Powered by Deep Web Technologies
Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Guide to Critical Infrastructure Protection Cyber Vulnerability...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized...

2

CYBER-RELATED CRITICAL INFRASTRUCTURE IDENTIFICATION AND PROTECTION...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER-RELATED CRITICAL INFRASTRUCTURE IDENTIFICATION AND PROTECTION MEASURES, IG-0545 CYBER-RELATED CRITICAL INFRASTRUCTURE IDENTIFICATION AND PROTECTION MEASURES, IG-0545 In...

3

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)

4

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June

5

Cyber Infrastructure Group Home Page  

Science Conference Proceedings (OSTI)

Cyber Infrastructure Group. Welcome. The Cyber Infrastructure Group (775.04) addresses the integration and interoperability ...

2012-07-17T23:59:59.000Z

6

Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research: Energy Infrastructure Cyber Protection  

Science Conference Proceedings (OSTI)

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Protecting and trusting information is not unique to the grid. Indeed, the information security market is worth tens of billions of dollars, almost exclusively in cyber security products and services. Yet, solutions designed for the Internet are often not appropriate for securing the energy grid, which has a different set of priorities and communication needs. Any viable information security solution must address those unique challenges and features. The discussion at the CSIIR Workshop was primarily focused about the Energy Infrastructure Cyber Protection (ENCyP) Initiative. ENCyP is a multidisciplinary strategic theme oriented on cyber protection for the most critical and most vulnerable components of Energy Delivery System (EDS). The initiative derived from ORNL's focus on energy and cyber-physical defenses. On this basis we received just over 100 submissions stemming from both novel theoretical and empirical research focused on the many different aspects of ENCyP. We encouraged the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the evolving context ENCyP. Topics included: Security assurance/interoperability for Energy Delivery Systems (EDS) Scalable/trusted control (cyber-physical) systems security Visual analytics for cyber security Next generation control systems vulnerability assessment Wireless Smart Grid security SCADA, EDS communications security test beds Use cases and attack scenarios for EDS Wide area monitoring, protection & control AMI, demand-response, distribution grid management security Electric transportation & distributed energy resources security Policy/standards driven architectures for EDS Anti-tamper device architectures Cryptographic key management for EDS Security risk assessment and management for EDS Insider and life-cycle threats Automated vulnerability detection Access control management and authentication services for EDS Secure information exchange gateway & watchdog switches Bio-Inspired technologies for enhancing EDS cybersecurity A principle goal of the workshop was to foster discussions and dialog among the 210 registered attendees from North and South America, Europe, Asia, and Africa. This goal was initiated and facilitated by 8 plenary keynote addresses including our banquet and reception speakers. There were also six invited speakers, including two panels of government and national laboratory representatives. A total of one hundred and three papers (i.e., extended abstracts [EAs]) were submitted involving over three hundred independent reviews from more than one hundred reviewers. Thirty two percent of the papers that were submitted received two reviews while all of the rest of the papers received three or more. Fifty-four EAs were accepted. Twenty-five posters were invited. All of the EAs, presentations and posters are included in our proceedings. The subject areas span the topics above and were organized into nine tracks: Security Assurance for EDS; Wide Area Mo

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [University of Idaho

2011-01-01T23:59:59.000Z

7

Cyber and physical infrastructure interdependencies.  

Science Conference Proceedings (OSTI)

The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

2008-09-01T23:59:59.000Z

8

Protecting Intelligent Distributed Power Grids Against Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a...

9

Data Diodes in Support of Trustworthy Cyber Infrastructure  

SciTech Connect

Interconnections between process control networks and en- terprise networks has resulted in the proliferation of stan- dard communication protocols in industrial control systems which exposes instrumentation, control systems, and the critical infrastructure components they operate to a variety of cyber attacks. Various standards and technologies have been proposed to protect industrial control systems against cyber attacks and to provide them with confidentiality, in- tegrity, and availability. Among these technologies, data diodes provide protection of critical systems by the means of physically enforcing traffic direction on the network. In order to deploy data diodes effectively, it is imperative to un- derstand the protection they provide, the protection they do not provide, their limitations, and their place in the larger security infrastructure. In this work, we briefly review the security challenges in an industrial control system, study data diodes, their functionalities and limitations, and pro- pose a scheme for their effective deployment in trusted pro- cess control networks (TPCNs.)

Sheldon, Frederick T [ORNL; Okhravi, Hamed [ORNL

2010-01-01T23:59:59.000Z

10

Optimizing investments in cyber-security for critical infrastructure  

Science Conference Proceedings (OSTI)

Investments in the cyber-security of critical infrastructure must balance preventing intrusion, detecting a cyber-attack, and mitigating the attacker's physical effects on computer controlled equipment. For this purpose, we outline a method for making ...

