National Library of Energy BETA

Sample records for information systems security

  1. Classified Information Systems Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-08-03

    This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

  2. Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

  3. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

  4. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  5. Security Controls for Unclassified Information Systems Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-05

    The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

  6. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PDF icon PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE More Documents & Publications PIA - INL Education Programs Business Enclave Manchester Software 1099 Reporting PIA, Idaho National Laboratory PIA - INL PeopleSoft - Human Resource System

  7. information systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    information systems | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at

  8. Information System Security Officer (ISSO) | Department of Energy

    Office of Environmental Management (EM)

    Officer (ISSO) Information System Security Officer (ISSO) digital-388075_960_720.jpg The Information System Security Officer (ISSO) is responsible to the Information System Security Manager (SSM), information owner, and system owner for ensuring a proper security posture is in place. PDF icon ISSO Core Competency Training Worksheet More Documents & Publications Cybersecurity Program Manager (CSPM) Authorizing Official Designated Representative (AODR) Information System Owner (ISO

  9. Information System Security Manager (ISSM) | Department of Energy

    Office of Environmental Management (EM)

    Manager (ISSM) Information System Security Manager (ISSM) macbook-925595_960_720.jpg The Information Security System Manager (ISSM) is designated by an operating unit's (DOE organization or site) Senior Manager to manage the unit's cyber security program. The ISSM establishes, documents, and monitors an operating unit's cyber security program implementation plan, and ensures compliance with DOE management policies. Candidates must possess a working knowledge of cyber security policies and

  10. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    BUSINESS ENCLAVE PDF icon PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ... 1099 Reporting PIA, Idaho National Laboratory PIA - INL PeopleSoft - Human Resource System

  11. List of Major Information Systems,National Nuclear Security Administration

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ADaPT Networked: | Department of Energy List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear

  12. Information security management system planning for CBRN facilities

    SciTech Connect (OSTI)

    Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-12-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  13. Electronic DOE Information Security System (eDISS) PIA, Office of Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Safety and Security | Department of Energy DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security PDF icon Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security More Documents & Publications Integrated Safety Management Workshop

  14. Zicom Electronic Security Systems Ltd | Open Energy Information

    Open Energy Info (EERE)

    Security Systems Ltd. Place: Mumbai, Maharashtra, India Zip: 400093 Sector: Solar, Wind energy Product: Mumbai-based electronic security systems integrator. The firm plans to...

  15. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  16. Manual of Security Requirements for the Classified Automated Information System Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15

    This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

  17. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  18. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  20. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  1. List of Major Information Systems,National Nuclear Security Administra...

    Broader source: Energy.gov (indexed) [DOE]

    Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. ...

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  3. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  4. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  5. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that ...

  6. Cyber Security Requirements for Wireless Devices and Information Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-11

    The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  7. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  8. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  9. Electronic DOE Information Security System (eDISS) PIA, Office...

    Energy Savers [EERE]

    Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory Occupational Injury & Illness System...

  10. The theory of diversity and redundancy in information system security : LDRD final report.

    SciTech Connect (OSTI)

    Mayo, Jackson R.; Torgerson, Mark Dolan; Walker, Andrea Mae; Armstrong, Robert C.; Allan, Benjamin A.; Pierson, Lyndon George

    2010-10-01

    The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems.

  11. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  12. The use of information technology security assessment criteria to protect specialized computer systems

    SciTech Connect (OSTI)

    Lykov, V.A.; Shein, A.V.; Piskarev, A.S.; Devaney, D.M.; Melton, R.B.; Hunteman, W.J.; Prommel, J.M.; Rothfuss, J.S.

    1997-10-01

    The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory collaboration. Depending on the conditions in which the MC and A system is intended to operate, some of the criteria and the attendant certification requirements may exceed those established or may overlap the requirements established for attestation of such systems. In this regard it is possible to modify the certification and attestation requirements depending on the conditions in which a system will operate in order to achieve the ultimate goal--implementation of the systems in the industry.

  13. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  14. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  15. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  16. Information Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information Security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at

  17. Implementing Information Security and Its Technology: A LineManagement...

    Office of Scientific and Technical Information (OSTI)

    Country of Publication: United States Language: English Subject: 29; 99; INFORMATION SYSTEMS; MANAGEMENT; SECURITY cybersecurity cyberlaw information management privacy Word...

  18. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs

  19. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  20. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  1. ETTP Security Access Control System (ESACS) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) PDF icon ETTP Security Access Control System (ESACS) More Documents & Publications PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL PeopleSoft - Human Resource System PIA - Human Resources - Personal Information Change Request - Idaho National Engineering Laboratory

  2. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L. (Idaho Falls, ID)

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  3. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized ...

  4. Information Security: Coordination of Federal Cyber Security Research and

    Energy Savers [EERE]

    Development | Department of Energy Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In

  5. Cyber Securing Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Industrial Control Systems Integration into the DoD Networks A Briefing in Response to House Report 113-102, Accompanying the FY14 National Defense Authorization Act Unclassified - Distribution Statement A August, 2015 Cyber Securing Control Systems Acquisition, Technology and Logistics 2 DoD Scope of Platform IT & Control Systems * Acquisitions / Weapon Systems - H,M & E (ships / subs, missiles, UVs, etc.) - Training Simulators, 3D printing, etc. * EI&E - Buildings & linear

  6. Securing Control Systems Modems

    Energy Savers [EERE]

    Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate

  7. Information Security Specialist | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security Specialist Information Security Specialist Submitted by admin on Sun, 2015-09-13 00:15 Job Summary Organization Name Department Of Energy Agency SubElement...

  8. Nuclear Materials Information Program | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Information Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

  9. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Physical Security Systems | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working

  10. Determining Home Range and Preferred Habitat of Feral Horses on the Nevada National Security Site Using Geographic Information Systems

    SciTech Connect (OSTI)

    Burns, Ashley V.

    2014-05-30

    Feral horses (Equus caballus) are free-roaming descendants of domesticated horses and legally protected by the Wild and Free-Roaming Horses and Burros Act of 1971, which mandates how feral horses and burros should be managed and protected on federal lands. Using a geographic information system to determine the home range and suitable habitat of feral horses on the federally managed Nevada National Security Site can enable wildlife biologists in making best management practice recommendations. Home range was estimated at 88.1 square kilometers. Site suitability was calculated for elevation, forage, slope, water presence and horse observations. These variables were combined in successive iterations into one polygon. Suitability rankings established that 85 square kilometers are most suitable habitat, with 2,052 square kilometers of good habitat 1,252 square kilometers of fair habitat and 122 square kilometers of least suitable habitat.

  11. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  12. Emergency Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  13. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  14. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture PDF icon ...

  15. Control Systems Security Standards: Accomplishments And Impacts...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Standards: Accomplishments And Impacts Control Systems Security Standards: ... strategies defined in the DOEDHS Roadmap to Secure Control Systems in the Energy Sector. ...

  16. T-592: Cisco Security Advisory: Cisco Secure Access Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unauthorized Password Change Vulnerability | Department of Energy 92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability March 31, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch

  17. Center for Control System Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Control System Security Critical Infrastructure is at Risk As America's infrastructures have become more complex and interconnected, their operation and control has become more...

  18. Cyberspace Security Econometrics System (CSES)

    Energy Science and Technology Software Center (OSTI)

    2012-07-27

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing complance pressures require careful consideration and adaption. The CSES provides a measure (i.e. a quantitative indication) of reliability, performance, and/or safety of a system that accounts for themore » criticality of each requirement as a function of one or more stakeholders' interests in that requirement. For a given stakeholder, CSES accounts for the variance that may exist among the stakes one attaches to meeting each requirement.« less

  19. PIA - Security Clearance Work Tracking and Budget System | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Work Tracking and Budget System PIA - Security Clearance Work Tracking and Budget System PIA - Security Clearance Work Tracking and Budget System PDF icon PIA - Security Clearance Work Tracking and Budget System More Documents & Publications Freedom of Information and Privacy Act Database PIA, Idaho Operations Office PIA - INL Education Programs Business Enclave Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory

  20. Selecting RMF Controls for National Security Systems

    SciTech Connect (OSTI)

    Witzke, Edward L.

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  1. U-200: Red Hat Directory Server Information Disclosure Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

  2. Supervisory Information Technology Specialist (Information Security)

    Broader source: Energy.gov [DOE]

    The Office of the Chief Information Officer is seeking a motivated and highly-qualified candidate to serve as the Director of the Cybersecurity Operations Office and oversee development and...

  3. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  4. System and method for secure group transactions

    DOE Patents [OSTI]

    Goldsmith, Steven Y. (Rochester, MN)

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  5. How to implement security controls for an information security program at CBRN facilities

    SciTech Connect (OSTI)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  6. Secure Control Systems for the Energy Sector

    SciTech Connect (OSTI)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  7. Site Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  8. Contact Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  9. Membership Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Membership Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at

  10. Program Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  11. T-592: Cisco Security Advisory: Cisco Secure Access Control System

    Broader source: Energy.gov (indexed) [DOE]

    Unauthorized Password Change Vulnerability | Department of Energy PROBLEM: A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a centralized RADIUS and TACACS+ server, combining user authentication, user and administrator device access control, and policy control into a centralized identity

  12. National Security Information Classification Guidance Fundamental Review, June 2012

    Office of Environmental Management (EM)

    Security Information Fundamental Classification Guidance Review Report to the Information Security Oversight Office June 2012 United States Department of Energy Washington, DC 20585 Department of Energy | June 2012 National Security Information Fundamental Classification Guidance Review | Page iii Executive Summary Section 1.9 of Executive Order (E.O.) 13526, Classified National Security Information, dated December 29, 2009, directs agency heads to complete a comprehensive review of agency

  13. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site...

  14. Headquarters Facilities Master Security Plan- Chapter 13, Controlled Unclassified Information

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 13, Controlled Unclassified Information Describes DOE Headquarters procedures for protecting Controlled Unclassified Information (CUI).

  15. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments: Program Areas Defense Systems About Defense Systems & Assessments Program Areas Accomplishments Cybersecurity Programs Program Areas EOD security and defense photo Sandia's engineering, science, and technology expertise helps anticipate and solve the nation's toughest security challenges. Defense Systems & Assessments work is focused in seven main program areas: Information Operations: Information Operations develops technologies that help protect U.S. government,

  16. GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development

    Office of Environmental Management (EM)

    the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House

  17. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    SciTech Connect (OSTI)

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  18. Roadmap to Secure Control Systems in the Energy Sector - January...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Secure Control Systems in the Energy Sector - January 2006 Roadmap to Secure Control Systems in the Energy Sector - January 2006 This document, the Roadmap to Secure...

  19. Pantex Occupational Health System (OHS), National Nuclear Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security ...

  20. Pantex Occupational Health System (OHS), National Nuclear Security...

    Energy Savers [EERE]

    Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security...

  1. Farmland Security Zone | Open Energy Information

    Open Energy Info (EERE)

    Security Zone Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Farmland Security ZoneLegal Abstract California Department of...

  2. Information System Owner | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    startup-849805_960_720.jpg The Information System Owner (ISO) is responsible for every stage in the lifecycle of an information system, including: procurement development integration modification operation maintenance retirement The ISO is a key contributor in: developing system design specifications testing implementation PDF icon Information System Owner Core Competency Training Worksheet More Documents & Publications Information System Security Officer (ISSO) Authorizing Official

  3. Developing Secure Power Systems Professional Competence: Alignment...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    resources that can aid in the accelerating need for Secure Power Systems Professionals, ... and competencies along with assessing the need and qualifications for a certification ...

  4. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    SciTech Connect (OSTI)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  5. Common Cyber Security Vulnerabilities Observed in Control System

    Energy Savers [EERE]

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  6. Secure Smart Grid Association | Open Energy Information

    Open Energy Info (EERE)

    Smart Grid Association Jump to: navigation, search Name: Secure Smart Grid Association Address: 2374 S Josephine St Place: Denver, Colorado Zip: 80210 Region: Rockies Area Number...

  7. Site Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Kansas City National Security Campus (NSC), located in Kansas City, Mo., is the principal nonnuclear production site within the nuclear weapons complex, responsible for ...

  8. Secure videoconferencing equipment switching system and method

    DOE Patents [OSTI]

    Hansen, Michael E. (Livermore, CA)

    2009-01-13

    A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.

  9. PKI-based security for peer-to-peer information sharing

    SciTech Connect (OSTI)

    Berket, Karlo; Essiari, Abdelilah; Muratas, Artur

    2004-05-02

    The free flow of information is the feature that has made peer-to-peer information sharing applications popular. However, this very feature holds back the acceptance of these applications by the corporate and scientific communities. In these communities it is important to provide confidentiality and integrity of communication and to enforce access control to shared resources. We present a number of security mechanisms that can be used to satisfy these security requirements. Our solutions are based on established and proven security techniques and we utilize existing technologies when possible. As a proof of concept, we have developed an information sharing system, called scishare, which integrates a number of these security mechanisms to provide a secure environment for information sharing. This system will allow a broader set of user communities to benefit from peer-to-peer information sharing.

  10. AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938 June 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 June 3, 2015 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report: "Cybersecurity Controls Over a Major National Nuclear Security Administration Information System" BACKGROUND In both the

  11. Network Information System

    Energy Science and Technology Software Center (OSTI)

    1996-05-01

    The Network Information System (NWIS) was initially implemented in May 1996 as a system in which computing devices could be recorded so that unique names could be generated for each device. Since then the system has grown to be an enterprise wide information system which is integrated with other systems to provide the seamless flow of data through the enterprise. The system Iracks data for two main entities: people and computing devices. The following aremore » the type of functions performed by NWIS for these two entities: People Provides source information to the enterprise person data repository for select contractors and visitors Generates and tracks unique usernames and Unix user IDs for every individual granted cyber access Tracks accounts for centrally managed computing resources, and monitors and controls the reauthorization of the accounts in accordance with the DOE mandated interval Computing Devices Generates unique names for all computing devices registered in the system Tracks the following information for each computing device: manufacturer, make, model, Sandia property number, vendor serial number, operating system and operating system version, owner, device location, amount of memory, amount of disk space, and level of support provided for the machine Tracks the hardware address for network cards Tracks the P address registered to computing devices along with the canonical and alias names for each address Updates the Dynamic Domain Name Service (DDNS) for canonical and alias names Creates the configuration files for DHCP to control the DHCP ranges and allow access to only properly registered computers Tracks and monitors classified security plans for stand-alone computers Tracks the configuration requirements used to setup the machine Tracks the roles people have on machines (system administrator, administrative access, user, etc...) Allows systems administrators to track changes made on the machine (both hardware and software) Generates an adjustment history of changes on selected fields« less

  12. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    DOE Patents [OSTI]

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  13. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F. Russell; Carroll, J. Ritchie; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  14. Security Forms and Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... You will receive a more in-depth Initial Security Briefing when you receive your DOE photo ... New Employee Orientation About the U.S. Department of Energy What To Bring On Your First ...

  15. Page 10, Security Forms and Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Employees entering DOE facilities must have either a DOE photo identification Security Badge or a DOE Temporary Badge. Either badge must be displayed above the waist in plain view ...

  16. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  17. Information System Owner (ISO) | Department of Energy

    Office of Environmental Management (EM)

    Owner (ISO) Information System Owner (ISO) startup-849805_960_720.jpg The Information System Owner (ISO) is responsible for every stage in the lifecycle of an information system, including: procurement development integration modification operation maintenance retirement The ISO is a key contributor in: developing system design specifications testing implementation PDF icon Information System Owner Core Competency Training Worksheet More Documents & Publications Information System Security

  18. DOE and Industry Showcase New Control Systems Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Delivery Systems Cybersecurity Control Systems Security News Archive DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and ...

  19. Recommended Practice for Securing Control System Modems

    SciTech Connect (OSTI)

    James R. Davidson; Jason L. Wright

    2008-01-01

    This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

  20. Situated Usability Testing for Security Systems

    SciTech Connect (OSTI)

    Greitzer, Frank L.

    2011-03-02

    While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused on matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.

  1. Secure videoconferencing equipment switching system and method

    DOE Patents [OSTI]

    Dirks, David H; Gomes, Diane; Stewart, Corbin J; Fischer, Robert A

    2013-04-30

    Examples of systems described herein include videoconferencing systems having audio/visual components coupled to a codec. The codec may be configured by a control system. Communication networks having different security levels may be alternately coupled to the codec following appropriate configuration by the control system. The control system may also be coupled to the communication networks.

  2. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector ...

  3. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

  4. Roadmap to Secure Control Systems in the Energy: Executive Summary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to...

  5. Common Cyber Security Vulnerabilities Observed in Control System...

    Energy Savers [EERE]

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

  6. Control Systems Cyber Security: Defense in Depth Strategies ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security: Defense in Depth Strategies Control Systems Cyber Security: Defense in ... strategies for organizations that use control system networks while maintaining a ...

  7. The Department of Energy's National Security Information Fundamental

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Classification Guidance Review | Department of Energy The Department of Energy's National Security Information Fundamental Classification Guidance Review The Department of Energy's National Security Information Fundamental Classification Guidance Review The goals of this review process was to evaluate the guidance content, determine if the guidance conforms to current operational and technical circumstances, determine if the guidance meets the standards for classification under section 1.4

  8. PIA - Human Resources Information System (HRIS) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information System (HRIS) PIA - Human Resources Information System (HRIS) PIA - Human Resources Information System (HRIS) PDF icon PIA - Human Resources Information System (HRIS) More Documents & Publications PIA - INL PeopleSoft - Human Resource System PIA - Human Resources - Personal Information Change Request - Idaho National Engineering Laboratory PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE

  9. PIA - Human Resources Management Information System (HRMIS) | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Information System (HRMIS) PIA - Human Resources Management Information System (HRMIS) PIA - Human Resources Management Information System (HRMIS) PDF icon PIA - Human Resources Management Information System (HRMIS) More Documents & Publications PIA - INL PeopleSoft - Human Resource System PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - Human Resources - Personal Information Change Request - Idaho National Engineering Laboratory

  10. Control Systems Security Standards: Accomplishments & Impacts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7019 Unlimited Release November 2007 Control Systems Security Standards Accomplishments & Impacts Ronald Halbgewachs Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited.

  11. Control Systems Security Standards: Accomplishments & Impacts

    Office of Environmental Management (EM)

    019 Unlimited Release November 2007 Control Systems Security Standards Accomplishments & Impacts Ronald Halbgewachs Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited.

  12. Important Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Important Information Important Information From time to time, important information for subcontractors to Y-12 is posted on this web page. If you have a question that is not answered here, please contact Procurement at 865.576.8500. Taxes on sales to Y-12 are subject to the the provisions of the State of Tennessee Sales Tax Rule and Regulation Number 68. See the Y-12 Blanket Certificate of Resale (PDF), which includes the letter from the Tennessee Department of Revenue. Financial information,

  13. Vendor Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Database. This database provides buyers an opportunity to search for potential suppliers for upcoming requirements. The Vendor Information Database is currently unavailable....

