the role of technological, individual, cultural, and informational traits in shaping the intention to buy and sell online. The focus of this paper is on information privacy-security ... Keywords: culture, information privacy, information security, online buying and selling, structural equation modeling

Waseem Afzal

2013-11-01T23:59:59.000Z

113

CONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT  

E-Print Network [OSTI]

and the decision of acceptable risk; · Monitor security controls in the information system on an ongoing1 basis that organization-wide operations remain within an acceptable level of risk when changes are made, and that timelyCONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT Shirley

114

Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

115

A Distributed Honeypot System for Grid Security  

Science Journals Connector (OSTI)

In this paper, we propose a distributed honeypot model for grid computing system security. Based on the IDS Snort and the...

Geng Yang; Chunming Rong; Yunping Dai

2004-01-01T23:59:59.000Z

116

PKI-based security for peer-to-peer information sharing  

SciTech Connect (OSTI)

The free flow of information is the feature that has made peer-to-peer information sharing applications popular. However, this very feature holds back the acceptance of these applications by the corporate and scientific communities. In these communities it is important to provide confidentiality and integrity of communication and to enforce access control to shared resources. We present a number of security mechanisms that can be used to satisfy these security requirements. Our solutions are based on established and proven security techniques and we utilize existing technologies when possible. As a proof of concept, we have developed an information sharing system, called scishare, which integrates a number of these security mechanisms to provide a secure environment for information sharing. This system will allow a broader set of user communities to benefit from peer-to-peer information sharing.

Berket, Karlo; Essiari, Abdelilah; Muratas, Artur

2004-05-02T23:59:59.000Z

117

Acceptable Information Technology Devices | Y-12 National Security...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Acceptable Information Technology Devices Within Y-12's Limited Areas, Exclusion Areas, Material Access Areas, and Protected Areas (security areas designated by DOE for the...

118

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?  

E-Print Network [OSTI]

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

Qin, Xiao

119

January 2007 SECURITY CONTROLS FOR  

E-Print Network [OSTI]

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

120

ORO Office Safeguards and Security Clearance Tracking System...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System...

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

DOE and Industry Showcase New Control Systems Security Technologies...  

Broader source: Energy.gov (indexed) [DOE]

Technology Development Energy Delivery Systems Cybersecurity Control Systems Security News Archive DOE and Industry Showcase New Control Systems Security Technologies at...

122

Hospital Information System  

Science Journals Connector (OSTI)

Ahospital information system is an information system for processing data, information and knowledge in hospital ...

2008-01-01T23:59:59.000Z

123

DRAFT DRAFT Peer Production of Privacy and Security Information  

E-Print Network [OSTI]

DRAFT DRAFT Peer Production of Privacy and Security Information L Jean Camp* Informatics Indiana_Friedman@ksgphd.harvard.edu #12;2 L. Jean Camp and Allan Friedman, "Peer Production of Privacy and Security Information" Ethical operators in the model of the turn of the twentieth century, as it required at the turn of the nineteenth

Camp, L. Jean

124

Policy 3505 Information Technology Security 1 OLD DOMINION UNIVERSITY  

E-Print Network [OSTI]

to the advancement of higher education through the effective use of information technology. Members include representatives from institutions of higher education, higher education technology companiesPolicy 3505 ­ Information Technology Security 1 OLD DOMINION UNIVERSITY University Policy Policy

125

Research on Security Architecture and Protocols of Grid Computing System  

Science Journals Connector (OSTI)

This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstract of grid computing system at Grid

Xiangming Fang; Shoubao Yang; Leitao Guo; Lei Zhang

2004-01-01T23:59:59.000Z

126

Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

127

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

128

T-582: RSA systems has resulted in certain information being...  

Broader source: Energy.gov (indexed) [DOE]

certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely...

129

Common Cyber Security Vulnerabilities Observed in Control System...  

Broader source: Energy.gov (indexed) [DOE]

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

130

National SCADA Test Bed - Enhancing control systems security...  

Broader source: Energy.gov (indexed) [DOE]

SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

131

Security Analysis and Project Management Systems | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Analysis and Project Management Systems SHARE Security Analysis and Project Management Systems ORNL brings together the subject matter experts with programmers to design,...

132

Collaboration Topics - System Software | National Nuclear Security  

National Nuclear Security Administration (NNSA)

System Software | National Nuclear Security System Software | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Collaboration Topics - System Software Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

133

Recommended Practice for Securing Control System Modems  

SciTech Connect (OSTI)

This paper addresses an often overlooked backdoor into critical infrastructure control systems created by modem connections. A modems connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

James R. Davidson; Jason L. Wright

2008-01-01T23:59:59.000Z

134

GAO Challenges and Efforts to Secure Control Systems (March 2004) |  

Broader source: Energy.gov (indexed) [DOE]

GAO Challenges and Efforts to Secure Control Systems (March 2004) GAO Challenges and Efforts to Secure Control Systems (March 2004) GAO Challenges and Efforts to Secure Control Systems (March 2004) Computerized control systems perform vital functions across many of our nation's critical infrastructures. For example, in natural gas distribution, they can monitor and control the pressure and flow of gas through pipelines. In October 1997, the President's Commission on Critical Infrastructure Protection emphasized the increasing vulnerability of control systems to cyber attacks. The House Committee on Government Reform and its Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census asked GAO to report on potential cyber vulnerabilities, focusing on (1) significant cybersecurity risks associated with control systems (2) potential and reported cyber attacks

135

Index of Energy Security Risk | Open Energy Information  

Open Energy Info (EERE)

Index of Energy Security Risk Index of Energy Security Risk Jump to: navigation, search Tool Summary Name: Index of Energy Security Risk Agency/Company /Organization: United States Chamber of Commerce, Institute for 21st Century Energy Sector: Energy Focus Area: Non-renewable Energy, Renewable Energy Topics: Co-benefits assessment, - Energy Security Resource Type: Publications Website: www.energyxxi.org/images/Energy_Index_2011_FINAL.pdf Cost: Free Index of Energy Security Risk Screenshot References: Index of Energy Security Risk[1] "This 2011 edition of the Index incorporates the most current energy data, including the Energy Information Administration's (EIA) Annual Energy Outlook 2011 (AEO 2011), to provide an up-to-date assessment of the trends having the greatest impact on energy security since the first Index was

136

Secure videoconferencing equipment switching system and method  

DOE Patents [OSTI]

Examples of systems described herein include videoconferencing systems having audio/visual components coupled to a codec. The codec may be configured by a control system. Communication networks having different security levels may be alternately coupled to the codec following appropriate configuration by the control system. The control system may also be coupled to the communication networks.

Dirks, David H; Gomes, Diane; Stewart, Corbin J; Fischer, Robert A

2013-04-30T23:59:59.000Z

137

Geographic Information System (GIS)  

Science Journals Connector (OSTI)

The geographic information system is abranch of health information system and public health information system ...developed for the capture, storage, manipulation, analysis, and visualization of geographic ...

2008-01-01T23:59:59.000Z

138

Secure control systems with application to cyber-physical systems  

Science Journals Connector (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power ... Keywords: SCADA systems, cyber-physical systems, secure control, security

Jin Dong; Seddik. M. Djouadi; James J. Nutaro; Teja Kuruganti

2014-04-01T23:59:59.000Z

139

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

140

PARS II New Contractor Information for Interconnection Security...  

Office of Environmental Management (EM)

V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System...

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Aerial Measuring System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Measuring System | National Nuclear Security Administration Measuring System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Aerial Measuring System Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Consequence Management > Aerial Measuring System Aerial Measuring System AMS Logo NNSA's Aerial Measuring System (AMS) provides specialized airborne

142

Information security: where computer science, economics and psychology meet  

Science Journals Connector (OSTI)

...trade became too hazardous. Camp Wolfram (2000) built on this...vulnerabilities There has been debate for centuries about whether security is helped...Cambridge, UK, 26-28 June 2006. Camp, J. Wolfram, C. 2000 Pricing...information security L.J. Camp and S. Lewis2004pp. 1-15...

2009-01-01T23:59:59.000Z

143

Transcript: NUIT Information Security News Podcast, August 2, 2012  

E-Print Network [OSTI]

is Thursday, August 2 and you're listening to the information security news podcast brought to you, I don't think this is any surprise to anybody who is listening to this here. People despise having when it comes to some computer security is having a password on the device that you're trying

Shahriar, Selim

144

System security Dr Len Hamey  

E-Print Network [OSTI]

threat, mitigates risk) The Attack Of The Killer Hack: Are You A Target For Hackers? 2004 Australian and behaviour ­ 65% Keeping up-to-date with latest threats ­ 61% Largest Factors Contributing To Hacks and procedures The Attack Of The Killer Hack Are You A Target For Hackers? Security Timeline #12;3 The Anatomy

Hamey, Len

145

Primer Control System Cyber Security Framework and Technical Metrics  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

146

Attachment 2 … List of Major Information Systems  

Broader source: Energy.gov (indexed) [DOE]

1 - List of Major Information Systems 1 - List of Major Information Systems Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network Infrastructure: Develops and deploys emerging information networking technology to production processes in

147

NNSA PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PERSONNEL SECURITY PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION Contractor Federal Name (Last, First, Middle): Suffix: Date of Birth: Social Security Number: Place of Birth (city and state/country): Citizenship(s): Email Address: Employer (legal name): Job Title: Required: LOCATION/BILLING Work Location: Contracting Office Location/SON: Prime Contract Number: Sub-contract Number: Facility Code: Employer Code: Required: CLEARANCE ACTION Requested Action(s): Clearance Level: (for employer/contract above) Clearance History Never held a clearance Previously held Currently holds Key Management Personnel (KMP)? Human Reliability Program (HRP)? PERSONNEL SECURITY USE ONLY: DOE Clearance: Special Access Program (SAP)? Yes No CLEARANCE JUSTIFICATION NARRATIVE

148

Farmland Security Zone | Open Energy Information  

Open Energy Info (EERE)

Zone Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Farmland Security ZoneLegal Abstract California Department of Conservation,...

149

EEO Complaints Information for Managers | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Information for Managers | National Nuclear Security Information for Managers | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog EEO Complaints Information for Managers Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > EEO Complaints Information for Managers EEO Complaints Information for Managers

150

Information Security Framework for Small and Medium Sized Businesses  

E-Print Network [OSTI]

Information security issues are a challenge to everyone who uses computers. The rise of the personal computer as a common business tool and the Internet as a common means of business communication and commerce have also created an environment...

Michnick, Steven M.

2009-06-17T23:59:59.000Z

151

A Data Grid Security System Based on Shared Context  

Science Journals Connector (OSTI)

Data grid system supports uniform and secure access of ... administrative domains, each with its own local security policy. The security challenge has been a focus in a data grid environment. This paper mainly pr...

Nong Xiao; Xiaonian Wu; Wei Fu; Xiangli Qu

2004-01-01T23:59:59.000Z

152

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

153

Implementing Information Security and Its Technology: A LineManagement Perspective  

SciTech Connect (OSTI)

Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

Barletta, William A.

2005-08-22T23:59:59.000Z

154

Secure Smart Grid Association | Open Energy Information  

Open Energy Info (EERE)

Secure Smart Grid Association Secure Smart Grid Association Jump to: navigation, search Name Secure Smart Grid Association Address 2374 S Josephine St Place Denver, Colorado Zip 80210 Region Rockies Area Number of employees 1-10 Year founded 2009 Phone number 303-997-2824 Coordinates 39.673446°, -104.9575629° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.673446,"lon":-104.9575629,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

155

TEPS/BPA Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

TEPS/BPA Information | National Nuclear Security Administration TEPS/BPA Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog TEPS/BPA Information Home > About Us > Our Operations > Acquisition and Project Management > Technical, Engineering, and Programmatic Support (TEPS) Blanket Purchase Agreements (BPAs) > TEPS/BPA Information

156

First Analysis Securities Corporation | Open Energy Information  

Open Energy Info (EERE)

First Analysis Securities Corporation First Analysis Securities Corporation Jump to: navigation, search Logo: First Analysis Securities Corporation Name First Analysis Securities Corporation Address One South Wacker Drive, Suite 3900 Place Chicago, Illinois Zip 60606 Product Private equity, venture capital, investment banking and equity research. Year founded 1981 Phone number (312) 258-1400 Website http://www.firstanalysis.com/ Coordinates 41.8819019°, -87.6367295° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.8819019,"lon":-87.6367295,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

157

TEACHING CONTEXT IN INFORMATION SECURITY Matt Bishop  

E-Print Network [OSTI]

security 1. PROBLEM STATEMENT Software engineers used standard software engineering processes to develop of software are annoying, but delays of an hour are not catastrophic. But in certain environments (notably to use techniques, and--more importantly--how to analyze social, political, and cultural environments

158

TEACHING CONTEXT IN INFORMATION SECURITY Matt Bishop  

E-Print Network [OSTI]

security 1. PROBLEM S A EMEN Software engineers used standard software engineering processes to develop and scenarios drawn from political science, history, and other humanities to force students to apply or derive the process enjoyable, stimulating, and effective. Key words: environment, judgment, instruction, computer

Bishop, Matt

159

The Need for Effective Information Security Awareness  

E-Print Network [OSTI]

, the high internet penetration growth rate in the Middle East and the limited security awareness among users internet penetration rates in the Middle East as of June 30, 2010 with rates equivalent to 88%, 75 had the highest e-commerce penetration rate in 2008. Specifically, 21.5% of UAE, 14.3% of Saudi Arabia

Aloul, Fadi

160

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Office of Environmental Management (EM)

can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a...

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Corporate Information Systems | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Corporate Information Systems Corporate Information Systems Corporate Information Systems The mission of the Office of Corporate Information Systems (CF-40) is to plan and manage the design, development, operation and maintenance of the Department's Integrated Management Navigation (iManage) program and projects; identify and implement business process automation initiatives; provide technical support for legacy systems operations and maintenance; provide technical support for web design, development and maintenance; manage cyber security and enterprise architecture activities; and serve as the liaison to Chief Information Officer for Information Technology services. Functions: Plan and manage the design, integration, and implementation of the Department's corporate business systems through the iManage program,

162

NNSA Policy System | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy System | National Nuclear Security Administration Policy System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NNSA Policy System Home > About Us > Our Operations > Management and Budget > NNSA Policy System NNSA Policy System The NNSA's Policy System is established under the authority of Section 3212(d) of Public Law 106-65, the National Defense Authorization Act for

163

Information Flow for Secure Distributed Applications  

E-Print Network [OSTI]

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

Cheng, Winnie Wing-Yee

2009-08-27T23:59:59.000Z

164

Information flow for secure distributed applications  

E-Print Network [OSTI]

Private and confidential information is increasingly stored online and increasingly being exposed due to human errors as well as malicious attacks. Information leaks threaten confidentiality, lead to lawsuits, damage ...

Cheng, Winnie Wing-Yee

2009-01-01T23:59:59.000Z

165

Securing Dynamic Membership Information in Multicast Communications  

E-Print Network [OSTI]

insiders and outsiders. We collectively refer to groiq~rl!namics information (GDI) as information performs group management and has the knowledge of GDI. Although the service provider may release some

Liu, K. J. Ray

166

Securing Dynamic Membership Information in Multicast Communications  

E-Print Network [OSTI]

insiders and outsiders. We collectively refer to group dynamics information (GDI) as information describing performs group management and has the knowledge of GDI. Although the service provider may release some

Sun, Yan Lindsay

167

Processes in Securing Open Architecture Software Systems  

E-Print Network [OSTI]

, and development practices play in facilitating or constrain- ing these processes through the case study. Our/variants. We employ a case study focusing on an OA software system whose security must be continually sustained versus descriptive practice of these processes and tool usage in studies of conventional and open source

Scacchi, Walt

168

Information Security Risk Modeling Using Bayesian Index  

Science Journals Connector (OSTI)

......not allowed to access the intranet and the information equipment...1 Banking 3 1 2 1 2 0 High technology 5 2 3 2 1 2 Information technology 8 3 5 4 2 2 Manufacture 11...banking industry, 5 from the technology industry, 8 from the information......

Chien-Lung Chan

2011-04-01T23:59:59.000Z

169

Control Systems Security Standards: Accomplishments & Impacts  

Broader source: Energy.gov (indexed) [DOE]

019 019 Unlimited Release November 2007 Control Systems Security Standards Accomplishments & Impacts Ronald Halbgewachs Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor any agency

170

Security Metricsfor Process Control Systems  

Broader source: Energy.gov [DOE]

This document describes the foundations of metrics, discusses application of these metrics to control system environments, introduces a metrics taxonomy, and suggests usage of metrics to achieve...

171

Mitigations for Security Vulnerabilities Found in Control System Networks |  

Broader source: Energy.gov (indexed) [DOE]

Mitigations for Security Vulnerabilities Found in Control System Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in

172

Senior Systems Engineer | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Senior Systems Engineer | National Nuclear Security Administration Senior Systems Engineer | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Regina Griego Senior Systems Engineer Regina Griego Regina Griego Role: Senior Systems Engineer Profile: Regina Griego has been elected a fellow of the International Council on

173

Securing Electrical Power System Operation  

Science Journals Connector (OSTI)

Automation in power systems has avery long tradition. Just recall the flyball governor in a steam engine and it becomes clear that power people have been using control principles and instruments for more th...

Petr Horacek PhD

2009-01-01T23:59:59.000Z

174

Cyber-Security of Networked Control Systems Karl Henrik Johansson  

E-Print Network [OSTI]

7/3/12 1 Cyber-Security of Networked Control Systems Karl Henrik Johansson #12;7/3/12 2 Recent Cyber-ARacks on Control Systems Cyber-Security of Networked

Johansson, Karl Henrik

175

DOE Cyber Security Role, Competency and Functional Matrix  

Broader source: Energy.gov (indexed) [DOE]

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

176

Control Systems Cyber Security:Defense in Depth Strategies  

SciTech Connect (OSTI)

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing defense-in-depth strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

David Kuipers; Mark Fabro

2006-05-01T23:59:59.000Z

177

DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING  

E-Print Network [OSTI]

DATE: NVLAP LAB CODE: INFORMATION TECHNOLOGY SECURITY TESTING TEST PROCEDURE SELECTION LIST ­ HEALTHCARE IT TESTING NVLAP HEALTHCARE IT TESTING APPLICATION (2013-01-02) PAGE 1 OF 3 Instructions: Please check the method for which you are requesting accreditation. NVLAP Code Test Procedure Description 2011

178

Office of the CISO, December 2010 Information Security Risk Advisory  

E-Print Network [OSTI]

Office of the CISO, December 2010 Information Security Risk Advisory Web Browsing Software attacks that exploit web browsers (e.g., Internet Explorer, Firefox, Safari, Chrome, Opera) are on the rise. Cyber criminals frequently attack web browsers to take control of computers, delete files, steal personally

Queitsch, Christine

179

A Security-enabled Grid System for MINDS Distributed Data Mining  

Science Journals Connector (OSTI)

Interest has been increasing in mining information from a huge amount of data for various purposes such as business processes, scientific discoveries, and security. MINDS (Minnesota INtrusion Detection System) is...

Seonho Kim; Jinoh Kim; Jon B. Weissman

2014-09-01T23:59:59.000Z

180

Service Oriented Architecture in Network Security - a novel Organisation in Security Systems  

E-Print Network [OSTI]

Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is distinguished. The security system then checks the node from outside and the right security components are provided through a service oriented architecture. Due to the running in a virtual machine, the infected nodes can be halted, duplicated, and moved to other nodes for further analysis and legal aspects. This organisation is in this article analysed and a preliminary implementation showing promising results are discussed.