Ike Patterson; James Nutaro; Glenn Allgood; Teja Kuruganti; David Fugate

2013-01-01T23:59:59.000Z

11

Protecting users of the cyber commons  

Science Conference Proceedings (OSTI)

Establish a global cyber "neighborhood watch" enabling users to take defensive action to protect their operations.

Stephen J. Lukasik

2011-09-01T23:59:59.000Z

12

Advanced Metering Infrastructure Cyber Security Risks  

Science Conference Proceedings (OSTI)

The deployment of advanced metering infrastructure (AMI) systems is introducing millions of components to the electric grid that support two-way communication for next-generation grid applications. Although these systems can increase operational efficiencies and enable new capabilities such as demand-response, they also increase the attack surface for potential adversaries. Utilities must address these new cyber security risks as part of their overall enterprise risk management strategy. These ...

2013-12-23T23:59:59.000Z

13

The Cyber Threat to National Critical Infrastructures: Beyond Theory  

Science Conference Proceedings (OSTI)

Adversary threats to critical infrastructures have always existed during times of conflict, but threat scenarios now include peacetime attacks from anonymous computer hackers. Current events, including examples from Israel and Estonia, prove that a certain ... Keywords: Estonia, business continuity and disaster recover planning, critical, cyber, infrastructure, security architecture and design, telecommunications and network security threat

Kenneth Geers

2009-01-01T23:59:59.000Z

14

National Infrastructure Protection Plan  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Infrastructure Infrastructure Protection Plan 2006 Preface Preface i The ability to protect the critical infrastructure and key resources (CI/KR) of the United States is vital to our national security, public health and safety, economic vitality, and way of life. U.S. policy focuses on the importance of enhancing CI/KR protection to ensure that essential governmental missions, public services, and economic functions are maintained in the event of a

15

INL Cyber Security Research | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Research Cyber security research at INL will help protect critical infrastructure control system computers against worms and other viruses. INL Cyber Security Research More...

16

Critical Foundations: Protecting America's Infrastructures  

Science Conference Proceedings (OSTI)

Page 1. CRITICAL FOUNDATIONS PROTECTING AMERICA'S INFRASTRUCTURES The Report of the President's Commission ...

17

Data Diodes in Support of a Power Grid Trustworthy Cyber Infrastructure  

SciTech Connect

Industrial Control Systems (ICS) are an integral part of the industrial infrastructure providing for the national good. While sharing basic constructs with Information Technology (IT) business systems, ICSs are technically, administratively, and functionally more complex and unique than business IT systems. Critical infrastructure protection focuses on protecting and maintaining a safe and reliable supply of electric power, oil, water, gasoline, chemicals, food, etc. Cyber vul-nerabilities are important if they can affect the safe, functional performance of these systems and processes. The majority of ICS exhibit vulnerable devices with unsecured physical access and/or subject to insider attack. In this whitepaper, we advocate trusted process control networks as a way to address the serious cyber security flaws which combines both white/black listing into a design philosophy that addresses information warfare scenarios, software process monitoring and an attack recognition and management architecture.

Sheldon, Frederick T [ORNL; MacIntyre, Lawrence Paul [ORNL; Okhravi, Hamed [ORNL; Munson, Dr. John C. [Computer Measurement Laboratory, Inc.

2009-12-01T23:59:59.000Z

18

National Infrastructure Protection Plan  

E-Print Network (OSTI)

this context, our critical infrastructure and key resources (CIKR) may be directly exposed to the event themselves or indirectly exposed as a result of the dependencies and interde- pendencies among CIKR. Within the CIKR protection mission area, national priorities must include preventing catastrophic loss of life

Sen, Pradeep

19

TCIP: Trustworthy CyberInfrastructure for the Power Grid | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid The TCIP, or Trustworthy CyberInfrastructure for the Power Grid, project's vision is to provide the fundamental science and technology to create an intelligent, adaptive power grid which survives malicious adversaries, provides continuous delivery of power, and supports dynamically varying trust requirements. This goal may be reached by creating the cyber building blocks, architecture, and validation technology to quantify the amount of trust provided by a proposed approach. The presentation below was given by William H. Saunders at the Visualization and Controls Program Peer Review in October 2006. TCIP: Trustworthy CyberInfrastructure for the Power Grid

20

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Submission to NIST RFI for Critical Infrastructure Cyber ...  

Science Conference Proceedings (OSTI)

... Page 2 of 3 3. The forces that govern cyber security implementation, innovation and transformation are diffuse and widely distributed. ...

2013-04-10T23:59:59.000Z

22

CyberDesign & Infrastructure for Multiscale Modeling and Simulations  

Science Conference Proceedings (OSTI)

Multiscale cyber design methodology, which usually disparate entities such as material characterization, mechanical experimentation, material design, and...