  14. Design tools for complex dynamic security systems.

    SciTech Connect (OSTI)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III; Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  15. Primer Control System Cyber Security Framework and Technical Metrics

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  16. Emergency Public Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Emergency Public Information Emergency Public Information Y-12's activities are vital to securing America's future, but they can also pose potential risks. To help protect against possible incidents, Emergency Management personnel work daily to keep safe workplaces and educated communities. Although incidents are rare, we want you to be informed and prepared. Emergency information posted on these Web pages is relevant to all local residents and employees, such as what to do when sirens sound and

  17. Mitigations for Security Vulnerabilities Found in Control System Networks |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the

  18. Pantex Occupational Health System (OHS), National Nuclear Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Administration Pantex Site Office | Department of Energy Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office PDF icon Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office More Documents &

  19. Area Information | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Area Information Guides, Area Maps, Airport... Airport, About: McGhee Tyson Airport Airport: map to Oak Ridge/Knoxville Oak Ridge: City Guide for City of Oak Ridge, Tennessee Knoxville: maps for visitors Oak Ridge: area map with location of Y-12 Visitor's Center Oak Ridge: map of city streets Roane County: Roane County Guide Resources: News, History... Knoxville: Knoxville, Tennessee Knoxville: Museums Knoxville: Knoxville News-Sentinel Oak Ridge: City of Oak Ridge Oak Ridge: Chamber

  20. A Summary of Control System Security Standards Activities in...

    Broader source: Energy.gov (indexed) [DOE]

    document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication...

  1. Implementing Information Security and Its Technology: A LineManagement Perspective

    SciTech Connect (OSTI)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  2. Informational Materials | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Informational Materials Informational Materials Listed below are complimentary historical materials available at the Y-12 History Center or for viewing or downloading from this page. All files are in Adobe PDF format. BOOKLETS Image of John Googin A Biography of Dr. John M. Googin A warm tribute and loving memorial for Dr. John M. Googin, published by his friends and colleagues in Y-12's Development Division. (Size: 856 KB) Image of Jack Case Jack Case and The Jack Case Center Articles on Jack

  3. NNSA's G2 Management Information System Wins Association for Enterprise

    National Nuclear Security Administration (NNSA)

    Information's (AFEI) "Excellence in Enterprise Information Award" | National Nuclear Security Administration G2 Management Information System Wins Association for Enterprise Information's (AFEI) "Excellence in Enterprise Information Award" | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering

  4. Program Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Contract International Association of Machinists and Aerospace Workers Agreement HS&E Management System Description and Worker Safety and Health Program 2015 Small Business...

  5. Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1993-07-23

    The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities (SCIFs) within DOE. Supersedes DOE 5639.8.

  6. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  7. Comparison of Routable Control System Security Approaches

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

    2011-06-01

    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

  8. The FELICIA bulletin board system and the IRBIS anonymous FTP server: Computer security information sources for the DOE community. CIAC-2302

    SciTech Connect (OSTI)

    Orvis, W.J.

    1993-11-03

    The Computer Incident Advisory Capability (CIAC) operates two information servers for the DOE community, FELICIA (formerly FELIX) and IRBIS. FELICIA is a computer Bulletin Board System (BBS) that can be accessed by telephone with a modem. IRBIS is an anonymous ftp server that can be accessed on the Internet. Both of these servers contain all of the publicly available CIAC, CERT, NIST, and DDN bulletins, virus descriptions, the VIRUS-L moderated virus bulletin board, copies of public domain and shareware virus- detection/protection software, and copies of useful public domain and shareware utility programs. This guide describes how to connect these systems and obtain files from them.

  9. ORO Office Safeguards and Security Clearance Tracking System and Visitor

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Control System PIA, Oak Ridge Operations Office | Department of Energy Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office PDF icon ORO Office Safeguards and Security Clearance Tracking

  10. Security Profile Inspector for UNIX Systems

    Energy Science and Technology Software Center (OSTI)

    1995-04-01

    SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configurationmore » Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX system security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less

  11. System and method for key generation in security tokens

    DOE Patents [OSTI]

    Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.; Pooser, Raphael C.; Prowell, Stacy J.

    2015-10-27

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  12. System and method for key generation in security tokens

    DOE Patents [OSTI]

    Evans, Philip G; Humble, Travis S; Paul, Nathanael R; Pooser, Raphael C; Prowell, Stacy J

    2015-11-05

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  13. EEO Complaints Information for Managers | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Complaints Information for Managers | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply

  14. NNSA Awards Information Technology Contract | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Information Technology Contract | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for

  15. NMMSS Information, Reports & Forms | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Information, Reports & Forms | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for

  16. PIA - Security Clearance Tracking System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tracking System PIA - Security Clearance Tracking System PIA - Security Clearance Tracking System PDF icon PIA - Security Clearance Tracking System More Documents & Publications Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory PIA - GovTrip (DOE data) PIA - Bonneville Power Adminstration Ethics Helpline

  17. Aerial Measuring System | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Aerial Measuring System | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at

  18. NNSA Policy System | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Policy System | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  19. emergency management systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    systems | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  20. Collaboration Topics - System Software | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration System Software | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs

  1. Ultra Safe And Secure Blasting System

    SciTech Connect (OSTI)

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

  2. Cyber Security Procurement Language for Control Systems Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language ... subway systems, dams, telecommunication systems, natural gas pipelines, and many others. ...

  3. Photovoltaic Geographical Information System | Open Energy Information

    Open Energy Info (EERE)

    Information System Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Photovoltaic Geographical Information System Focus Area: Renewable Energy Topics: Opportunity...

  4. Information extraction system

    DOE Patents [OSTI]

    Lemmond, Tracy D; Hanley, William G; Guensche, Joseph Wendell; Perry, Nathan C; Nitao, John J; Kidwell, Paul Brandon; Boakye, Kofi Agyeman; Glaser, Ron E; Prenger, Ryan James

    2014-05-13

    An information extraction system and methods of operating the system are provided. In particular, an information extraction system for performing meta-extraction of named entities of people, organizations, and locations as well as relationships and events from text documents are described herein.

  5. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  6. TEPS/BPA Information | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    TEPS/BPA Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at

  7. Roadmap to Secure Control Systems in the Energy Sector 2006 ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop Presentation by Hank Kenchington on the 2006 roadmap to secure control ...

  8. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  9. Secure Retrieval of FFTF Testing, Design, and Operating Information

    SciTech Connect (OSTI)

    Butner, R. Scott; Wootan, David W.; Omberg, Ronald P.; Makenas, Bruce J.; Nielsen, Deborah

    2009-10-01

    One of the goals of the Advanced Fuel Cycle Initiative (AFCI) is to preserve the knowledge that has been gained in the United States on Liquid Metal Reactors (LMR). In addition, preserving LMR information and knowledge is part of a larger international collaborative activity conducted under the auspices of the International Atomic Energy Agency (IAEA). A similar program is being conducted for EBR-II at the Idaho Nuclear Laboratory (INL) and international programs are also in progress. Knowledge preservation at the FFTF is focused on the areas of design, construction, startup, and operation of the reactor. As the primary function of the FFTF was testing, the focus is also on preserving information obtained from irradiation testing of fuels and materials. This information will be invaluable when, at a later date, international decisions are made to pursue new LMRs. In the interim, this information may be of potential use for international exchanges with other LMR programs around the world. At least as important in the United States, which is emphasizing large-scale computer simulation and modeling, this information provides the basis for creating benchmarks for validating and testing these large scale computer programs. Although the preservation activity with respect to FFTF information as discussed below is still underway, the team of authors above is currently retrieving and providing experimental and design information to the LMR modeling and simulation efforts for use in validating their computer models. On the Hanford Site, the FFTF reactor plant is one of the facilities intended for decontamination and decommissioning consistent with the cleanup mission on this site. The reactor facility has been deactivated and is being maintained in a cold and dark minimal surveillance and maintenance mode until final decommissioning is pursued. In order to ensure protection of information at risk, the program to date has focused on sequestering and secure retrieval. Accomplishments include secure retrieval of: more than 400 boxes of FFTF information, several hundred microfilm reels including Clinch River Breeder Reactor (CRBR) information, and 40 boxes of information on the Fuels and Materials Examination Facility (FMEF). All information preserved to date is now being stored and categorized consistent with the IAEA international standardized taxonomy. Earlier information largely related to irradiation testing is likewise being categorized. The fuel test results information exists in several different formats depending upon the final stage of the test evaluation. In some cases there is information from both non-destructive and destructive examination while in other cases only non-destructive results are available. Non-destructive information would include disassembly records, dimensional profilometry, gamma spectrometry, and neutron radiography. Information from destructive examinations would include fission gas analysis, metallography, and photomicrographs. Archiving of FFTF data, including both the reactor plant and the fuel test information, is being performed in coordination with other data archiving efforts underway under the aegis of the AFCI program. In addition to the FFTF efforts, archiving of data from the EBR-II reactor is being carried out by INL. All material at risk associated with FFTF documentation has been secured in a timely manner consistent with the stated plan. This documentation is now being categorized consistent with internationally agreed upon IAEA standards. Documents are being converted to electronic format for transfer to a large searchable electronic database being developed by INL. In addition, selected FFTF information is being used to generate test cases for large-scale simulation modeling efforts and for providing Design Data Need (DDN) packages as requested by the AFCI program.

  10. Energy Sector Security Appliances in a System for Intelligent Learning Network Configuration Management and Monitoring (Essence)

    Office of Environmental Management (EM)

    Sector Security Appliances in a System for Intelligent Learning Network Configuration Management and Monitoring (Essence) Software defined network to assist small electric cooperatives with limited resources for securing utility operational networks Background Utilities of all sizes are faced with the challenge of configuring, managing, monitoring, and securing their information technology and operational technology (IT and OT) networks; but the challenge is more acute for small utilities and

  11. Security Metricsfor Process Control Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Metricsfor Process Control Systems Security Metricsfor Process Control Systems This document describes the foundations of metrics, discusses application of these metrics to control system environments, introduces a metrics taxonomy, and suggests usage of metrics to achieve operational excellence. PDF icon Security Metrics for Process Control Systems More Documents & Publications Report of the Cyber Security Research Needs for Open Science Workshop Visualization & Controls Program Peer

  12. Prototype system brings advantages of wireless technology to secure

    National Nuclear Security Administration (NNSA)

    environment | National Nuclear Security Administration Prototype system brings advantages of wireless technology to secure environment | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios

  13. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  14. A Hierarchical Security Architecture for Cyber-Physical Systems

    SciTech Connect (OSTI)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  15. EcoSecurities India Ltd | Open Energy Information

    Open Energy Info (EERE)

    Indian subsidiary of UK CDM project developer EcoSecurities, to focus primarily on methane capture and destruction projects. References: EcoSecurities India Ltd.1 This...

  16. MN Office of Energy Security | Open Energy Information

    Open Energy Info (EERE)

    MN Office of Energy Security Jump to: navigation, search Name: MN Office of Energy Security Place: St. Paul, MN Website: www.mnofficeofenergysecurity.c References: MN Office of...

  17. Engineering Design Information System (EDIS)

    SciTech Connect (OSTI)

    Smith, P.S.; Short, R.D.; Schwarz, R.K.

    1990-11-01

    This manual is a guide to the use of the Engineering Design Information System (EDIS) Phase I. The system runs on the Martin Marietta Energy Systems, Inc., IBM 3081 unclassified computer. This is the first phase in the implementation of EDIS, which is an index, storage, and retrieval system for engineering documents produced at various plants and laboratories operated by Energy Systems for the Department of Energy. This manual presents on overview of EDIS, describing the system's purpose; the functions it performs; hardware, software, and security requirements; and help and error functions. This manual describes how to access EDIS and how to operate system functions using Database 2 (DB2), Time Sharing Option (TSO), Interactive System Productivity Facility (ISPF), and Soft Master viewing features employed by this system. Appendix A contains a description of the Soft Master viewing capabilities provided through the EDIS View function. Appendix B provides examples of the system error screens and help screens for valid codes used for screen entry. Appendix C contains a dictionary of data elements and descriptions.

  18. Process Control Systems in the Chemical Industry: Safety vs. Security

    SciTech Connect (OSTI)

    Jeffrey Hahn; Thomas Anderson

    2005-04-01

    Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

  19. Help for the Developers of Control System Cyber Security Standards

    SciTech Connect (OSTI)

    Robert P. Evans

    2008-05-01

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  20. Securing Wide Area Measurement Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Wide Area Measurement Systems Securing Wide Area Measurement Systems This report documents an assessment of wide area measurement system (WAMS) security conducted by Pacific Northwest National Laboratory (PNNL) as a project funded by the National SCADA Test Bed Program in cooperation with the Department of Energy's Transmission Reliability Program. With emphasis on cyber security, this report also addresses other categories of risk and vulnerability including equipment reliability, data quality

  1. Security Framework for Control System Data Classification and Protection |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Framework for Control System Data Classification and Protection Security Framework for Control System Data Classification and Protection This document presents a data classification process that gives utility administrators, control engineers, and IT personnel a cohesive approach to deploying efficient and effective process control security. PDF icon Security Framework for Control System Data Classification and Protection More Documents & Publications Essential Body

  2. Control Systems Security News Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity August 2010: - DOE 2010 Cybersecurity Peer Review Update March 2010 - DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH Feb. 2010 - DOE Issues National Energy Sector Cyber Organization Notice of Intent Nov. 2009 - New TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE

  3. Design of a physical security perimeter fencing system.

    SciTech Connect (OSTI)

    Mack, Thomas Kimball; Ross, Michael P.; Lin, Han Wei

    2010-10-01

    Design of a physical security perimeter fencing system requires that security designers provide effective detection, delay, and response functionalities with minimal nuisance alarms. In addition, the designers must take into considerations the security fence system life cycle cost (equipment and grounds maintenance), complexity of the terrain, safety, and environmental conditions (location of where the security fence will be installed). Often, these factors drive the security designers to design a perimeter intrusion detection and assessment system (PIDAS) that includes: (1) larger than desired footprint, (2) one or more animal control fences to minimize the nuisance alarm rate (NAR), and (3) clear zones and an isolation zone to facilitate intrusion detection and assessment by keeping the fence lines clear of vegetation, trash, and other objects that could impede the security system's performance. This paper presents a two-tier PIDAS design that focuses on effective performance specifically in high probability of detection and low NAR that minimizes cost and the footprint of the system.

  4. Project Management and Systems Support | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Project Management and Systems Support | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

  5. Control Systems Security Publications Library | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transmission and Distribution World article: "DOE Focuses on Cyber Security" - March 2007 Back to Top ENERGY SECTOR ROADMAP AND ROADMAP IMPLEMENTATION Roadmap to Achieve Energy ...

  6. Container Security - part of the CORE system

    Energy Science and Technology Software Center (OSTI)

    2009-10-02

    A data integration system to support the US Customs and Border Protection Officers to supervise and make decisions for container inspections. CORE is designed to act as a framework to bridge the gaps between disparate data integration and delivery of disparate information visualization.

  7. Roadmap to Secure Control Systems in the Energy Sector

    Energy Savers [EERE]

    Roadmap to Secure Control Systems in the Energy Sector -  - Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improing cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and goernment to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors oer the next ten years. The Roadmap proides a strategic

  8. Roadmap to Secure Control Systems in the Energy: Executive Summary

    Energy Savers [EERE]

    Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision

  9. DOE and Industry Showcase New Control Systems Security Technologies at

    Office of Environmental Management (EM)

    DistribuTECH | Department of Energy and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH March 25, 2010 - 1:20pm Addthis DistribuTECH Conference Tuesday-Thursday, March 23-25, 2010 Tampa Convention Center Booth #231 Tampa, FL Join the Department of Energy and its industry partners as they showcase six new products and technologies designed to secure the nation's energy

  10. Fact Sheet Preliminary Notice of Violation: Classified Information Security Event at LANL

    Office of Environmental Management (EM)

    LANL On May 27, 2015 the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of Violation (PNOV) to Los Alamos National Security, LLC (LANS) for violations of Department of Energy (DOE) classified information security program requirements. LANS is the management and operating contractor for NNSA's Los Alamos National Laboratory (LANL), located in Los Alamos, New Mexico. The PNOV cites three violations of Departmental classified information security requirements related to

  11. Fact Sheet Preliminary Notice of Violation: Classified Information Security Event at SNL

    Office of Environmental Management (EM)

    SNL On May 27, 2015, the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of Violation (PNOV) to Sandia Corporation (Sandia) for violations of Department of Energy (DOE) classified information security program requirements. Sandia is the management and operating contractor for NNSA's Sandia National Laboratories (SNL), located in Albuquerque, New Mexico. The PNOV cites six violations of Departmental classified information security requirements related to a security

  12. Secure control systems with application to cyber-physical systems

    SciTech Connect (OSTI)

    Dong, Jin; Djouadi, Seddik M; Nutaro, James J; Kuruganti, Phani Teja

    2014-01-01

    Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

  13. Gasification Systems Project Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project Information Gasifier Optimization Archived Projects Agreement Number Project Title Performer Name Technology Area FE0023497 Alstom's Limestone Chemical Looping Gasification Process for High Hydrogen Syngas Generation Alstom Power, Inc Gasification Systems FE0023577 Advanced Gasifier and Water Gas Shift Technologies for Low Cost Coal Conversion to High Hydrogen Syngas Gas Technology Institute Coal & Coal-Biomass to Liquids, Gasification Systems FE0023915 Pilot Scale Operation and

  14. Credit Leona Securities Asia CLSA UK | Open Energy Information

    Open Energy Info (EERE)

    Leona Securities Asia CLSA UK Jump to: navigation, search Name: Credit Leona Securities Asia - CLSA (UK) Place: London, United Kingdom Zip: EC3V 4QH Sector: Services Product: CLSA...

  15. Recommended Practice for Securing Control System Modems | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Practice for Securing Control System Modems Recommended Practice for Securing Control System Modems This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader

  16. NREL: News - New Energy Systems Enhance National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Systems Enhance National Security Washington D.C., March 14, 2002 Experts from the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) have identified key renewable energy technologies that can be used to strengthen U.S. energy security. "Renewable energy technologies offer the nation powerful tools for enhancing homeland security," NREL Director Richard Truly said today at the National Press Club. More broadly, Truly said, the growing energy contributions

  17. Geographic Information System | Open Energy Information

    Open Energy Info (EERE)

    Exploration, Tracers Data Analysis, And Enhanced Data Distribution, Visualization, And Management Geographic Information System At Brady Hot Springs Area (Laney, 2005) Brady Hot...

  18. 3-Year Renewal Request of OMB 1910-1800, Security, Information Collections

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 3-Year Renewal Request of OMB 1910-1800, Security, Information Collections 3-Year Renewal Request of OMB 1910-1800, Security, Information Collections Following are the collection instruments for your viewing. DOE F 5631.34, Data Report on Spouse/Cohabitant Security Incident Notification Report and Report of Preliminary Security Incident/Infraction (DOE F 471.1 and DOE F 5639.3) DOE F 5631.20, Request for Visitor Access Approval DOE Form 5631.18, Security

  19. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  20. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  1. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E.; Duggan, David P.; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  2. Index of Energy Security Risk | Open Energy Information

    Open Energy Info (EERE)

    for 21st Century Energy Sector: Energy Focus Area: Non-renewable Energy, Renewable Energy Topics: Co-benefits assessment, - Energy Security Resource Type: Publications Website:...