Hilker, Michael

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Area Information | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Visiting Us / Area Information Visiting Us / Area Information Area Information Guides, Area Maps, Airport... Airport, About: McGhee Tyson Airport Airport: map to Oak Ridge/Knoxville Oak Ridge: City Guide for City of Oak Ridge, Tennessee Knoxville: maps for visitors Oak Ridge: area map with location of Y-12 Visitor's Center Oak Ridge: map of city streets Roane County: Roane County Guide Resources: News, History... Knoxville: Knoxville, Tennessee Knoxville: Museums Knoxville: Knoxville News-Sentinel Oak Ridge: City of Oak Ridge Oak Ridge: Chamber of Commerce Oak Ridge: Convention and Visitors Bureau Oak Ridge: Oak Ridger Oak Ridge: Secret City History Area Attractions: To Do and See Knoxville: Clarence Brown Theater Knoxville: Frank H. McClung Museum Knoxville: Knoxville Opera Company, Francis Graffeo, General

182

DOE Cites Battelle Energy Alliance, LLC for Classified Information Security Violations  

Broader source: Energy.gov (indexed) [DOE]

February 25,2011 February 25,2011 CERTIFIED MAIL RETURN RECEIPT REQUESTED Mr. John 1. Grossenbacher Director, Idaho National Laboratory and President, Battelle Energy Alliance, LLC P. O. Box 1625 Idaho Falls, Idaho 83415-3695 SEA-20ll-01 Dear Mr. Grossenbacher: The Office of Health, Safety and Security's Office of Enforcement has completed its investigation into the facts and circumstances associated with an incident of security concern regarding the introduction of classified information into unapproved information systems (security event) at the U.S. Department of Energy's (DOE) Idaho National Laboratory (INL). Based on the on-site investigation and evaluation of the evidence in this matter, and in consideration of information presented by you and other Battelle Energy Alliance, LLC (BEA)

183

Microsoft Word - AMI System Security Requirements - v1_01-1.doc  

Broader source: Energy.gov (indexed) [DOE]

UCAIUG: AMI-SEC-ASAP UCAIUG: AMI-SEC-ASAP AMI System Security Requirements V1.01 ASAP 12/17/2008 AMI System Security Specification v1.0 Page i Executive Summary 1 This document provides the utility industry and vendors with a set of security requirements for 2 Advanced Metering Infrastructure (AMI). These requirements are intended to be used in the 3 procurement process, and represent a superset of requirements gathered from current cross- 4 industry accepted security standards and best practice guidance documents. 5 6 This document provides substantial supporting information for the use of these requirements 7 including scope, context, constraints, objectives, user characteristics, assumptions, and 8

184

Program Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Contract International Association of Machinists and Aerospace Workers Agreement HS&E Management System Description and Worker Safety and Health Program 2015 Small Business...

185

CyberPhysical System Security for the Electric Power Grid  

E-Print Network [OSTI]

INVITED P A P E R Cyber­Physical System Security for the Electric Power Grid Control in power research efforts aimed at enhancing the smart grid's application and infrastructure security. Finally­physical systems (CPS); cyber security; electric grid; smart grid; supervisory control and data acquisi- tion

Manimaran, Govindarasu

186

Power System Security in Market Clearing and Dispatch Mechanisms  

E-Print Network [OSTI]

costs while maintaining grid security; however, the dominant concern was system reliability, while costs1 Power System Security in Market Clearing and Dispatch Mechanisms Claudio A. Ca~nizares, Senior typical market clearing and dispatch mechanisms based on security- constrained (SC) optimal power flow

Cañizares, Claudio A.

187

Wireless Policy, Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

188

Security Requirements Model for Grid Data Management Systems  

Science Journals Connector (OSTI)

In this paper, we present our ongoing work of a policy-driven approach to security requirements of grid data management systems (GDMS). We analyse the security functionalities of existing GDMS to determine their ...

Syed Naqvi; Philippe Massonet; Alvaro Arenas

2006-01-01T23:59:59.000Z

189

Recommended Practice for Securing Control System Modems | Department of  

Broader source: Energy.gov (indexed) [DOE]

Practice for Securing Control System Modems Practice for Securing Control System Modems Recommended Practice for Securing Control System Modems This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. Recommended Practice for Securing Control System Modems More Documents & Publications

190

Freedom of Information Act (FOIA) | National Nuclear Security  

National Nuclear Security Administration (NNSA)

(FOIA) | National Nuclear Security (FOIA) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Freedom of Information Act (FOIA) Home > About Us > Our Operations > NNSA Office of General Counsel > Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) The FOIA establishes the premise that people should have access to

191

Quantitative information-flow tracking for real systems  

E-Print Network [OSTI]

An information-flow security policy constrains a computer system's end-to-end use of information, even as it is transformed in computation. For instance, a policy would not just restrict what secret data could be revealed ...

McCamant, Stephen

2008-01-01T23:59:59.000Z

192

Security of Information Flow in the Electric Power Grid  

Science Journals Connector (OSTI)

The confidentiality of information in a system can be breached through unrestricted information flow. The formal properties of non-deducibility and non-inference are often used to assess information flow in purel...

Han Tang; Bruce McMillin

2008-01-01T23:59:59.000Z

193

The 5 Waves of Information Security From Kristian Beckman to the Present  

E-Print Network [OSTI]

The 5 Waves of Information Security ­ From Kristian Beckman to the Present Prof SH (Basie) von to the present time. The paper makes use of two papers by the author, Information Security ­ the Third Wave (von Solms, 2000) and Information Security ­ the Fourth Wave (von Solms, 2006), as well as a paper

Boyer, Edmond

194

Transforming our information systems  

E-Print Network [OSTI]

Transforming our information systems and technology Information Systems Development Framework #12 university. In support of this position we are transforming our information systems, servicesDonald Principal and Vice-Chancellor #12;Strategy for transformation Tactical Delivering the services and tools our

Strathclyde, University of

195

Ensuring system security through formal software evaluation  

SciTech Connect (OSTI)

With the increasing use of computer systems and networks to process safeguards information in nuclear facilities, the issue of system and data integrity is receiving worldwide attention. Among the many considerations are validation that the software performs as intended and that the information is adequately protected. Such validations are often requested of the Safeguards Systems Group of the Los Alamos National Laboratory. This paper describes our methodology for performing these software evaluations.

Howell, J A; Fuyat, C [Los Alamos National Lab., NM (United States)] [Los Alamos National Lab., NM (United States); Elvy, M [Marble Associates, Boston, MA (United States)] [Marble Associates, Boston, MA (United States)

1992-01-01T23:59:59.000Z

196

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

197

Uni ed Support for Heterogeneous Security Policies in Distributed Systems  

E-Print Network [OSTI]

Uni ed Support for Heterogeneous Security Policies in Distributed Systems Naftaly H. Minsky in this paper a security mechanism that can support e ciently, and in a uni ed manner, a wide range of security policies are de ned formallyandexplicitly,and are enforced bya uni ed mechanism. Each policy under

Minsky, Naftaly

198

Secure Mobile Data Collection Systems for Low-Budget Settings  

Science Journals Connector (OSTI)

Lack of infrastructures in health care and transportation, combined with the demand for low cost health services and shortage of medical professionals, are some of the known causes for loss of life in low income countries. Mobile Health (a.k.a. mHealth) ... Keywords: mHealth, Mobile Data Collection Systems, Mobile Security, J2ME, HTTPS, secure communication protocols, secure mobile data storage, secure mobile data transmission

F. Mancini; S. Gejibo; K. A. Mughal; R. A. B. Valvik; J. Klungsoyr

2012-08-01T23:59:59.000Z

199

2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN- CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION  

Broader source: Energy.gov [DOE]

2014 HEADQUARTERS FACILITIES MASTER SECURITY PLAN - CHAPTER 13, CONTROLLED UNCLASSIFIED INFORMATION Describes DOE Headquarters procedures for protecting Controlled Unclassified Information (CUI).

200

ORO Office Safeguards and Security Clearance Tracking System and Visitor  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office Safeguards and Security Clearance Tracking System and Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office More Documents & Publications Occupational Medicine - Assistant PIA, Idaho National Laboratory ORO Verification of Employment Tracking System(VETS) PIA, Oak ridge Operations Office iManage Strategic Integrated Procurement Enterprise System (STRIPES) PIA, Office of Procurement and Assistance Management

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect (OSTI)

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

202

Proposed platform for improving grid security by trust management system  

E-Print Network [OSTI]

With increasing the applications of grid system, the risk in security field is enhancing too. Recently Trust management system has been recognized as a noticeable approach in enhancing of security in grid systems. In this article due to improve the grid security a new trust management system with two levels is proposed. The benefits of this platform are adding new domain in grid system, selecting one service provider which has closest adaption with user requests and using from domains security attribute as an important factor in computing the trust value.

Siadat, Safieh; Mohsenzadeh, Mehran

2009-01-01T23:59:59.000Z

203

Help for the Developers of Control System Cyber Security Standards  

SciTech Connect (OSTI)

A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

Robert P. Evans

2008-05-01T23:59:59.000Z

204

Lincoln Electric System | Open Energy Information  

Open Energy Info (EERE)

Lincoln Electric System Lincoln Electric System Place Nebraska Utility Id 11018 Utility Location Yes Ownership M NERC Location MRO NERC MRO Yes RTO SPP Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes Activity Buying Transmission Yes Activity Distribution Yes Activity Wholesale Marketing Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] Energy Information Administration Form 826[2] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png 1000 W Mercury Vapor- Security Light Lighting 150 W High Pressure Sodium - Security Light Lighting 175 W Mercury Vapor- Security Light Lighting 250 W High Pressure Sodium - Security Light Lighting

205

Prototype system brings advantages of wireless technology to secure  

National Nuclear Security Administration (NNSA)

Prototype system brings advantages of wireless technology to secure Prototype system brings advantages of wireless technology to secure environment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Prototype system brings advantages of wireless technology ... Prototype system brings advantages of wireless technology to secure environment

206

A Summary of Control System Security Standards Activities in...  

Broader source: Energy.gov (indexed) [DOE]

sector standards, guidelines, and technical reports, demonstrating standards coverage by security topic. This work focuses on control systems standards applicable to the energy...

207

Initial CTBT international monitoring system security findings and recommendations  

SciTech Connect (OSTI)

An initial security evaluation of the proposed International Monitoring System (IMS) suggests safeguards at various points in the IMS to provide reliable information to the user community. Modeling the IMS as a network of information processing nodes provides a suitable architecture for assessing data surety needs of the system. The recommendations in this paper include the use of public-key authentication for data from monitoring stations and for commands issued to monitoring stations. Other monitoring station safeguards include tamper protection of sensor subsystems, preservation of data (i.e. short-term archival), and limiting the station`s network services. The recommendations for NDCs focus on the need to provide a backup to the IDC for data archival and data routing. Safeguards suggested for the IDC center on issues of reliability. The production of event bulletins should employ {open_quotes}two-man{close_quotes} procedures. As long as the data maintains its integrity, event bulletins can be produced by NDCs as well. The effective use of data authentication requires a sound key management system. Key management systems must be developed for the authentication of data, commands, and event bulletins if necessary. It is recommended that the trust placed in key management be distributed among multiple parties. The recommendations found in this paper offer safeguards for identified vulnerabilities in the IMS with regard to data surety. However, several outstanding security issues still exist. These issues include the need to formalize and obtain a consensus on a threat model and a trust model for the IMS. The final outstanding security issue that requires in-depth analysis concerns the IDC as a potential single point of failure in the current IMS design.

Craft, R.L.; Draelos, T.J.

1996-08-01T23:59:59.000Z

208

Securing Distributed Storage: Challenges, Techniques, and Systems  

E-Print Network [OSTI]

important security issues related to storage and present a comprehensive survey of the security services, present a critical review of the existing solutions, compare them, and highlight potential research issues time, recent trends in data outsourcing have raised many new privacy issues making security a crucial

Kim, Dae-Shik

209

UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY  

E-Print Network [OSTI]

UMBC Policy # X-1.00.02 Page 1 of 3 UMBC INFORMATION TECHNOLOGY SECURITY POLICY UMBC Policy # X-1.00.02 I. POLICY STATEMENT UMBC's Information Technology (IT) Security Policy is the basis to its IT resources. II. PURPOSE FOR POLICY The purpose of this policy is to establish an IT security

Adali, Tulay

210

Security plan for the Automated Transportation Management System  

SciTech Connect (OSTI)

The Automated Transportation Management System (ATMS) is an unclassified non-sensitive system consisting of hardware and software designed to facilitate the shipment of goods for the US Department of Energy (DOE). The system is secured against waste, fraud, abuse, misuse, and programming errors through a series of security measures that are discussed in detail in this document.

Not Available

1994-04-01T23:59:59.000Z

211

Techniques for Securing Substation Automation Systems David Guidry1  

E-Print Network [OSTI]

Techniques for Securing Substation Automation Systems David Guidry1 , Mike Burmester1 , Xiuwen Liu1 propose techniques for resilient substation automation of power utility systems with security based-90-5 compliant substation automation systems that are resilient. We demonstrate the feasibility of our approach

Burmester, Mike

212

University of Connecticut / Jason Pufahl, CISSP, CISM 1 INFORMATION SECURITY STRATEGIC  

E-Print Network [OSTI]

University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 #12;University of Connecticut / Jason Pufahl of Connecticut recognizes that information is a critical asset and that how information is managed, controlled

Alpay, S. Pamir

213

Putting Security in Context: Visual Correlation of Network Activity with Real-World Information  

SciTech Connect (OSTI)

To effectively identify and respond to cyber threats, computer security analysts must understand the scale, motivation, methods, source, and target of an attack. Central to developing this situational awareness is the analysts world knowledge that puts these attributes in context. What known exploits or new vulnerabilities might an anomalous traffic pattern suggest? What organizational, social, or geopolitical events help forecast or explain attacks and anomalies? Few visualization tools support creating, maintaining, and applying this knowledge of the threat landscape. Through a series of formative workshops with practicing security analysts, we have developed a visualization approach inspired by the human process of contextualization; this system, called NUANCE, creates evolving behavioral models of network actors at organizational and regional levels, continuously monitors external textual information sources for themes that indicate security threats, and automatically determines if behavior indicative of those threats is present on a network.

Pike, William A.; Scherrer, Chad; Zabriskie, Sean J.

2008-06-04T23:59:59.000Z

214

DOE and Industry Showcase New Control Systems Security Technologies at  

Broader source: Energy.gov (indexed) [DOE]

Technology Development » Energy Delivery Systems Technology Development » Energy Delivery Systems Cybersecurity » Control Systems Security News Archive » DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DistribuTECH Conference Tuesday-Thursday, March 23-25, 2010 Tampa Convention Center Booth #231 Tampa, FL Join the Department of Energy and its industry partners as they showcase six new products and technologies designed to secure the nation's energy infrastructure from cyber attack on Tuesday through Thursday, March 23-25. Visit Booth #231 at the DistribuTECH 2010 Conference & Exhibition in Tampa, FL, to see first-hand demonstrations of several newly commercialized control systems security products-each developed through a

215

Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS  

E-Print Network [OSTI]

2010- 2011 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS Relevance and currency -- that is what drives the Aviation Safety and Security Program of the USC Viterbi that our core course, Aviation Safety Management Systems, is so necessary in ensuring the safety

Wang, Hai

216

Applications for cyber security - System and application monitoring  

SciTech Connect (OSTI)

Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

Marron, J. E. [Invensys Process Systems, 33 Commercial Street, Foxboro, MA 02035 (United States)

2006-07-01T23:59:59.000Z

217

Research challenges for the security of control systems  

Science Journals Connector (OSTI)

In this paper we attempt to answer two questions: (1) Why should we be interested in the security of control systems? And (2) What are the new and fundamentally different requirements and problems for the security of control systems? We also propose ...

Alvaro A. Crdenas; Saurabh Amin; Shankar Sastry

2008-07-01T23:59:59.000Z

218

EcoSecurities Brasil Ltd | Open Energy Information  

Open Energy Info (EERE)

EcoSecurities Brasil Ltd Jump to: navigation, search Name: EcoSecurities Brasil Ltd. Place: Rio de Janeiro, Rio de Janeiro, Brazil Sector: Carbon Product: Brazilian subsidiary...

219

New_Contractor_Information_for_Interconnection_Security_Agreement...  

Broader source: Energy.gov (indexed) [DOE]

NewContractorInformationforInterconnectionSecurityAgreement.pdf NewContractorInformationforInterconnectionSecurityAgreement.pdf NewContractorInformationforIntercon...

220

Embedded system: a solution for home security.  

E-Print Network [OSTI]

??The objective of this thesis is to present the reader with the latest advances in home automation technologies with an emphasis on security. The X10/INSTEON, (more)

Hern, Roland Lee

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Developing Secure Power Systems Professional Competence: Alignment and Gaps  

Broader source: Energy.gov (indexed) [DOE]

Developing Secure Power Systems Professional Competence: Alignment Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) DOE has recognized that the electricity industry needs workforce development resources that can aid in the accelerating need for Secure Power Systems Professionals, while at the same time identifying capabilities and competencies to protect and enable the modernized grid currently being built. In the spring of 2011 a project was initiated to identify those capabilities and competencies along with assessing the need and qualifications for a certification program for Secure Power Systems

222

Engineering Design Information System (EDIS)  

SciTech Connect (OSTI)

This manual is a guide to the use of the Engineering Design Information System (EDIS) Phase I. The system runs on the Martin Marietta Energy Systems, Inc., IBM 3081 unclassified computer. This is the first phase in the implementation of EDIS, which is an index, storage, and retrieval system for engineering documents produced at various plants and laboratories operated by Energy Systems for the Department of Energy. This manual presents on overview of EDIS, describing the system's purpose; the functions it performs; hardware, software, and security requirements; and help and error functions. This manual describes how to access EDIS and how to operate system functions using Database 2 (DB2), Time Sharing Option (TSO), Interactive System Productivity Facility (ISPF), and Soft Master viewing features employed by this system. Appendix A contains a description of the Soft Master viewing capabilities provided through the EDIS View function. Appendix B provides examples of the system error screens and help screens for valid codes used for screen entry. Appendix C contains a dictionary of data elements and descriptions.

Smith, P.S.; Short, R.D.; Schwarz, R.K.

1990-11-01T23:59:59.000Z

223

Lincoln Electric System | Open Energy Information  

Open Energy Info (EERE)

System System (Redirected from LES) Jump to: navigation, search Name Lincoln Electric System Place Nebraska Utility Id 11018 Utility Location Yes Ownership M NERC Location MRO NERC MRO Yes RTO SPP Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes Activity Buying Transmission Yes Activity Distribution Yes Activity Wholesale Marketing Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] Energy Information Administration Form 826[2] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png 1000 W Mercury Vapor- Security Light Lighting 150 W High Pressure Sodium - Security Light Lighting 175 W Mercury Vapor- Security Light Lighting

224

Secure control systems with application to cyber-physical systems  

SciTech Connect (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

Dong, Jin [ORNL] [ORNL; Djouadi, Seddik M [ORNL] [ORNL; Nutaro, James J [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL

2014-01-01T23:59:59.000Z

225

Creating security applications based on The Global Certificate Management System  

Science Journals Connector (OSTI)

The Certificate Management System (CMS) is a global network system whose primary services are generation, distribution, storage and verification of certificates. It supports various security applications which use public key cryptography by providing the means for the administration of certificates. This paper describes the interface between security enhanced application and the CMS. The interface layer with which the security applications are extended is named CMS Client. The CMS Client comprises a set of functions that enable the certification of users of security applications, retrieval of certificates and verification of retrieved certificates. The paper gives a short description of the CMS system and a detailed description of the CMS Client functions. Furthermore it describes how to extend the existing or create new security applications based on the CMS system.