23

Networks, deregulation, and risk : the politics of critical infrastructure protection  

E-Print Network (OSTI)

Standards for Critical Infrastructure Protection. Docket RMStandards for Critical Infrastructure Protection. Docket RM2- 13; GAO. ?Critical Infrastructure Protection: Multiple

Ellis, Ryan Nelson

2011-01-01T23:59:59.000Z

24

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

25

Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.  

Science Conference Proceedings (OSTI)

The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

Dawson, Lon Andrew; Stinebaugh, Jennifer A.

2010-04-01T23:59:59.000Z

26

Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor  

SciTech Connect

Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.

Ondrej Linda; Todd Vollmer; Jim Alves-Foss; Milos Manic

2011-08-01T23:59:59.000Z

27

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

28

The detailed evaluation criteria for designation of critical information infrastructure in the field of broadcasting and communication  

Science Conference Proceedings (OSTI)

Increasing to dependency on information infrastructures involves various threats to cyber incidents. Most of nations or organizations work on protect to not only infrastructure but also information infrastructure. Korea established Critical Information ... Keywords: CII (critical information infrastructure), CIIP (CII protection), cyber incident, cyber security, designation criteria, information assets

Soontai Park; Wan S. Yi; Bong-Nam Noh

2010-02-01T23:59:59.000Z

29

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

30

Integration of a system for critical infrastructure protection with the OSSIM SIEM platform: a dam case study  

Science Conference Proceedings (OSTI)

In recent years the monitoring and control devices in charge of supervising the critical processes of Critical Infrastructures have been victims of cyber attacks. To face such threat, organizations providing critical services are increasingly focusing ... Keywords: OSSIM, SIEM, critical infrastructure protection, dam

Luigi Coppolino; Salvatore D'Antonio; Valerio Formicola; Luigi Romano

2011-09-01T23:59:59.000Z

31

Lessons to Learn for U.S. Electric Grid Critical Infrastructure Protection: Organizational Challenges for Utilities in Identification of Critical Assets and Adequate Security Measures  

Science Conference Proceedings (OSTI)

The U.S. Federal Energy Regulatory Commission (FERC) approved the first critical infrastructure protection (CIP) standards for transmission and generation providers in January 2008. These standards require utilities to implement cyber security measures ...

Brian McKay

2011-01-01T23:59:59.000Z

32

Electric Drive Vehicle and Charging Infrastructure Demonstrations...  

NLE Websites -- All DOE Office Websites (Extended Search)

P t ti - Energy Critical Infrastructure Protection - Homeland Security and Cyber Security Nuclear 2 Hydropower Geothermal t t AVTA Participants and Goals P ti i t * Participants -...

33

Understanding cyber threats and vulnerabilities  

Science Conference Proceedings (OSTI)

This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was ... Keywords: actor, critical infrastructure, cyber crime, cyber terrorism, cyber threat, cyber vulnerabilities

Eric Luiijf

2012-01-01T23:59:59.000Z

34

Critical infrastructure protection: The vulnerability conundrum  

Science Conference Proceedings (OSTI)

Critical infrastructure and key resources (CIKR) refer to a broad array of assets which are essential to the everyday functionality of social, economic, political and cultural systems in the United States. The interruption of CIKR poses significant threats ... Keywords: Critical infrastructure, Fortification, Interdiction, Policy, Protection, Strategies, Vulnerability

Alan T. Murray; Tony H. Grubesic

2012-02-01T23:59:59.000Z

35

National Infrastructure Protection Plan | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Infrastructure Protection Plan Infrastructure Protection Plan National Infrastructure Protection Plan Protecting the critical infrastructure and key resources (CI/KR) of the United States is essential to the Nation's security, public health and safety, economic vitality, and way of life. Attacks on CI/KR could significantly disrupt the functioning of government and business alike and produce cascading effects far beyond the targeted sector and physical location of the incident. Direct terrorist attacks and natural, manmade, or technological hazards could produce catastrophic losses in terms of human casualties, property destruction, and economic effects, as well as profound damage to public morale and confidence. Attacks using components of the Nation's CI/KR as weapons of mass destruction could have even more

36

GAO-04-354, CRITICAL INFRASTRUCTURE PROTECTION: Challenges and Efforts to Secure Control Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report to Congressional Requesters Report to Congressional Requesters United States General Accounting Office GAO March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems GAO-04-354 www.gao.gov/cgi-bin/getrpt?GAO-04-354. To view the full product, including the scope and methodology, click on the link above. For more information, contact Robert F. Dacey at (202) 512-3317 or daceyr@gao.gov. Highlights of GAO-04-354, a report to congressional requesters March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems In addition to general cyber threats, which have been steadily increasing, several factors have contributed to the escalation of the risks of cyber attacks against control systems. These include the adoption of standardized

37

DOE to Provide Nearly $8 Million to Safeguard the Nations Energy Infrastructure from Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE))

U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically-advanced controls and cyber-security devices into our electric grid and energy infrastructure.