  3. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  4. Security Requirements for Classified Automatic Data Processing Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1985-07-10

    To establish and describe the computer security program for classified automatic data processing (ADP) systems at the Department of Energy (DOE) Headquarters. This directive does not cancel another directive. Canceled by DOE N 251.9.

  5. Information encoder/decoder using chaotic systems

    DOE Patents [OSTI]

    Miller, S.L.; Miller, W.M.; McWhorter, P.J.

    1997-10-21

    The present invention discloses a chaotic system-based information encoder and decoder that operates according to a relationship defining a chaotic system. Encoder input signals modify the dynamics of the chaotic system comprising the encoder. The modifications result in chaotic, encoder output signals that contain the encoder input signals encoded within them. The encoder output signals are then capable of secure transmissions using conventional transmission techniques. A decoder receives the encoder output signals (i.e., decoder input signals) and inverts the dynamics of the encoding system to directly reconstruct the original encoder input signals. 32 figs.

  6. Information encoder/decoder using chaotic systems

    DOE Patents [OSTI]

    Miller, Samuel Lee (Albuquerque, NM); Miller, William Michael (Tijeras, NM); McWhorter, Paul Jackson (Albuquerque, NM)

    1997-01-01

    The present invention discloses a chaotic system-based information encoder and decoder that operates according to a relationship defining a chaotic system. Encoder input signals modify the dynamics of the chaotic system comprising the encoder. The modifications result in chaotic, encoder output signals that contain the encoder input signals encoded within them. The encoder output signals are then capable of secure transmissions using conventional transmission techniques. A decoder receives the encoder output signals (i.e., decoder input signals) and inverts the dynamics of the encoding system to directly reconstruct the original encoder input signals.

  7. Information Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Systems Information Systems Condition Assessment Information System (CAIS) Inspection or assessment data is loaded into the Condition Assessment Information System (CAIS) Web database where it is costed using various RS Means Construction Cost Book data. RS Means is the predominant national cost estimating system. Currently CAIS Web contains over 53,000 line items dealing with building elements, components, and types and other structure and facilities, and infrastructure systems.

  8. Dynamic Information Architecture System

    Energy Science and Technology Software Center (OSTI)

    1997-02-12

    The Dynamic Information System (DIAS) is a flexible object-based software framework for concurrent, multidiscplinary modeling of arbitrary (but related) processes. These processes are modeled as interrelated actions caused by and affecting the collection of diverse real-world objects represented in a simulation. The DIAS architecture allows independent process models to work together harmoniously in the same frame of reference and provides a wide range of data ingestion and output capabilities, including Geographic Information System (GIS) typemore » map-based displays and photorealistic visualization of simulations in progress. In the DIAS implementation of the object-based approach, software objects carry within them not only the data which describe their static characteristics, but also the methods, or functions, which describe their dynamic behaviors. There are two categories of objects: (1) Entity objects which have real-world counterparts and are the actors in a simulation, and (2) Software infrastructure objects which make it possible to carry out the simulations. The Entity objects contain lists of Aspect objects, each of which addresses a single aspect of the Entity''s behavior. For example, a DIAS Stream Entity representing a section of a river can have many aspects correspondimg to its behavior in terms of hydrology (as a drainage system component), navigation (as a link in a waterborne transportation system), meteorology (in terms of moisture, heat, and momentum exchange with the atmospheric boundary layer), and visualization (for photorealistic visualization or map type displays), etc. This makes it possible for each real-world object to exhibit any or all of its unique behaviors within the context of a single simulation.« less

  9. Developing Secure Power Systems Professional Competence: Alignment and Gaps

    Office of Environmental Management (EM)

    in Workforce Development Programs - Phase 2 (July/August 2013) | Department of Energy Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) DOE has recognized that the electricity industry needs workforce development resources that can aid in the accelerating need for

  10. Pressurized security barrier and alarm system

    DOE Patents [OSTI]

    Carver, D.W.

    1995-04-11

    A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder`s making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed. 7 figures.

  11. Marine asset security and tracking (MAST) system

    DOE Patents [OSTI]

    Hanson, Gregory Richard; Smith, Stephen Fulton; Moore, Michael Roy; Dobson, Eric Lesley; Blair, Jeffrey Scott; Duncan, Christopher Allen; Lenarduzzi, Roberto

    2008-07-01

    Methods and apparatus are described for marine asset security and tracking (MAST). A method includes transmitting identification data, location data and environmental state sensor data from a radio frequency tag. An apparatus includes a radio frequency tag that transmits identification data, location data and environmental state sensor data. Another method includes transmitting identification data and location data from a radio frequency tag using hybrid spread-spectrum modulation. Another apparatus includes a radio frequency tag that transmits both identification data and location data using hybrid spread-spectrum modulation.

  12. Pressurized security barrier and alarm system

    DOE Patents [OSTI]

    Carver, Don W. (Knoxville, TN)

    1995-01-01

    A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder's making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed.

  13. Energy Independence and Security Act of 2007 | Open Energy Information

    Open Energy Info (EERE)

    Energy Independence and Security Act of 2007 Jump to: navigation, search This article is a stub. You can help OpenEI by expanding it. External Links Energy Independence and...

  14. Category:Geographic Information System | Open Energy Information

    Open Energy Info (EERE)

    Geographic Information System Jump to: navigation, search Geothermalpower.jpg Looking for the Geographic Information System page? For detailed information on Geographic Information...

  15. Collaboration Topics - System Software | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Simulation and Computing and Institutional R&D Programs NNSACEA Cooperation in Computer Science Collaboration Topics - System Software Collaboration Topics - System...

  16. Aerial Measuring System | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AMS Logo NNSA's Aerial Measuring System (AMS) provides specialized airborne radiation detection systems to provide real-time measurements of low levels of air and ground ...

  17. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  18. Using Multiple Unmanned Systems for a Site Security Task

    SciTech Connect (OSTI)

    Matthew O. Anderson; Curtis W. Nielsen; Mark D. McKay; Derek C. Wadsworth; Ryan C. Hruska; John A. Koudelka

    2009-04-01

    Unmanned systems are often used to augment the ability of humans to perform challenging tasks. While the value of individual unmanned vehicles have been proven for a variety of tasks, it is less understood how multiple unmanned systems should be used together to accomplish larger missions such as site security. The purpose of this paper is to discuss efforts by researchers at the Idaho National Laboratory (INL) to explore the utility and practicality of operating multiple unmanned systems for a site security mission. This paper reviews the technology developed for a multi-agent mission and summarizes the lessons-learned from a technology demonstration.

  19. Cyber Security Procurement Language for Control Systems Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then...

  20. Fact Sheet Preliminary Notice of Violation: Classified Information Security Event at Y-12

    Office of Environmental Management (EM)

    Y-12 On January 28, 2016, the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of Violation (PNOV) to Babcock and Wilcox Technical Services Y-12, LLC (B&W Y-12) for violations of Department of Energy (DOE) classified information security program requirements. B&W Y-12 was the management and operating contractor for NNSA's Y-12 National Security Complex (Y-12), located in Oak Ridge, Tennessee at the time of discovery of the security event. The PNOV cites three

  1. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

    2005-10-01

    The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

  2. Freedom of Information Act (FOIA) | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration (FOIA) | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working

  3. Freedom of Information Act - Costs | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration - Costs | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working

  4. Freedom of Information Act Related Sites | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Related Sites | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs

  5. Nevada National Security Site Cleanup Information Is Just a Click Away with

    Energy Savers [EERE]

    Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public | Department of Energy National Security Site Cleanup Information Is Just a Click Away with Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public Nevada National Security Site Cleanup Information Is Just a Click Away with Computer Map, Database - New Interactive Map Makes NNSS Data More Accessible to the Public December 27, 2012 - 12:00pm Addthis Shown here is a

  6. Critical issues in process control system security : DHS spares project.

    SciTech Connect (OSTI)

    Hernandez, Jacquelynne; McIntyre, Annie; Henrie, Morgan

    2010-10-01

    The goals of this event are: (1) Discuss the next-generation issues and emerging risks in cyber security for control systems; (2) Review and discuss common control system architectures; (3) Discuss the role of policy, standards, and supply chain issues; (4) Interact to determine the most pertinent risks and most critical areas of the architecture; and (5) Merge feedback from Control System Managers, Engineers, IT, and Auditors.

  7. Condition Assessment Information System

    Energy Science and Technology Software Center (OSTI)

    2002-09-16

    CAIS2000 records, tracks and cost maintenance deficiencies associated with condition assessments of real property assets. Cost information is available for 39,000 items in the currenht RS Means, Facilities Construction Manual. These costs can, in turn, be rolled by by asset to produce the summary condition of an asset or site.

  8. Secure Video Surveillance System Acquisition Software

    Energy Science and Technology Software Center (OSTI)

    2009-12-04

    The SVSS Acquisition Software collects and displays video images from two cameras through a VPN, and store the images onto a collection controller. The software is configured to allow a user to enter a time window to display up to 2 1/2, hours of video review. The software collects images from the cameras at a rate of 1 image per second and automatically deletes images older than 3 hours. The software code operates in amore » linux environment and can be run in a virtual machine on Windows XP. The Sandia software integrates the different COTS software together to build the video review system.« less

  9. Computational Systems & Software Environment | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Computational Systems & Software Environment | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery

  10. LANL installs high-performance computer system | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration installs high-performance computer system | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs

  11. Crops reap benefits of Pantex irrigation system | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Crops reap benefits of Pantex irrigation system | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery

  12. Project Records Information System (PRIS)

    SciTech Connect (OSTI)

    Smith, P.S.; Schwarz, R.K.

    1990-11-01

    The Project Records Information System (PRIS) is an interactive system developed for the Information Services Division (ISD) of Martin Marietta Energy Systems, Inc., to perform indexing, maintenance, and retrieval of information about Engineering project record documents for which they are responsible. This PRIS User's Manual provides instruction on the use of this system. This manual presents an overview of PRIS, describing the system's purpose; the data that it handles; functions it performs; hardware, software, and access; and help and error functions. This manual describes the interactive menu-driven operation of PRIS. Appendixes A, B, C, and D contain the data dictionary, help screens, report descriptions, and a primary menu structure diagram, respectively.

  13. Information Systems Engineering

    Broader source: Energy.gov [DOE]

    The OCIO is dedicated to supporting the development and maintenance of DOE Department wide and site-specific software and IT systems engineering initiatives.  This webpage contains resources,...

  14. Secure communication of static information by electronic means

    DOE Patents [OSTI]

    Gritton, Dale G. (Pleasanton, CA)

    1994-01-01

    A method and apparatus (10) for the secure transmission of static data (16) from a tag (11) to a remote reader (12). Each time the static data (16) is to be transmitted to the reader (12), the 10 bits of static data (16) are combined with 54 bits of binary data (21), which constantly change from one transmission to the next, into a 64-bit number (22). This number is then encrypted and transmitted to the remote reader (12) where it is decrypted (26) to produce the same 64 bit number that was encrypted in the tag (11). With a continual change in the value of the 64 bit number (22) in the tag, the encrypted numbers transmitted to the reader (12) will appear to be dynamic in character rather than being static.

  15. Towards improving software security by using simulation to inform requirements and conceptual design

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Nutaro, James J.; Allgood, Glenn O.; Kuruganti, Teja

    2015-06-17

    We illustrate the use of modeling and simulation early in the system life-cycle to improve security and reduce costs. The models that we develop for this illustration are inspired by problems in reliability analysis and supervisory control, for which similar models are used to quantify failure probabilities and rates. In the context of security, we propose that models of this general type can be used to understand trades between risk and cost while writing system requirements and during conceptual design, and thereby significantly reduce the need for expensive security corrections after a system enters operation

  16. AMI System Security Requirements - v1_01-1 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AMI System Security Requirements - v1_01-1 AMI System Security Requirements - v1_01-1 This document provides the utility industry and vendors with a set of security requirements for Advanced Metering Infrastructure (AMI). These requirements are intended to be used in the procurement process, and represent a superset of requirements gathered from current cross industry accepted security standards and best practice guidance documents. PDF icon AMI System Security Requirements - v1_01-1 More

  17. Integrated risk information system (IRIS)

    SciTech Connect (OSTI)

    Tuxen, L.

    1990-12-31

    The Integrated Risk Information System (IRIS) is an electronic information system developed by the US Environmental Protection Agency (EPA) containing information related to health risk assessment. IRIS is the Agency`s primary vehicle for communication of chronic health hazard information that represents Agency consensus following comprehensive review by intra-Agency work groups. The original purpose for developing IRIS was to provide guidance to EPA personnel in making risk management decisions. This original purpose for developing IRIS was to guidance to EPA personnel in making risk management decisions. This role has expanded and evolved with wider access and use of the system. IRIS contains chemical-specific information in summary format for approximately 500 chemicals. IRIS is available to the general public on the National Library of Medicine`s Toxicology Data Network (TOXNET) and on diskettes through the National Technical Information Service (NTIS).

  18. Security Control Assessor | Department of Energy

    Energy Savers [EERE]

    Security Control Assessor Security Control Assessor Cyber-security-300x199.jpg The Security Control Assessor (SOA) is responsible for assessing the management, operational, assurance, and technical security controls implemented on an information system via security testing and evaluation (ST&E) methods. The SOA must be independent of system development, operation, and deficiency mitigation. PDF icon Security Control Assessor Core Competency Training Worksheet More Documents &

  19. NEVADA NATIONAL SECURITY SITE (NNSS) DRIVERS ROUTE/SHIPMENT INFORMATION

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (NNSS) DRIVERS ROUTE/SHIPMENT INFORMATION (12/2014 Log No. 2014-229) NOTE: THIS FORM IS TWO (2) PAGES - YOU MUST COMPLETE BOTH PAGES NNSS SHIPMENT NUMBER: CARRIER NAME: TRACTOR NO.: TRAILER NO.: AT ORIGIN AT NNSS Main Gate NNSS OFFICE USE ONLY DEPARTURE DATE: ARRIVAL DATE: DESTINATION AREA: Area 5 DEPARTURE TIME: ARRIVAL TIME: NNSS DEPARTURE TIME: LOCATION: HELD OVER? No Yes REASON: ROUTE INFORMATION REVIEWED BY: ONSITE SHIPMENT (MAP NOT APPLICABLE) DROP YARD; LEAVE THIS FORM WITH SHIPPING

  20. Property Information System

    Energy Science and Technology Software Center (OSTI)

    1998-01-28

    Provides cradle to grave tracking of DOE property (capital, accountable, etc.). Major functional areas include Acquisitions, Management, Inventory, Accounting, Agreements, Excessing, Dispositions, and Reporting. The Accounting module is not used at this time and may not be operational. A major enhancement added here at Lockheed Martin Energy Systems is the Web-based portion of the system, which allows custodians of property to record location and custodial changes, and to provide inventory confirmations. PLEASE NOTE: Customer mustmore » contact Ben McMurry, (865) 576-5906, Lockheed Martin Energy Ssytems, for help with installation of package. The fee for this installation help will be coordinated by customer and Lockheed Martin and is in addition to the cost of the package from ESTSC. Customer should contact Cheri Cross, (865) 574-6046, for user help.« less

  1. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  2. Tools and Methods for Hardening Communication Security of Energy Delivery Systems

    SciTech Connect (OSTI)

    Gadgil, Shrirang; Lin, Yow-Jian; Ghosh, Abhrajit; Samtani, Sunil; Kang, Jaewon; Siegell, Bruce; Kaul, Vikram; Unger, John; De Bruet, Andre; Martinez, Catherine; Vermeulen, Gerald; Rasche, Galen; Sternfeld, Scott; Berthier, Robin; Bobba, Rakesh; Campbell, Roy; Sanders, Williams; Lin, Yow-Jian

    2014-06-30

    This document summarizes the research and development work the TT Government Solutions (TTGS), d.b.a. Applied Communication Sciences (ACS), team performed for the Department of Energy Cybersecurity for Energy Delivery Systems (CEDS) program. It addresses the challenges in protecting critical grid control and data communication, including the identification of vulnerabilities and deficiencies of communication protocols commonly used in energy delivery systems (e.g., ICCP, DNP3, C37.118, C12.22), as well as the development of effective means to detect and prevent the exploitation of such vulnerabilities and deficiencies. The team consists of • TT Government Solutions (TTGS), a leading provider of communications solutions that has extensive experience in commercializing communications solutions. TTGS also has deep cyber security research and development expertise supporting a variety of customers. • University of Illinois at Urbana-Champaign (UIUC), a leader in the cyber security research for the power grid. UIUC brings unique experience in designing secure communication protocols to this project. • Electric Power Research Institute (EPRI), an independent nonprofit that conducts research and development relating to the generation, delivery and use of electricity for the benefit of the public. EPRI brings to this effort its extensive technical expertise and its utility connections, with members representing more than 90 percent of the electricity generated and delivered in the United States. • DTE Energy, the 10th largest electric utility in the US, which helps ensure that this project focuses on the needs of utilities and is rightly positioned to address the needs of the market place. We designed, developed, and demonstrated a modular and extensible ADEC-G (Agent-based, Distributed, Extensible Cybersecurity for the Grid) system for monitoring/detecting abnormal energy delivery systems (EDS) protocol usage and ensuring security coverage. Our approach consists of i. An online system with stateful model based checkers (SMBCs) that helps utilities monitor EDS protocol communication contexts and flag abnormal session behaviors; ii. An offline framework that security tool developers, operators, and auditors can use to verify security properties (leverages formal methods). The modular design of the ADEC-G online system enables its easy extension to cover added protocol features, to introduce new monitoring capabilities, and to apply to additional communication protocols. Its monitoring capabilities and user interface features also facilitate visibilities into ongoing communication patterns and quick grasps of suspicious communication activities. The offline framework provides a platform not only for rigorous validation of security coverage, but also for systematic refinement of checker design leveraging the counter traces generated by the model checking tool. The ADEC-G online monitoring/detection system and the offline validation framework are both operational and have been demonstrated in various settings. The ADEC-G online system has also been integrated into TTGS SecureSmart Managed Security Services offering and been employed to perform security assessment in a section of a utility’s operational network as well as in other Smart Grid security pilot project offerings. TTGS is also in discussions with several system integrators for incorporating the integrated SecureSmart Managed Security Services offering as the cyber security solution for the nce of Operations Technology (OT) and Information Technology (IT).