Nada Kapidzic

1998-01-01T23:59:59.000Z

226

Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations  

Science Journals Connector (OSTI)

Safety Instrumented Systems (SIS) as defined in IEC 61508 and IEC 61511 are very important for the safety of offshore oil & natural gas installations. SIS typically include the Emergency Shutdown System (ESD) that ensures that process systems return ... Keywords: Offshore, Process Control, Safety Instrumented Systems, Secure remote access

Martin Gilje Jaatun; Tor Olav Grtan; Maria B. Line

2008-06-01T23:59:59.000Z

227

Enhancing the OS against Security Threats in System Administration  

Science Journals Connector (OSTI)

The consequences of security breaches due to system administrator errors can be catastrophic. Software systems in general, and OSes in particular, ultimately depend on a fully trusted administrator whom is gra...

Nuno Santos; Rodrigo Rodrigues; Bryan Ford

2012-01-01T23:59:59.000Z

228

Enhancing the OS against security threats in system administration  

Science Journals Connector (OSTI)

The consequences of security breaches due to system administrator errors can be catastrophic. Software systems in general, and OSes in particular, ultimately depend on a fully trusted administrator whom is granted superuser privileges that allow him ...

Nuno Santos; Rodrigo Rodrigues; Bryan Ford

2012-12-01T23:59:59.000Z

229

Homeland Security Challenges Facing Small Water Systems in Texas  

E-Print Network [OSTI]

with small water systems to develop volun- tary assessments of the homeland security threats that they face. EPA provides assistance to small systems through education work- shops and seminars, reports and guidelines, and tutorials on CD. In 2005 EPA...

Dozier, Monty; Theodori, Gene L.; Jensen, Ricard

2007-05-31T23:59:59.000Z

230

Design and Fabrication of Security and Home Automation System  

Science Journals Connector (OSTI)

Home automation system was designed and fabricated for controlling of home appliances, gas detection and home security. The fabricated system could detect the ... the house or office and the operation of home app...

Eung Soo Kim; Min Sung Kim

2006-01-01T23:59:59.000Z

231

Information Flow Control for Secure Web Sites Maxwell Norman Krohn  

E-Print Network [OSTI]

smaller, and configure the Web site's security policies. They need only change when the policy changes

232

Information-Theoretically Secure Communication Under Channel Uncertainty  

E-Print Network [OSTI]

. In addition, when the eavesdropper channel realization is strong, a prescribed part of the bits needs to remain secure. We call such codes security embedding codes, referring to the fact that high-security bits are now embedded into the low-security ones. We...

Ly, Hung Dinh

2012-07-16T23:59:59.000Z

233

Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems  

Science Journals Connector (OSTI)

The specification of security requirements for systems of systems is often an activity that is forced upon non-security experts and performed under time pressure. This paper describes how we have addressed this p...

Albin Zuccato; Nils Daniels; Cheevarat Jampathom

2010-01-01T23:59:59.000Z

234

Open Energy Information Systems  

Broader source: Energy.gov (indexed) [DOE]

OpenEIS (energy information OpenEIS (energy information systems) Jessica Granderson Lawrence Berkeley National Laboratory JGranderson@lbl.gov, 510.486.6792 April 3, 2013 2 | Building Technologies Office eere.energy.gov Purpose & Objectives Problem Statement: Advanced algorithms and analyses can enable 5-40% savings, yet are rarely adopted; 3 relevant barriers include: 1. Lack of awareness that simple analytics can be used to generate valuable insights and actionable information, without further training

235

Open Energy Information Systems  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OpenEIS (energy information OpenEIS (energy information systems) Jessica Granderson Lawrence Berkeley National Laboratory JGranderson@lbl.gov, 510.486.6792 April 3, 2013 2 | Building Technologies Office eere.energy.gov Purpose & Objectives Problem Statement: Advanced algorithms and analyses can enable 5-40% savings, yet are rarely adopted; 3 relevant barriers include: 1. Lack of awareness that simple analytics can be used to generate valuable insights and actionable information, without further training

236

Secure data storage for mobile data collection systems  

Science Journals Connector (OSTI)

Wireless network infrastructures, notably cellular networks, are becoming a vital element for exchanging electronic data in low income countries. Several key sectors are already leveraging on cellular networks: mobile financial transactions have already ... Keywords: Delphi theory, J2ME, OWASP, RMS, mhealth, mobile data collection systems, mobile security, secure mobile data storage

Samson Gejibo; Federico Mancini; Khalid A. Mughal; Remi A. B. Valvik; Jrn Klungsyr

2012-10-01T23:59:59.000Z

237

Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS  

E-Print Network [OSTI]

2011- 2012 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS of aviation safety. Endings signal new beginnings and new beginnings mean evolving challenges for safety. This was the world in which the USC Aviation Safety and Security Program was born in 1952 and this is the world

Wang, Hai

238

Climate Registry Information System | Open Energy Information  

Open Energy Info (EERE)

Climate Registry Information System Climate Registry Information System Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Climate Registry Information System Agency/Company /Organization: The Climate Registry Sector: Climate Focus Area: Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Online calculator User Interface: Website Website: www.theclimateregistry.org/climate-registry-information-system-cris/ Web Application Link: www.theclimateregistry.org/climate-registry-information-systhttps://ww Cost: Free References: General Reporting Protocol[1] The Climate Registry Information System (CRIS) is the official online greenhouse gas calculation, reporting, and verifcation tool for The Climate Registry, a North American registry through which members voluntarily

239

REQUEST FOR INFORMATION Student Information System  

E-Print Network [OSTI]

REQUEST FOR INFORMATION Student Information System This form is to be used by those requesting information from the Registrar's Office. Federal privacy regulations require strict monitoring of access to student information. PERSONS OR ORGANIZATIONS MUST DEMOSTRATE THAT THE INFORMATION IS NEEDED

Thaxton, Christopher S.

240

Information Security: The Human Perspective Kathleen M. Carley  

E-Print Network [OSTI]

, redundancy, cascade effects, organizational memory, organizational learning, information diffusion, changing), CASOS ­ the center for Computational Analysis of Social and Organizational Systems at Carnegie Mellon network and knowledge management approach to discovering organizational vulnerabilities within companies

Sadeh, Norman M.

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Information security: where computer science, economics and psychology meet  

Science Journals Connector (OSTI)

...Gilbert 2006). Since 2004, computer crime has become organized...Commemoration Commission and by NSF grant DGE-0636782 (T.M...In Proc. Seventeenth Annual Computer Security Applications Conf...Schechter, S. E. 2004 Computer security strength and risk...

2009-01-01T23:59:59.000Z

242

Comprehensive test ban treaty international monitoring system security threats and proposed security attributes  

SciTech Connect (OSTI)

To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

Draelos, T.J.; Craft, R.L.

1996-03-01T23:59:59.000Z

243

Activities to Secure Control Systems in the Energy Sector  

Broader source: Energy.gov (indexed) [DOE]

sector sector NSTB November 2008 Hank Kenchington - Program Manager Office of Electricity of Delivery and Energy Reliability U.S. Department of Energy Activities to Secure Control Systems in the Energy Sector * 2,000,000 Miles of Oil Pipelines * 1,300,000 Miles of Gas Pipelines * 2,000 Petroleum Terminals * ~1,000,000 Wells * Extensive Ports, Refineries, Transportation, and LNG Facilities * 160,000 Miles of Electrical Transmission lines * ~17,000 Generators; 985,000 Megawatts (net summer capacity) * Over 3,100 Electric Utilities, with 131 million customers Refinery Locations, Crude and Product Pipelines Source: Energy Information Administration, Office of Oil & Gas LNG Import Facilities (Reactivation underway) Legend Interstate Pipelines Intrastate and Other Pipelines

244

AMI System Security Requirements - v1_01-1 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AMI System Security Requirements - v101-1 AMI System Security Requirements - v101-1 This document provides the utility industry and vendors with a set of security requirements...

245

NIM (NERSC Information Management) system  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NERSC Information Management (NIM) portal The NERSC Information Management (NIM) system is a web portal used to view and modify user account, usage, and allocations information....

246

Security Assessment of Communication Networks for Integrated Substation Automation Systems  

Science Journals Connector (OSTI)

To assess the security of communication networks for integrated substation automation systems, a systematic approach based on ... to communication networks between the control center and substations through the a...

Huisheng Gao; Xuejiao Dai

2011-01-01T23:59:59.000Z

247

Access Rate Control System | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

by this browser. Download video Captions: On Time: 4:03 min Developed to support safeguards and security, the Access Rate Control System (ARCS) controls the speed of entry...

248

Security Requirements for Classified Automatic Data Processing Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish and describe the computer security program for classified automatic data processing (ADP) systems at the Department of Energy (DOE) Headquarters. This directive does not cancel another directive. Canceled by DOE N 251.9.

1985-07-10T23:59:59.000Z

249

Security in the Telecommunications Information Networking Architecture --the CrySTINA Approach \\Lambda  

E-Print Network [OSTI]

Security in the Telecommunications Information Networking Architecture -- the CrySTINA Approach Butty??an Jean­Pierre Hubaux Swiss Federal Institute of Technology Telecommunications Laboratory EPFL for the Telecommunication Information Networking Architecture (TINA) is security. TINA is intended to provide

Bencsáth, Boldizsár

250

Geographic Information System | Open Energy Information  

Open Energy Info (EERE)

Geographic Information System Geographic Information System Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Technique: Geographic Information System Details Activities (24) Areas (11) Regions (4) NEPA(0) Exploration Technique Information Exploration Group: Data and Modeling Techniques Exploration Sub Group: Data Techniques Parent Exploration Technique: Data Techniques Information Provided by Technique Lithology: Any mapable information Stratigraphic/Structural: Any mapable information Hydrological: Any mapable information Thermal: Any mapable information Cost Information Low-End Estimate (USD): 70.007,000 centUSD 0.07 kUSD 7.0e-5 MUSD 7.0e-8 TUSD / hour Median Estimate (USD): 80.008,000 centUSD 0.08 kUSD 8.0e-5 MUSD 8.0e-8 TUSD / hour High-End Estimate (USD): 150.0015,000 centUSD

251

Training Management Information System  

SciTech Connect (OSTI)

The Training Management Information System (TMIS) is an integrated information system for all training related activities. TMIS is at the leading edge of training information systems used in the nuclear industry. The database contains all the necessary records to confirm the department's adherence to accreditation criteria and houses all test questions, student records and information needed to evaluate the training process. The key to the TMIS system is that the impact of any change (i.e., procedure change, new equipment, safety incident in the commercial nuclear industry, etc.) can be tracked throughout the training process. This ensures the best training can be performed that meets the needs of the employees. TMIS is comprised of six functional areas: Job and Task Analysis, Training Materials Design and Development, Exam Management, Student Records/Scheduling, Evaluation, and Commitment Tracking. The system consists of a VAX 6320 Cluster with IBM and MacIntosh computers tied into an ethernet with the VAX. Other peripherals are also tied into the system: Exam Generation Stations to include mark sense readers for test grading, Production PC's for Desk-Top Publishing of Training Material, and PC Image Workstations. 5 figs.

Rackley, M.P.

1989-01-01T23:59:59.000Z

252

US National Nuclear Security Administration NNSA | Open Energy Information  

Open Energy Info (EERE)

Nuclear Security Administration NNSA Nuclear Security Administration NNSA Jump to: navigation, search Name US National Nuclear Security Administration (NNSA) Place Washington, DC Zip 20585 Product Washington D.C.-based nuclear body established by the United States Congress as a separately organized agency within the US Department of Energy. References US National Nuclear Security Administration (NNSA)[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. US National Nuclear Security Administration (NNSA) is a company located in Washington, DC . References ↑ "US National Nuclear Security Administration (NNSA)" Retrieved from "http://en.openei.org/w/index.php?title=US_National_Nuclear_Security_Administration_NNSA&oldid=352617

253

Roadmap to Secure Control Systems in the Energy Sector  

Broader source: Energy.gov (indexed) [DOE]

Roadmap Roadmap to Secure Control Systems in the Energy Sector -  - Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improing cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and goernment to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors oer the next ten years. The Roadmap proides a strategic framework for guiding industry and goernment efforts based on a clear ision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. A distinctie feature of this collaboratie effort is the actie inolement and leadership of energy asset

254

Information Systems Engineering Guidance (ISEG)  

Broader source: Energy.gov (indexed) [DOE]

Departmental Information Systems Engineering (DISE) Departmental Information Systems Engineering (DISE) Volume 1 Information Systems Engineering Lifecycle January 31, 2002 Software Quality and Systems Engineering Program Office of the Associate CIO of Architecture, Standards & Planning Office of the Chief Information Officer Title Page Document Series: Departmental Information Systems Engineering Document Name: Volume 1, Information Systems Engineering Lifecycle Publication Date: 01/31/02 Document Owner: Software Quality and Systems Engineering Program Office of the Associate CIO of Architecture, Standards & Planning The concepts and processes in this document are aligned with the DOE Information Management (IM) Strategic Plan Mission and Goals. The Information Management Mission is:

255

Project Management and Systems Support | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Management and Systems Support | National Nuclear Security Project Management and Systems Support | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Project Management and Systems Support Home > About Us > Our Operations > Acquisition and Project Management > Project Management and Systems Support Project Management and Systems Support Goal

256

Small Business Sourcing System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Sourcing System | National Nuclear Security Administration Sourcing System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Small Business Sourcing System Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Small Business Toolbox > Small Business Sourcing System Small Business Sourcing System

257

Project Management and Systems Support | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Project Management and Systems Support | National Nuclear Security Project Management and Systems Support | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Project Management and Systems Support Home > About Us > Our Operations > Acquisition and Project Management > Project Management and Systems Support Project Management and Systems Support Goal

258

Transmission Pricing of Distributed Multilateral Energy Transactions to Ensure System Security and Guide Economic Dispatch  

E-Print Network [OSTI]

Transmission Pricing of Distributed Multilateral Energy Transactions to Ensure System Security and Guide Economic Dispatch...

Ilic, Marija; Hsieh, Eric; Remanan, Prasad

2004-06-16T23:59:59.000Z

259

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Broader source: Energy.gov (indexed) [DOE]

200: Red Hat Directory Server Information Disclosure Security 200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

260

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Broader source: Energy.gov (indexed) [DOE]

0: Red Hat Directory Server Information Disclosure Security 0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

T-582: RSA systems has resulted in certain information being extracted from  

Broader source: Energy.gov (indexed) [DOE]

2: RSA systems has resulted in certain information being 2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely sophisticated cyber attack in progress, targeting their RSA business unit. RSA took a variety of aggressive measures against the threat to protect their business and their customers, including further hardening of their IT infrastructure. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

262

Photovoltaic Geographical Information System | Open Energy Information  

Open Energy Info (EERE)

Photovoltaic Geographical Information System Photovoltaic Geographical Information System Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Photovoltaic Geographical Information System Focus Area: Renewable Energy Topics: Opportunity Assessment & Screening Website: re.jrc.ec.europa.eu/pvgis/ Equivalent URI: cleanenergysolutions.org/content/photovoltaic-geographical-information Language: English Policies: Deployment Programs DeploymentPrograms: Demonstration & Implementation This tool provides a geographical inventory of solar energy resources and an assessment of the electricity generation from photovoltaic systems in Europe, Africa, and southwest Asia. The tools allows for analysis of the technical, environmental, and socio-economic factors of solar electricity generation. Users may access maps and posters generated using the tool, as

263

Surreptitious security violation in the MVS operating system  

Science Journals Connector (OSTI)

Even in the well-protected IBM MVS operating system users can force breaches in the standard protection mechanisms and obtain control over the entire installation regardless of RACF or TOP SECRET protection software. This paper encourages computing center management to appoint security officers to prevent and detect security violations. The need for these officers will be demonstrated as a consequence of the violations shown.

Ronal Paans; Guus Bonnes

1983-01-01T23:59:59.000Z

264

Nuclear safety information sharing agreement between NRC and DOEs Office of Environment, Health, Safety and Security  

Broader source: Energy.gov [DOE]

Nuclear safety information sharing agreement between NRC and DOEs Office of Environment, Health, Safety and Security.

265

Crops reap benefits of Pantex irrigation system | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Crops reap benefits of Pantex irrigation system | National Nuclear Security Crops reap benefits of Pantex irrigation system | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Crops reap benefits of Pantex irrigation system Home > content > Crops reap benefits of Pantex irrigation system Crops reap benefits of Pantex irrigation system

266

Office of Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

267

Security Notice | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

268

PIA - Human Resources Information System (HRIS) | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Information System (HRIS) PIA - Human Resources Information System (HRIS) PIA - Human Resources Information System (HRIS) PIA - Human Resources Information System (HRIS) More...

269

Remote Access to the BNL Network, Cyber Security, Information Technology  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

270

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

271

Access control models and security labelling  

Science Journals Connector (OSTI)

Security labels convey information that is utilised to perform access control decisions, specify protective measures, and aid in the determination of additional handling restrictions required by security policies. In discussing security labelling, one ... Keywords: access control, assurance, dynamic labelling model, open system, security label, security policy

Chuchang Liu; Angela Billard; Maris Ozols; Nikifor Jeremic

2007-01-01T23:59:59.000Z

272

Nevada National Security Site Cleanup Information Is Just a Click Away with  

Broader source: Energy.gov (indexed) [DOE]

Nevada National Security Site Cleanup Information Is Just a Click Nevada National Security Site Cleanup Information Is Just a Click Away with Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public Nevada National Security Site Cleanup Information Is Just a Click Away with Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public December 27, 2012 - 12:00pm Addthis Shown here is a screenshot of the interactive map, which makes Nevada National Security Site data more accessible to the public. Shown here is a screenshot of the interactive map, which makes Nevada National Security Site data more accessible to the public. LAS VEGAS, NV - For decades, the Nevada Site Office (NSO) has been investigating, characterizing, identifying, and performing corrective

273

Pressurized security barrier and alarm system  

DOE Patents [OSTI]

A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder`s making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed. 7 figures.

Carver, D.W.

1995-04-11T23:59:59.000Z

274

Computational Systems & Software Environment | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Computational Systems & Software Environment | National Nuclear Security Computational Systems & Software Environment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog CSSE Computational Systems & Software Environment Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

275

Argonne Team Challenges Physical Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

276

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network [OSTI]

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

Habib, Ayman

277

Investigating alternative concepts of operations for a maritime security system of systems  

E-Print Network [OSTI]

For complex systems of systems, such as those required to perform maritime security, system architects have numerous choices they may select from, both in the components and in the way the system operates. Component choices, ...

Mekdeci, Brian Anthony

278

Improving Security in the ATLAS PanDA System  

E-Print Network [OSTI]

The security challenges faced by users of the grid are considerably different to those faced in previous environments. The adoption of pilot jobs systems by LHC experiments has mitigated many of the problems associated with the inhomogeneities found on the grid and has greatly improved job reliability; however, pilot jobs systems themselves must then address many security issues, including the execution of multiple users' code under a common `grid' identity. In this paper we describe the improvements and evolution of the security model in the ATLAS PanDA (Production and Distributed Analysis) system. We describe the security in the PanDA server which is in place to ensure that only authorized members of the VO are allowed to submit work into the system and that jobs are properly audited and monitored. We discuss the security in place between the pilot code itself and the PanDA server, ensuring that only properly authenticated workload is delivered to the pilot for execution. When the code to be executed is fro...