38

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

Science Conference Proceedings (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

39

Protecting Intelligent Distributed Power Grids against Cyber Attacks  

Science Conference Proceedings (OSTI)

Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

2010-12-31T23:59:59.000Z

40

Cyberwarfare on the Electricity Infrastructure  

SciTech Connect

The report analyzes the possibility of cyberwarfare on the electricity infrastructure. The ongoing deregulation of the electricity industry makes the power grid all the more vulnerable to cyber attacks. The report models the power system information system components, models potential threats and protective measures. It therefore offers a framework for infrastructure protection.

Murarka, N.; Ramesh, V.C.

2000-03-20T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

42

Public Power Infrastructure Protection Act (Nebraska) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Power Infrastructure Protection Act (Nebraska) Power Infrastructure Protection Act (Nebraska) Public Power Infrastructure Protection Act (Nebraska) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Nebraska Program Type Safety and Operational Guidelines Provider Nebraska Public Power District This statute affirms the state's commitment to protecting electric

43

Constructing vulnerabilty and protective measures indices for the enhanced critical infrastructure protection program.  

SciTech Connect

The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators of the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The NIPP framework incorporates consequence, threat, and vulnerability components and addresses all hazards. The analysis of the vulnerability data needs to be reproducible, support risk analysis, and go beyond protection. It also needs to address important security/vulnerability topics, such as physical security, cyber security, systems analysis, and dependencies and interdependencies. This report provides an overview of the approach being developed to estimate vulnerability and provide vulnerability comparisons for sectors and subsectors. the information will be used to assist DHS in analyzing existing protective measures and vulnerability at facilities, to identify potential ways to reduce vulnerabilities, and to assist in preparing sector risk estimates. The owner/operator receives an analysis of the data collected for a specific asset, showing a comparison between the facility's protection posture/vulnerability index and those of DHS sector/subsector sites visited. This comparison gives the owner/operator an indication of the asset's security strengths and weaknesses that may be contributing factors to its vulnerability and protection posture. The information provided to the owner/operator shows how the asset compares to other similar assets within the asset's sector or subsector. A 'dashboard' display is used to illustrate the results in a convenient format. The dashboard allows the owner/operator to analyze the implementation of additional protective measures and to illustrate how such actions would impact the asset's Protective Measures Index (PMI) or Vulnerability Index (VI).

Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.; Bassett, G. W.; Dickinson, D. C.; Haffenden, R. A.; Klett, M. S.; Lawlor, M. A.; Decision and Information Sciences; LANL

2009-10-14T23:59:59.000Z

44

A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes  

E-Print Network (OSTI)

and operation of an embedded sensor network (57 wirelessoperations and man-made infrastructure. Chapter 2: Wireless

Kerkez, Branko

2012-01-01T23:59:59.000Z

45

Protecting critical infrastructures while preserving each organization's autonomy  

Science Conference Proceedings (OSTI)

In critical infrastructures (CIs), different organizations must cooperate, while being mutually suspicious since they have different interests and can be in competition on some markets. Moreover, in most cases, there is no recognized authority that can ... Keywords: access control policies and models, collaboration, critical infrastructure protection, interoperability, security

Yves Deswarte

2011-02-01T23:59:59.000Z

46

DRAFT Outline - Preliminary Framework to Reduce Cyber ...  

Science Conference Proceedings (OSTI)

Page 1. 1 DRAFT Outline - Preliminary Framework to Reduce Cyber Risks to Critical Infrastructure, July 1, 2013 NOTES ...

2013-07-02T23:59:59.000Z

47

sSCADA: securing SCADA infrastructure communications  

Science Conference Proceedings (OSTI)

Distributed control systems (DCS) and supervisory control and data acquisition (SCADA) systems were developed to reduce labour costs, and to allow system-wide monitoring and remote control from a central location. Control systems ... Keywords: DCS, SCADA, authenticated broadcast channels, authenticated emergency channels, authentication, critical infrastructures, cyber attacks, data acquisition, distributed control systems, infrastructure protection, secure channels, secure communications, smart grid security, supervisory control

Yongge Wang

2011-12-01T23:59:59.000Z

48

Cyber Security Solutions for Instrumentation and Control Systems  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced as a result of continual threats to business and process control networks. Many standards have been drafted, undergone revision, and are being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection standards requirements of the North American Electric Reliability Corporation and related requirements in the international community. Compliance with ...

2012-12-12T23:59:59.000Z

49

Investigating the effectiveness of many-core network processors for high performance cyber protection systems. Part I, FY2011.  