  3. System for Information Discovery

    Energy Science and Technology Software Center (OSTI)

    1998-09-25

    SID characterizes natural language based documents so that they may be related and retrieved based on content similarity. This technology processes textual documents, autonoumsly identifies the major topics of the document set, and constructs an interpretable, high dimensional representation of each document. SID also provides the ability to interactively reweight representations based on user need, so users may analyze the dataset from multiple points of view. The particular advantages SID offers are speed, data compression,more » flexibility in representation, and incremental processing. SPIRE consists of software for visual analysis of text-based information sources. This technology enables users to make discoveries about the content of very large sets of textual documents without requiring the user to read or presort the documents. It employs algorithms for text and word proximity analysis to identify the key themes within the documents. The results of this analysis are projected onto a visual spatial proximity display (Galaxies or Themescape) where document proximity represents the degree of relatedness of theme.« less

  4. Western Renewable Energy Generation Information System | Open...

    Open Energy Info (EERE)

    Renewable Energy Generation Information System Jump to: navigation, search Name: Western Renewable Energy Generation Information System Place: Sacramento, California Zip:...

  5. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments: Cybersecurity Programs Cybersecurity Delivering experience & expertise Training the next generation of cyber defenders Cybersecurity computing Defending national security Applying science and engineering to protect cyber systems from malicious attacks Cyber worker inspecting supercomputer Protecting cyberspace An expert team, passionate about defending the nation's critical infrastructure Computer Annex "The cyber threat to our nation is one of the most serious

  6. Small Business Sourcing System | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Sourcing System | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  7. Control Systems Security Publications Library | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Publications Library Control Systems Security Publications Library Publications Library Repository of documents, listed by topic. (Some of the documents in this section require Adobe Acrobat Reader. You can download a free copy of the Reader by visiting Adobe.) VULNERABILITY REPORTS PERIODICAL ARTICLES ENERGY SECTOR ROADMAP AND ROADMAP IMPLEMENTATION DOE NSTB PROGRAM PLANNING AND RESOURCE DOCUMENTS PROJECT FACT SHEETS TRAINING MATERIALS AND RECOMMENDED PRACTICES ASSESSMENT AND TECHNICAL

  8. Cyberspace Security Econometrics System (CSES) - U.S. Copyright TXu 1-901-039

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Schlicher, Bob G; Sheldon, Frederick T; Lantz, Margaret W; Hauser, Katie R

    2014-01-01

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing compliance pressures require careful consideration and adaptation. The Cyberspace Security Econometrics System (CSES) provides a measure (i.e., a quantitative indication) of reliability, performance, and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. For a given stakeholder, CSES accounts for the variance that may exist among the stakes one attaches to meeting each requirement. The basis, objectives and capabilities for the CSES including inputs/outputs as well as the structural and mathematical underpinnings contained in this copyright.

  9. Information system revives materials management

    SciTech Connect (OSTI)

    Hansen, T.

    1995-12-01

    Through a change in philosophy and the development of a new, more efficient information management system, Arizona Public Service Co. (APSW) has, in less than two years, reduced material and service costs by 10 percent. The utility plans to cut these costs form 1993 figures by 25 percent before 2000. The utility is breaking new ground with ongoing implementation of new business processes and the new Materials Logistics Information System (MLIS), which has been co-developed with Texas Instruments Software Division (TISD).

  10. A Summary of Control System Security Standards Activities in the Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sector (October 2005) | Department of Energy A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) This document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication protocols and systems. Also contained in this report is a comparison of

  11. Capacity Utilization Study for Aviation Security Cargo Inspection Queuing System

    SciTech Connect (OSTI)

    Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E; Brumback, Daryl L

    2010-01-01

    In this paper, we conduct performance evaluation study for an aviation security cargo inspection queuing system for material flow and accountability. The queuing model employed in our study is based on discrete-event simulation and processes various types of cargo simultaneously. Onsite measurements are collected in an airport facility to validate the queuing model. The overall performance of the aviation security cargo inspection system is computed, analyzed, and optimized for the different system dynamics. Various performance measures are considered such as system capacity, residual capacity, throughput, capacity utilization, subscribed capacity utilization, resources capacity utilization, subscribed resources capacity utilization, and number of cargo pieces (or pallets) in the different queues. These metrics are performance indicators of the system s ability to service current needs and response capacity to additional requests. We studied and analyzed different scenarios by changing various model parameters such as number of pieces per pallet, number of TSA inspectors and ATS personnel, number of forklifts, number of explosives trace detection (ETD) and explosives detection system (EDS) inspection machines, inspection modality distribution, alarm rate, and cargo closeout time. The increased physical understanding resulting from execution of the queuing model utilizing these vetted performance measures should reduce the overall cost and shipping delays associated with new inspection requirements.

  12. Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.; Conway, T. J.; Vanderhorst, Jr, T. J.; Januszewski, III, J.; leo, R.; Perman, K.

    2013-08-26

    This is the final report of Phase 2 of the Secure Power Systems Professional project, a 3 phase project. DOE will post to their website upon release.

  13. Evolution of toxicology information systems

    SciTech Connect (OSTI)

    Wassom, J.S.; Lu, P.Y.

    1990-12-31

    Society today is faced with new health risk situations that have been brought about by recent scientific and technical advances. Federal and state governments are required to assess the many potential health risks to exposed populations from the products (chemicals) and by-products (pollutants) of these advances. Because a sound analysis of any potential health risk should be based on the use of relevant information, it behooves those individuals responsible for making the risk assessments to know where to obtain needed information. This paper reviews the origins of toxicology information systems and explores the specialized information center concept that was proposed in 1963 as a means of providing ready access to scientific and technical information. As a means of illustrating this concept, the operation of one specialized information center (the Environmental Mutagen Information Center at Oak Ridge National Laboratory) will be discussed. Insights into how toxicological information resources came into being, their design and makeup, will be of value to those seeking to acquire information for risk assessment purposes. 7 refs., 1 fig., 4 tabs.

  14. Roadmap to Secure Control Systems in the Energy Sector - January 2006 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Energy Sector - January 2006 Roadmap to Secure Control Systems in the Energy Sector - January 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years.

  15. Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten

  16. What is the Freedom of Information Act (FOIA)? | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Freedom of Information Act (FOIA)? | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply

  17. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  18. Distributed Object Oriented Geographic Information System

    Energy Science and Technology Software Center (OSTI)

    1997-02-01

    This interactive, object-oriented, distributed Geographic Information System (GIS) uses the World Wibe Web (WWW) as application medium and distribution mechanism. The software provides distributed access to multiple geo-spatial databases and presents them as if they came from a single coherent database. DOOGIS distributed access comes not only in the form of multiple geo-spatial servers but can break down a single logical server into the constituent physical servers actually storing the data. The program provides formore » dynamic protocol resolution and content handling allowing unknown objects from a particular server to download their handling code. Security and access privileges are negotiated dynamically with each server contacted and each access attempt.« less

  19. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    SciTech Connect (OSTI)

    Robert P. Evans

    2005-09-01

    Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was selected from the list of standards identified in the identification effort. The requirements in these seven standards were then compared against the requirements given in the Framework. This comparison identified gaps (requirements not covered) in both the individual industry standards and in the Framework. In addition to the sector-specific standards reviewed, the team compared the requirements in the cross-sector Instrumentation, Systems, and Automation Society (ISA) Technical Reports (TR) 99 -1 and -2 to the Framework requirements. The Framework defines a set of security classes separated into families as functional requirements for control system security. Each standard reviewed was compared to this template of requirements to determine if the standard requirements closely or partially matched these Framework requirements. An analysis of each class of requirements pertaining to each standard reviewed can be found in the comparison results section of this report. Refer to Appendix A, ''Synopsis of Comparison Results'', for a complete graphical representation of the study's findings at a glance. Some of the requirements listed in the Framework are covered by many of the standards, while other requirements are addressed by only a few of the standards. In some cases, the scope of the requirements listed in the standard for a particular industry greatly exceeds the requirements given in the Framework. These additional families of requirements, identified by the various standards bodies, could potentially be added to the Framework. These findings are, in part, due to the maturity both of the security standards themselves and of the different industries current focus on security. In addition, there are differences in how communication and control is used in different industries and the consequences of disruptions via security breaches to each particular industry that could affect how security requirements are prioritized. The differences in the requirements listed in the Framework and in the various industry standards are due, in part, to differences in the level and purpose of the standards. While the requir

  20. Geographic Information Systems- Tools For Geotherm Exploration...

    Open Energy Info (EERE)

    Information Systems- Tools For Geotherm Exploration, Tracers Data Analysis, And Enhanced Data Distribution, Visualization, And Management Abstract Geographic information...

  1. Roadmap to Secure Control Systems in the Energy Sector- January 2006

    Broader source: Energy.gov [DOE]

    This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented...

  2. National SCADA Test Bed- Enhancing control systems security in the energy sector (September 2009)

    Broader source: Energy.gov [DOE]

    Improving the security of energy control systems has become a national priority. Since the mid-1990’s, security experts have become increasingly concerned about the threat of malicious cyber...

  3. Microsoft Word - AMI System Security Requirements - v1_01-1.doc

    Office of Environmental Management (EM)

    UCAIUG: AMI-SEC-ASAP AMI System Security Requirements V1.01 ASAP 12/17/2008 AMI System Security Specification v1.0 Page i Executive Summary 1 This document provides the utility industry and vendors with a set of security requirements for 2 Advanced Metering Infrastructure (AMI). These requirements are intended to be used in the 3 procurement process, and represent a superset of requirements gathered from current cross- 4 industry accepted security standards and best practice guidance documents.

  4. Headquarters Security Quick Reference Book Headquarters Security Quick Reference Book

    Office of Environmental Management (EM)

    Headquarters Security Quick Reference Book Headquarters Security Quick Reference Book ACRONYMS BAO Building Access Only CMPC Classified Matter Protection and Control CUI Controlled Unclassified Information FACTS Foreign Access Central Tracking System DOE Department of Energy E.O. Executive Order FOCI Foreign Ownership, Control or Influence FOIA Freedom of Information Act HSPD Homeland Security Presidential Directive HSS Office of Health, Safety and Security HQ Headquarters HQFMSP HQ Facilities

  5. Appropriate Technology Management Information System

    SciTech Connect (OSTI)

    Not Available

    1984-02-01

    From 1978 to 1981, the Department of Energy (DOE) awarded more than 2200 small grants worth more than $25 million to individuals, organizations and small businesses across the nation for the purposes of researching, developing and demonstrating appropriate technologies. Grants were given in the full range of technology areas, including conservation, solar, biomass, wind, geothermal, and hydro power. The final report from each DOE grantee was reviewed in an effort to extract information about new ideas and proven concepts that could be of value to the public. To manage the growing wealth of information from the grant reports, and to monitor the report review process, the Appropriate Technology Management Information System (ATMIS), a computer data base, was developed. The ATMIS can classify data into numerous categories (technology area, geographic location, project status, etc.). This manual was generated directly from the data base.

  6. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Office of Environmental Management (EM)

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify

  7. Site Information--Updates 2-3-15 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information--Updates 2-3-15 | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs

  8. Large-Scale Information Systems

    SciTech Connect (OSTI)

    D. M. Nicol; H. R. Ammerlahn; M. E. Goldsby; M. M. Johnson; D. E. Rhodes; A. S. Yoshimura

    2000-12-01

    Large enterprises are ever more dependent on their Large-Scale Information Systems (LSLS), computer systems that are distinguished architecturally by distributed components--data sources, networks, computing engines, simulations, human-in-the-loop control and remote access stations. These systems provide such capabilities as workflow, data fusion and distributed database access. The Nuclear Weapons Complex (NWC) contains many examples of LSIS components, a fact that motivates this research. However, most LSIS in use grew up from collections of separate subsystems that were not designed to be components of an integrated system. For this reason, they are often difficult to analyze and control. The problem is made more difficult by the size of a typical system, its diversity of information sources, and the institutional complexities associated with its geographic distribution across the enterprise. Moreover, there is no integrated approach for analyzing or managing such systems. Indeed, integrated development of LSIS is an active area of academic research. This work developed such an approach by simulating the various components of the LSIS and allowing the simulated components to interact with real LSIS subsystems. This research demonstrated two benefits. First, applying it to a particular LSIS provided a thorough understanding of the interfaces between the system's components. Second, it demonstrated how more rapid and detailed answers could be obtained to questions significant to the enterprise by interacting with the relevant LSIS subsystems through simulated components designed with those questions in mind. In a final, added phase of the project, investigations were made on extending this research to wireless communication networks in support of telemetry applications.

  9. GAO-04-354, CRITICAL INFRASTRUCTURE PROTECTION: Challenges and Efforts to Secure Control Systems

    Office of Environmental Management (EM)

    Report to Congressional Requesters United States General Accounting Office GAO March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems GAO-04-354 www.gao.gov/cgi-bin/getrpt?GAO-04-354. To view the full product, including the scope and methodology, click on the link above. For more information, contact Robert F. Dacey at (202) 512-3317 or daceyr@gao.gov. Highlights of GAO-04-354, a report to congressional requesters March 2004 CRITICAL INFRASTRUCTURE

  10. Modeling and simulation for cyber-physical system security research, development and applications.

    SciTech Connect (OSTI)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  11. Peak Treatment Systems | Open Energy Information

    Open Energy Info (EERE)

    Treatment Systems Jump to: navigation, search Name: Peak Treatment Systems Place: Golden, CO Website: www.peaktreatmentsystems.com References: Peak Treatment Systems1 Information...

  12. Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to the 2008 ieRoadmap Workshop | Department of Energy Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop Presentation by Hank Kenchington on the 2006 roadmap to secure control systems in the energy sector at the ieRoadmap Workshop in Chicago, May 28-29, 2008. PDF icon Roadmap to Secure Control Systems in the Energy Sector More

  13. Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation

    Energy Savers [EERE]

    to the 2008 ieRoadmap Workshop | Department of Energy 2006 - Presentation to the 2008 ieRoadmap Workshop Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop Presentation by Hank Kenchington on the 2006 roadmap to secure control systems in the energy sector at the ieRoadmap Workshop in Chicago, May 28-29, 2008. PDF icon Roadmap to Secure Control Systems in the Energy Sector More Documents & Publications Security is Not an Option

  14. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    SciTech Connect (OSTI)

    Farnham, Irene; Marutzky, Sam

    2014-12-01

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  15. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals. Individual and Team Performance Guidelines

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.; Greitzer, Frank L.; Dalton, Angela C.; Pusey, Portia K.

    2015-03-01

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Individual and Team Performance Guidelines. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  16. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals. Job Profiles

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.; Greitzer, Frank L.; Dalton, Angela C.; Pusey, Portia K.

    2015-03-01

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Job Profiles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  17. Attachment 2 Â… List of Major Information Systems

    Office of Environmental Management (EM)

    Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. ...

  18. Geographic Information System (Monaster And Coolbaugh, 2007)...

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System (Monaster And Coolbaugh, 2007) Exploration Activity Details Location...

  19. Geographic Information System At International Geothermal Area...

    Open Energy Info (EERE)

    search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System At International Geothermal Area, Indonesia (Nash, Et Al., 2002) Exploration Activity...

  20. Performance Systems Development | Open Energy Information

    Open Energy Info (EERE)

    Systems Development Jump to: navigation, search Name: Performance Systems Development Place: Ithaca, NY Information About Partnership with NREL Partnership with NREL Yes...

  1. Information Concerning Reliability Impacts under Various System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Concerning Reliability Impacts under Various System Configurations of the Mirant Potomac River Plant Information Concerning Reliability Impacts under Various System Configurations...

  2. Department of Energy Cyber Security Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-21

    The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

  3. Department of Energy Cyber Security Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-12-04

    The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

  4. Pipo Systems | Open Energy Information

    Open Energy Info (EERE)

    Pipo Systems Jump to: navigation, search Name: Pipo Systems Place: Spain Product: Spanish wave technology developer. References: Pipo Systems1 This article is a stub. You can...

  5. Redwood Systems | Open Energy Information

    Open Energy Info (EERE)

    Redwood Systems Place: Fremont, California Zip: 94538 Product: Redwood Systems is a Fremont-based technology developer of lighting management systems. Coordinates: 44.2605,...

  6. Energistic Systems | Open Energy Information

    Open Energy Info (EERE)

    Energistic Systems Jump to: navigation, search Logo: Energistic Systems Name: Energistic Systems Address: 13551 W. 43rd Street Dr Place: Golden, Colorado Zip: 80403 Region: Rockies...

  7. HR Information Systems | Department of Energy

    Energy Savers [EERE]

    HR Information Systems HR Information Systems The OCHCO establishes and provides assistance and guidance on the use of technology-supported business process reengineering; investment analysis; performance measurement; strategic development and application of information systems and infrastructure; policies to provide improved management of information resources and technology; and better, more efficient service to our clients and employees. Documents Available for Download No downloads found for

  8. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  9. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  10. Risk assessment of climate systems for national security.

    SciTech Connect (OSTI)

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  11. Action Codes Table | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA Blog Home About Us Our Programs Defense Nuclear Security Nuclear Materials Management & Safeguards System NMMSS Information, Reports & Forms Code Tables Action...

  12. Intrusion Detecting Using Secure Signatures - Energy Innovation...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Current systems use public notice, patches, or a description of how to detect the security vulnerability, that may grant computer crackers information on the dangerous...

  13. Corporate Information Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Corporate Information Systems Corporate Information Systems The mission of the Office of Corporate Information Systems (CF-40) is to plan and manage the design, development, operation and maintenance of the Department's Integrated Management Navigation (iManage) program and projects; identify and implement business process automation initiatives; provide technical support for legacy systems operations and maintenance; provide technical support for web design, development and maintenance; manage

  14. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  15. Megtec Systems | Open Energy Information

    Open Energy Info (EERE)

    "group":"","inlineLabel":"","visitedicon":"" Hide Map References: Megtec Systems1 Methane Capture2 Megtec Systems is a company headquartered in De Pere, Wisconsin. Megtec...

  16. Solar Systems | Open Energy Information

    Open Energy Info (EERE)

    Logo: Solar Systems Name: Solar Systems Address: 45 Grosvenor Street Place: Abbotsford, Australia Sector: Solar Product: Solar concentrators Phone Number: +61 3 9413 8000 Website:...

  17. Crystal Systems | Open Energy Information

    Open Energy Info (EERE)

    is located in Salem, Massachusetts. Crystal Systems produces sapphire crystals for optics and electronics, and silicon for photovoltaics. References Crystal Systems...

  18. Socovoltaic Systems | Open Energy Information

    Open Energy Info (EERE)

    Name: Socovoltaic Systems Place: Vicenza, Italy Zip: 36100 Product: Socovoltaic is a joint venture between Socotherm and TSNergy. References: Socovoltaic Systems1 This...

  19. NRG Systems | Open Energy Information

    Open Energy Info (EERE)

    Systems Jump to: navigation, search Name: NRG Systems Place: Hinesburg, Vermont Zip: 5461 Sector: Wind energy Product: A US-based manufacturer of wind measurement and turbine...

  20. Hydrothermal System | Open Energy Information

    Open Energy Info (EERE)

    Hydrothermal Systems: A hydrothermal system is one that included fluid, heat, and permeability in a naturally occurring geological formation for the production of electricity....