Caballero, J; The ATLAS collaboration; Nilsson, P; Stewart, G; Potekhin, M; Wenaus, T

2011-01-01T23:59:59.000Z

279

Control Systems Security News Archive | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

News Archive News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity August 2010: - DOE 2010 Cybersecurity Peer Review Update March 2010 - DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH Feb. 2010 - DOE Issues National Energy Sector Cyber Organization Notice of Intent Nov. 2009 - New TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE Award October 2009 - DOE NSTB researchers demonstrated R&D successes to asset owners at EnergySec Conference September 2009 - ISA approves standard for wireless automation in process control applications Sept. 2009 - Government and Industry a Force for Collaboration at the

280

Definition: Geographic Information System | Open Energy Information  

Open Energy Info (EERE)

Geographic Information System Geographic Information System Jump to: navigation, search Dictionary.png Geographic Information System A GIS is an organized collection of computer hardware, software, geographic data, and personnel designed to efficiently capture, store, update, manipulate, analyze, and display all forms of geographically referenced information[1] View on Wikipedia Wikipedia Definition References ↑ http://ciesin.columbia.edu/docs/005-331/005-331.html Ret LikeLike UnlikeLike You like this.Sign Up to see what your friends like. rieved from "http://en.openei.org/w/index.php?title=Definition:Geographic_Information_System&oldid=579407" Category: Definitions What links here Related changes Special pages Printable version Permanent link Browse properties 429 Throttled (bot load)

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

U-200: Red Hat Directory Server Information Disclosure Security...  

Broader source: Energy.gov (indexed) [DOE]

Passwords to Remote Authenticated and Local Users V-041: Red Hat CloudForms Multiple Vulnerabilities T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

282

Energy Independence and Security Act of 2007 | Open Energy Information  

Open Energy Info (EERE)

This article is a stub. You can help OpenEI by expanding it. External Links Energy Independence and Security Act of 2007 Retrieved from "http:en.openei.orgw...

283

Information Systems Engineering Guidance (ISEG)  

Broader source: Energy.gov (indexed) [DOE]

Departmental Information Systems Engineering (DISE) Departmental Information Systems Engineering (DISE) Guidance Volume 2 Managing DOE IT Projects March 26, 2002 Revised December 27, 2002 Developed by the Software Quality and Systems Engineering Program Office of the Chief Information Officer Departmental Information Systems Engineering Guidance Title Page Document Series: Departmental Information Systems Engineering (DISE) Guidance Document Name: Volume 2, Managing DOE IT Projects Publication Date: 03/26/03, Revised 12/27/02 Document Owner: Office of the Chief Information Officer Software Quality and Systems Engineering Brenda Coblentz, IM-21, Program Manager Acknowledgement: Wayne Jones, author of the DOE (HQ) IM Project Management Guide, September 1998

284

DOE/CX-00007 CATEGORICAL EXCLUSION SAFEGUARDS AND SECURITY ENHANCED ASSESSMENT SYSTEM  

Broader source: Energy.gov (indexed) [DOE]

07 07 CATEGORICAL EXCLUSION SAFEGUARDS AND SECURITY ENHANCED ASSESSMENT SYSTEM (PROJECT S-221) HANFORD SITE, RICHLAND, WASHINGTON PROPOSED ACTION The U.S. Department of Energy (DOE) proposes to install six wooden utility poles to support the safeguards and security enhanced assessment system. LOCATION OF ACTION The locations of the proposed action are generally within and around 200 East Area of the Hanford Site. The specific locations cannot be disclosed due to their safeguards and security related nature, and the locations have been designated Official Use Only. It is the policy of the DOE to make records available to the public to the greatest extent possible, in keeping with the spirit of the Freedom of Information Act (FOIA), while at the same time

285

Incorporating hacking projects in computer and information security education: an empirical study  

Science Journals Connector (OSTI)

Incorporating hacking projects in information security education is controversial. However, several studies discussed the benefits of including offensive exercises (e.g., hacking) in information security courses. In this paper, we present our experiment in incorporating hacking projects in the laboratory exercises for an undergraduate-level Computer and Information Security (CIS) course at King Abdulaziz University (KAU), Saudi Arabia. We conducted a survey to measure the effectiveness of incorporating hacking projects from the students' perspective. We also questioned the ethical aspects of these projects. The results strongly suggest that hacking projects have helped the students better understanding computer and information security principles. Furthermore, the majority of the students stated that they do not intend to misuse the learned skills, mainly for religious and ethical reasons. We also present the precautions that we took to avoid legal or ethical consequences that may be connected with these activities.

Eman Alashwali

2014-01-01T23:59:59.000Z

286

J. Douglas Streit, Information Security Officer Office of Computing and Communications Services  

E-Print Network [OSTI]

Last updated February 6, 2012 Old Dominion University Information Technology Security Program #12;J and collaborative network environment required for higher education institutions to foster scholarly activity II delegated authority from the Commonwealth under the Virginia Restructured Higher Education

287

Roadmap to Secure Control Systems in the Energy: Executive Summary  

Broader source: Energy.gov (indexed) [DOE]

Foreword Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. A distinctive feature of this collaborative effort is the active involvement and leadership of energy asset owners and operators in developing the Roadmap content and priorities. The Roadmap synthesizes

288

MODELING SECURITY IN CYBER-PHYSICAL SYSTEMS  

E-Print Network [OSTI]

novel aspects of networked systems that include integrating dis- tributed computing systems with monitoring and controlling entities in the physical environment. For example, in real-time control systems stations. Other examples include smart grid systems and supervisory control and data acquisition (SCADA

Burmester, Mike

289

Study on Threats to Security of Space TT&C Systems  

Science Journals Connector (OSTI)

A space Tracking, Telemetry and Command (TT&C) system is a spaceflight support system and its security is of great significance. A framework of space TT&C system security threat assessment is proposed and it comp...

Qi Wang; Bo Wang; Bin Wu

2013-01-01T23:59:59.000Z

290

NERSC Increases System Storage and Security for Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Increases Increases System Storage and Security for Users NERSC Increases System Storage and Security for Users April 28, 2009 Franklin Upgrades Improve I/O Performance Throughout the month of March the Cray XT4 machine Franklin underwent a series of upgrades and improvements, including a major I/O upgrade. The disk capacity of the scratch file system was increased by 30% to 460 TB, and the I/O bandwidth was nearly tripled to an aggregate write performance of 32 GB/sec, compared to 11 GB/s before the upgrade. Instead of adding the new hardware to the existing scratch file system, NERSC chose to implement a second scratch file system so that Franklin now has two scratch file systems, each with a peak write bandwidth of 16 GB/sec. "We doubled the amount of I/O hardware and nearly tripled the bandwidth,

291

Critical issues in process control system security : DHS spares project.  

SciTech Connect (OSTI)

The goals of this event are: (1) Discuss the next-generation issues and emerging risks in cyber security for control systems; (2) Review and discuss common control system architectures; (3) Discuss the role of policy, standards, and supply chain issues; (4) Interact to determine the most pertinent risks and most critical areas of the architecture; and (5) Merge feedback from Control System Managers, Engineers, IT, and Auditors.

Hernandez, Jacquelynne; McIntyre, Annie; Henrie, Morgan

2010-10-01T23:59:59.000Z

292

Security Assistance | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

293

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

infrastructure systems in the analysis of safety and stability - a significant contribution to the theory of hybrid

Amin, Saurabh

2011-01-01T23:59:59.000Z

294

A Review of the Security of Insulin Pump Infusion Systems Nathanael Paul, Ph.D. Tadayoshi Kohno, Ph.D. David C. Klonoff, M.D., FACP  

E-Print Network [OSTI]

A Review of the Security of Insulin Pump Infusion Systems Nathanael Paul, Ph.D. Tadayoshi Kohno, Ph is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we safety and information security. From 2005 to 2009, there were 56,000 adverse events in infusion pump

Matsuoka, Yoky

295

Proxy Documentation, Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Proxy Configuration Proxy Configuration Here you will find instructions for using the FTP and Web proxies. Keep in mind that depending on where you access the proxies from (whether you are inside or outside of the BNL network), the process will differ slightly. For FTP, you will not be required to enter any passwords to use the proxies while on the BNL network. However, when accessing the proxies from an outside network (e.g. anything not .bnl.gov), you will be required to authenticate using a RSA SecurID Token. If you do not already have one of these, please visit the RSA SecurID User Guide for instructions on obtaining one. Users who are only interested in configuring their web browsers need NOT bother with RSA SecurID, as the web proxies will not be needed when you are outside the BNL network.

296

Securely Sealing Multi-FPGA Systems Tim Guneysu1  

E-Print Network [OSTI]

G¨ortz Institute for IT-Security, Ruhr-University Bochum, Germany 2 University of Michigan, 2260-growing supply chains that disentangle chip designers and manufacturers from OEMs. Our work shows how automatically enforces the system configuration detected upon power-up and bans further mod- ifications. 1

Markov, Igor

297

The Freight Shuttle System: Automated-Secure Trade  

E-Print Network [OSTI]

the same volume) #12;HDD Truck vs. FSS (CO2 required to service the same volume) #12;Next Steps · Finalize footprint guide way ­ To be built within existing highway ROW The Freight Shuttle System 24/7 operations transportation #12;#12;#12;#12;Port of Entry Security #12;Ciudad Juarez El Paso Scan-in-motion Scan

298

Auction Market System in Electronic Security Trading Platform  

E-Print Network [OSTI]

in electronic trading platforms, although they implement the same fundamental principle of maximum tradingAuction Market System in Electronic Security Trading Platform Li Xihao Bielefeld Graduate School of Economics and Management Discussion Paper: May 11, 2010 Abstract Under the background of the electronic

Tesfatsion, Leigh

299

SRS upgrades helium recovery system | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

upgrades helium recovery system | National Nuclear Security upgrades helium recovery system | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > SRS upgrades helium recovery system SRS upgrades helium recovery system Posted By Office of Public Affairs Savannah River Site (SRS) Tritium Programs recently completed a project to design, build and relocate a new system for separating and capturing

300

Office of Security Assistance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

302

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

303

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

304

T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security  

SciTech Connect (OSTI)

Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

2009-07-20T23:59:59.000Z

305

Part III - Information Systems  

Science Journals Connector (OSTI)

Abstract This part enters into the main territory of enterprise architecture for information systems which is as rich in technology specialties as the IT ecosystem is diverse. Most organizations fail to recognize the need for diverse specialization within architecture because they fail to understand the depth of complexity and the costs associated with mediocrity within each area of specialization. They also believe that a general practioner, which we will call a solution architect, is qualified and appropriate to address the complexities across a wide array of technology areas. In reality, this is equivalent to staffing a medical center primarily with general practioners that act as the specialists. A healthy organization maintains top specialists with which the general practioners can participate in getting expertise that is in alignment with a future state vision that reduces complexity and costs.

James V. Luisi

2014-01-01T23:59:59.000Z

306

Toward sensitive information redaction in a collaborative, multilevel security environment  

Science Journals Connector (OSTI)

Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, government, and research environments it is often necessary to control access ... Keywords: collaboration, multilevel security, redaction

Peter Gehres; Nathan Singleton; George Louthan; John Hale

2010-07-01T23:59:59.000Z

307

Asbestos : operating system security for mobile devices  

E-Print Network [OSTI]

This thesis presents the design and implementation of a port of the Asbestos operating system to the ARM processor. The port to the ARM allows Asbestos to run on mobile devices such as cell phones and personal digital ...

Stevenson, Martijn

2006-01-01T23:59:59.000Z

308

Security and Privacy Notice  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

309

Category:Geographic Information System | Open Energy Information  

Open Energy Info (EERE)

Jump to: navigation, search Geothermalpower.jpg Looking for the Geographic Information System page? For detailed information on Geographic Information System, click here....

310

Security-Widefield, Colorado: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Security-Widefield, Colorado: Energy Resources Security-Widefield, Colorado: Energy Resources Jump to: navigation, search Equivalent URI DBpedia Coordinates 38.7640957°, -104.7404269° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.7640957,"lon":-104.7404269,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

311

Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior  

Science Journals Connector (OSTI)

Abstract To protect complex power-grid control networks, efficient security assessment techniques are required. However, efficiently making sure that calculated security measures match the expert knowledge is a challenging endeavor. In this paper, we present EliMet, a framework that combines information from different sources and estimates the extent to which a control network meets its security objective. Initially, EliMet passively observes system operators' online reactive behavior against security incidents, and accordingly refines the calculated security measure values. To make the values comply with the expert knowledge, EliMet actively queries operators regarding those states for which sufficient information was not gained during the passive observation. Finally, EliMet makes use of the estimated security measure values for predictive situational awareness by ranking potential cyber-physical contingencies that the security administrators should plan for upfront. Our experimental results show that EliMet can optimally make use of prior knowledge as well as automated inference techniques to minimize human involvement and efficiently deduce the expert knowledge regarding individual states of that particular system.

Saman Zonouz; Parisa Haghani

2013-01-01T23:59:59.000Z

312

PIA - Human Resources Management Information System (HRMIS) ...  

Energy Savers [EERE]

Information System (HRMIS) PIA - Human Resources Management Information System (HRMIS) PIA - Human Resources Management Information System (HRMIS) PIA - Human Resources Management...

313

3-Year Renewal Request of OMB 1910-0818, Security, Information Request  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

HSS Topical Areas HSS Topical Areas Quality Assurance Enforcement / Oversight Environment HSS Outreach and Communications HSPD-12 Nuclear Materials Management & Safeguards System (NMMSS) HSS Internal Operations Council on Environmental Quality (CEQ) Office of Health, Safety and Security Collection Package Human Reliability Program OMB 1910-5122 Description of Collections 1. Human Reliability Program Certification (DOE F 470.3). Under the Department of Energy Human Reliability Program (HRP), individuals who are applicants for or incumbents in designated positions must be evaluated to ensure that they meet the requirements for certification in the program. This form documents that each part of the evaluation has been completed and records the determination by the HRP Certifying Official. The collection and documentation of this information is required by the HRP regulation found in the Code of Federal Regulations at 10 CFR 712. Form may be viewed at: http://energy.gov/cio/downloads/doe-f-4703

314

GAO-04-354, CRITICAL INFRASTRUCTURE PROTECTION: Challenges and Efforts to Secure Control Systems  

Broader source: Energy.gov (indexed) [DOE]

Report to Congressional Requesters Report to Congressional Requesters United States General Accounting Office GAO March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems GAO-04-354 www.gao.gov/cgi-bin/getrpt?GAO-04-354. To view the full product, including the scope and methodology, click on the link above. For more information, contact Robert F. Dacey at (202) 512-3317 or daceyr@gao.gov. Highlights of GAO-04-354, a report to congressional requesters March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems In addition to general cyber threats, which have been steadily increasing, several factors have contributed to the escalation of the risks of cyber attacks against control systems. These include the adoption of standardized

315

Adding User-Level SPACe: Security, Privacy, and Context to Intelligent Multimedia Information Architectures  

Science Journals Connector (OSTI)

We provide a unified architecture, called SPACe, for Secure, Privacy-Aware, and Contextual multimedia systems in organizations. Many key and important architectural components already exist which contribute to a unified platform, including the classic ...

Dawn N. Jutla; Dimitri Kanevsky

2006-12-01T23:59:59.000Z

316

Information Security: The Human Perspective Kathleen M. Carley  

E-Print Network [OSTI]

, redundancy, cascade effects, organizational memory, organizational learning, information diffusion, changing resource records, and organizational accounting information. Recent cases of industrial espionage all point addressed if both technological and organizational issues are considered simultaneously. How should

Sadeh, Norman M.

317

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

318

Project Records Information System (PRIS)  

SciTech Connect (OSTI)

The Project Records Information System (PRIS) is an interactive system developed for the Information Services Division (ISD) of Martin Marietta Energy Systems, Inc., to perform indexing, maintenance, and retrieval of information about Engineering project record documents for which they are responsible. This PRIS User's Manual provides instruction on the use of this system. This manual presents an overview of PRIS, describing the system's purpose; the data that it handles; functions it performs; hardware, software, and access; and help and error functions. This manual describes the interactive menu-driven operation of PRIS. Appendixes A, B, C, and D contain the data dictionary, help screens, report descriptions, and a primary menu structure diagram, respectively.

Smith, P.S.; Schwarz, R.K.

1990-11-01T23:59:59.000Z

319

Using Virtual Organizations Membership System with EDG's Grid Security and Database Access  

E-Print Network [OSTI]

Using Virtual Organizations Membership System with EDG's Grid Security and Database Access Marko University of Technology March 17, 2004 Keywords: Grid security, virtual organizations, Grid use case. This paper describes the European Data Grid's (EDG's) java security system and Spitfire database access

Haak, Hein

320

Service oriented architecture governance tools within information security .  

E-Print Network [OSTI]

??Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for (more)

Mokgosi, Letlhogonolo

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Freedom of Information Act Related Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

of Defense scientific and technical information. Radiation Effects Research Foundation A Cooperative Japan-United States Research Organization, conducts research and...

322

Technical and Human Issues in Computer-Based Systems Security Budi Arief and Denis Besnard  

E-Print Network [OSTI]

of hacking methods in technical terms; Section 3 outlines different players involved in computer security to make computer systems more secure. 2. TECHNICAL SIDE OF HACKING Hacking is usually a technical activity

Newcastle upon Tyne, University of

323

Enhancing the Hierarchical Clustering Mechanism of Storing Resources Security Policies in a Grid Authorization System  

Science Journals Connector (OSTI)

Many existing grid authorization systems adopt an inefficient structure of storing security policies for the available resources, which reduces ... scalability and leads to huge repetitions in checking security r...

Mustafa Kaiiali; Rajeev Wankar; C. R. Rao

2010-01-01T23:59:59.000Z

324

National SCADA Test Bed- Enhancing control systems security in the energy sector (September 2009)  

Broader source: Energy.gov [DOE]

Improving the security of energy control systems has become a national priority. Since the mid-1990s, security experts have become increasingly concerned about the threat of malicious cyber...

325

Roadmap to Secure Control Systems in the Energy Sector- January 2006  

Broader source: Energy.gov [DOE]

This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented...

326

Multi-objective Optimization for Pricing System Security in Electricity Markets  

E-Print Network [OSTI]

or hybrid markets, how to properly include system security is still an open question. This paper mainly focuses on hybrid markets and on the inclusion of proper security constraints through the use of a multi

Cañizares, Claudio A.

327

Information technology equipment cooling system  

SciTech Connect (OSTI)

According to one embodiment, a system for removing heat from a rack of information technology equipment may include a sidecar indoor air to liquid heat exchanger that cools warm air generated by the rack of information technology equipment. The system may also include a liquid to liquid heat exchanger and an outdoor heat exchanger. The system may further include configurable pathways to connect and control fluid flow through the sidecar heat exchanger, the liquid to liquid heat exchanger, the rack of information technology equipment, and the outdoor heat exchanger based upon ambient temperature and/or ambient humidity to remove heat from the rack of information technology equipment.

Schultz, Mark D.

2014-06-10T23:59:59.000Z

328

Exploiting adversary's risk profiles in imperfect information security games  

Science Journals Connector (OSTI)

At present much of the research which proposes to provide solutions to Imperfect Information Non-Cooperative games provides superficial analysis which then requires a priori knowledge of the game to be played. We propose that High Card, a simple Multiplayer ... Keywords: adversarial game theory, high card, imperfect information

Gabriel Fortunato Stocco; George Cybenko

2011-11-01T23:59:59.000Z

329

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Plant: Relative Risk Ranking Sites Plant: Relative Risk Ranking Sites These rankings are based on the EM-40 Release Site Methodology. Select a release site to receive information concerning that site. Please note that not all of the listed sites are linked to further information. Abandoned Nitric Acid Pipeline ACN Drum Yard Bear Creek Burial Grounds Bear Creek Contaminated Floodplain Soils Beta-4 Security Pits Building 81-10 Area Mercury Contaminated Soils Building 9201-2 Transformer and Capacitor Storage Area Building 9201-3 Coolant Salt Technology Facility Building 9201-4 Building 9201-4 External Pipes Building 9201-5E Northeast Yard Waste Storage Area Building 9202 East Pad Waste Storage Area Building 9204-2 West Yard Waste Storage Area Building 9206 Underground Tank Building 9215 West Pad Waste Storage Area

330

Disable Automatic Login, Cyber Security, Information Technology Division,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Disable Automatic Login Disable Automatic Login Automatic Login MUST be disabled... Follow the steps below to verify that auto login is disabled. Verify Security Settings Select Personal Section: Click Make sure the following required boxes are checked. - Require password to wake this computer from sleep or screen saver - Disable automatic login If so, close panel. If not, continue... Note: Mac users should have the panel locked at all times. Click the lock image to lock the panel if its open to prevent further changes. To unlock the above panel, click the lock image to bring up the login box. Insert your username & password, click . You should now be able to make changes to the panel.