SciTech Connect

This report documents our first year efforts to address the use of many-core processors for high performance cyber protection. As the demands grow for higher bandwidth (beyond 1 Gbits/sec) on network connections, the need to provide faster and more efficient solution to cyber security grows. Fortunately, in recent years, the development of many-core network processors have seen increased interest. Prior working experiences with many-core processors have led us to investigate its effectiveness for cyber protection tools, with particular emphasis on high performance firewalls. Although advanced algorithms for smarter cyber protection of high-speed network traffic are being developed, these advanced analysis techniques require significantly more computational capabilities than static techniques. Moreover, many locations where cyber protections are deployed have limited power, space and cooling resources. This makes the use of traditionally large computing systems impractical for the front-end systems that process large network streams; hence, the drive for this study which could potentially yield a highly reconfigurable and rapidly scalable solution.

Wheeler, Kyle Bruce; Naegle, John Hunt; Wright, Brian J.; Benner, Robert E., Jr.; Shelburg, Jeffrey Scott; Pearson, David Benjamin; Johnson, Joshua Alan; Onunkwo, Uzoma A.; Zage, David John; Patel, Jay S.

2011-09-01T23:59:59.000Z

50

Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks  

SciTech Connect

Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

Hartman, Steven M [ORNL

2012-01-01T23:59:59.000Z

51

Cyber-infrastructure to Support Science and Data Management for the Dark Energy Survey  

E-Print Network (OSTI)

The Dark Energy Survey (DES; operations 2009-2015) will address the nature of dark energy using four independent and complementary techniques: (1) a galaxy cluster survey over 4000 deg2 in collaboration with the South Pole Telescope Sunyaev-Zel'dovich effect mapping experiment, (2) a cosmic shear measurement over 5000 deg2, (3) a galaxy angular clustering measurement within redshift shells to redshift=1.35, and (4) distance measurements to 1900 supernovae Ia. The DES will produce 200 TB of raw data in four bands, These data will be processed into science ready images and catalogs and co-added into deeper, higher quality images and catalogs. In total, the DES dataset will exceed 1 PB, including a 100 TB catalog database that will serve as a key science analysis tool for the astronomy/cosmology community. The data rate, volume, and duration of the survey require a new type of data management (DM) system that (1) offers a high degree of automation and robustness and (2) leverages the existing high performance computing infrastructure to meet the project's DM targets. The DES DM system consists of (1) a grid-enabled, flexible and scalable middleware developed at NCSA for the broader scientific community, (2) astronomy modules that build upon community software, and (3) a DES archive to support automated processing and to serve DES catalogs and images to the collaboration and the public. In the recent DES Data Challenge 1 we deployed and tested the first version of the DES DM system, successfully reducing 700 GB of raw simulated images into 5 TB of reduced data products and cataloguing 50 million objects with calibrated astrometry and photometry.

C. Ngeow; J. J. Mohr; T. Alam; W. A. Barkhouse; C. Beldica; D. Cai; G. Daues; R. Plante; J. Annis; H. Lin; D. Tucker; R. C. Smith

2006-08-11T23:59:59.000Z

52

Cyber Security and Resilient Systems  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nations cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

53

Microsoft Word - OE Cyber Release 10 18 07.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These projects will

54

Ideal based cyber security technical metrics for control systems  

Science Conference Proceedings (OSTI)

Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provide the basis for management decisions that affect the protection of the ... Keywords: control system security, cyber security metrics

Wayne Boyer; Miles McQueen

2007-10-01T23:59:59.000Z

55

M.: On the impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems  

E-Print Network (OSTI)

The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of SCADA systems, today we still lack the proper understanding of the effects that cyber attacks have on NICS. In this paper we identify the communication and control logic implementation parameters that influence the outcome of attacks against NICS and that could be used as effective measures for increasing the resilience of industrial installations. The implemented scenario involves a powerful attacker that is able to send legitimate Modbus packets/commands to control hardware in order to bring the physical process into a critical state, i.e. dangerous, or more generally unwanted state of the system. The analysis uses a Boiling Water Power Plant to show that the outcome of cyber attacks is influenced by network delays, packet losses, background traffic and control logic scheduling time. The main goal of this paper is to start an exploration of cyber-physical effects in particular scenarios. This study is the first of its kind to analyze cyber-physical systems and provides insight to the way that the cyber realm affects the physical realm.

B. Genge; C. Siaterlis; M. Hohenadel; Bla Genge; Christos Siaterlis; Marc Hohenadel

2012-01-01T23:59:59.000Z

56

ICME: Informatics and Infrastructure  

Science Conference Proceedings (OSTI)

Oct 18, 2010... interfaces and data management systems that can be read by computers are important to enable a cyber infrastructure, their use in materials...

57

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

58

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

59

Cyber Security Solutions for Instrumentation and Control Systems, Topic 2: Patch Management and Automated Change Management  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced as a result of continual threats to business and process control networks. Many standards have been drafted, have undergone revision, and are being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection (CIP) standards requirements of the North American Electric Reliability Corporation (NERC) and related requirements in the international ...