  1. Chorus Systems | Open Energy Information

    Open Energy Info (EERE)

    Chorus Systems Jump to: navigation, search Name: Chorus Systems Place: Sankt Augustin, Germany Zip: D-53757 Product: Plans and realises PV installations in Germany. References:...

  2. Neptune Systems | Open Energy Information

    Open Energy Info (EERE)

    Systems Jump to: navigation, search Name: Neptune Systems Address: PO Box 8719 Place: Breda Zip: 4820 BA Region: Netherlands Sector: Marine and Hydrokinetic Phone Number: +31 (0)...

  3. Electronic DOE Information Security System (eDISS) PIA, Office...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory Occupational Injury & Illness ...

  4. Electronic DOE Information Security System (eDISS) PIA

    Energy Savers [EERE]

  5. NREL Fills Key Leadership Role for Energy Systems Security and Resilience -

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    News Releases | NREL Fills Key Leadership Role for Energy Systems Security and Resilience April 6, 2015 Dr. Erfan Ibrahim has joined the Energy Department's National Renewable Energy Laboratory as director of Cyber Physical Systems Security and Resilience for NREL's Energy Systems Integration directorate. This critical area of research and development addresses the challenges of integrating clean energy sources into the national energy infrastructure. "Erfan's experience, creativity and

  6. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in ...

  7. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or...

  8. PV Systems | Open Energy Information

    Open Energy Info (EERE)

    PV Systems Place: Wales, United Kingdom Zip: CF15 7JD Product: Welsh building integrated PV (BIPV) company References: PV Systems1 This article is a stub. You can help OpenEI by...

  9. Drilling Systems | Open Energy Information

    Open Energy Info (EERE)

    Act: Enhanced Geothermal Systems Component Research and DevelopmentAnalysis Tulsa, OK 2,399,999 600,000 2,999,999 Stinger Enhanced Bits for Engineered Geothermal Systems...

  10. Altergy Systems | Open Energy Information

    Open Energy Info (EERE)

    95630 Product: Designs and manufactures proprietary proton exchange membrane (PEM) fuel cell systems. References: Altergy Systems1 This article is a stub. You can help OpenEI by...

  11. Audit Report - Naval Reactors Information Technology System Development Efforts, IG-0879

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Naval Reactors Information Technology System Development Efforts DOE/IG-0879 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 21, 2012 MEMORANDUM FOR THE ADMINISTRATOR, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on the "Naval Reactors Information Technology System Development Efforts" INTRODUCTION AND

  12. Trip Information Log Tracking System

    Energy Science and Technology Software Center (OSTI)

    1992-06-23

    The system is focused on the Employee Business Travel Event. The system must be able to CRUD (Create, Retrieve, Update, Delete) instances of the Travel Event as well as the ability to CRUD frequent flyer milage associated with airline travel. Additionally the system must provide for a compliance reporting system to monitor reductions in travel costs and lost opportunity costs (i.e., not taking advantage of business class or 7 day advance tickets).

  13. Contact Information Systems | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact Information Systems Questions about Ames Laboratory network issues, contact networks@ameslab.gov Questions about Ames Laboratory websites, contact webrequest@ameslab.gov To...

  14. Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs—Summary Report

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.; Conway, T. J.; Vanderhorst, Jr, T. J.; Januszewski, III, J.; Leo, R.; Perman, K.

    2013-07-01

    This document is a summarization of the report, Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs, the final report for phase 2 of the SPSP (DOE workforce study) project.

  15. Passiv Systems | Open Energy Information

    Open Energy Info (EERE)

    Place: England, United Kingdom Zip: RG14 2PZ Product: UK based developer of a home energy management system, covering heating, hot water and electrical appliances....

  16. KUKA Systems | Open Energy Information

    Open Energy Info (EERE)

    search Name: KUKA Systems Place: Augsburg, Germany Zip: D-86165 Sector: Solar, Wind energy Product: German manufacturer of assembly lines for solar and wind industries....

  17. Hydrothermal System | Open Energy Information

    Open Energy Info (EERE)

    of the underlying resource.1 Occurrence Models "To search efficiently for blind geothermal systems, general geographic regions must first be identified based upon...

  18. Arisdyne Systems | Open Energy Information

    Open Energy Info (EERE)

    Cleveland, Ohio Zip: 44142 Product: Arisdyne Systems is a former subsidiary of Five Star Technologies that concentrates on development of biofuel processing technologies,...

  19. Verno Systems | Open Energy Information

    Open Energy Info (EERE)

    search Name: Verno Systems Place: Redmond, Washington State Zip: 98052 Sector: Biofuels Product: California-based investment fund focused on biofuels. References: Verno...

  20. Vitex Systems | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search Name: Vitex Systems Place: San Jose, California Zip: CA 95131 USA Product: Production of OLEDs and commercialization of flat panel displays (FPDs)...

  1. Paradyme Systems | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search Name: Paradyme Systems Region: United States Sector: Marine and Hydrokinetic Website: http: This company is listed in the Marine and Hydrokinetic...

  2. Chapter 3: Enabling Modernization of the Electric Power System Technology Assessment | Cyber and Physical Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber and Physical Security Chapter 3: Technology Assessments Introduction As understanding of the threats facing the operation, components, and subsystems of the electric power system is gained, a need has emerged for improvements in grid security and resilience. The focus on resiliency implies that threats will not go away and that some attacks, in addition to natural events, will be carried out successfully. The objective is for the system and associated subsystems to be designed and operated

  3. Sandia Explosive Inventory and Information System

    SciTech Connect (OSTI)

    Clements, D.A.

    1994-08-01

    The Explosive Inventory and Information System (EIS) is being developed and implemented by Sandia National Laboratories (SNL) to incorporate a cradle to grave structure for all explosives and explosive containing devices and assemblies at SNL from acquisition through use, storage, reapplication, transfer or disposal. The system does more than track all material inventories. It provides information on material composition, characteristics, shipping requirements; life cycle cost information, plan of use; and duration of ownership. The system also provides for following the processes of explosive development; storage review; justification for retention; Resource, Recovery and Disposition Account (RRDA); disassembly and assembly; and job description, hazard analysis and training requirements for all locations and employees involved with explosive operations. In addition, other information systems will be provided through the system such as the Department of Energy (DOE) and SNL Explosive Safety manuals, the Navy`s Department of Defense (DoD) Explosive information system, and the Lawrence Livermore National Laboratories (LLNL) Handbook of Explosives.

  4. Wind energy systems information user study

    SciTech Connect (OSTI)

    Belew, W.W.; Wood, B.L.; Marle, T.L.; Reinhardt, C.L.

    1981-01-01

    This report describes the results of a series of telephone interviews with potential users of information on wind energy conversion. These interviews, part of a larger study covering nine different solar technologies, attempted to identify: the type of information each distinctive group of information users needed, and the best way of getting information to that group. Groups studied include: wind energy conversion system researchers; wind energy conversion system manufacturer representatives; wind energy conversion system distributors; wind turbine engineers; utility representatives; educators; county agents and extension service agents; and wind turbine owners.

  5. Composite Data Products (CDPs) from the Hydrogen Secure Data Center (HSDC) at the Energy Systems Integration Facility (ESIF), NREL

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The Hydrogen Secure Data Center (HSDC) at NREL's Energy Systems Integration Facility (ESIF) plays a crucial role in NREL's independent, third-party analysis of hydrogen fuel cell technologies in real-world operation. NREL partners submit operational, maintenance, safety, and cost data to the HSDC on a regular basis. NREL's Technology Validation Team uses an internal network of servers, storage, computers, backup systems, and software to efficiently process raw data, complete quarterly analysis, and digest large amounts of time series data for data visualization. While the raw data are secured by NREL to protect commercially sensitive and proprietary information, individualized data analysis results are provided as detailed data products (DDPs) to the partners who supplied the data. Individual system, fleet, and site analysis results are aggregated into public results called composite data products (CDPs) that show the status and progress of the technology without identifying individual companies or revealing proprietary information. These CDPs are available from this NREL website: 1) Hydrogen Fuel Cell Vehicle and Infrastructure Learning Demonstration; 2) Early Fuel Cell Market Demonstrations; 3) Fuel Cell Technology Status [Edited from http://www.nrel.gov/hydrogen/facilities_secure_data_center.html].

  6. Energy Security and Restoration Exercise Program/Best Practices and Information Sharing

    SciTech Connect (OSTI)

    Barbara McCabe; John Kovach

    2009-03-30

    The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

  7. Policy enabled information sharing system

    DOE Patents [OSTI]

    Jorgensen, Craig R.; Nelson, Brian D.; Ratheal, Steve W.

    2014-09-02

    A technique for dynamically sharing information includes executing a sharing policy indicating when to share a data object responsive to the occurrence of an event. The data object is created by formatting a data file to be shared with a receiving entity. The data object includes a file data portion and a sharing metadata portion. The data object is encrypted and then automatically transmitted to the receiving entity upon occurrence of the event. The sharing metadata portion includes metadata characterizing the data file and referenced in connection with the sharing policy to determine when to automatically transmit the data object to the receiving entity.

  8. Sensorpedia: Information Sharing Across Autonomous Sensor Systems

    SciTech Connect (OSTI)

    Gorman, Bryan L; Resseguie, David R; Tomkins-Tinch, Christopher H

    2009-01-01

    The concept of adapting social media technologies is introduced as a means of achieving information sharing across autonomous sensor systems. Historical examples of interoperability as an underlying principle in loosely-coupled systems is compared and contrasted with corresponding tightly-coupled, integrated systems. Examples of ad hoc information sharing solutions based on Web 2.0 social networks, mashups, blogs, wikis, and data tags are presented and discussed. The underlying technologies of these solutions are isolated and defined, and Sensorpedia is presented as a formalized application for implementing sensor information sharing across large-scale enterprises with incompatible autonomous sensor systems.

  9. PIA - Security Clearance Work Tracking and Budget System | Department...

    Energy Savers [EERE]

    Documents & Publications Freedom of Information and Privacy Act Database PIA, Idaho Operations Office Occupational Medicine - Assistant PIA, Idaho National Laboratory TRAIN-PIA.pdf...

  10. Information Concerning Reliability Impacts under Various System

    Energy Savers [EERE]

    Configurations of the Mirant Potomac River Plant | Department of Energy Concerning Reliability Impacts under Various System Configurations of the Mirant Potomac River Plant Information Concerning Reliability Impacts under Various System Configurations of the Mirant Potomac River Plant Docket No. EO-05-01: PJM Interconnection, L.L.C. and PEPCO Holdings, Inc. is hereby providing you with additional information concerning reliability impacts under various system conditions associated with the

  11. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  12. MOX Services Unclassified Information System PIA, National Nuclear...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    MOX Services Unclassified Information System PIA, National Nuclear Services Administration MOX Services Unclassified Information System PIA, National Nuclear Services ...

  13. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    SciTech Connect (OSTI)

    Vollmer, Todd; Manic, Milos

    2014-05-01

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, an established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.

  14. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Vollmer, Todd; Manic, Milos

    2014-05-01

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, anmore » established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.« less

  15. The renewable electric plant information system

    SciTech Connect (OSTI)

    Sinclair, K.

    1995-12-01

    This report explains the procedures used for creating the Renewable Electric Plant Information System (REPiS) database, describes the database fields, and summarizes the data. The REPiS database contains comprehensive information on grid-connected renewable electric generation plants in the United States. Originally designed in 1987 and updated in 1990, the database includes information through 1994. The report also illustrates ways of using the data for analysis is and describes how researchers validated the data.

  16. Access Rate Control System | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Access Rate Control System Access Rate Control System The mp4 video format is not supported by this browser. Download video Captions: On Time: 4:03 min Developed to support...

  17. Western Renewable Energy Generation Information System ACCOUNT...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Western Renewable Energy Generation Information System ACCOUNT HOLDER REGISTRATION AGREEMENT (Also referred to as the "TERMS OF USE") June 22,2007 Revised May 1,2008 JUL 3 1 REC'D...

  18. Project Records Information System (PRIS) user's manual

    SciTech Connect (OSTI)

    Smith, P.S.; Nations, J.A.; Short, R.D.

    1991-08-01

    The Projects Record Information System (PRIS) is an interactive system developed for the Information Services Division (ISD) of Martin Marietta Energy Systems, Inc., to perform indexing, maintenance, and retrieval of information about Engineering project record documents for which they are responsible. This PRIS User's Manual provides instruction on the use of this system. Section 2.0 of this manual presents an overview of PRIS, describing the system's purpose; the data that it handles, functions it performs; hardware, software, and access; and help and error functions. Section 3.0 describes the interactive menu-driven operation of PRIS. Appendixes A, B,C, and D contain the data dictionary, help screens, report descriptions, and a primary menu structure diagram, respectively.

  19. ORO Office Safeguards and Security Clearance Tracking System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    More Documents & Publications Occupational Medicine - Assistant PIA, Idaho National Laboratory ORO Verification of Employment Tracking System(VETS) PIA, Oak ridge Operations Office ...

  20. ORO Office Safeguards and Security Clearance Tracking System...

    Energy Savers [EERE]

    System PIA, Oak Ridge Operations Office More Documents & Publications Occupational Medicine - Assistant PIA, Idaho National Laboratory ORO Verification of Employment Tracking...

  1. Information survey for microcomputer systems integration

    SciTech Connect (OSTI)

    Hake, K.A.

    1991-12-01

    One goal of the PM-AIM is to provide US Army Project Managers (PMs) and Project Executive Officers (PEOs) with a fundamental microcomputing resource to help perform acquisition information management and its concomitant reporting requirements. Providing key application software represents one means of accomplishing this goal. This workstation would furnish a broad range of capabilities needed in the PM and PEO office settings as well as software tools for specific project management and acquisition information. Although still in the conceptual phase, the practical result of this exercise in systems integration will likely be a system called the Project Manager's Information System (PMIS) or the AIM workstation. It would include such software as, Project Manager's System Software (PMSS), Defense Acquisition Executive Summary (DAES), and Consolidated Acquisition Reporting System (CARS) and would conform to open systems architecture as accepted by the Department of Defense. ORNL has assisted PM-AIM in the development of technology ideas for the PMIS workstation concept. This paper represents the compilation of information gained during this process. This information is presented as a body of knowledge (or knowledge domain) defining the complex technology of microcomputing. The concept of systems integration or tying together all hardware and software components reflects the nature of PM-AIM's task in attempting to field a PMIS or AIM workstation.

  2. Information survey for microcomputer systems integration

    SciTech Connect (OSTI)

    Hake, K.A.

    1991-12-01

    One goal of the PM-AIM is to provide US Army Project Managers (PMs) and Project Executive Officers (PEOs) with a fundamental microcomputing resource to help perform acquisition information management and its concomitant reporting requirements. Providing key application software represents one means of accomplishing this goal. This workstation would furnish a broad range of capabilities needed in the PM and PEO office settings as well as software tools for specific project management and acquisition information. Although still in the conceptual phase, the practical result of this exercise in systems integration will likely be a system called the Project Manager`s Information System (PMIS) or the AIM workstation. It would include such software as, Project Manager`s System Software (PMSS), Defense Acquisition Executive Summary (DAES), and Consolidated Acquisition Reporting System (CARS) and would conform to open systems architecture as accepted by the Department of Defense. ORNL has assisted PM-AIM in the development of technology ideas for the PMIS workstation concept. This paper represents the compilation of information gained during this process. This information is presented as a body of knowledge (or knowledge domain) defining the complex technology of microcomputing. The concept of systems integration or tying together all hardware and software components reflects the nature of PM-AIM`s task in attempting to field a PMIS or AIM workstation.

  3. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  4. Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-03-18

    To establish Department of Energy (DOE) requirements and responsibilities for reporting cyber security incidents involving classified and unclassified systems and responding to cyber security alerts and advisories; and to implement requirements of DOE N 205.1, Unclassified Cyber Security Program, and DOE M 471.2-2, Classified Information Systems Security Manual. DOE N 205.13, dated 7-6-04, extends this notice until 7-6-05. Cancels DOE M 471.2-2, Chapter III, section 8.

  5. Chemical Biological Emergency Management Information System

    Energy Science and Technology Software Center (OSTI)

    2004-06-15

    CB-EMIS is designed to provide information and analysis to transit system operators and emergency responders in the event of a chemical attack on a subway system. The software inforporates detector data, video images, train data, meteorological data, and above- and below-ground plume dispersion models, hight of the liquid level.

  6. GAO Challenges and Efforts to Secure Control Systems (March 2004)

    Broader source: Energy.gov [DOE]

    Computerized control systems perform vital functions across many of our nation’s critical infrastructures. For example, in natural gas distribution, they can monitor and control the pressure and...

  7. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments Programs Defense Systems & Assessments Accelerating Innovation for the Warfighter Accelerating Innovation into the Hands of the Warfighter Supporting Ballistic Missile Defense Supporting Ballistic Missile Defense Launching GPS Satellites Launch of GPS satellite About Defense Systems & Assessments Our engineering, science, and technology expertise supports soldiers on the battlefield. About Us Program Areas Our multi-faceted research detects and defends against threats

  8. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control

    Energy Savers [EERE]

    Systems Are Under Way, but Challenges Remain | Department of Energy CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant

  9. Information systems to enhance technology exchange

    SciTech Connect (OSTI)

    Hunter, T.; Harrington, M.; Harlan, C.; Drozhko, E.

    1994-03-01

    A fundamental part of international technology exchange is the compilation and dissemination of information. Worldwide environmental problems and technology development activities form the basis for important opportunities across the world and especially for those in the former Soviet Union. Recently, important agreements have been reached among Russian institutes engaged in environmental work and the US Department of Energy (DOE) and its national laboratories. These agreements will allow a systematic compilation of information on environmental contamination problems in Russia that can be included in DOE`s environmental information systems. A computer hardware and software system has been loaned to Russian scientists by the DOE for the sharing of environmental software and data, while establishing standards for future information networks.

  10. Rapid Deployment Shelter System | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Rapid Deployment Shelter ... Rapid Deployment Shelter System The mp4 video format is not supported by this browser. Download video Captions: On Time: 5:03 min. Originally designed as a mobile surgical suite, the RDSS can also be converted and used for a command, control, logisitics, or operations center

  11. Rapid Deployment Shelter System, Application | Y-12 National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Complex Rapid Deployment Shelter ... Rapid Deployment Shelter System, Application The mp4 video format is not supported by this browser. Download video Captions: On Time: 3:30 min. The RDSS provides humanitarian and disaster relief first responders with a versatile portable shelter that is rapidly deployed under adverse conditions

  12. Information Sciences and Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    file systems Bioinformatics Infectious disease surveillance Climate change and energy security Smart grids Learn more about our Information Science and Technology capabilities

  13. INFORMATION: Audit Report on The Office of Secure Transportation DC-9 Aircraft Refurbishment

    SciTech Connect (OSTI)

    2009-05-01

    The National Nuclear Security Administration's (NNSA) Office of Secure Transportation (OST) maintains a fleet of seven aircraft to transport sensitive items, equipment and security personnel. Based on increasing requirements for transporting components and security personnel, OST decided to add a heavy transport aircraft to meet the Department's weapons surety and emergency response missions. In 2004, as a replacement following the sale of a portion of its fleet, OST acquired a DC-9 cargo aircraft that had been excessed by the U.S. military. Prior to integrating the DC-9 into its fleet, NNSA ordered a refurbishment of the aircraft. This refurbishment project was to permit the aircraft to be certified to civil air standards so that it could transport passengers for site visits, training and other travel. The NNSA Service Center (Service Center) awarded a contract for the refurbishment of the aircraft in December 2004. In recent years, the Office of Inspector General has addressed a number of issues relating to the Department's aircraft management activities and services. As part of our ongoing review process and because of the national security importance of its fleet of aircraft, we conducted this review to determine whether OST had an effective and efficient aviation management program.