331

Information Systems Management (ISM) 2011 Department of Supply Chain & Information Systems  

E-Print Network [OSTI]

Information Systems Management (ISM) 2011 Department of Supply Chain & Information Systems Information Systems Management Minor Application Overview The Information Systems Management focuses Systems Management and Applications c. MIS 431 (3) Business Data Management d. MIS 446 (3) Information

Yener, Aylin

332

Control Systems Security Publications Library | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Publications Library Publications Library Control Systems Security Publications Library Publications Library Repository of documents, listed by topic. (Some of the documents in this section require Adobe Acrobat Reader. You can download a free copy of the Reader by visiting Adobe.) VULNERABILITY REPORTS PERIODICAL ARTICLES ENERGY SECTOR ROADMAP AND ROADMAP IMPLEMENTATION DOE NSTB PROGRAM PLANNING AND RESOURCE DOCUMENTS PROJECT FACT SHEETS TRAINING MATERIALS AND RECOMMENDED PRACTICES ASSESSMENT AND TECHNICAL PUBLICATIONS SANDIA NATIONAL LABORATORIES REPORTS FOR NSTB PACIFIC NORTHWEST NATIONAL LABORATORY REPORTS FOR NSTB IDAHO NATIONAL LABORATORY REPORTS FOR NSTB FEDERAL GUIDANCE AND POLICY DOCUMENTS VULNERABILITY REPORTS INL Common Vulnerabilities Report - 2008 NERC Top 10 Vulnerabilities of Control Systems and Their Associated

333

Integrated risk information system (IRIS)  

SciTech Connect (OSTI)

The Integrated Risk Information System (IRIS) is an electronic information system developed by the US Environmental Protection Agency (EPA) containing information related to health risk assessment. IRIS is the Agency`s primary vehicle for communication of chronic health hazard information that represents Agency consensus following comprehensive review by intra-Agency work groups. The original purpose for developing IRIS was to provide guidance to EPA personnel in making risk management decisions. This original purpose for developing IRIS was to guidance to EPA personnel in making risk management decisions. This role has expanded and evolved with wider access and use of the system. IRIS contains chemical-specific information in summary format for approximately 500 chemicals. IRIS is available to the general public on the National Library of Medicine`s Toxicology Data Network (TOXNET) and on diskettes through the National Technical Information Service (NTIS).

Tuxen, L. [Environmental Protection Agency, Washington, DC (United States)

1990-12-31T23:59:59.000Z

334

Information Systems | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Information Systems Information Systems Information Systems Project Assessment and Reporting System (PARS II) PARS II is the Department's official "System of Record" for capital asset project performance information. Because PARS II uses the same data as maintained in our contractors' project management systems, everyone from the Federal Project Director's staff to the Secretary of Energy will have easy access to the same data. The PARS II software application is managed by the MA Office of Acquisition and Project Management and is used by federal and contractor personnel across the nation to record and track the progress of major construction and environmental cleanup projects. Questions or comments about PARS II should be directed to the PARS II Help Desk via email at i-Manage.eas@hq.doe.gov or by calling 301-903-2500

335

Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy  

E-Print Network [OSTI]

Lucas Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland clucas@inf.ethz.ch Dominik Maurer Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT controls Supported by the Zurich Information Security Center. Work done while at ETH Zurich, Switzerland

Maurer, Ueli

336

HybridSecure MPC: Trading InformationTheoretic Robustness for Computational Privacy  

E-Print Network [OSTI]

Lucas # Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland clucas@inf.ethz.ch Dominik Maurer # Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland maurer@inf.ethz.ch ABSTRACT--- Cryptographic controls # Supported by the Zurich Information Security Center. + Work done while at ETH Zurich

Maurer, Ueli

337

Botnets: To what extent are they a threat to information security?  

Science Journals Connector (OSTI)

Russian advertisement offering botnet services The purpose of this article is to examine to what extent botnets pose a threat to information security. In Chapter 1 the terms in the title are defined, and a comprehensive overview of botnets is provided ...

Claire Elliott

2010-08-01T23:59:59.000Z

338

Securing Dynamic Group Membership Information over Multicast: Attacks and Immunization  

E-Print Network [OSTI]

(GDI) as information describing the dynamic membership of a group application, such as the number the service during a time interval. In many multicast applications, GDI is confidential and should of the GDI to competitors could enable them to analyze the statistical behavior of the audience and help them

Sun, Yan Lindsay

339

Implementing data security in student lifecycle management system at the university of Prishtina  

Science Journals Connector (OSTI)

In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation ... Keywords: X.509 certificate, authentication, digital signature, non-repudiation, privacy, security, smart cards, student lifecycle management

Blerim Rexha; Haxhi Lajqi; Myzafere Limani

2010-07-01T23:59:59.000Z

340

Headquarters Personnel Security Operations | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Headquarters Personnel Security Operations Headquarters Personnel Security Operations Headquarters Personnel Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems. Functions The primary function of the Office of Headquarters Personnel

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Department of Energy Cyber Security Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

342

Department of Energy Cyber Security Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

343

Information System Owner | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Owner Information System Owner The Information System Owner (also referred to as System Owner) is the individual responsible for the overall procurement, development, integration,...

344

National SCADA Test Bed Enhancing control systems security in the energy  

Broader source: Energy.gov (indexed) [DOE]

SCADA Test Bed Enhancing control systems security in the SCADA Test Bed Enhancing control systems security in the energy sector National SCADA Test Bed Enhancing control systems security in the energy sector Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA) and distributed control systems (DCS) used to monitor and manage our energy infrastructure. Many of the systems still in use today were designed to operate in closed, proprietary networks. National SCADA Test Bed Enhancing control systems security in the energy sector More Documents & Publications NSTB Summarizes Vulnerable Areas Transmission and Distribution World March 2007: DOE Focuses on Cyber

345

Energy Management and Information Systems  

E-Print Network [OSTI]

?infrastructure energy?audits,?HVAC?upgrades,? heat?recovery,?etc. Improve?operations processes?and?day?to?day? operations,?retro? commissioning ENERGY?MANAGEMENT?INFORMATION?SYSTEM the?project Hardware ? $3.0?million?investment ? 400+?meters...

Conraud, J.

2013-01-01T23:59:59.000Z

346

BNL Password Procedures, Cyber Security,Information Technology Division,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Password Policy, Procedures, and Guidance Password Policy, Procedures, and Guidance Password Policy Choosing a Good Password - Online Random Password Generator Password Do's and Don'ts Password Protection Password Changing Password Change Process - Using Windows NT/2000/XP Operating Systems - Unix Systems Users not logged into the BNL Domain Password Policy for BlackBerry and Windows-based Hand-held Wireless Devices Password Policy Based upon DOE Notice N205.3 and guidance in DOE G 205.3-1, all BNL computer platforms capable of supporting password protection systems must have passwords that are in accord with the following. Password contains at least eight non-blank characters, provided such passwords are allowed by the operating system or application. Password contains a combination of letters (a mixture of upper and lowercase), numbers, and at least one special character within the first seven positions, provided such passwords are allowed by the operating system or application.

347

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up, 1st edition  

Science Journals Connector (OSTI)

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap ...

Evan Wheeler

2011-05-01T23:59:59.000Z

348

A Summary of Control System Security Standards Activities in the Energy  

Broader source: Energy.gov (indexed) [DOE]

A Summary of Control System Security Standards Activities in the A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) This document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication protocols and systems. Also contained in this report is a comparison of several of the sector standards, guidelines, and technical reports, demonstrating standards coverage by security topic. This work focuses on control systems standards applicable to the energy (oil, gas, and electric, but not nuclear) sector. Summary of CS Standards Activities in the Energy Sector.pdf More Documents & Publications

349

Cost/benefit analysis for video security systems  

SciTech Connect (OSTI)

Dr. Don Hush and Scott Chapman, in conjunction with the Electrical and Computer Engineering Department of the University of New Mexico (UNM), have been contracted by Los Alamos National Laboratories to perform research in the area of high security video analysis. The first phase of this research, presented in this report, is a cost/benefit analysis of various approaches to the problem in question. This discussion begins with a description of three architectures that have been used as solutions to the problem of high security surveillance. An overview of the relative merits and weaknesses of each of the proposed systems is included. These descriptions are followed directly by a discussion of the criteria chosen in evaluating the systems and the techniques used to perform the comparisons. The results are then given in graphical and tabular form, and their implications discussed. The project to this point has involved assessing hardware and software issues in image acquisition, processing and change detection. Future work is to leave these questions behind to consider the issues of change analysis - particularly the detection of human motion - and alarm decision criteria. The criteria for analysis in this report include: cost; speed; tradeoff issues in moving primative operations from software to hardware; real time operation considerations; change image resolution; and computational requirements.

NONE

1997-01-01T23:59:59.000Z

350

Modeling and simulation for cyber-physical system security research, development and applications.  

SciTech Connect (OSTI)

This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

2010-02-01T23:59:59.000Z

351

Privacy/Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

352

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

353

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

354

Information Access Router for Integrated Information Access System Koji Murakami  

E-Print Network [OSTI]

Information Access Router for Integrated Information Access System Koji Murakami Department System (IIAS) that accepts diverse kinds of questions and provides the requested information in the most suit- able format for the information need. We designed a set of 18 Information Access Types

355

Evolution of toxicology information systems  

SciTech Connect (OSTI)

Society today is faced with new health risk situations that have been brought about by recent scientific and technical advances. Federal and state governments are required to assess the many potential health risks to exposed populations from the products (chemicals) and by-products (pollutants) of these advances. Because a sound analysis of any potential health risk should be based on the use of relevant information, it behooves those individuals responsible for making the risk assessments to know where to obtain needed information. This paper reviews the origins of toxicology information systems and explores the specialized information center concept that was proposed in 1963 as a means of providing ready access to scientific and technical information. As a means of illustrating this concept, the operation of one specialized information center (the Environmental Mutagen Information Center at Oak Ridge National Laboratory) will be discussed. Insights into how toxicological information resources came into being, their design and makeup, will be of value to those seeking to acquire information for risk assessment purposes. 7 refs., 1 fig., 4 tabs.

Wassom, J.S.; Lu, P.Y. [Oak Ridge National Laboratory, TN (United States)

1990-12-31T23:59:59.000Z

356

PRIVACY/SECURITY NOTICE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

357

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

358

Audit Report - Naval Reactors Information Technology System Development Efforts, IG-0879  

Broader source: Energy.gov (indexed) [DOE]

Naval Reactors Information Naval Reactors Information Technology System Development Efforts DOE/IG-0879 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 21, 2012 MEMORANDUM FOR THE ADMINISTRATOR, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on the "Naval Reactors Information Technology System Development Efforts" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, was established to provide the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility

359

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project  

Broader source: Energy.gov (indexed) [DOE]

53 53 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman August 2013 PNNL- 22653 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman Contributors: SGC Panel Members August 2013 Prepared by: Pacific Northwest National Laboratory and

360

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Broader source: Energy.gov (indexed) [DOE]

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Selective Versioning in a Secure Disk System Appears in the Proceedings of the 17th USENIX Security Symposium  

E-Print Network [OSTI]

Symposium Swaminathan Sundararaman Stony Brook University Gopalan Sivathanu Stony Brook University Erez are minimal. 1 Introduction Protecting disk data against malicious damage is one of the key requirements in computer systems security. Stored data is one the most valuable assets for most or- ganizations and damage

Zadok, Erez

362

Selective Versioning in a Secure Disk System Appears in the Proceedings of the 17th USENIX Security Symposium  

E-Print Network [OSTI]

Symposium Swaminathan Sundararaman Stony Brook University Gopalan Sivathanu Stony Brook University Erez are minimal. 1 Introduction Protecting disk data against malicious damage is one of the key requirements in computer systems security. Stored data is one the most valuable assets for most or­ ganizations and damage

Zadok, Erez

363

Securing Offshore Infrastructures Through a Global Alert and Graded Response System  

E-Print Network [OSTI]

1 « SARGOS » Securing Offshore Infrastructures Through a Global Alert and Graded Response System and graded response system to answer the recent but strong need for securing critical civilian offshore of their 2009 global safety program (CSOSG). 1. Introduction Offshore oil installations are critical energy

Paris-Sud XI, Université de

364

GLOSSARY OF INFORMATION SECURITY THREATS Computer any electronic device used for storing, processing and transmitting data according  

E-Print Network [OSTI]

GLOSSARY OF INFORMATION SECURITY THREATS Computer · any electronic device used listening agent. A favored method of stealing passwords. Malware · a general term and malware in order to infiltrate, compromise, exploit and disable any device

Brinkmann, Peter

365

International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5, No. 2, August 2013 Badr Benmammar1,  

E-Print Network [OSTI]

68 International Journal of Communication Networks and Information Security (IJCNIS) Vol. 5, No. 2 and other mobile devices. Due to the emergence of application domains, such as sensor networks, smart grid

366

SRS upgrades helium recovery system | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

detectors employed by the United States Department of Homeland Security to detect neutron activity from nuclear material. Savannah River Nuclear Solutions, LLC, the management...

367

Securing linked transportation systems: economic implications and investment strategies  

E-Print Network [OSTI]

implications and investment strategies Adib Kanafani &research explores agency investment behavior in multi-agencysystems develops guidelines for investments in security. The

Kanafani, Adib; Huang, Jiangchuan

2010-01-01T23:59:59.000Z

368

Louisiana State University System 3810 West Lakeshore Drive  

E-Print Network [OSTI]

State University System Information Security Plan ­ PM-36 This document is a coordinated effort Care Services Division This Information Security Plan is considered to be "living

369

INFORMATION SECURITY:  

Science Journals Connector (OSTI)

......of the top four risks to the UK. The...used as a form of political protest. The UK...the 650 million investment through the National...the considerable investment by the government...and development, risk analysis, policy...attacks, as a form of political protest, has become......

Cyber Security Skill Shortages

2012-01-01T23:59:59.000Z

370

Information flow in entangled quantum systems  

Science Journals Connector (OSTI)

...research-article Research Article Information flow in entangled quantum systems David...of Oxford, , Oxford OX1 3PU, UK All information in quantum systems is, notwithstanding...Heisenberg picture to analyse quantum information processing makes this locality explicit...

2000-01-01T23:59:59.000Z

371

WIMS - Waste Information Management System  

Office of Environmental Management (EM)

Welcome To WIMS Welcome To WIMS Waste Information Management System WIMS new web address: http://www.emwims.org WIMS is developed to provide DOE Headquarters and site waste managers with the tools necessary to easily visualize, understand, and manage the vast volumes, categories, and problems of forecasted waste streams. WIMS meets this need by providing a user-friendly online system to gather, organize, and present waste forecast data from DOE sites. This system provides a method for identification of waste forecast volumes, material classes, disposition pathways, and potential choke points and barriers to final disposition. Disclaimer: Disposition facility information presented is for planning purposes only and does not represent DOE's decisions or commitments. Any selection of disposition facility will be made after technical, economic, and policy considerations.

372

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

373

Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 |  

Broader source: Energy.gov (indexed) [DOE]

Energy: Executive Summary Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. Roadmap to Secure Control Systems in the Energy: Executive Summary

374

Roadmap to Secure Control Systems in the Energy Sector - 2006 | Department  

Broader source: Energy.gov (indexed) [DOE]

- 2006 - 2006 Roadmap to Secure Control Systems in the Energy Sector - 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. Roadmap to Secure Control Systems in the Energy Sector More Documents & Publications

375

Special feature: Creating security applications based on The Global Certificate Management System  

Science Journals Connector (OSTI)

The Certificate Management System (CMS) is a global network system whose primary services are generation, distribution, storage and verification of certificates. It supports various security applications which use public key cryptography by providing ...

Nada Kapidzic

1998-01-01T23:59:59.000Z

376

Technical Services | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Technical Technical Services Technical Services Technical services spans Y-12 disciplines that support manufacturing at Y-12. Information Systems (National Security Systems Development) Provide solutions for information security, including the protection of national security, proprietary and any other class of highly sensitive information. Develop highly integrated, enterprise level software applications for use within the federal space and adaptable to commercial application. Leverage the transformative information technology capabilities of the NNSA to a broad spectrum of federal applications for rapidly deployed, cost effective and reproducible technical solutions. Develop virtual collaborative networks for cluster manufacturing. Develop, test, and implement operational cyber security strategies

377

Information Systems Analysis and Design CSC340 2002 John Mylopoulos Other Phases --1  

E-Print Network [OSTI]

and installation Operation PhaseOperation Phase -- training, operations control, security controls, file of furniture, training of programming personnel #12;Page Information Systems Analysis and Design CSC340 & feasibility Study current system Define end user reqs. Select feasible solution Design new system Select

Mylopoulos, John

378

Information Systems Analysis and Design CSC340 2002 John Mylopoulos Other Phases --1  

E-Print Network [OSTI]

and installation · Operation PhaseOperation Phase -- training, operations control, security controls, file for performance, arrangement of furniture, training of programming personnel #12;Page 2 Information Systems & feasibility Study current system Define end user reqs. Select feasible solution Design new system Select

Mylopoulos, John

379

Office of Security Enforcement | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Enforcement Office of Security Enforcement MISSION The Office of Security Enforcement implements the Department's classified information security enforcement program in...

380

Command and Control Information Systems Engineering: Progress and Prospects  

Science Journals Connector (OSTI)

Publisher Summary Systems engineering engrosses all the activities that extend over the life cycle of a system, including requirements definitions, functional designs, development, testing, and evaluation. This chapter describes and provides an analysis of the generic information systems engineering (ISE) process, the domain of military command and control (C2), and the application of the principles of multidisciplinary information systems engineering to C2 information and decision systems engineering. The chapter also presents some command and control ISE case studies intended to illustrate the most salient features of the ISE process. ISE represents an innovative way to think about systems design and development; C2 represents an expanding applications domain; the marriage between ISE and C2 is likely to yield some creative system solutions to existing and future requirements. System solutions are not found only in structured design methodology; but also in the application of advanced and emerging technologies. ISE is structured, yet flexible enough to exploit new technological opportunities. New opportunities for the application of advanced information technology are rising dramatically. Next-generation C2 information and decision systems will appear very different to users; they will be far more powerful, much easier to use, and able to communicate with problem-solving cousins distributed across large, secure and reconstitutable networks.