2013-04-18T23:59:59.000Z

60

Cyber Security Solutions for Instrumentation and Control Systems, Topic 3: Security Status Monitoring  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced in response to continual threats to business and process control networks. Many standards have been drafted and subsequently revised and are now being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with the requirements set forth in the North American Electric Reliability Corporations Critical Infrastructure Protection standards and related requirements in the international ...

2013-11-08T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection  

Science Conference Proceedings (OSTI)

Critical Infrastructures, such as energy, banking, and transport, are an essential pillar to the well-being of the national and international economy, security and quality of life. These infrastructures are dependent on a spectrum of highly interconnected ... Keywords: Critical Information Infrastructure Protection, Network Security, Wireless Sensor Networks

Rodrigo Roman; Cristina Alcaraz; Javier Lopez

2007-01-01T23:59:59.000Z

62

21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 Steps to Improve Cyber Security of SCADA Networks 1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in cyber space today. By allowing the collection and analysis of data and control of equipment such as pumps and valves from remote locations, SCADA networks provide great efficiency and are widely used. However, they also present a security risk. 21 Steps to Improve Cyber Security of SCADA Networks

63

Simulation and test: Instruments for Critical Infrastructure Protection (CIP)  

Science Conference Proceedings (OSTI)

Simulation and evaluation of critical infrastructures for analysis and planning of processes and procedures increasing the robustness and fault tolerance of the overall infrastructure while limiting the overall cost are essential in an environment in ...

W. Schmitz

2007-01-01T23:59:59.000Z

64

THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519 THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519 Protecting unclassified information systems continues to...

65

Report of the Cyber Security Research Needs for Open Science...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Cyber Security Research Needs for Open Science Workshop Report of the Cyber Security Research Needs for Open Science Workshop Protecting systems and users, while maintaining...

66

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

2005-10-01T23:59:59.000Z

67

Critical infrastructure systems of systems assessment methodology.  

Science Conference Proceedings (OSTI)

Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies that separately consider physical security and cyber security. This research has developed a risk assessment methodology that explicitly accounts for both physical and cyber security, while preserving the traditional security paradigm of detect, delay, and respond. This methodology also accounts for the condition that a facility may be able to recover from or mitigate the impact of a successful attack before serious consequences occur. The methodology uses evidence-based techniques (which are a generalization of probability theory) to evaluate the security posture of the cyber protection systems. Cyber threats are compared against cyber security posture using a category-based approach nested within a path-based analysis to determine the most vulnerable cyber attack path. The methodology summarizes the impact of a blended cyber/physical adversary attack in a conditional risk estimate where the consequence term is scaled by a ''willingness to pay'' avoidance approach.

Sholander, Peter E.; Darby, John L.; Phelan, James M.; Smith, Bryan; Wyss, Gregory Dane; Walter, Andrew; Varnado, G. Bruce; Depoy, Jennifer Mae

2006-10-01T23:59:59.000Z

68

Development of the PowerCyber SCADA security testbed  

Science Conference Proceedings (OSTI)

Meeting current demands for critical infrastructure cyber security education and research will require accurate testbed development. The PowerCyber was designed to closely resemble power grid communication utilizing actual field devices and SCADA software. ...

Adam Hahn; Ben Kregel; Manimaran Govindarasu; Justin Fitzpatrick; Rafi Adnan; Siddharth Sridhar; Michael Higdon

2010-04-01T23:59:59.000Z

69

Chapter_14_Cyber_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

70

Protection of Coastal Infrastructure under Rising Flood Risk  

E-Print Network (OSTI)

The 2005 hurricane season was particularly damaging to the United States, contributing to significant losses to energy infrastructuremuch of it the result of flooding from storm surge during hurricanes Katrina and Rita. ...

Lickley, M.J.

71

On the protection and technologies of critical information infrastructures  

Science Conference Proceedings (OSTI)

Critical Infrastructures are complex and highly interconnected systems that are crucial for the well-being of the society. Any type of failure can cause significant damage, affecting one or more sectors due to their inherent interdependency. Not only ...

Javier Lopez; Cristina Alcaraz; Rodrigo Roman

2007-01-01T23:59:59.000Z

72

Microsoft Word - OE Cyber Release 10 18 07.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE to Provide Nearly 8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for...

73

Obama's Call for Public-Private Cyber Security Collaboration...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the...

74

NIST Finalizes Initial Set of Smart Grid Cyber Security ...  

Science Conference Proceedings (OSTI)

... guidelines is intended to facilitate organization-specific Smart Grid cyber security ... the nation's electric infrastructure to make it smarter, more efficient ...