  14. MODELING AND PERFORMANCE EVALUATION FOR AVIATION SECURITY CARGO INSPECTION QUEUING SYSTEM

    SciTech Connect (OSTI)

    Allgood, Glenn O; Olama, Mohammed M; Rose, Terri A; Brumback, Daryl L

    2009-01-01

    Beginning in 2010, the U.S. will require that all cargo loaded in passenger aircraft be inspected. This will require more efficient processing of cargo and will have a significant impact on the inspection protocols and business practices of government agencies and the airlines. In this paper, we conduct performance evaluation study for an aviation security cargo inspection queuing system for material flow and accountability. The overall performance of the aviation security cargo inspection system is computed, analyzed, and optimized for the different system dynamics. Various performance measures are considered such as system capacity, residual capacity, and throughput. These metrics are performance indicators of the system s ability to service current needs and response capacity to additional requests. The increased physical understanding resulting from execution of the queuing model utilizing these vetted performance measures will reduce the overall cost and shipping delays associated with the new inspection requirements.

  15. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect (OSTI)

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  16. Computer Security Risk Assessment

    Energy Science and Technology Software Center (OSTI)

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore » deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.« less

  17. Closure Report for Corrective Action Unit 562: Waste Systems, Nevada National Security Site, Nevada

    SciTech Connect (OSTI)

    NSTec Environmental Restoration

    2012-08-15

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 562, Waste Systems, and provides documentation supporting the completed corrective actions and confirmation that closure objectives for CAU 562 were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 as amended). CAU 562 consists of the following 13 Corrective Action Sites (CASs), located in Areas 2, 23, and 25 of the Nevada National Security Site: · CAS 02-26-11, Lead Shot · CAS 02-44-02, Paint Spills and French Drain · CAS 02-59-01, Septic System · CAS 02-60-01, Concrete Drain · CAS 02-60-02, French Drain · CAS 02-60-03, Steam Cleaning Drain · CAS 02-60-04, French Drain · CAS 02-60-05, French Drain · CAS 02-60-06, French Drain · CAS 02-60-07, French Drain · CAS 23-60-01, Mud Trap Drain and Outfall · CAS 23-99-06, Grease Trap · CAS 25-60-04, Building 3123 Outfalls Closure activities began in October 2011 and were completed in April 2012. Activities were conducted according to the Corrective Action Plan for CAU 562 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The corrective actions included No Further Action and Clean Closure. Closure activities generated sanitary waste and hazardous waste. Some wastes exceeded land disposal limits and required offsite treatment prior to disposal. Other wastes met land disposal restrictions and were disposed in appropriate onsite or offsite landfills. NNSA/NSO requests the following: · A Notice of Completion from the Nevada Division of Environmental Protection to NNSA/NSO for closure of CAU 562 · The transfer of CAU 562 from Appendix III to Appendix IV, Closed Corrective Action Units, of the FFACO

  18. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  19. Cyber Security Indications and Warning System (SV): CRADA 1573.94 Project Accomplishments Summary

    SciTech Connect (OSTI)

    Hu, Tan Chang; Robinson, David G.

    2011-09-08

    As the national focus on cyber security increases, there is an evolving need for a capability to provide for high-speed sensing of events, correlation of events, and decision-making based on the adverse events seen across multiple independent large-scale network environments. The purpose of this Shared Vision project, Cyber Security Indications and Warning System, was to combine both Sandia's and LMC's expertise to discover new solutions to the challenge of protecting our nation's infrastructure assets. The objectives and scope of the proposal was limited to algorithm and High Performance Computing (HPC) model assessment in the unclassified environment within funding and schedule constraints. The interest is the identification, scalability assessment, and applicability of current utilized cyber security algorithms as applied in an HPC environment.

  20. Function analysis for waste information systems

    SciTech Connect (OSTI)

    Sexton, J.L.; Neal, C.T.; Heath, T.C.; Starling, C.D.

    1996-04-01

    This study has a two-fold purpose. It seeks to identify the functional requirements of a waste tracking information system and to find feasible alternatives for meeting those requirements on the Oak Ridge Reservation (ORR) and the Portsmouth (PORTS) and Paducah (PGDP) facilities; identify options that offer potential cost savings to the US government and also show opportunities for improved efficiency and effectiveness in managing waste information; and, finally, to recommend a practical course of action that can be immediately initiated. In addition to identifying relevant requirements, it also identifies any existing requirements that are currently not being completely met. Another aim of this study is to carry out preliminary benchmarking by contacting representative companies about their strategic directions in waste information. The information obtained from representatives of these organizations is contained in an appendix to the document; a full benchmarking effort, however, is beyond the intended scope of this study.

  1. SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Behavioral Interview Guidelines by Job Roles

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.; Greitzer, Frank L.; Dalton, Angela C.; Pusey, Portia K.

    2015-03-01

    The Secure Power Systems Professional Phase III final report was released last year which an appendix of Behavioral Interview Guidelines by Job Roles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.

  2. Guidance for FY2014 Facilities Information Management System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Guidance for FY2014 Facilities Information Management System Data Validations Guidance for FY2014 Facilities Information Management System Data Validations PDF icon FY 2014 FIMS...

  3. Newsletters | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    About Us / Our Programs / Defense Nuclear Security / Nuclear Materials Management & Safeguards System / NMMSS Information, Reports & Forms / Newsletters Newsletters U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Newsletters NMMSS is sponsored by the National Nuclear Security Administration's (NNSA) Office of Materials Integration within the U.S. Department of Energy and the U.S. Nuclear Regulatory Commission Attachment

  4. PIA - AMWTP Information Systems Enclave | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AMWTP Information Systems Enclave PIA - AMWTP Information Systems Enclave PIA - AMWTP Information Systems Enclave PDF icon PIA - AMWTP Information Systems Enclave More Documents & Publications Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medical Surveillance System (OMSS) PIA, Idaho National Laboratory PIA - Bonneville Power Adminstration Ethics Helpline

  5. Cyber Assessment Methods for SCADA Security

    Office of Environmental Management (EM)

    5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition,

  6. An efficient wireless power transfer system with security considerations for electric vehicle applications

    SciTech Connect (OSTI)

    Zhang, Zhen; Chau, K. T. Liu, Chunhua; Qiu, Chun; Lin, Fei

    2014-05-07

    This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.

  7. Energy, information science, and systems science

    SciTech Connect (OSTI)

    Wallace, Terry C; Mercer - Smith, Janet A

    2011-02-01

    This presentation will discuss global trends in population, energy consumption, temperature changes, carbon dioxide emissions, and energy security programs at Los Alamos National Laboratory. LANL's capabilities support vital national security missions and plans for the future. LANL science supports the energy security focus areas of impacts of Energy Demand Growth, Sustainable Nuclear Energy, and Concepts and Materials for Clean Energy. The innovation pipeline at LANL spans discovery research through technology maturation and deployment. The Lab's climate science capabilities address major issues. Examples of modeling and simulation for the Coupled Ocean and Sea Ice Model (COSIM) and interactions of turbine wind blades and turbulence will be given.

  8. Waste Information Management System-2012 - 12114

    SciTech Connect (OSTI)

    Upadhyay, H.; Quintero, W.; Shoffner, P.; Lagos, L.; Roelant, D. [Applied Research Center, Florida International University, 10555 West Flagler Street, Suite 2100, Miami, FL 33174 (United States)

    2012-07-01

    The Waste Information Management System (WIMS) -2012 was updated to support the Department of Energy (DOE) accelerated cleanup program. The schedule compression required close coordination and a comprehensive review and prioritization of the barriers that impeded treatment and disposition of the waste streams at each site. Many issues related to waste treatment and disposal were potential critical path issues under the accelerated schedule. In order to facilitate accelerated cleanup initiatives, waste managers at DOE field sites and at DOE Headquarters in Washington, D.C., needed timely waste forecast and transportation information regarding the volumes and types of radioactive waste that would be generated by DOE sites over the next 40 years. Each local DOE site historically collected, organized, and displayed waste forecast information in separate and unique systems. In order for interested parties to understand and view the complete DOE complex-wide picture, the radioactive waste and shipment information of each DOE site needed to be entered into a common application. The WIMS application was therefore created to serve as a common application to improve stakeholder comprehension and improve DOE radioactive waste treatment and disposal planning and scheduling. WIMS allows identification of total forecasted waste volumes, material classes, disposition sites, choke points, technological or regulatory barriers to treatment and disposal, along with forecasted waste transportation information by rail, truck and inter-modal shipments. The Applied Research Center (ARC) at Florida International University (FIU) in Miami, Florida, developed and deployed the web-based forecast and transportation system and is responsible for updating the radioactive waste forecast and transportation data on a regular basis to ensure the long-term viability and value of this system. WIMS continues to successfully accomplish the goals and objectives set forth by DOE for this project. It has replaced the historic process of each DOE site gathering, organizing, and reporting their waste forecast information utilizing different databases and display technologies. In addition, WIMS meets DOE's objective to have the complex-wide waste forecast and transportation information available to all stakeholders and the public in one easy-to-navigate system. The enhancements to WIMS made since its initial deployment include the addition of new DOE sites and facilities, an updated waste and transportation information, and the ability to easily display and print customized waste forecast, the disposition maps, GIS maps and transportation information. The system also allows users to customize and generate reports over the web. These reports can be exported to various formats, such as Adobe{sup R} PDF, Microsoft Excel{sup R}, and Microsoft Word{sup R} and downloaded to the user's computer. Future enhancements will include database/application migration to the next level. A new data import interface will be developed to integrate 2012-13 forecast waste streams. In addition, the application is updated on a continuous basis based on DOE feedback. (authors)

  9. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  10. Advanced Information Systems Laboratory Crypto Library

    Energy Science and Technology Software Center (OSTI)

    2012-09-12

    AISL-CRYPTO is a library of cryptography functions supporting other AISL software. It provides various crypto functions for Common Lisp, including Digital Signature Algorithm, Data Encryption Standard, Secure Hash Algorithm, and public-key cryptography.

  11. MOX Services Unclassified Information System PIA, National Nuclear Services

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Administration | Department of Energy MOX Services Unclassified Information System PIA, National Nuclear Services Administration MOX Services Unclassified Information System PIA, National Nuclear Services Administration MOX Services Unclassified Information System PIA, National Nuclear Services Administration PDF icon MOX Services Unclassified Information System PIA, National Nuclear Services Administration More Documents & Publications TRAIN-PIA.pdf Occupational Medicine - Assistant

  12. Information processing systems, reasoning modules, and reasoning system design methods

    DOE Patents [OSTI]

    Hohimer, Ryan E; Greitzer, Frank L; Hampton, Shawn D

    2014-03-04

    Information processing systems, reasoning modules, and reasoning system design methods are described. According to one aspect, an information processing system includes working memory comprising a semantic graph which comprises a plurality of abstractions, wherein the abstractions individually include an individual which is defined according to an ontology and a reasoning system comprising a plurality of reasoning modules which are configured to process different abstractions of the semantic graph, wherein a first of the reasoning modules is configured to process a plurality of abstractions which include individuals of a first classification type of the ontology and a second of the reasoning modules is configured to process a plurality of abstractions which include individuals of a second classification type of the ontology, wherein the first and second classification types are different.

  13. Information processing systems, reasoning modules, and reasoning system design methods

    DOE Patents [OSTI]

    Hohimer, Ryan E.; Greitzer, Frank L.; Hampton, Shawn D.

    2015-08-18

    Information processing systems, reasoning modules, and reasoning system design methods are described. According to one aspect, an information processing system includes working memory comprising a semantic graph which comprises a plurality of abstractions, wherein the abstractions individually include an individual which is defined according to an ontology and a reasoning system comprising a plurality of reasoning modules which are configured to process different abstractions of the semantic graph, wherein a first of the reasoning modules is configured to process a plurality of abstractions which include individuals of a first classification type of the ontology and a second of the reasoning modules is configured to process a plurality of abstractions which include individuals of a second classification type of the ontology, wherein the first and second classification types are different.

  14. Building Energy Information Systems: User Case Studies

    SciTech Connect (OSTI)

    Granderson, Jessica; Piette, Mary Ann; Ghatikar, Girish

    2010-03-22

    Measured energy performance data are essential to national efforts to improve building efficiency, as evidenced in recent benchmarking mandates, and in a growing body of work that indicates the value of permanent monitoring and energy information feedback. This paper presents case studies of energy information systems (EIS) at four enterprises and university campuses, focusing on the attained energy savings, and successes and challenges in technology use and integration. EIS are broadly defined as performance monitoring software, data acquisition hardware, and communication systems to store, analyze and display building energy information. Case investigations showed that the most common energy savings and instances of waste concerned scheduling errors, measurement and verification, and inefficient operations. Data quality is critical to effective EIS use, and is most challenging at the subsystem or component level, and with non-electric energy sources. Sophisticated prediction algorithms may not be well understood but can be applied quite effectively, and sites with custom benchmark models or metrics are more likely to perform analyses external to the EIS. Finally, resources and staffing were identified as a universal challenge, indicating a need to identify additional models of EIS use that extend beyond exclusive in-house use, to analysis services.

  15. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  16. Project Management Information Systems (PMIS) | Department of Energy

    Energy Savers [EERE]

    Project Management Information Systems (PMIS) Project Management Information Systems (PMIS) Project Management Information Systems (PMIS) Project Assessment & Reporting System (PARS IIe) Office of Project Management Oversight & Assessments (PM) manages and operates Project Assessment and Reporting System (PARS IIe) - the Department's official "System of Record" for project information, documentation, and performance data of all non-IT Capital Asset Acquisitions. It is used by

  17. PIA - Human Resources - Personal Information Change Request ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    More Documents & Publications PIA - INL PeopleSoft - Human Resource System PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE Integrated Safety Management Workshop ...

  18. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    WIPP Transportation Security Gregory M. Sahd Security Manager Carlsbad Field Office U.S. Department of Energy Contact Information Gregory M. Sahd Security Operations Carlsbad Field Office * U.S. Department of Energy 575.234.8117 * Greg.Sahd@wipp.ws WIPP Transportation "...The (WIPP transportation) system is safer than that employed for any other hazardous material in the U.S...." - National Academy of Sciences, WIPP Panel Hanford Idaho National Engineering and Environmental Laboratory

  19. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    0-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: ď‚· Title 32, CFR, Part 2001, Classified National Security Information ď‚· Executive Order 13526, Classified National Security Information ď‚· DOE Order 470.4B, Safeguards and Security (S&S) Program, Appendix B. Section 3 ď‚· DOE Order 475.2A, Identifying Classified Information ď‚· DOE Order 475.1, Counterintelligence Program The Security Awareness

  20. GAO-07-1036, CRITICAL INFRASTRUCTURE PROTECTION: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain

    Office of Environmental Management (EM)

    Congressional Requesters CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain September 2007 GAO-07-1036 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2007 CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain Highlights of GAO-07-1036, a report to congressional requesters

  1. Renovated Korean nuclear safety and security system: A review and suggestions to successful settlement

    SciTech Connect (OSTI)

    Chung, W. S.; Yun, S. W.; Lee, D. S.; Go, D. Y.

    2012-07-01

    Questions of whether past nuclear regulatory body of Korea is not a proper system to monitor and check the country's nuclear energy policy and utilization have been raised. Moreover, a feeling of insecurity regarding nuclear safety after the nuclear accident in Japan has spread across the public. This has stimulated a renovation of the nuclear safety regime in Korea. The Nuclear Safety and Security Commission (NSSC) was launched on October 26, 2011 as a regulatory body directly under the President in charge of strengthening independence and nuclear safety. This was a meaningful event as the NSSC it is a much more independent regulatory system for Korea. However, the NSSC itself does not guarantee an enhanced public acceptance of the nuclear policy and stable use nuclear energy. This study introduces the new NSSC system and its details in terms of organization structure, appropriateness of specialty, budget stability, and management system. (authors)

  2. Object-oriented Geographic Information System Framework

    Energy Science and Technology Software Center (OSTI)

    2003-03-01

    JeoViewer is an intelligent object-oriented geographic information system (GIS) framework written in Java that provides transparent linkage to any object’s data, behaviors, and optimized spatial geometry representation. Tools are provided for typical GIS functionality, data ingestion, data export, and integration with other frameworks. The primary difference between Jeo Viewer and traditional GIS systems is that traditional GIS systems offer static views of geo-spatial data while JeoViewer can be dynamically coupled to models and live datamore » streams which dynamically change the state of the object which can be immediately represented in JeoViewer. Additionally, JeoViewer’s object-oriented paradigm provides a more natural representation of spatial data. A rich layer hierarchy allows arbitrary grouping of objects based on any relationship as well as the traditional GIS vertical ordering of objects. JeoViewer can run as a standalone product, extended with additional analysis functionality, or embedded in another framework.« less

  3. T-642: RSA SecurID update to Customers

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

  4. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  5. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Contact Courses Summer School Engineering Information Science, Technology Geophysics, Planetary Physics, Signatures Applied Geophysical Experiences Materials Design Calendar NSEC » Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5 665-1144 Email Energy Security Council The Los Alamos National Laboratory Energy Security

  6. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  7. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision the capability set needed to address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and systems engineering; and chemistry. In addition, Sandia has a tool set that enhances the ability to perform high level

  8. Value Added Energy Information Systems VAEIS | Open Energy Information

    Open Energy Info (EERE)

    Solar, Wind energy Product: Provides turn-key monitoring systems for the performance of solar, wind, fuel cell and other distributed generation installations. Coordinates:...

  9. Cyber security analysis testbed : combining real, emulation, and simulation.

    SciTech Connect (OSTI)

    Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

    2010-07-01

    Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

  10. Geographic Information System At Lightning Dock Geothermal Area...

    Open Energy Info (EERE)

    navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System At Lightning Dock Geothermal Area (Getman, 2014) Exploration Activity...

  11. Geographic Information System (Nash, Et Al., 2002) | Open Energy...

    Open Energy Info (EERE)

    search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System (Nash, Et Al., 2002) Exploration Activity Details Location Unspecified Exploration...