Stephen J. Andriole

1990-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

1398 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 20, NO. 3, AUGUST 2005 Model Uncertainty in Security  

E-Print Network [OSTI]

1398 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 20, NO. 3, AUGUST 2005 Model Uncertainty in Security in a power market. The paper addresses two types of uncertainties: 1) struc- tural (e.g., branch outages minimal corrections in existing contractual transactions that ensure security. Given our interest in real

Stankoviæ, Aleksandar

382

Safety and Security Enforcement Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Enforcement Enforcement Enforcement Home Worker Safety and Health Enforcement Office of Nuclear Safety Enforcement Security Enforcement Notices of Violation Consent Orders / Settlement Agreements Compliance Orders Special Report Orders Enforcement Letters Regulatory Assistance Reviews Enforcement Program and Process Guidance and Information Non-Compliance Tracking System (NTS) Non-Compliance Reporting Thresholds Regulations and Directives Enforcement Staff Enforcement Coordinator Contact Information 2013 DOE Safety and Security Enforcement Workshop Request for Investigation or Inspection of Safety or Security Violations Archived Documents HSS Logo Safety and Security Enforcement Program Office of Enforcement and Oversight What's New: » Worker Safety and Health Enforcement Preliminary Notice of Violation issued to Brookhaven Science Associates, LLC

383

Botnets: To what extent are they a threat to information security?  

Science Journals Connector (OSTI)

Russian advertisement offering botnet services The purpose of this article is to examine to what extent botnets pose a threat to information security. In Chapter 1 the terms in the title are defined, and a comprehensive overview of botnets is provided in order to equip the reader with an understanding of the context for the remaining chapters. The motives for using botnets and the methods in which they are used are outlined. The methods of botnet attack are then analysed in terms of their potential impact on information security and a conclusion is drawn that botnets are indeed a threat to information security in general terms. Chapter 2 then goes on to examine the extent of the threat from the three different perspectives of governments, corporate and the general public. The threats from each perspective and their impacts are identified, and each threat type for each perspective is then categorised in terms of probability and potential impact. The extent of the threat of each botnet-related attack from each perspective is then assessed using a model recommended by ISO/IEC 27005:2008, and the conclusion is drawn that the extent of the threat that botnets pose to governments, corporates and the general public is High. In Chapter 3, we look at how law enforcement agencies investigate botnets and the criminals behind them, and establish the challenges they face in doing so. It is clear that law enforcement face an uphill struggle due to technical tricks employed by the botherders to remain untraceable, lack of resources with the necessary skillset, the legal complexity of working with multiple jurisdictions, and procedural delays working with foreign law enforcement agencies. The conclusion is drawn that botnets are here to stay and that for the time being the botherders will have the upper hand.

Claire Elliott

2010-01-01T23:59:59.000Z

384

An Advanced Security Infrastructure for Heterogeneous Relational Grid Data Sources  

Science Journals Connector (OSTI)

In this paper we deal with the problem of secure access to metadata information in Grid computing environments. The heterogeneity of the eventual ... database management systems) and the enforcement of security p...

Javier Jan Martnez; JosH. Cans

2004-01-01T23:59:59.000Z

385

Welcome to the Kansas City Field Office | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

(816) 488-3341 Manager, Office of Business & Security Operations (816) 488-5321 Contracting Officer (816) 488-3249 Team Lead, Security & Information Systems (816) 488-5109...

386

Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0  

SciTech Connect (OSTI)

This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plans purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programsthe Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

Farnham, Irene; Marutzky, Sam

2014-12-01T23:59:59.000Z

387

Security and Privacy in Smart Grid Demand Response Systems  

Science Journals Connector (OSTI)

Various research efforts have focussed on the security and privacy concerns arising from the introduction of smart energy meters. However, in addition to smart metering, the ultimate vision of the smart grid incl...

Andrew Paverd; Andrew Martin; Ian Brown

2014-01-01T23:59:59.000Z

388

An Analysis of Security Services in Grid Storage Systems  

Science Journals Connector (OSTI)

With the wide-spread deployment of Data Grids, storage services are becoming a critical aspect of the Grid infrastructure. Due to the sensitive and critical nature of the data being stored, security issues relate...

Jesus Luna; Michail D. Flouris; Manolis Marazakis

2008-01-01T23:59:59.000Z

389

Hallmark Project Commercialization of the Secure SCADA Communications  

Broader source: Energy.gov (indexed) [DOE]

Project Commercialization of the Secure SCADA Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Increased connectivity and automation in the control systems that manage the nation's energy infrastructure have improved system functionality, but left systems more vulnerable to cyber attack. Intruders could severely disrupt control system operation by sending fabricated information or commands to control system devices. To ensure message integrity, supervisory control and data acquisition (SCADA) systems require a method to validate device-to-device communication and verify that information has

390

Strategic Information Systems and Business Outcomes  

Science Journals Connector (OSTI)

This large-scale study of 1,990 responses from practitioners in a wide range of industries developed and tested a model of relationships among a specific type of strategic information system --strategic performance measurement systems SPMS --characteristics ... Keywords: Design Purposes, Financial and Non-Financial-Measures, Impact On Business Outcomes, Information Quality, Information Technology Use, Strategic Performance Measurement Systems SPMS, System Effectiveness

Alberto Bento, Regina Bento, Lourdes White, Ana Bento

2014-01-01T23:59:59.000Z

391

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sites Sites These rankings are based on the EM-40 Release Site Methodology. Select a release site to receive information concerning that site. Please note that not all of the listed sites are linked to further information. Big Bayou Creek Big Bayou Creek Monitoring Station C-100 South Side Berm C-100 Trailer Complex Soil Contamination C-200 Underground Gasoline Tanks (UST) C-304 Bldg/HVAC Piping System (Soil Backfill) C-310 PCB Soil Contamination (West Side) C-331 PCB Soil Contamination (Southeast) C-331 PCB Soil Contamination (West) C-331 RCW Leak East Side C-331 RCW Leak Northwest Side C-333-A Vaporizer C-333 PCB Soil Contamination C-333 Cooling Tower Scrap Wood Pile C-333 PCB Soil Contamination (West) C-333 PCB Waste Storage Area C-333A Sewage Treatment Aeration Tank

392

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Broader source: Energy.gov (indexed) [DOE]

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

393

Quantum-secured imaging  

E-Print Network [OSTI]

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magaa-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

394

Information sharing for distributed intrusion detection systems  

Science Journals Connector (OSTI)

In this paper, we present an information sharing model for distributed intrusion detection systems. The typical challenges faced by distributed intrusion detection systems is what information to share and how to share information. We address these problems ... Keywords: Anomaly detection, Denial of service attack, Distributed intrusion detection, Information sharing, Reflector attack

Tao Peng; Christopher Leckie; Kotagiri Ramamohanarao

2007-08-01T23:59:59.000Z

395

Composite Data Products (CDPs) from the Hydrogen Secure Data Center (HSDC) at the Energy Systems Integration Facility (ESIF), NREL  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The Hydrogen Secure Data Center (HSDC) at NREL's Energy Systems Integration Facility (ESIF) plays a crucial role in NREL's independent, third-party analysis of hydrogen fuel cell technologies in real-world operation. NREL partners submit operational, maintenance, safety, and cost data to the HSDC on a regular basis. NREL's Technology Validation Team uses an internal network of servers, storage, computers, backup systems, and software to efficiently process raw data, complete quarterly analysis, and digest large amounts of time series data for data visualization. While the raw data are secured by NREL to protect commercially sensitive and proprietary information, individualized data analysis results are provided as detailed data products (DDPs) to the partners who supplied the data. Individual system, fleet, and site analysis results are aggregated into public results called composite data products (CDPs) that show the status and progress of the technology without identifying individual companies or revealing proprietary information. These CDPs are available from this NREL website: 1) Hydrogen Fuel Cell Vehicle and Infrastructure Learning Demonstration; 2) Early Fuel Cell Market Demonstrations; 3) Fuel Cell Technology Status [Edited from http://www.nrel.gov/hydrogen/facilities_secure_data_center.html].

396

STUDENT INFORMATION SYSTEMS: 2008-2009 MANUAL  

E-Print Network [OSTI]

STUDENT INFORMATION SYSTEMS: 2008-2009 MANUAL Student Academic Affairs Office College of Education #12;ii #12;SIS Manual: 2008-2009 iii TABLE OF CONTENTS ABOUT STUDENT INFORMATION SYSTEMS (SIS.............................................................................................1 STUDENTS

Gilbert, Matthew

397

Northwest Habitat Institute Integrated Habitat and Biodiversity Information SystemIntegrated Habitat and Biodiversity Information System  

E-Print Network [OSTI]

Northwest Habitat Institute Integrated Habitat and Biodiversity Information SystemIntegrated Habitat and Biodiversity Information System (IBIS) for the Columbia River Basin(IBIS) for the Columbia

398

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report  

Broader source: Energy.gov (indexed) [DOE]

41 41 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman July 2013 PNNL- 22641 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman Contributors: SGC Panel Members July, 2013 Prepared by: Pacific Northwest National Laboratory and NBISE Secure Power Systems Professional Project Team This document is a summarization of the report, Developing Secure Power Systems

399

Transmission pricing of distributed multilateral energy transactions to ensure system security and guide economic dispatch  

E-Print Network [OSTI]

In this paper we provide a simulations-based demonstration of a hybrid electricity market that combines the distributed competitive advantages of decentralized markets with the system security guarantees of centralized ...

Ilic, Marija D.

2002-01-01T23:59:59.000Z

400

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development ProgramsSummary Report  

SciTech Connect (OSTI)

This document is a summarization of the report, Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs, the final report for phase 2 of the SPSP (DOE workforce study) project.

O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.; Conway, T. J.; Vanderhorst, Jr, T. J.; Januszewski, III, J.; Leo, R.; Perman, K.

2013-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Geographic Information System At International Geothermal Area...  

Open Energy Info (EERE)

navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System At International Geothermal Area, Indonesia (Nash, Et Al., 2002) Exploration...

402

Geographic Information System (Monaster And Coolbaugh, 2007)...  

Open Energy Info (EERE)

navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System (Monaster And Coolbaugh, 2007) Exploration Activity Details Location...

403

PSH-14-0034 - In the Matter of Personnel Security Hearing | Department...  

Broader source: Energy.gov (indexed) [DOE]

activity, his failure to adhere to DOE security requirements, and his failure to safeguard classified information and sensitive government information technology systems....

404

United Solar Systems | Open Energy Information  

Open Energy Info (EERE)

United Solar Systems Place: Troy, MI References: United Solar Systems1 Information About Partnership with NREL Partnership with NREL Yes Partnership Type "CRADA" is not in the...

405

Information Concerning Reliability Impacts under Various System...  

Broader source: Energy.gov (indexed) [DOE]

Impacts under Various System Configurations of the Mirant Potomac River Plant Information Concerning Reliability Impacts under Various System Configurations of the Mirant...

406

MANAGEMENT INFORMATION SYSTEMS (MIS) CONCENTRATION FOR UNDERGRADUATES  

E-Print Network [OSTI]

MANAGEMENT INFORMATION SYSTEMS (MIS) CONCENTRATION FOR UNDERGRADUATES The management information systems concentration, like a major, focuses on the use of information technology for value creation creation. Link to Rensselaer 2012-2013 Catalog Required Courses MGMT 4240 Systems Analysis & Design MGMT

Salama, Khaled

407

Security & Privacy | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

408

Risk assessment of climate systems for national security.  

SciTech Connect (OSTI)

Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing [University of Illinois-Urbana; Conrad, Stephen Hamilton; Constantine, Paul [Stanford University; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael [National Center for Atmospheric Research; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

2012-10-01T23:59:59.000Z

409

Geographic Information System (Laney, 2005) | Open Energy Information  

Open Energy Info (EERE)

Geographic Information System (Laney, 2005) Geographic Information System (Laney, 2005) Exploration Activity Details Location Unspecified Exploration Technique Geographic Information System Activity Date Usefulness useful DOE-funding Unknown Notes Geology and Geophysics of Geothermal Systems, Gregory Nash, 2005. This project has also reinforced the value of geographic information systems (GIS) in exploration efforts. GIS has enabled the visualization of data, storage and access of disparate data sets, and merging of data that would not be possible using any other technology. While CAD is preferred by some in geothermal exploration, it lacks a multitude of the functions facilitated with GIS. References Patrick Laney (2005) Federal Geothermal Research Program Update - Fiscal Year 2004 Retrieved from "http://en.openei.org/w/index.php?title=Geographic_Information_System_(Laney,_2005)&oldid=38930

410

Towards Simple and Scalable Analysis of Secure Systems Jason Franklin, Deepak Garg, Dilsun Kaynar, Anupam Datta  

E-Print Network [OSTI]

Towards Simple and Scalable Analysis of Secure Systems Jason Franklin, Deepak Garg, Dilsun Kaynar in system modeling and analysis. Despite substantial progress, the goal of proving deep properties of system abstraction: modeling and analysis of system designs at a high­level where in­depth analysis can identify

Garlan, David

411

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for TETRACHLOROETHYLENE Condensed Toxicity Summary for TETRACHLOROETHYLENE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. MARCH 1993 Prepared by: Mary Lou Daugherty, M.S., Chemical Hazard Evaluation Group, Biomedical Environmental Information Analysis Section, Health and Safety Research Division, Oak Ridge National Laboratory*, Oak Ridge, Tennessee. Prepared for: Oak Ridge Reservation Environmental Restoration Program. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. Tetrachloroethylene (CAS No. 127-18-4) is a halogenated aliphatic

412

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for ETHYLBENZENE Condensed Toxicity Summary for ETHYLBENZENE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. Prepared by: Dennis M. Opresko, Ph.D., Chemical Hazard Evaluation Group in the Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, Oak Ridge National Laboratory*. Prepared for: Oak Ridge Reservation Environmental Restoration Program. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. Ethylbenzene is a colorless, flammable liquid with a pungent odor (Cavender 1994). The water solubility of ethylbenzene is 0.014 g/100 mL and its vapor

413

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

BENZO[A]PYRENE BENZO[A]PYRENE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. December 1994 Prepared by: Rosmarie A. Faust, Ph.D., Chemical Hazard Evaluation Group, Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, *, Oak Ridge, Tennessee. Prepared for: OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. Benzo[a]pyrene is a polycyclic aromatic hydrocarbon (PAH) that can be derived from coal tar. Benzo[a]pyrene occurs ubiquitously in products of

414

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for AROCLOR-1260 Condensed Toxicity Summary for AROCLOR-1260 NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. Prepared by C. B. Bast, Ph.D., D.A.B.T., Chemical Hazard Evaluation Group, Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, *. Prepared for OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400 Aroclor® 1260 is a polychlorinated biphenyl (PCB) mixture containing approximately 38% C12H4Cl6, 41% C12H3Cl7, 8% C12H2Cl8, and 12% C12H5Cl5

415

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for ZINC AND ZINC COMPOUNDS Condensed Toxicity Summary for ZINC AND ZINC COMPOUNDS NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. April 1992 Prepared by Dennis M. Opresko, Ph.D., Chemical Hazard Evaluation and Communication Group, Biomedical and Environmental Information Analysis Section, Health and Safety Research Division, Oak Ridge National Laboratory*, Oak Ridge, Tennessee Prepared for OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400 Zinc is used primarily in galvanized metals and metal alloys, but zinc

416

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for THALLIUM Condensed Toxicity Summary for THALLIUM NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. DECEMBER 1994 Prepared by: Tim Borges and Mary Lou Daugherty, Chemical Hazard Evaluation Group, Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, Oak Ridge National Laboratory*, Oak Ridge, Tennessee. Prepared for: Oak Ridge Reservation Environmental Restoration Program. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. This report is an update of the Toxicity Summary for Thallium (CAS Registry

417

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for ASBESTOS Condensed Toxicity Summary for ASBESTOS NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. August 1995 Prepared by: Rosmarie A. Faust, Ph.D., Chemical Hazard Evaluation Group, Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, *, Oak Ridge, Tennessee. Prepared for OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM. *Managed by Lockheed Martin Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. Asbestos (CAS No. 1332-21-4) is the generic name for a variety of naturally formed hydrated silicates containing metal cations such as sodium,

418

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for METHYL ISOBUTYL KETONE Condensed Toxicity Summary for METHYL ISOBUTYL KETONE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. July 1995 Prepared by Rosmarie A. Faust, Ph.D., Chemical Hazard Evaluation and Communication Program, Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, *, Oak Ridge, Tennessee. Prepared for OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM. *Managed by Lockheed Martin Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. Methyl isobutyl ketone (MIBK) (CAS Reg. No. 108-10-1), a clear liquid with

419

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

-DINITROTOLUENE -DINITROTOLUENE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. Prepared by: Rosmarie A. Faust, Ph.D., Chemical Hazard Evaluation Group in the Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, Oak Ridge National Laboratory*. Prepared for: Oak Ridge Reservation Environmental Restoration Program. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. This report is an update of the Toxicity Summary for 2,4-Dinitrotoluene (CAS Registry No. 121-14-2). The original summary for this chemical was

420

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for VANADIUM Condensed Toxicity Summary for VANADIUM NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. DECEMBER 1991 Prepared by: Dennis M. Opresko, Ph.D., Chemical Hazard Evaluation and Communication Group Biomedical and Environmental Information Analysis Section, Health and Safety Research Division, *. Oak Ridge, Tennessee Prepared for: Oak Ridge Reservation Environmental Restoration Program. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. Vanadium is a metallic element that occurs in six oxidation states and

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for MANGANESE Condensed Toxicity Summary for MANGANESE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. July 1995 Prepared by A. A. Francis and C. Forsyth, Chemical Hazard Evaluation Group, Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, *, Oak Ridge, Tennessee Prepared for OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM *Managed by Lockheed Martin Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400 Manganese is an essential trace element in humans that can elicit a variety of serious toxic responses upon prolonged exposure to elevated

422

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2-DICHLOROETHANE 2-DICHLOROETHANE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. May 1994 Prepared by Dennis M. Opresko, Ph.D., Chemical Hazard Evaluation and Communication Program, Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, *, Oak Ridge, Tennessee. Prepared for OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under contract No. DE-AC05-84OR21400. 1,2-Dichloroethane is used primarily in the manufacture of vinyl chloride, as well as in the synthesis of tetrachloroethylene, trichloroethylene,

423

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

COPPER COPPER NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. DECEMBER 1992 Prepared by: Rosmarie A. Faust, Ph.D., Chemical Hazard Evaluation and Communication Group, Biomedical and Environmental Information Analysis Section, Health and Safety Research Division, *, Oak Ridge, Tennessee. Prepared for: Oak Ridge Reservation Environmental Restoration Program. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. Copper occurs naturally in elemental form and as a component of many minerals. Because of its high electrical and thermal conductivity, it is

424

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

TRICHLOROETHENE TRICHLOROETHENE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. MARCH 1993 Prepared by: Rosmarie A. Faust, Ph.D, Chemical Hazard Evaluation Group, Biomedical Environmental Information Analysis Section, Health and Safety Research Division, *, Oak Ridge, Tennessee Prepared for: Oak Ridge Reservation Environmental Restoration Program. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. Trichloroethene (TCE) is an industrial solvent used primarily in metal degreasing and cleaning operations. TCE can be absorbed through the lungs,

425

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CHLORDANE CHLORDANE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. December 1994 Prepared by: Carol S. Forsyth, Ph.D., Chemical Hazard Evaluation Group, Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, *, Oak Ridge, Tennessee. Prepared for: OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM. *Managed by Martin Marietta Energy Systems Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. Technical grade chlordane is a mixture of structurally related compounds including trans-chlordane, cis-chlordane, -chlordene, heptachlor, and

426

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for METHYL MERCURY Condensed Toxicity Summary for METHYL MERCURY NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. FEBRUARY, 1992 Prepared by: Robert A. Young, Ph.D., D.A.B.T., Chemical Hazard Evaluation and Communication Group Biomedical and Environmental Information Analysis Section, Health and Safety Research Division, *, Oak Ridge, Tennessee. Prepared for: Oak Ridge Reservation Environmental Restoration Program. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. Methyl mercury is formed by biotic and abiotic methylation of mercury

427

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FLUORANTHENE FLUORANTHENE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. August 1993 Prepared by Rosmarie A. Faust, Ph.D., Chemical Hazard Evaluation and Communication Program, Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, *, Oak Ridge, Tennessee. Prepared for OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under contract No. DE-AC05-84OR21400. Fluoranthene is a polycyclic aromatic hydrocarbon (PAH) that can be derived from coal tar. Occurring ubiquitously in products of incomplete combustion

428

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for BENZENE Condensed Toxicity Summary for BENZENE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. September 1992 Prepared by: Mary Lou Daugherty, M.S., Chemical Hazard Evaluation and Communication Group, Biomedical and Environmental Information Analysis Section, Health and Safety Research Division*, , Oak Ridge, Tennessee. Prepared for OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. Benzene is absorbed via ingestion, inhalation, and skin application.