2010-09-29T23:59:59.000Z

75

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

76

Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques -- Phishing  

E-Print Network (OSTI)

Phishing (password + fishing) is a form of cyber crime based on social engineering and site spoofing techniques. The name of 'phishing' is a conscious misspelling of the word 'fishing' and involves stealing confidential data from a user's computer and subsequently using the data to steal the user's money. In this paper, we study, discuss and propose the phishing attack stages and types, technologies for detection of phishing web pages, and conclude our paper with some important recommendations for preventing phishing for both consumer and company.

Gharibi, Wajeb

2012-01-01T23:59:59.000Z

77

White Paper: The Clinton Administration's Policy on Critical Infrastructure Protection: Presidential Decision Directive 63  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PAPER PAPER The Clinton Administration's Policy on Critical Infrastructure Protection: Presidential Decision Directive 63 May 22, 1998 WHITE PAPER The Clinton Administration's Policy on Critical Infrastructure Protection: Presidential Decision Directive 63 May 22, 1998 This White Paper explains key elements of the Clinton Administration's policy on critical infrastructure protection. It is intended for dissemination to all interested parties in both the private and public sectors. It will also be used in U.S. Government professional education institutions, such as the National Defense University and the National Foreign Affairs Training Center, for coursework and exercises on interagency practices and procedures. Wide dissemination of this unclassified White Paper is encouraged by all agencies of the U.S.

78

The Pentagon Shield Field Program: Toward Critical Infrastructure Protection  

Science Conference Proceedings (OSTI)

The Pentagon, and its 25,000+ occupants, represents a likely target for a future terrorist attack using chemical, biological, or radiological material released into the atmosphere. Motivated by this, a building-protection system, called Pentagon ...

Thomas Warner; Paul Benda; Scott Swerdlin; Jason Knievel; Jeff Copeland; Andrew Crook; Yubao Liu; Shane Mayor; Bruce Morley; Robert Sharman; Scott Spuler; Juanzhen Sun; Mei Xu; Al Yates; Ying Zhang; Edward Argenta; Bryan Aronian; James Bowers; Donald Storwold; Ben Balsley; Michael Jensen; Yannick Meillier; Roger Carter; Kirk Clawson; Pamela Clark; Rod Frehlich; Jeffrey Weil

2007-02-01T23:59:59.000Z

79

Proposed Comprehensive Cyber Security Legislation, May 2011  

Science Conference Proceedings (OSTI)

The role of cyber security in the critical infrastructures of the United States has been recognized by the President and by members of Congress. To address potential cyber security threats and vulnerabilities, the Senate has proposed revisions to specific laws and regulations. This white paper includes a technical assessment of some of the key proposed revisions.

2011-10-26T23:59:59.000Z

80

Metaphors for cyber security.  

SciTech Connect

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Hiring and Managing a Cyber Security Workforce:  

Science Conference Proceedings (OSTI)

... DHS cyber security workers and others from outside of ... Sell the mission! Protecting the US nuclear arsenal or the New York City water supply is a ...

2013-09-19T23:59:59.000Z

82

DOE Issues Energy Sector Cyber Organization NOI  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues National Energy Sector Cyber Organization Notice of Intent Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. The cyber organization is expected to have the knowledge, expertise, capabilities, and capacity, at a minimum to: * Identify and prioritize cyber security research and development issues.

83

New affordable options for infrastructure and asset protection  

Science Conference Proceedings (OSTI)

Securitas is one of the leaders evolving with technology and delivering new forms of affordable security for mining facilities. It was called in to protect a large mothballed coal mine in the central USA, the victim of repeated thefts. First, Mobile Surveillance Units (MSUs) were installed but thefts continued. Later, a new wireless video security system called Videofied which used MotionViewers which use infrared detectors to detect movement and send a 10 second clip of the intrusion to an operator. This led to the thieves being caught. 2 photos.

NONE

2009-09-15T23:59:59.000Z

84

A survey SCADA of and critical infrastructure incidents  

Science Conference Proceedings (OSTI)

In this paper, we analyze several cyber-security incidents involving critical infrastructure and SCADA systems. We classify these incidents based on Source Sector, Method of Operations, Impact, and Target Sector. Using this standardized taxonomy we can ... Keywords: critical infrastructure, cyber attack, cyber security, information assurance and security, scada, security

Bill Miller; Dale Rowe

2012-10-01T23:59:59.000Z

85

Influence of time-dependent factors in the evaluation of critical infrastructure protection measures.  

Science Conference Proceedings (OSTI)

The examination of which protective measures are the most appropriate to be implemented in order to prevent, protect against, respond to, and recover from attacks on critical infrastructures and key resources typically involves a comparison of the consequences that could occur when the protective measure is implemented to those that could occur when it is not. This report describes a framework for evaluation that provides some additional capabilities for comparing optional protective measures. It illustrates some potentially important time-dependent factors, such as the implementation rate, that affect the relative pros and cons associated with widespread implementation of protective measures. It presents example results from the use of protective measures, such as detectors and pretrained responders, for an illustrative biological incident. Results show that the choice of an alternative measure can depend on whether or not policy and financial support can be maintained for extended periods of time. Choice of a time horizon greatly influences the comparison of alternatives.