  12. OLADE-Geo-Information System Referenced Renewable Energy | Open...

    Open Energy Info (EERE)

    Website Website: www.hidroinformatica.orgsigerhomeesindex.html Cost: Free Language: Spanish; Castilian OLADE-Geo-Information System Referenced Renewable Energy...

  13. Montana Ground Water Pollution Control System Information Webpage...

    Open Energy Info (EERE)

    Ground Water Pollution Control System Information Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Montana Ground Water Pollution Control System...

  14. W.E.T. Automotive Systems | Open Energy Information

    Open Energy Info (EERE)

    E.T. Automotive Systems Jump to: navigation, search Name: W.E.T. Automotive Systems Place: Odelzhausen, Germany Information About Partnership with NREL Partnership with NREL Yes...

  15. Method and system of integrating information from multiple sources

    DOE Patents [OSTI]

    Alford, Francine A. (Livermore, CA); Brinkerhoff, David L. (Antioch, CA)

    2006-08-15

    A system and method of integrating information from multiple sources in a document centric application system. A plurality of application systems are connected through an object request broker to a central repository. The information may then be posted on a webpage. An example of an implementation of the method and system is an online procurement system.

  16. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  17. Challenges in Securing the Interface Between the Cloud and Pervasive Systems

    SciTech Connect (OSTI)

    Lagesse, Brent J

    2011-01-01

    Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources and issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.

  18. 3D Imaging with Structured Illumination for Advanced Security Applications

    SciTech Connect (OSTI)

    Birch, Gabriel Carisle; Dagel, Amber Lynn; Kast, Brian A.; Smith, Collin S.

    2015-09-01

    Three-dimensional (3D) information in a physical security system is a highly useful dis- criminator. The two-dimensional data from an imaging systems fails to provide target dis- tance and three-dimensional motion vector, which can be used to reduce nuisance alarm rates and increase system effectiveness. However, 3D imaging devices designed primarily for use in physical security systems are uncommon. This report discusses an architecture favorable to physical security systems; an inexpensive snapshot 3D imaging system utilizing a simple illumination system. The method of acquiring 3D data, tests to understand illumination de- sign, and software modifications possible to maximize information gathering capability are discussed.

  19. Project Management Information Systems (PMIS) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Information Systems (PMIS) Project Management Information Systems (PMIS) Project Assessment & Reporting System (PARS IIe) Office of Project Management Oversight & Assessments (PM) manages and operates Project Assessment and Reporting System (PARS IIe) - the Department's official "System of Record" for project information, documentation, and performance data of all non-IT Capital Asset Acquisitions. It is used by Federal and contractor personnel across the

  20. Blind Geothermal System | Open Energy Information

    Open Energy Info (EERE)

    Blind Geothermal System Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Print PDF Blind Geothermal System Dictionary.png Blind Geothermal System: An area with a...

  1. Biodiesel Systems LLC | Open Energy Information

    Open Energy Info (EERE)

    Systems LLC Jump to: navigation, search Name: Biodiesel Systems, LLC Place: Madison, Wisconsin Zip: WI 53704 Product: The core business of Biodiesel Systems is plan, design,...

  2. Gas Recovery Systems | Open Energy Information

    Open Energy Info (EERE)

    Systems Jump to: navigation, search Name: Gas Recovery Systems Place: California Zip: 94550 Product: Turnkey landfill gas (LFG) energy extraction systems. References: Gas Recovery...

  3. Mirasol Solar Energy Systems | Open Energy Information

    Open Energy Info (EERE)

    Mirasol Solar Energy Systems Jump to: navigation, search Logo: Mirasol Solar Energy Systems Name: Mirasol Solar Energy Systems Address: 101 Spring Road NE Place: Rio Rancho, New...

  4. Expert Solar Systems | Open Energy Information

    Open Energy Info (EERE)

    Solar Systems Jump to: navigation, search Logo: Expert Solar Systems Name: Expert Solar Systems Address: 11700 E. Sneller Vista Place: Tucson, Arizona Zip: 85749 Sector: Solar...

  5. Bio Fuel Systems BFS | Open Energy Information

    Open Energy Info (EERE)

    Fuel Systems BFS Jump to: navigation, search Name: Bio Fuel Systems (BFS) Place: Alicante, Spain Sector: Biomass Product: Bio Fuel Systems focuses on the development of biofuel...

  6. Energy Conservation Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    Systems Inc Jump to: navigation, search Name: Energy Conservation Systems Inc Place: Prostpect, Kentucky Zip: 40059 Product: Smart solutionspower control system provider...

  7. Trinity Thermal Systems | Open Energy Information

    Open Energy Info (EERE)

    Systems Place: Texas Zip: 75028 Product: Trinity Thermal Systems provides power storage products aimed a shifting energy use from air conditioning systems to off-peak times....

  8. Orion Energy Systems | Open Energy Information

    Open Energy Info (EERE)

    Systems Jump to: navigation, search Name: Orion Energy Systems Place: Plymouth, Wisconsin Zip: 53073 Product: Designs and manufactures application specific lighting systems and...

  9. Wind to Power Systems | Open Energy Information

    Open Energy Info (EERE)

    Power Systems Jump to: navigation, search Name: Wind to Power Systems Place: Madrid, Spain Zip: 28108 Sector: Wind energy Product: Wind to Power Systems designs, supplies and...

  10. Ambient Control Systems | Open Energy Information

    Open Energy Info (EERE)

    Control Systems Jump to: navigation, search Logo: Ambient Control Systems Name: Ambient Control Systems Address: 1810 Gillespie Way Place: El Cajon, California Zip: 92020 Region:...

  11. Landfill Energy Systems LES | Open Energy Information

    Open Energy Info (EERE)

    Energy Systems LES Jump to: navigation, search Name: Landfill Energy Systems (LES) Place: Michigan Zip: 48393 Product: Landfill gas to energy systems project developer, gas...

  12. Aperion Energy Systems | Open Energy Information

    Open Energy Info (EERE)

    system controls, and fuel options with various stack technologies to supply optimized fuel cell systems. References: Aperion Energy Systems1 This article is a stub. You can...

  13. Koyo Thermo Systems | Open Energy Information

    Open Energy Info (EERE)

    Koyo Thermo Systems Jump to: navigation, search Name: Koyo Thermo Systems Place: Nara, Japan Zip: 632-0084 Product: Koyo Thermo Systems is a Japanese crystalline silicon...

  14. System for gathering and summarizing internet information

    DOE Patents [OSTI]

    Potok, Thomas E.; Elmore, Mark Thomas; Reed, Joel Wesley; Treadwell, Jim N.; Samatova, Nagiza Faridovna

    2006-07-04

    A computer method of gathering and summarizing large amounts of information comprises collecting information from a plurality of information sources (14, 51) according to respective maps (52) of the information sources (14), converting the collected information from a storage format to XML-language documents (26, 53) and storing the XML-language documents in a storage medium, searching for documents (55) according to a search query (13) having at least one term and identifying the documents (26) found in the search, and displaying the documents as nodes (33) of a tree structure (32) having links (34) and nodes (33) so as to indicate similarity of the documents to each other.

  15. Security Notice | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice This computer system is operated on a U.S. Federal Government network (unclassified information only). This system is for the use of authorized users only. Unauthorized access is prohibited and makes you liable to civil and criminal penalties. Individuals using this computer system without authority, or in excess of their authority, are subject to having all of their activities monitored and recorded by system personnel. In the course of monitoring individuals improperly using

  16. BPD Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security BPD Security Information related to the Building Performance Database (BPD) security and software controls. PDF icon Building Performance Database (BPD) Security More Documents & Publications Buildings Performance Database - 2013 BTO Peer Review BPD Webinar: Analyze Building Energy Data, Understand Market Trends, Inform Decisions Buildings Performance Database (BPD)

  17. Decontamination Systems Information and Reseach Program

    SciTech Connect (OSTI)

    Echol E. Cook

    1998-04-01

    The following paragraphs comprise the research efforts during the first quarter of 1998 (January 1 - March 31). These tasks have been granted a continuation from the 1997 work and will all end in June 1998. This report represents the last technical quarterly report deliverable for the WVU Cooperative Agreement - Decontamination Systems Information and Research Program. Final reports for all of the 1997 projects will be submitted afterwards as one document. During this period, groundwater extraction operations were completed on Task 1.6 - Pilot Scale Demonstration of TCE Flushing Through PVDs at the DOE/RMI Extrusion Plant. The data have been evaluated and graphs are presented. The plot of TCE Concentration versus Time shows that the up-gradient groundwater monitoring well produced consistent levels of TCE contamination. A similar trend was observed for the down-gradient wells via grab samples tested. Groundwater samples from the PVD test pad Zone of Influence showed consistent reductions in TCE concentrations with respect to time. In addition, a natural pulse frequency is evident which will have a significant impact on the efficiency of the contaminant removal under natural groundwater advection/diffusion processes. The relationships between the PVD Extraction Flow Rate versus Cumulative Time shows a clear trend in flow rate. Consistent values between 20 to 30 g.p.m. at the beginning of the extraction duration, to less than 10 g.p.m. by the end of the extraction cycle are observed. As evidenced by the aquifer?s diminishing recharge levels, the PVD extraction is affecting the response of the aquifer?s natural attenuation capability. Progress was also marked on the Injection and Circulation of Potable Water Through PVDs task. Data reduction from this sequence of testing is ongoing. Work planned for next quarter includes completing the Injection / Extraction of potable water task and beginning the Surfactant Injection and removal task.

  18. Powersource Energy Systems Ltd | Open Energy Information

    Open Energy Info (EERE)

    Systems Ltd Jump to: navigation, search Name: Powersource Energy Systems Ltd Place: Canada Product: A spinoff from Soltek Powersource Ltd, since 1996, it merged back with them...

  19. Biomass Combustion Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    Biomass Combustion Systems Inc Retrieved from "http:en.openei.orgwindex.php?titleBiomassCombustionSystemsInc&oldid768602" Feedback Contact needs updating Image...

  20. Microgy Cogeneration Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    Microgy Cogeneration Systems Inc Jump to: navigation, search Name: Microgy Cogeneration Systems Inc Place: Tarrytown, New York Zip: 10591 Product: New York-based Microgy...

  1. InPower Systems | Open Energy Information

    Open Energy Info (EERE)

    Name: InPower Systems Place: Carbondale, Colorado Zip: 81623 Sector: Geothermal energy, Solar Product: InPower Systems designs, installs and maintains turn-key solar, solar...

  2. WebGen Systems | Open Energy Information

    Open Energy Info (EERE)

    search Logo: WebGen Systems Name: WebGen Systems Address: 41 Linksey Way Place: Cambridge, Massachusetts Zip: 02142 Region: Greater Boston Area Sector: Efficiency Product:...

  3. Promethean Power Systems | Open Energy Information

    Open Energy Info (EERE)

    Power Systems Jump to: navigation, search Name: Promethean Power Systems Place: Cambridge, Massachusetts Zip: 2138 Product: US-based developer of a solar-powered...

  4. ICOS Vision Systems NV | Open Energy Information

    Open Energy Info (EERE)

    ICOS Vision Systems NV Jump to: navigation, search Name: ICOS Vision Systems NV Place: Leuvan, Belgium Zip: 3001 Product: Provides inspection products for the manufacturing...

  5. California Wind Systems | Open Energy Information

    Open Energy Info (EERE)

    Systems Jump to: navigation, search Name: California Wind Systems Address: 3411 Camino Corte Place: Carlsbad, California Zip: 92008 Region: Southern CA Area Sector: Wind energy...

  6. Enova Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    search Name: Enova Systems Inc Place: Torrance, California Zip: CA 90502 Product: Enova Systems develops and manufactures power management and power conversion products with a...

  7. Green Design Systems | Open Energy Information

    Open Energy Info (EERE)

    Systems Jump to: navigation, search Name: Green Design Systems Address: PO Box 1229 Place: Healdsburg, California Zip: 95448 Region: Bay Area Sector: Buildings Product: Refuse...

  8. Green Systems UK | Open Energy Information

    Open Energy Info (EERE)

    Systems UK Jump to: navigation, search Name: Green Systems UK Place: Cambridge, United Kingdom Sector: Solar Product: Design and installation of vacuum tube & flat plate solar hot...

  9. Alstom Energy Systems | Open Energy Information

    Open Energy Info (EERE)

    Alstom Energy Systems Jump to: navigation, search Name: Alstom Energy Systems Address: 3 avenue Andr Malraux Place: Levallois-Perret Cedex, France Website: www.alstom.com...

  10. Independent Power Systems | Open Energy Information

    Open Energy Info (EERE)

    Systems is an independent energy consultancy specialising in reducing client energy and environmental costs. References: Independent Power Systems1 This article is a stub. You...

  11. Southwest Photovoltaic Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    Southwest Photovoltaic Systems Inc Jump to: navigation, search Name: Southwest Photovoltaic Systems Inc Place: Tomball, Texas Zip: 77375 Product: Distributor of small scale PV...

  12. American Alternative Energy Systems | Open Energy Information

    Open Energy Info (EERE)

    Alternative Energy Systems Jump to: navigation, search Name: American Alternative Energy Systems Place: Denton, Texas Zip: 76209 Product: An American company involved in project...

  13. Renewable Power Systems | Open Energy Information

    Open Energy Info (EERE)

    Renewable Power Systems Place: Bedford, England, United Kingdom Zip: MK42 9TW Sector: Renewable Energy Product: Bedford, UK based developer of renewable power systems. References:...

  14. Sathian Sun Power Systems | Open Energy Information

    Open Energy Info (EERE)

    Sathian Sun Power Systems Jump to: navigation, search Name: Sathian Sun Power Systems Place: Salem, Andhra Pradesh, India Sector: Solar Product: Manufacturer of solar street lights...

  15. Advanced Energy Systems Ltd | Open Energy Information

    Open Energy Info (EERE)

    Systems Ltd Place: Welshpool, Western Australia, Australia Zip: 6016 Sector: Solar, Wind energy Product: Manufacturer and distributor of micro wind turbines, solar systems, gas...

  16. Naps Systems Oy | Open Energy Information

    Open Energy Info (EERE)

    Naps Systems Oy Jump to: navigation, search Name: Naps Systems Oy Place: Vantaa, Finland Zip: 1510 Sector: Solar Product: Naps provides solar electricity solutions that range from...

  17. Tahoe Water Systems | Open Energy Information

    Open Energy Info (EERE)

    Tahoe Water Systems Jump to: navigation, search Name: Tahoe Water Systems Sector: Solar, Wind energy Product: Develops a self-contained solarwind based water pumping technology....

  18. Star Energy Systems | Open Energy Information

    Open Energy Info (EERE)

    Systems Jump to: navigation, search Name: Star Energy Systems Place: Ahmedabad, Gujarat, India Zip: 380 009 Sector: Solar Product: Solar PV product distributor. Coordinates:...

  19. Flywheel Energy Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    K2H 8S1 Product: Focuses on design, fabrication, assembling and distributing flywheel energy storage systems and related components. References: Flywheel Energy Systems Inc1...

  20. Independent Energy Systems IES | Open Energy Information

    Open Energy Info (EERE)

    IES Jump to: navigation, search Name: Independent Energy Systems (IES) Place: Santa Cruz, California Zip: 95062 Product: Independent Energy Systems sells, designs, and installs...

  1. Bio Energy Systems LLC | Open Energy Information

    Open Energy Info (EERE)

    search Name: Bio-Energy Systems LLC Place: san Anselmo, California Zip: 94960 Product: Biodiesel producer in Vallejo, California. References: Bio-Energy Systems LLC1 This...

  2. Solimpeks Solar Energy Systems | Open Energy Information

    Open Energy Info (EERE)

    Solimpeks Solar Energy Systems Jump to: navigation, search Name: Solimpeks Solar Energy Systems Place: Karatay - KONYA, Turkey Zip: 42300 Sector: Solar Product: Turkish...

  3. Rand Solar Energy Systems | Open Energy Information

    Open Energy Info (EERE)

    Rand Solar Energy Systems Jump to: navigation, search Name: Rand Solar Energy Systems Place: Petach Tikva, Israel Zip: 49130 Sector: Solar Product: Israel-based manufacturer and...

  4. Apollo Energy Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    Apollo Energy Systems Inc Place: Pompano Beach, Florida Zip: FLA 33069 Sector: Hydro, Hydrogen, Renewable Energy Product: Apollo Energy Systems is a developer, producer, marketor...

  5. Advanced Fuel Cell Systems | Open Energy Information

    Open Energy Info (EERE)

    Fuel Cell Systems Jump to: navigation, search Name: Advanced Fuel Cell Systems Place: Amherst, New York Zip: 14228 Product: Collaboration of three companies (ATSI Engineering,...

  6. Solargy Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    Solar Product: Solargy Systems designs and manufactures PV cells and develops waste to energy and biomass plants. References: Solargy Systems Inc.1 This article is a stub....

  7. Synergetic Power Systems | Open Energy Information

    Open Energy Info (EERE)

    Sector: Buildings, Solar Product: Start-up planning to install parabolic concentrated solar collector systems on large flat-roofed buildings to power their HVAC systems, and...

  8. Corporate Systems Engineering | Open Energy Information

    Open Energy Info (EERE)

    Systems Engineering Jump to: navigation, search Name: Corporate Systems Engineering Place: Indianapolis, Indiana Product: Indiana-based energy management company. Coordinates:...

  9. Invensys Building System | Open Energy Information

    Open Energy Info (EERE)

    Zip: 61132 Product: Invensys was a supplier of integrated systems for building automation, and is now merged with TAC. References: Invensys Building System1 This article is...

  10. Saft Power Systems | Open Energy Information

    Open Energy Info (EERE)

    and systems, servicing the telecom and coal industries; in particular, manufacturers inverters and balance of systems for solar industry. Coordinates: 48.88811, 2.194915 Show...

  11. Optimal Energy Systems | Open Energy Information

    Open Energy Info (EERE)

    Energy Systems Place: Torrance, California Zip: 90505 Product: Manufacturer of flywheel power system, specialising in aerospace and defence sector. Coordinates: 40.417285,...

  12. Renewable Energy Systems Americas | Open Energy Information

    Open Energy Info (EERE)

    Americas Jump to: navigation, search Name: Renewable Energy Systems Americas Place: Broomfield, CO Website: www.res-americas.com References: Renewable Energy Systems Americas1...

  13. Greasecar Vegetable Fuel Systems | Open Energy Information

    Open Energy Info (EERE)

    Greasecar Vegetable Fuel Systems Jump to: navigation, search Name: Greasecar Vegetable Fuel Systems Place: Florence, Massachusetts Zip: 1062 Product: Manufacturer of vegetable fuel...

  14. Renewable Power Systems LLC | Open Energy Information

    Open Energy Info (EERE)

    Power Systems LLC Jump to: navigation, search Name: Renewable Power Systems, LLC Place: Averill Park, New York Zip: 12018 Sector: Solar Product: Albany, New York-based solar...

  15. West Point Utility System | Open Energy Information

    Open Energy Info (EERE)

    Utility System Jump to: navigation, search Name: West Point Utility System Place: Iowa Phone Number: (319) 837-6313 Website: www.westpointiowa.comwp-utili Facebook: https:...