429

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for METHYLENE CHLORIDE Condensed Toxicity Summary for METHYLENE CHLORIDE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. September 1993 Prepared by Cheryl B. Bast, Ph.D., Chemical Hazard Evaluation and Communication Program, Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, *, Oak Ridge, Tennessee. Prepared for OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under contract No. DE-AC05-84OR21400. Methylene chloride (CH2Cl2, CAS No. 75-09-2), also known as dichloromethane

430

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SELENIUM SELENIUM NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. MARCH 1993 Prepared by: Dennis M. Opresko, Ph.D, Chemical Hazard Evaluation Group, Biomedical Environmental Information Analysis Section, Health and Safety Research Division, Oak Ridge National Laboratory*, Oak Ridge, Tennessee. Prepared for: Oak Ridge Reservation Environmental Restoration Program. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. Selenium is an essential trace element important in many biochemical and physiological processes including the biosynthesis of coenzyme Q (a

431

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for MOLYBDENUM Condensed Toxicity Summary for MOLYBDENUM NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. JANUARY 1993 Prepared by: Dennis M. Opresko, Ph.D., Chemical Hazard Evaluation Group, Biomedical and Environmental Information Analysis Section, Health and Safety Research Division, *, Oak Ridge, Tennessee. Prepared for: Oak Ridge Reservation Environmental Restoration Program. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. Molybdenum (Mo) occurs naturally in various ores; the principal source being molybdenite (MoS2) (Stokinger, 1981). Molybdenum compounds are used

432

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

LITHIUM LITHIUM NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. May 1995 Prepared by Dennis M. Opresko, Ph.D., Chemical Hazard Evaluation and Communication Program, Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, *, Oak Ridge, Tennessee. Prepared for OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under contract No. DE-AC05-84OR21400. Lithium is an alkali metal similar to magnesium and sodium in its properties (Birch, 1988; Arena, 1986) and has a molecular weight of 6.941

433

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for ALUMINUM Condensed Toxicity Summary for ALUMINUM NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. September 1993 Prepared by Cheryl B. Bast, Chemical Hazard Evaluation Group, Biomedical Environmental Information Analysis Section, Health Sciences Research Division, *, Oak Ridge, Tennessee. Prepared for OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. Aluminum is a silver-white flexible metal with a vast number of uses. It is poorly absorbed and efficiently eliminated; however, when absorption does

434

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CYANIDE CYANIDE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. February 1994 Prepared by Rosmarie A. Faust, Ph.D., Chemical Hazard Evaluation and Communication Group, Biomedical and Environmental Information Analysis Section, Health and Safety Research Division, *, Oak Ridge, Tennessee. Prepared for OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400 Cyanide most commonly occurs as hydrogen cyanide and its salts--sodium and potassium cyanide. Cyanides are both man-made and naturally occurring

435

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for 1,4-DICHLOROBENZENE Condensed Toxicity Summary for 1,4-DICHLOROBENZENE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. Prepared by: James C. Norris, Ph.D, Chemical Hazard Evaluation Group in the Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, Oak Ridge National Laboratory*. Prepared for: Oak Ridge Reservation Environmental Restoration Program. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. 1,4-Dichlorobenzene (CAS 106-46-7), also referred to as para-DCB, p-DCB, paracide, Paramoth®, Parazene®, PDB, and Santochlor®, has a benzene ring

436

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Condensed Toxicity Summary for 2,6-DINITROTOLUENE Condensed Toxicity Summary for 2,6-DINITROTOLUENE NOTE: Although the toxicity values presented in these toxicity profiles were correct at the time they were produced, these values are subject to change. Users should always refer to the Toxicity Value Database for the current toxicity values. Prepared by: Rosmarie A. Faust, Ph.D., Chemical Hazard Evaluation Group in the Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, Oak Ridge National Laboratory*. Prepared for: Oak Ridge Reservation Environmental Restoration Program. *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400. 2,6-Dinitrotoluene (2,6-DNT; 2-methyl-1,3-dinitrobenzene; CAS Reg. No. 606-20-2) is a pale yellow crystalline solid and one of six possible

437

PIA - Human Resources System/Payroll System | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

System PIA - Human Resources SystemPayroll System More Documents & Publications PIA - INL PeopleSoft - Human Resource System PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

438

WHO Statistical Information System (WHOSIS) | Open Energy Information  

Open Energy Info (EERE)

Page Page Edit with form History Facebook icon Twitter icon » WHO Statistical Information System (WHOSIS) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: WHO Statistical Information System (WHOSIS) Agency/Company /Organization: World Health Organization (WHO) Topics: Co-benefits assessment, Policies/deployment programs, Resource assessment Resource Type: Dataset Website: www.who.int/whosis/en/ WHO Statistical Information System (WHOSIS) Screenshot References: WHO Statistical Information System (WHOSIS)[1] Overview "The World Health Organization is the United Nations specialized agency for health. WHO's objective, as set out in its Constitution, is the attainment by all peoples of the highest possible level of health. The WHO Statistical Information System is the guide to health and

439

West Point Utility System | Open Energy Information  

Open Energy Info (EERE)

System System Jump to: navigation, search Name West Point Utility System Place Iowa Utility Id 20396 Utility Location Yes Ownership M NERC Location MRO NERC MRO Yes Activity Bundled Services Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png General Service and Municipal Institutional service Large General Service Commercial Rural Resident and Farm All-Electric Residential Rural Resident and Farm Rate Residential Security Light - 150 Watt HPS Customer Owned Pole Lighting Security Light - 150 Watt HPS Utility Owned Pole Lighting Urban All-Electric Residential Rate Residential

440

Information Systems Engineering | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Information Information Systems Engineering Information Systems Engineering The OCIO is dedicated to supporting the development and maintenance of DOE Department wide and site-specific software and IT systems engineering initiatives. This webpage contains resources, checklists, templates, and samples that can be downloaded, plus links to many other informative web sites. In particular, the Department of Energy has issued the DOE Systems Engineering Methodology (SEM), which documents the minimum software and IT systems engineering practices that should be implemented on DOE projects, as well as other accompanying guidance documents. The DOE SEM is the Department's standard lifecycle methodology. It integrates IT systems engineering, software engineering, project management, and quality

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Nonproliferation and National Security Program - Nuclear Engineering  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Major Programs > Nonproliferation and Major Programs > Nonproliferation and National Security Program Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program (NPNS)

442

Towards Simple and Scalable Analysis of Secure Systems Jason Franklin, Deepak Garg, Dilsun Kaynar, Anupam Datta  

E-Print Network [OSTI]

Towards Simple and Scalable Analysis of Secure Systems Jason Franklin, Deepak Garg, Dilsun Kaynar and analysis. Despite substantial progress, the goal of proving deep properties of system implementations: modeling and analysis of system designs at a high-level where in-depth analysis can identify flawed de

Garlan, David

443

E-Print Network 3.0 - automation simulation system Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: Information and Reservation System" "Automated Phone Book Management System" "Simulation of Searching Family... HMI" "Security System Simulator" "Performance Comparison...

444

The potential of intelligent vehicle highway systems for enhanced traveler security  

SciTech Connect (OSTI)

The Intelligent Vehicle Highway System (IVHS) program that was mandated by the Intermodal Surface Transportation Efficiency Act of 1991 (ISTEA) presents a number of opportunities and challenges. While the program primarily is intended to address the problem of traffic congestion, the technologies it will require could also be used to enhance the safety and security of the traveling public. Public transit systems offer the most likely near-term opportunities both for IVHS-type technologies, and for new security measures to be applied. This paper will address some of the possible security functions that could be applied to transit systems by utilizing the availability of Automatic Vehicle Location systems (AVL), broadband digital communication systems, and other IVHS functions.

Caskey, D.L.

1992-12-31T23:59:59.000Z

445

Environmental remediation and waste management information systems  

SciTech Connect (OSTI)

The purpose of this paper is to document a few of the many environmental information systems that currently exist worldwide. The paper is not meant to be a comprehensive list; merely a discussion of a few of the more technical environmental database systems that are available. Regulatory databases such as US Environmental Protection Agency`s (EPA`s) RODS (Records of Decision System) database [EPA, 1993] and cost databases such as EPA`s CORA (Cost of Remedial Action) database [EPA, 1993] are not included in this paper. Section 2 describes several US Department of Energy (DOE) Environmental Restoration and Waste Management (EM) information systems and databases. Section 3 discusses several US EPA information systems on waste sites and technologies. Section 4 summarizes a few of the European Community environmental information systems, networks, and clearinghouses. And finally, Section 5 provides a brief overview of Geographical Information Systems. Section 6 contains the references, and the Appendices contain supporting information.

Harrington, M.W.; Harlan, C.P.

1993-12-31T23:59:59.000Z

446

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

447

Similarity and Clustering in Chemical Information Systems  

Science Journals Connector (OSTI)

From the Publisher:This book describes the latest developments in computational techniques which increase the effectiveness of the storage, retrieval, and processing of information in computerized chemical information systems. Covers the specifics of ...

John 1953- Willett

1987-04-01T23:59:59.000Z

448

Technology Lecture: Developments in Scientific Information Systems  

Science Journals Connector (OSTI)

...research-article Technology Lecture: Developments...in Scientific Information Systems Robert...application of technology can improve aspects...use electronic information capture, storage...availability of technology may govern choice...

1983-01-01T23:59:59.000Z

449

Protocol, Security Assistance - January 2007 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 January 2007 Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security. The Assistance Program is comprised of technologists and subject matter experts from all the S&S disciplines and technical areas including Program Planning Management and Support, Advanced Security Technologies, Protective Force, Physical Security, Information Protection, Safeguards and Security Construction Projects, Vulnerability Assessments, and Nuclear Materials Control and Accountability. Our commitment is to continue to build an assistance program dedicated to serving the interests of the Department and our customers' S&S programs. Our emphasis remains

450

Concepts and applications of wireless security systems for tactical, portable, and fixed sites  

SciTech Connect (OSTI)

Intrusion detection systems sometimes use radio signals to convey sensor status in areas that wire conduits do not service or as a redundant path to wired systems. Some applications benefit from radio technology by minimizing setup time and reducing installation and operation costs. In recent years with the explosion in wireless communications, these radio-based security systems have become more capable while lowering costs, size, and power consumption. However, the very nature of radio communication raises issues regarding setup, operation, and security of these systems. Sandia National Laboratories, in cooperation with government and industry, has addressed many of these issues through the analysis and development of security systems, communications protocols, and operational procedures. Message encryption and frequent channel supervision are used to enhance security. Installation and maintenance of these systems are simplified by incorporating built-in radio link analysis, menu-driven configuration equipment, and other techniques. Commercial communications satellites and spread-spectrum radios are also being integrated to provide unique capabilities to the security community. The status of this work is presented here along with details of its development.

Harrington, J.J.

1997-06-01T23:59:59.000Z

451

An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems  

Science Journals Connector (OSTI)

The problem of sharing manufacturing, inventory, or capacity to improve performance is applicable in many decentralized operational contexts. However, the solution of such problems commonly requires an intermediary or a broker to manage information security ... Keywords: algorithm, collaboration, cryptography, incentive compatible, routing, space-filling curve

Chris Clifton; Ananth Iyer; Richard Cho; Wei Jiang; Murat Kantarc?o?lu; Jaideep Vaidya

2008-01-01T23:59:59.000Z

452

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Prepared by C. B. Bast, Ph.D., D.A.B.T., Chemical Hazard Evaluation Group, Prepared by C. B. Bast, Ph.D., D.A.B.T., Chemical Hazard Evaluation Group, Biomedical and Environmental Information Analysis Section, Health Sciences Research Division, *. Prepared for OAK RIDGE RESERVATION ENVIRONMENTAL RESTORATION PROGRAM *Managed by Martin Marietta Energy Systems, Inc., for the U.S. Department of Energy under Contract No. DE-AC05-84OR21400 Aroclor® 1254 is a polychlorinated biphenyl (PCB) mixture containing approximately 21% C12H6Cl4, 48% C12H5Cl5, 23% C12H4Cl6, and 6% C12H3Cl7 with an average chlorine content of 54% (USAF 1989). PCBs are inert, thermally and physically stable, and have dielectric properties. In the environment, the behavior of PCB mixtures is directly correlated to the degree of chlorination. Aroclor® is strongly sorbed to soil and remains

453

TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27  

E-Print Network [OSTI]

TVMDL Procedures TVMDL Procedure 29.01.03.V1.01 Information Security and Computer Use Page 1 of 27.01.04 PROCEDURE STATEMENT This procedure establishes information resources security and management guidelines for all Texas Veterinary Medical Diagnostic Laboratory (TVMDL) positions. Reason for Procedure Under

454

Office of Headquarters Personnel Security Operations: Mission and Functions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Executive Protection Office of Executive Protection Home Sub Offices › HQ Security Officers (HSO) Program › Office of Security Operations › Office of Information Security › Office of Headquarters Personnel › Office of Physical Protection › Office of Security Operations Mission & Functions › Security Operations › HQ Security Operations › HQ Personnel Security Op. › Special Operations HSO Program - 2010 Spotlights - 2009 Spotlights - Spotlights Archives (2008-2007) HSO Contacts Contact Us Headquarters Facilities Master Security Plan Security Reference Book HSS Logo Office of Headquarters Personnel Security Operations Reports to the Office of Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems.

455

Hydrothermal System | Open Energy Information  

Open Energy Info (EERE)

Hydrothermal System Hydrothermal System (Redirected from Hydrothermal Systems) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Print PDF Hydrothermal Systems Geothermal Technologies There are many types of Geothermal Technologies that take advantage of the earth's heat: Hydrothermal Systems Enhanced Geothermal Systems (EGS) Sedimentary Geothermal Systems Co-Produced Geothermal Systems Geothermal Direct Use Ground Source Heat Pumps Dictionary.png Hydrothermal Systems: A hydrothermal system is one that included fluid, heat, and permeability in a naturally occurring geological formation for the production of electricity. Other definitions:Wikipedia Reegle Geothermal production well at Imperial Valley, California. The drilling of production wells, such as this one in southern California, results in

456

THE DESIGN AND IMPLEMENTATION OF HARDWARE SYSTEMS FOR INFORMATION FLOW TRACKING  

E-Print Network [OSTI]

THE DESIGN AND IMPLEMENTATION OF HARDWARE SYSTEMS FOR INFORMATION FLOW TRACKING A DISSERTATION Computer security is a critical problem impacting every segment of social life. Recent research has shown attacks. With hardware support, DIFT can provide comprehensive protection to unmodified application

Kozyrakis, Christos

457

Energy Security and Restoration Exercise Program/Best Practices and Information Sharing  

SciTech Connect (OSTI)

The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

Barbara McCabe; John Kovach

2009-03-30T23:59:59.000Z

458

First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems  

Science Journals Connector (OSTI)

This extended abstract reports on steps towards an environment for repeatable and scalable experiments on wide-area cyber-physical systems. The cyber-physical systems that underlie the world's critical infrastructure are increasingly vulnerable to attack ... Keywords: cyber-physical, cyber-security, experimental research, overlay network, smart grid, testbed

Ryan Goodfellow; Robert Braden; Terry Benzel; David E. Bakken

2013-01-01T23:59:59.000Z

459

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis  

E-Print Network [OSTI]

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis Abstract: We present an evaluation of threats on the Radio Frequency IDentification (RFID) system of the Electronic components due to the use of an insecure wireless channel. We analyze the threats according

Garcia-Alfaro, Joaquin

460

UPDATE/PATCH MANAGEMENT SYSTEMS: a protocol taxonomy with security implications  

E-Print Network [OSTI]

UPDATE/PATCH MANAGEMENT SYSTEMS: a protocol taxonomy with security implications Andrew Colarik, patches and updates are issued periodically to extend the functional life cycle of software products industry has responded with update and patch management systems. Because of the proprietary nature

Thomborson, Clark

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

A Coal Mine Security Monitoring System Based on Multiplexed Fibre Bragg Grating Sensors and Coherence-Multiplexing Technique  

Science Journals Connector (OSTI)

Abstract: An FBG sensing system for coal mine security monitoring is proposed in this paper. It works over a Spatial-division-multiplexing/coherence-multiplexing network to realize...

Xia, Tianhao; Zhou, Bin; Liu, Weisheng; Guan, Zuguang

462

Definition: Distribution Management System | Open Energy Information  

Open Energy Info (EERE)

Management System Management System Jump to: navigation, search Dictionary.png Distribution Management System A Distribution Management System (DMS) is a utility IT system capable of collecting, organizing, displaying and analyzing real-time or near real-time electric distribution system information. A DMS can also allow operators to plan and execute complex distribution system operations in order to increase system efficiency, optimize power flows, and prevent overloads. A DMS can interface with other operations applications such as geographic information systems (GIS), outage management systems (OMS), and customer information systems (CIS) to create an integrated view of distribution operations.[1] View on Wikipedia Wikipedia Definition In the recent years, utilization of electrical energy increased

463

PIA - Security Clearance Work Tracking and Budget System | Department...  

Broader source: Energy.gov (indexed) [DOE]

Documents & Publications Freedom of Information and Privacy Act Database PIA, Idaho Operations Office Occupational Medicine - Assistant PIA, Idaho National Laboratory TRAIN-PIA.pdf...

464

Altergy Systems | Open Energy Information  

Open Energy Info (EERE)

Zip: 95630 Product: Designs and manufactures proprietary proton exchange membrane (PEM) fuel cell systems. References: Altergy Systems1 This article is a stub. You can help...

465

Use of Multi-attribute Utility Functions in Evaluating Security Systems  

SciTech Connect (OSTI)

In analyzing security systems, we are concerned with protecting a building or facility from an attack by an adversary. Typically, we address the possibility that an adversary could enter a building and cause damage resulting in an immediate loss of life, or at least substantial disruption in the operations of the facility. In response to this setting, we implement security systems including devices, procedures, and facility upgrades designed to (a) prevent the adversary from entering, (b) detect and neutralize him if he does enter, and (c) harden the facility to minimize damage if an attack is carried out successfully. Although we have cast this in terms of physical protection of a building, the same general approach can be applied to non-physical attacks such as cyber attacks on a computer system. A rigorous analytic process is valuable for quantitatively evaluating an existing system, identifying its weaknesses, and proposing useful upgrades. As such, in this paper we describe an approach to assess the degree of overall protection provided by security measures. Our approach evaluates the effectiveness of the individual components of the system, describes how the components work together, and finally assesses the degree of overall protection achieved. This model can then be used to quantify the amount of protection provided by existing security measures, as well as to address proposed upgrades to the system and help identify a robust and cost effective set of improvements. Within the model, we use multiattribute utility functions to perform the overall evaluations of the system.

Meyers, C; Lamont, A; Sicherman, A

2008-06-13T23:59:59.000Z

466

Information Systems Projects Company Description  

E-Print Network [OSTI]

insurance claims processing, billing, and remittance for auto repair and maintenance facilities around/agency data, from which valuable pipeline and performance statistics can be reported. All of this information

Dahl, David B.

467

Cyber Security Requirements for Risk Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

468

Wind energy systems information user study  

SciTech Connect (OSTI)

This report describes the results of a series of telephone interviews with potential users of information on wind energy conversion. These interviews, part of a larger study covering nine different solar technologies, attempted to identify: the type of information each distinctive group of information users needed, and the best way of getting information to that group. Groups studied include: wind energy conversion system researchers; wind energy conversion system manufacturer representatives; wind energy conversion system distributors; wind turbine engineers; utility representatives; educators; county agents and extension service agents; and wind turbine owners.

Belew, W.W.; Wood, B.L.; Marle, T.L.; Reinhardt, C.L.

1981-01-01T23:59:59.000Z

469

Graduate Certificate in Geographic Information Systems (GIS)  

E-Print Network [OSTI]

Graduate Certificate in Geographic Information Systems (GIS) Texas A&M University GIS technologies 651/BAEN 651 ­ Geographic Information Systems · GEOG 660 ­ Applications for GIS Intermediate Level (Both are required) 6 hours · ESSM 652/BAEN 652 ­ Advanced Topics in GIS · GEOG 665 ­ GIS ­ based

470

Taking industry seriously in information systems research  

Science Journals Connector (OSTI)

In this essay, we argue that industry receives little attention in information systems research and theory, despite its increasingly important influence on IS activities. This is evident both in the narrow range of industries examined in IS research ... Keywords: industry context, information systems theory, institutional theory

Mike W. Chiasson; Elizabeth Davidson

2005-12-01T23:59:59.000Z

471

A Proposed Information Architecture for Telehealth System Interoperability  

SciTech Connect (OSTI)

Telemedicine technology is rapidly evolving. Whereas early telemedicine consultations relied primarily on video conferencing, consultations today may utilize video conferencing, medical peripherals, store-and-forward capabilities, electronic patient record management software, and/or a host of other emerging technologies. These remote care systems rely increasingly on distributed, collaborative information technology during the care delivery process, in its many forms. While these leading-edge systems are bellwethers for highly advanced telemedicine, the remote care market today is still immature. Most telemedicine systems are custom-designed and do not interoperate with other commercial offerings. Users are limited to a set of functionality that a single vendor provides and must often pay high prices to obtain this functionality, since vendors in this marketplace must deliver entire systems in order to compete. Besides increasing corporate research and development costs, this inhibits the ability of the user to make intelligent purchasing decisions regarding best-of-breed technologies. We propose a secure, object-oriented information architecture for telemedicine systems that promotes plug-and-play interaction between system components through standardized interfaces, communication protocols, messaging formats, and data definitions. In this architecture, each component functions as a black box, and components plug together in a lego-like fashion to achieve the desired device or system functionality. The architecture will support various ongoing standards work in the medical device arena.

Warren, S.; Craft, R.L.; Parks, R.C.; Gallagher, L.K.; Garcia, R.J.; Funkhouser, D.R.

1999-04-07T23:59:59.000Z

472

Interdependence of the Electricity Generation System and the Natural Gas System and Implications for Energy Security  

E-Print Network [OSTI]

Approved for public release; distribution is unlimited. Lexington Massachusetts This page intentionally left blank. EXECUTIVE SUMMARY Concern about energy security on domestic Department of Defense installations has led to the possibility of using natural gas-fired electricity generators to provide power in the event of electric grid failures. As natural gas is an increasingly base-load fuel for electricity generation in the United States, the electricity generation system has become increasingly dependent on the operation of the natural gas system. However, as the natural gas system is also partly dependent on electricity for its ability to deliver natural gas from the well-head to the consumer, the question arises of whether, in the event of an electric grid failure, the natural gas would continue to flow. As the natural gas transmission system largely uses natural gas from the pipelines as a source of power, once the gas has been extracted from the ground, the system is less dependent on the electric grid. However, some of the drilling rigs, processing units, and pipeline compressors do depend on electric power, making the vulnerability to the system to a disruption in the national electricity supply network vary depending on the cause, breadth, and geographic location of the disruption. This is due to the large numbers of players in the natural gas production and

N. Judson; N. Judson

2013-01-01T23:59:59.000Z

473

Information Concerning Reliability Impacts under Various System  

Broader source: Energy.gov (indexed) [DOE]

Information Concerning Reliability Impacts under Various System Information Concerning Reliability Impacts under Various System Configurations of the Mirant Potomac River Plant Information Concerning Reliability Impacts under Various System Configurations of the Mirant Potomac River Plant Docket No. EO-05-01: PJM Interconnection, L.L.C. and PEPCO Holdings, Inc. is hereby providing you with additional information concerning reliability impacts under various system conditions associated with the unavailability of the Potomac River Generating Station to serve load in the D.C. area. Also enclosed as part of this submittal is material provided by PEPCO (balance of sentence redacted) In addition, there is a discussion concerning the impacts of demand side response in addressing this situation. Information Concerning Reliability Impacts under Various System

474

Definition: Reliability Coordinator Information System | Open Energy  

Open Energy Info (EERE)

Reliability Coordinator Information System Reliability Coordinator Information System Jump to: navigation, search Dictionary.png Reliability Coordinator Information System The system that Reliability Coordinators use to post messages and share operating information in real time.[1] Related Terms Reliability Coordinator References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Reliability_Coordinator_Information_System&oldid=480407" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version Permanent link Browse properties 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load)

475

Cognitive Systems Foundations of Information Processing  

E-Print Network [OSTI]

1 Cognitive Systems Foundations of Information Processing in Natural and Artificial Systems 2010 Cognitive Systems 1: Topics · Perception · Memory and Reasoning · Learning and Action · Communication 3 Cognitive Systems 2: Topics · Methods from psychology, neuroscience, informatics: Cognitive modeling

Bremen, Universität

476

S-Security Protective Force and Systems Services for the Nevada Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

S-Security Protective Force and Systems Services for the Nevada Site S-Security Protective Force and Systems Services for the Nevada Site Office Solicitation Number: DE-SOL-0002014 Agency: Department of Energy Office: Federal Locations Location: All DOE Federal Contracting Offices Notice Type: Modification/Amendment Original Posted Date: June 22, 2010 Posted Date: June 13, 2011 Response Date: Jul 13, 2011 5:00 pm Mountain Original Response Date: July 7, 2010 Archiving Policy: Manual Archive Original Archive Date: August 6, 2010 Archive Date: - Original Set Aside: N/A Set Aside: N/A Classification Code: S -- Utilities and housekeeping services NAICS Code: 561 -- Administrative and Support Services/561612 -- Security Guards and Patrol Services Solicitation Number: DE-SOL-0002014 Notice Type:

477

INFORMATION SYSTEMS UNIT Topic Policies  

E-Print Network [OSTI]

, but not limited to: � Damaging hardware or corrupting software; � Attempting to `hack' into systems; � Using

478

Sensorpedia: Information Sharing Across Autonomous Sensor Systems  

SciTech Connect (OSTI)

The concept of adapting social media technologies is introduced as a means of achieving information sharing across autonomous sensor systems. Historical examples of interoperability as an underlying principle in loosely-coupled systems is compared and contrasted with corresponding tightly-coupled, integrated systems. Examples of ad hoc information sharing solutions based on Web 2.0 social networks, mashups, blogs, wikis, and data tags are presented and discussed. The underlying technologies of these solutions are isolated and defined, and Sensorpedia is presented as a formalized application for implementing sensor information sharing across large-scale enterprises with incompatible autonomous sensor systems.

Gorman, Bryan L [ORNL; Resseguie, David R [ORNL; Tomkins-Tinch, Christopher H [ORNL

2009-01-01T23:59:59.000Z

479

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Frequently Asked Questions Frequently Asked Questions This page represents the most commonly approached topics from our users. What internet browser works best for the RAIS? We attempt to accommodate every browser. If there is a problem viewing the RAIS pages or downloading items, let us know what browser you are using and we will try and fix the problem. How can I use the information on the RAIS? The information on the RAIS can be used for teaching material and performing risk assessments that comply with EPA guidance. Feel free to use the information; it is available to the public. However, please give proper credit to the RAIS and the team from Oak Ridge National Laboratory and The University of Tennessee where you see fit. Also, the databases we maintain are updated on a quarterly basis or sooner, so you may need to "time-stamp"

480

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

Note: This page contains sample records for the topic "information systems security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Hydrothermal System | Open Energy Information  

Open Energy Info (EERE)

(Redirected from Hydrothermal) (Redirected from Hydrothermal) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Print PDF Hydrothermal Systems Geothermal Technologies There are many types of Geothermal Technologies that take advantage of the earth's heat: Hydrothermal Systems Enhanced Geothermal Systems (EGS) Sedimentary Geothermal Systems Co-Produced Geothermal Systems Geothermal Direct Use Ground Source Heat Pumps Dictionary.png Hydrothermal Systems: A hydrothermal system is one that included fluid, heat, and permeability in a naturally occurring geological formation for the production of electricity. Other definitions:Wikipedia Reegle Geothermal production well at Imperial Valley, California. The drilling of production wells, such as this one in southern California, results in one-third to one-half of the cost of a geothermal project. Copyright ©

482

Hydrothermal System | Open Energy Information  

Open Energy Info (EERE)

Jump to: navigation, search Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Print PDF Hydrothermal Systems Geothermal Technologies There are many types of Geothermal Technologies that take advantage of the earth's heat: Hydrothermal Systems Enhanced Geothermal Systems (EGS) Sedimentary Geothermal Systems Co-Produced Geothermal Systems Geothermal Direct Use Ground Source Heat Pumps Dictionary.png Hydrothermal Systems: A hydrothermal system is one that included fluid, heat, and permeability in a naturally occurring geological formation for the production of electricity. Other definitions:Wikipedia Reegle Geothermal production well at Imperial Valley, California. The drilling of production wells, such as this one in southern California, results in one-third to one-half of the cost of a geothermal project. Copyright ©

483

Adura Systems | Open Energy Information  

Open Energy Info (EERE)

Systems Systems Jump to: navigation, search Name Adura Systems Place Menlo Park, California Zip 94025 Product California-based, developer of hybrid vehicle technology. References Adura Systems[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Adura Systems is a company located in Menlo Park, California . References ↑ "Adura Systems" Retrieved from "http://en.openei.org/w/index.php?title=Adura_Systems&oldid=341767" Categories: Clean Energy Organizations Companies Organizations Stubs What links here Related changes Special pages Printable version Permanent link Browse properties 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation:

484

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

485

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

486

PIA - Human Resources - Personal Information Change Request ...  

Office of Environmental Management (EM)

Request - Idaho National Engineering Laboratory More Documents & Publications PIA - INL PeopleSoft - Human Resource System PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

487

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

488

Energy-Economic Information System (SIEE) | Open Energy Information  

Open Energy Info (EERE)

Energy-Economic Information System (SIEE) Energy-Economic Information System (SIEE) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Energy-Economic Information System (SIEE) Database Agency/Company /Organization: Latin American Energy Organization Sector: Energy Topics: Baseline projection, GHG inventory, Background analysis Resource Type: Dataset Website: www.olade.org/sieeEn.html Country: Costa Rica, El Salvador, Guatemala, Honduras, Nicaragua, Panama, Mexico, Argentina, Bolivia, Brazil, Chile, Colombia, Ecuador, Guyana, Paraguay, Peru, Suriname, Uruguay, Venezuela, Barbados, Cuba, Grenada, Haiti, Jamaica, Trinidad & Tobago, Dominican Republic Central America, Central America, Central America, Central America, Central America, Central America, Central America, South America, South America, South America, South America, South America, South America, South America, South America, South America, South America, South America, South America, Caribbean, Caribbean, Caribbean, Caribbean, Caribbean, Caribbean, Caribbean

489

Legal Energy Information System (SIEL) Database | Open Energy Information  

Open Energy Info (EERE)

Legal Energy Information System (SIEL) Database Legal Energy Information System (SIEL) Database Jump to: navigation, search Tool Summary Name: Legal Energy Information System (SIEL) Database Agency/Company /Organization: Latin American Energy Organization Sector: Energy Focus Area: Renewable Energy Topics: Policies/deployment programs, Background analysis Resource Type: Dataset Website: www.olade.org/sielEn.html Country: Costa Rica, El Salvador, Guatemala, Honduras, Nicaragua, Panama, Mexico, Argentina, Bolivia, Brazil, Chile, Colombia, Ecuador, Guyana, Paraguay, Peru, Suriname, Uruguay, Venezuela, Barbados, Cuba, Grenada, Haiti, Jamaica, Trinidad & Tobago, Dominican Republic Central America, Central America, Central America, Central America, Central America, Central America, Central America, South America, South America, South America, South America, South America, South America, South America, South America, South America, South America, South America, South America, Caribbean, Caribbean, Caribbean, Caribbean, Caribbean, Caribbean, Caribbean

490

Drilling Systems | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit History Facebook icon Twitter icon » Drilling Systems Jump to: navigation, search Contents 1 Geothermal Lab Call Projects for Drilling Systems 2 Geothermal ARRA Funded Projects for Drilling Systems Geothermal Lab Call Projects for Drilling Systems Loading map... {"format":"googlemaps3","type":"ROADMAP","types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"limit":200,"offset":0,"link":"all","sort":[""],"order":[],"headers":"show","mainlabel":"","intro":"","outro":"","searchlabel":"\u2026

491

Vitex Systems | Open Energy Information  

Open Energy Info (EERE)

to: navigation, search Name: Vitex Systems Place: San Jose, California Zip: CA 95131 USA Product: Production of OLEDs and commercialization of flat panel displays (FPDs)...

492

River Protection Project information systems assessment  

SciTech Connect (OSTI)

The Information Systems Assessment Report documents the results from assessing the Project Hanford Management Contract (PHMC) Hanford Data Integrator 2000 (HANDI 2000) system, Business Management System (BMS) and Work Management System phases (WMS), with respect to the System Engineering Capability Assessment Model (CAM). The assessment was performed in accordance with the expectations stated in the fiscal year (FY) 1999 Performance Agreement 7.1.1, item (2) which reads, ''Provide an assessment report on the selected Integrated Information System by July 31, 1999.'' This report assesses the BMS and WMS as implemented and planned for the River Protection Project (RPP). The systems implementation is being performed under the PHMC HANDI 2000 information system project. The project began in FY 1998 with the BMS, proceeded in FY 1999 with the Master Equipment List portion of the WMS, and will continue the WMS implementation as funding provides. This report constitutes an interim quality assessment providing information necessary for planning RPP's information systems activities. To avoid confusion, HANDI 2000 will be used when referring to the entire system, encompassing both the BMS and WMS. A graphical depiction of the system is shown in Figure 2-1 of this report.

JOHNSON, A.L.

1999-07-28T23:59:59.000Z

493

SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC)  

Science Journals Connector (OSTI)

The purpose of this document is to provide guidance for securing industrial control systems (ICS), including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other systems performing control functions. ... Keywords: Cyber-physcial systems, ICS, Industrial Control Systems, SCADA, Supervisory Control and Data Acquisition, security controls, threats, vulnerabilities

Keith A. Stouffer; Joseph A. Falco; Karen A. Scarfone

2011-06-01T23:59:59.000Z

494

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Chemical Profile Tool Chemical Profile Tool Using the Chemical Data Profiles Tool Click on the steps below for detailed instructions about each page of the Chemical Data Profiles Tool. 1. Select Chemical 2. Chemical Profile 1. Select Chemical Select the chemical of interest and click "submit". 2. Chemical Profile Basic information for the chemical is shown in the first section. Next, toxicity infomation (Oral RfDs, Inhalation RfCs, and Cancer Toxicity Values) is displayed in tables filled with data from IRIS, PPRTV, ATSDR, CALEPA, and HEAST. The last section contains an extensive list of parameters for the chemical followed by tables of parameters from EPI, CRC, PERRY, LANGE, and YAWS. Hover over the source to see more information. The "Back" button can be used to view a different chemical profile.

495

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ORR Offsite: Relative Risk Ranking Sites ORR Offsite: Relative Risk Ranking Sites These rankings are based on the EM-40 Release Site Methodology. Select a release site to receive information concering that site. Please note that not all of the listed sites are linked to further information. Animal Burial Site I Animal Burial Site II Animal Burial Site III Atomic City Auto Parts - Contaminated Creek Sediments Atomic City Auto Parts - Contaminated Soils Atomic City Auto Parts - Surface Debris Clinch River/Poplar Creek CSX Railroad David Witherspoon, Inc., 1630 Site David Witherspoon, Inc., 901 Site Low Dose Rate Irradiation Facility (LDRIF) Lower East Fork Poplar Creek - Bruner Site Lower East Fork Poplar Creek - NOAA Site Lower Watts Bar Reservoir Oak Ridge Tool Engineering, Inc. Solway Drums Site Swine Waste Lagoons

496

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ORNL: Relative Risk Ranking Sites ORNL: Relative Risk Ranking Sites These rankings are based on the EM-40 Release Site Methodology. Select a release site to receive information concerning that site. Please note that not all of the listed sites are linked to further information. 3001 Storage Canal (OGR) 3517 Filter Pit (Fission Product Development Laboratory) Abandoned Burn Pit Abandoned Sanitary Waste Pipeline and Septic Tank N of 7917 Abandoned Underground Waste Oil Storage Tank 7002A Above-ground Demineralized-water Holding Tanks Aircraft Reactor Experiment Contaminated Tool Storage Aircraft Reactor Experiment Surface Impoundment Buried Scrap Metal Area C-14 Allocation in White Oak Trees C-14 Allocation in White Pine Trees C-14 Allocation in Woody Biomass Plantation Species C-14 Efflux in Yellow Poplar Stand

497

The Risk Assessment Information System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ETTP: Relative Risk Ranking Sites ETTP: Relative Risk Ranking Sites These rankings are based on the EM-40 Release Site Methodology. Select a release site to receive information concerning that site. Please note that not all of the listed sites are linked to further information. 518 Main Substation 600 Series Oil Storage Area 695/687 Oil Storage Operations Building 523 Grease {Burial Site} Building 526 Heavy Equipment Shop Building 569 Heavy Equipment Shop Building 665 Steam Shed Building F-29 Gasoline Station Demolition Materials Placement Area Duct Island Road F-05 Laboratory Burial Ground F-07 Material Warehouse F-08 Laboratory Flannagans Loop Road Groundwater Plume Centered Under North Side of K-1070-C/D Groundwater Plume Emanating from K-1401 Acid Line Groundwater Plume near Mitchell Branch Groundwater Plume Originating from K-1420 Building

498

Combining Provenance and Security Policies in a Web-based Document Management System  

E-Print Network [OSTI]

Combining Provenance and Security Policies in a Web-based Document Management System Brian J policies with provenance tracking. For instance, an on- line stock trading website might restrict access. Similarly, the application might need to track the provenance of transaction infor- mation to support

Hicks, Michael

499

Secure Systems Editor: S.W. Smith, sws@cs.dartmouth.edu  

E-Print Network [OSTI]

Secure Systems Editor: S.W. Smith, sws@cs.dartmouth.edu side of the picture--the computers which we train students, young and old, to be effective cyber-citizens; and the media coverage or produce more effective tailors. S.W. SMITH Dartmouth College T oalargeextent,computingsystemsareu

Smith, Sean W.

500

Energistic Systems | Open Energy Information  

Open Energy Info (EERE)

Energistic Systems Energistic Systems Jump to: navigation, search Logo: Energistic Systems Name Energistic Systems Address 13551 W. 43rd Street Dr Place Golden, Colorado Zip 80403 Sector Solar Product Solar PV and solar thermal systems Website http://www.energisticsystems.u Coordinates 39.749637°, -105.215984° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.749637,"lon":-105.215984,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}