  16. American Transmission Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    American Transmission Systems Inc Jump to: navigation, search Name: American Transmission Systems Inc Place: Ohio Website: www.atcllc.com Twitter: @amertransco References: EIA...

  17. American Energy Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    Systems Inc Jump to: navigation, search Name: American Energy Systems Inc Place: Minnesota Zip: 55350 Product: Biofuel burning appliance manufacturer (pellets & corn). References:...

  18. Interval Data Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    Interval Data Systems Inc Jump to: navigation, search Name: Interval Data Systems Inc Address: 135 Beaver Street Place: Waltham, Massachusetts Zip: 02452 Region: Greater Boston...

  19. Distributed Energy Systems Corp | Open Energy Information

    Open Energy Info (EERE)

    Distributed Energy Systems Corp Jump to: navigation, search Name: Distributed Energy Systems Corp Place: Wallingford, Connecticut Zip: CT 06492 Product: The former holding company...

  20. Louisville Electric System | Open Energy Information

    Open Energy Info (EERE)

    Louisville Electric System Jump to: navigation, search Name: Louisville Electric System Place: Mississippi References: EIA Form EIA-861 Final Data File for 2010 - File1a1 EIA...

  1. Directional Drilling Systems | Open Energy Information

    Open Energy Info (EERE)

    Directional Drilling Systems Jump to: navigation, search Geothermal ARRA Funded Projects for Directional Drilling Systems Loading map... "format":"googlemaps3","type":"ROADMAP","t...

  2. American Geothermal Systems | Open Energy Information

    Open Energy Info (EERE)

    Systems Place: Austin, Texas Sector: Geothermal energy Product: Installer of geothermal heating and cooling technologies, also has a patented water to air heat pump system....

  3. Thermal Energy Systems | Open Energy Information

    Open Energy Info (EERE)

    Energy Systems Jump to: navigation, search Name: Thermal Energy Systems Place: London, United Kingdom Sector: Biomass Product: UK based company that constructs and installs boilers...

  4. Nighthawk Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    Nighthawk Systems Inc Jump to: navigation, search Name: Nighthawk Systems Inc Place: San Antonio, Texas Zip: 78216 Product: Texas-based, provider of intelligent wireless power...

  5. Hydraulic Hybrid Systems | Open Energy Information

    Open Energy Info (EERE)

    Hydraulic Hybrid Systems Retrieved from "http:en.openei.orgwindex.php?titleHydraulicHybridSystems&oldid768560" Categories: Organizations Companies Energy...

  6. Monolithic Power Systems | Open Energy Information

    Open Energy Info (EERE)

    Power Systems Jump to: navigation, search Name: Monolithic Power Systems Place: San Jose, California Zip: 95120 Product: A California-based analog semiconductor company....

  7. Kawasaki Plant Systems Ltd | Open Energy Information

    Open Energy Info (EERE)

    Systems Ltd Jump to: navigation, search Name: Kawasaki Plant Systems Ltd Place: Kobe, Japan Zip: 650-8670 Sector: Biomass, Services, Solar Product: Engineers, manufactures, and...

  8. REpower Systems AG | Open Energy Information

    Open Energy Info (EERE)

    Systems AG Jump to: navigation, search Name: REpower Systems AG Place: Hamburg, Germany Zip: D-22297 Sector: Services, Wind energy Product: Wind turbine manufacturer with...

  9. Husk Power Systems | Open Energy Information

    Open Energy Info (EERE)

    Power Systems Jump to: navigation, search Name: Husk Power Systems Place: Patna, Bihar, India Zip: 800023 Sector: Biomass Product: India-based developer of mini biomass plants....

  10. Natural Climate Systems | Open Energy Information

    Open Energy Info (EERE)

    search Name: Natural Climate Systems Place: Spain Product: Develops bioclimatic architecture projects. References: Natural Climate Systems1 This article is a stub. You can...

  11. Strengthening Cyber Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector ...

  12. Lemnos Interoperable Security Program

    Office of Environmental Management (EM)

    Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as frewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products

  13. Framework for an Information Visualization System

    Energy Science and Technology Software Center (OSTI)

    2006-08-11

    The Program is a suite of Windows-based software applications and services for ingesting, storing, and analyzing large quantities of disparate inforamtion. The software supports the ingestion and storage of any information that can be represented in eXtensible Markup Language (XML) format. Stored information can be subsequently retrieved via search operations, then "visualized" in multiple ways using a client application that supports a variety of analytical functions. Visualization capabilities include tools for depicting a variety ofmore » relationships that may be present in the information, including geospatial, temporal, topical, categorical, and network relationships.« less

  14. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  15. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    DOE Patents [OSTI]

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  16. Open Energy Information Systems - 2013 Peer Review | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    - 2013 Peer Review Open Energy Information Systems - 2013 Peer Review Emerging Technologies Project for the 2013 Building Technologies Office's Program Peer Review PDF icon emrgtech04_granderson_040213.pdf More Documents & Publications Open Energy Information Systems (OpenEIS) - 2014 Peer Review Buildings Performance Database - 2013 BTO Peer Review Energy Management Systems Package for Small Commercial Buildings

  17. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  18. Defining and Computing a Valued Based Cyber-Security Measure

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2012-01-01

    In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  19. Defining and Computing a Value Based Cyber-Security Measure

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In past work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities\\; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper we discuss the specification and design of a system that collects, updates and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  20. Predictive Dynamic Security Assessment through Advanced Computing

    SciTech Connect (OSTI)

    Huang, Zhenyu; Diao, Ruisheng; Jin, Shuangshuang; Chen, Yousu

    2014-11-30

    Abstract— Traditional dynamic security assessment is limited by several factors and thus falls short in providing real-time information to be predictive for power system operation. These factors include the steady-state assumption of current operating points, static transfer limits, and low computational speed. This addresses these factors and frames predictive dynamic security assessment. The primary objective of predictive dynamic security assessment is to enhance the functionality and computational process of dynamic security assessment through the use of high-speed phasor measurements and the application of advanced computing technologies for faster-than-real-time simulation. This paper presents algorithms, computing platforms, and simulation frameworks that constitute the predictive dynamic security assessment capability. Examples of phasor application and fast computation for dynamic security assessment are included to demonstrate the feasibility and speed enhancement for real-time applications.

  1. U.S. Patent Pending, Cyberspace Security System for Complex Systems, U.S. Patent Application No.: 14/134,949

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2013-01-01

    A computer implemented method monetizes the security of a cyber-system in terms of losses each stakeholder may expect to lose if a security break down occurs. A non-transitory media stores instructions for generating a stake structure that includes costs that each stakeholder of a system would lose if the system failed to meet security requirements and generating a requirement structure that includes probabilities of failing requirements when computer components fails. The system generates a vulnerability model that includes probabilities of a component failing given threats materializing and generates a perpetrator model that includes probabilities of threats materializing. The system generates a dot product of the stakes structure, the requirement structure, the vulnerability model and the perpetrator model. The system can further be used to compare, contrast and evaluate alternative courses of actions best suited for the stakeholders and their requirements.

  2. Emergency Response | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Emergency Response Emergency Response Department of Energy's chief risk officer visits Nevada National Security Site Earlier this month, Associate Deputy Secretary John MacWilliams visited the Nevada National Security Site (NNSS) in his role as Chief Risk Officer for the Department of Energy. He reviewed the NNSA sites prepared for disasters using real-time response management system Pantex Emergency Services now uses the Emergency Management Information System, or EMInS. From left: Maribel

  3. Frequently Asked Questions | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Programs / Defense Nuclear Security / Nuclear Materials Management & Safeguards System / NMMSS Information, Reports & Forms / Frequently Asked Questions Frequently Asked Questions U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Frequently Asked Questions (FAQs) User Frequently Asked Questions What is the History of NMMSS? What Are the Other Uses of NMMSS? NMMSS is sponsored by the National Nuclear Security

  4. Security Notice | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User login Username * Password * Request new password Log in Forgot Your Password? Security Notice This computer system is operated on a U.S. Federal Government network (unclassified information only). This system is for the use of authorized users only. Unauthorized access is prohibited and makes you liable to civil and criminal penalties. Individuals using this computer system without authority, or in excess of their authority, are subject to having all of their activities monitored and

  5. Borrego Solar Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    Cajon, California Zip: 92020 Product: US-based installer of PV systems for commercial and public projects. References: Borrego Solar Systems Inc1 This article is a stub. You can...

  6. National Solar Systems | Open Energy Information

    Open Energy Info (EERE)

    National Solar Systems Place: Al-Khobar, Saudi Arabia Zip: 31952 Product: Leading system intergrator in Saudi Arabia. Coordinates: 26.28665, 50.21434 Show Map Loading map......

  7. Aura Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    Aura Systems Inc Jump to: navigation, search Name: Aura Systems Inc Place: El Segundo, California Zip: 90245 Product: El Segundo-head quartered developer of AuraGen, an axial flux...

  8. State Energy Data System | Open Energy Information

    Open Energy Info (EERE)

    Data System Jump to: navigation, search Name State Energy Data System Data Format CSV Geographic Scope United States TODO: Import actual dataset contents into OpenEI The State...

  9. A123Systems | Open Energy Information

    Open Energy Info (EERE)

    A123Systems Place: Watertown, Massachusetts Zip: 02472 Product: Massachusetts-based lithium-ion battery manufacturer. Website: www.a123systems.com Coordinates: 43.197366,...

  10. MSE Power Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    MSE Power Systems Inc Jump to: navigation, search Name: MSE Power Systems Inc Place: Albany, New York Zip: NY 12205 Sector: Services Product: Albany-based privately held company...

  11. Geco System Spa | Open Energy Information

    Open Energy Info (EERE)

    Zip: 21052 Product: Geco System offers "turnkey" solutions for the proudction of photovoltaic energy. References: Geco System Spa1 This article is a stub. You can help OpenEI...

  12. EDrive Systems LLC | Open Energy Information

    Open Energy Info (EERE)

    EDrive Systems LLC Place: Los Angeles, California Product: Developer of a plug-in and battery kit for the Toyota Prius. References: EDrive Systems LLC1 This article is a stub....

  13. Tri Power Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search Logo: Tri Power Systems Inc Name: Tri Power Systems Inc Address: P.O. Box 1450 Place: Idaho Springs, Colorado Zip: 80452 Region: Rockies Area Sector: Solar...

  14. Point Power Systems | Open Energy Information

    Open Energy Info (EERE)

    systems, ranging from 1-6kW. It has received support from Environmental Business Cluster, a California-based incubator. References: Point Power Systems1 This article is a...

  15. Mercury Solar Systems | Open Energy Information

    Open Energy Info (EERE)

    of PV products and systems for commercial and residential clients in the New York metrotri-state area. References: Mercury Solar Systems1 This article is a stub. You can...

  16. Sustainable Systems LLC | Open Energy Information

    Open Energy Info (EERE)

    Zip: 59812 Sector: Renewable Energy Product: Renewable energy and biobased product research, development and commercialization company. References: Sustainable Systems...

  17. Improved Meteorological Input for Atmospheric Release Decision support Systems and an Integrated LES Modeling System for Atmospheric Dispersion of Toxic Agents: Homeland Security Applications

    SciTech Connect (OSTI)

    Arnold, E; Simpson, M; Larsen, S; Gash, J; Aluzzi, F; Lundquist, J; Sugiyama, G

    2010-04-26

    When hazardous material is accidently or intentionally released into the atmosphere, emergency response organizations look to decision support systems (DSSs) to translate contaminant information provided by atmospheric models into effective decisions to protect the public and emergency responders and to mitigate subsequent consequences. The Department of Homeland Security (DHS)-led Interagency Modeling and Atmospheric Assessment Center (IMAAC) is one of the primary DSSs utilized by emergency management organizations. IMAAC is responsible for providing 'a single piont for the coordination and dissemination of Federal dispersion modeling and hazard prediction products that represent the Federal position' during actual or potential incidents under the National Response Plan. The Department of Energy's (DOE) National Atmospheric Release Advisory Center (NARAC), locatec at the Lawrence Livermore National Laboratory (LLNL), serves as the primary operations center of the IMAAC. A key component of atmospheric release decision support systems is meteorological information - models and data of winds, turbulence, and other atmospheric boundary-layer parameters. The accuracy of contaminant predictions is strongly dependent on the quality of this information. Therefore, the effectiveness of DSSs can be enhanced by improving the meteorological options available to drive atmospheric transport and fate models. The overall goal of this project was to develop and evaluate new meteorological modeling capabilities for DSSs based on the use of NASA Earth-science data sets in order to enhance the atmospheric-hazard information provided to emergency managers and responders. The final report describes the LLNL contributions to this multi-institutional effort. LLNL developed an approach to utilize NCAR meteorological predictions using NASA MODIS data for the New York City (NYC) region and demonstrated the potential impact of the use of different data sources and data parameterizations on IMAAC/NARAC fate and transport predictions. A case study involving coastal sea breeze circulation patterns in the NYC region was used to investigate the sensitivity of atmospheric dispersion results on the source of three-dimensional wind field data.

  18. Recommendation 171: Commendation for Waste Information Management System |

    Office of Environmental Management (EM)

    Department of Energy 1: Commendation for Waste Information Management System Recommendation 171: Commendation for Waste Information Management System The ORSSAB commends DOE and Florida International University for development of the Waste Information Management System and strongly recommends that it be periodically updated and improved. PDF icon Recommendation 171 PDF icon DOE response to recommendation 171 PDF icon DOE Gelles response to recommendation 171 More Documents & Publications

  19. Guidance for FY2014 Facilities Information Management System Data

    Office of Environmental Management (EM)

    Validations | Department of Energy FY2014 Facilities Information Management System Data Validations Guidance for FY2014 Facilities Information Management System Data Validations PDF icon FY 2014 FIMS Data Validation Guidance w MEMO.pdf More Documents & Publications Guidance for Fiscal Year 2015 Facilities Information Management System Data Validations Deputy Secretary Memo on Improving DOE-wide Recruitment and Hiring Processes FY2012 Three

  20. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  1. Testing standards for physical security systems at Category 1 fuel cycle facilities

    SciTech Connect (OSTI)

    Dwyer, P.A.

    1991-10-01

    This NUREG is a compilation of physical security testing standards for use at fuel cycle facilities using or possessing formula quantities of strategic special nuclear material.

  2. Visualization of Electric Power System Information: Workshop Proceedings

    SciTech Connect (OSTI)

    Kroposki, B.; Komomua, C.

    2013-01-01

    This report summarizes the workshop entitled: Visualization of Electric Power System Information. The workshop was held on September 11, 2012 on NREL's campus in Golden, Colorado.

  3. Energy Procurement Information Center (EPiC) - Deb Bouslog, Systems...

    Energy Savers [EERE]

    Information Center (EPiC) - Deb Bouslog, Systems Division, OAPM Agenda *Mission and Vision *Background *Benefits *A Parting Challenge PDF icon Workshop 2015 - BouslogEPiC.pdf...

  4. Geographic Information System At Northern Basin & Range Region...

    Open Energy Info (EERE)

    Nash & Johnson, 2003) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System At Northern Basin & Range Region (Nash &...

  5. Geographic Information System At Nw Basin & Range Region (Nash...

    Open Energy Info (EERE)

    Nw Basin & Range Region (Nash & Johnson, 2003) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System At Nw Basin & Range...

  6. Geographic Information System At Fish Lake Valley Area (Deymonaz...

    Open Energy Info (EERE)

    Fish Lake Valley Area (Deymonaz, Et Al., 2008) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System At Fish Lake Valley...

  7. Geographic Information System At Chena Geothermal Area (Holdmann...

    Open Energy Info (EERE)

    Details Location Chena Geothermal Area Exploration Technique Geographic Information System Activity Date 2005 - 2007 Usefulness useful DOE-funding Unknown Exploration Basis...

  8. Geographic Information System At Nevada Test And Training Range...

    Open Energy Info (EERE)

    Nevada Test And Training Range Area (Sabin, Et Al., 2004) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System At Nevada...

  9. Geographic Information System At U.S. West Region (Williams ...

    Open Energy Info (EERE)

    U.S. West Region (Williams & Deangelo, 2008) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System At U.S. West Region...

  10. Geographic Information System At Walker-Lane Transitional Zone...

    Open Energy Info (EERE)

    Zone Region (Laney, 2005) Exploration Activity Details Location Walker-Lane Transition Zone Geothermal Region Exploration Technique Geographic Information System Activity...

  11. National Energy Modeling System (NEMS) | Open Energy Information

    Open Energy Info (EERE)

    Modeling System (NEMS) AgencyCompany Organization: Energy Information Administration Sector: Energy Focus Area: Economic Development Phase: Develop Goals Topics: Policies...

  12. Geographic Information System At Dixie Valley Geothermal Area...

    Open Energy Info (EERE)

    Nash & D., 1997) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Geographic Information System At Dixie Valley Geothermal Area (Nash & D., 1997)...

  13. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessmentcwdd2015-05-04T21:05:48+00:00 security Water Treatment Facility Definition Security is assuring that water sources and water distribution systems are...

  14. Integrated Energy Systems | Open Energy Information

    Open Energy Info (EERE)

    Integrated Energy Systems Address: 747 N Main Street Place: Orange, California Zip: 92868 Region: Southern CA Area Sector: Solar Product: EPC Year Founded: 1985 Phone Number:...

  15. Steam-system upgrades | Open Energy Information

    Open Energy Info (EERE)

    upgrades Jump to: navigation, search TODO: Add description List of Steam-system upgrades Incentives Retrieved from "http:en.openei.orgwindex.php?titleSteam-systemupgrades&old...

  16. Fastcap Systems Corporation | Open Energy Information

    Open Energy Info (EERE)

    Corporation Jump to: navigation, search Name: Fastcap Systems Corporation Place: Cambridge, Massachusetts Zip: 2139 Sector: Carbon Product: Cambridge-based ultracapacitor...

  17. Ramgen Power Systems Inc | Open Energy Information

    Open Energy Info (EERE)

    Power Systems Inc Place: Bellevue, Washington State Zip: 98005 Product: Developer of engines and turbines using ramjet shockwave compression technology. Coordinates: 47.61002,...

  18. Clean Energy Systems | Open Energy Information

    Open Energy Info (EERE)

    Zip: 95742 Product: The company has developed oxyfuel technology for zero emission fossil fuel power plants. References: Clean Energy Systems1 This article is a stub. You can...

  19. Enhanced Geothermal Systems (EGS) | Open Energy Information

    Open Energy Info (EERE)

    DOE EGS Technical Roadmap DOE EGS Systems Demonstration Projects How EGS Works (Animation) EGS Development (Animation) EGS Schematic.jpg Dictionary.png Enhanced Geothermal...

  20. A123 Systems | Open Energy Information

    Open Energy Info (EERE)

    Zip: 02472 Region: Greater Boston Area Sector: Efficiency Product: Nanotech batteries Website: www.a123systems.com Coordinates: 42.3637762, -71.1662161 Show Map...