Buehring, W. A.; Samsa, M. E.; Decision and Information Sciences

2008-03-28T23:59:59.000Z

86

Cyber Incident Information | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Services » Guidance » Privacy » Cyber Incident Information Services » Guidance » Privacy » Cyber Incident Information Cyber Incident Information July 2013 Cyber Incident The Department of Energy has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information (PII). January 2013 Cyber Incident The Department of Energy (DOE) has confirmed a cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information (PII). Tips to Monitor Your Identity Here is a suggested list of tips to monitor and protect yourself. Assistive Technology Forms Guidance Capital Planning Information Collection Management

87

Lifecycle Management of Protection, Control and Associated Data Acquisition Infrastructure: Challenges and R&D Needs  

Science Conference Proceedings (OSTI)

Protection and control technologies are experiencing fundamental and revolutionary changes. In the transition from legacy electro-mechanical relays to the state of the art digital assets, utilities are facing the emerging challenges in the life-cycle management of a highly diverse and increasingly complicated P&C infrastructure. Most installed electro-mechanical devices are aging and close to their designed life cycle; meanwhile, new generation of microprocessor relays tend to have a much ...

2012-12-14T23:59:59.000Z

88

Publication and Protection of Sensitive Site Information in a Grid Infrastructure  

E-Print Network (OSTI)

Information in a Grid Infrastructure Shreyas Cholia Lawrencecreate a successful grid infrastructure, sites and resourcecan be used by the grid infrastructure for accounting and

Cholia, Shreyas

2008-01-01T23:59:59.000Z

89

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

90

Publication and Protection of Sensitive Site Information in a Grid Infrastructure  

Science Conference Proceedings (OSTI)

In order to create a successful grid infrastructure, sites and resource providers must be able to publish information about their underlying resources and services. This information makes it easier for users and virtual organizations to make intelligent decisions about resource selection and scheduling, and can be used by the grid infrastructure for accounting and troubleshooting services. However, such an outbound stream may include data deemed sensitive by a resource-providing site, exposing potential security vulnerabilities or private user information to the world at large, including malicious entities. This study analyzes the various vectors of information being published from sites to grid infrastructures. In particular, it examines the data being published to, and collected by the Open Science Grid, including resource selection, monitoring, accounting, troubleshooting, logging and site verification data. We analyze the risks and potential threat models posed by the publication and collection of such data. We also offer some recommendations and best practices for sites and grid infrastructures to manage and protect sensitive data.

Cholia, Shreyas; Cholia, Shreyas; Porter, R. Jefferson

2008-03-31T23:59:59.000Z

91

Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic  

Science Conference Proceedings (OSTI)

Networked critical infrastructures are of national importance. However, such infrastructures are running 24/7. The supervisory control and data acquisition system (SCADA) of the critical infrastructure will generate enormous network traffic continuously. ... Keywords: Critical infrastructure, Sampling, Traffic analysis

Abdun Naser Mahmood; Jiankun Hu; Zahir Tari; Christopher Leckie

2010-07-01T23:59:59.000Z

92

To appeared in "Securing Transportation Systems, Protecting Critical Infrastructures Series (Book)", 2012 On the Rationality and Optimality of Transportation  

E-Print Network (OSTI)

To appeared in "Securing Transportation Systems, Protecting Critical Infrastructures Series (Book)", 2012 On the Rationality and Optimality of Transportation Networks Defense -- a Network Centrality Eng., Ben-Gurion University {puzis,elovici}@bgu.ac.il 3 Transportation Research Institute, Technion

93

GAO-07-1036, CRITICAL INFRASTRUCTURE PROTECTION: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Congressional Requesters Congressional Requesters CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain September 2007 GAO-07-1036 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2007 CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain Highlights of GAO-07-1036, a report to congressional requesters Control systems-computer-based systems that monitor and control sensitive processes and physical functions-perform vital functions in many of our nation's critical infrastructures, including electric power, oil and gas, water treatment, and chemical production. The disruption of

94

Cyber Friendly Fire  

Science Conference Proceedings (OSTI)

Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public. The network is essentially divided into a production component that hosts the web and network services, and a user component that hosts thirty employee workstations and other end devices. The organization's network is separated from the Internet by a Cisco ASA network security device that both firewalls and detects intrusions. Business sensitive information is stored in various servers. This includes data comprising thousands of internal documents, such as finance and technical designs, email messages for the organization's employees including the CEO, CFO, and CIO, the organization's source code, and Personally Identifiable client data. Release of any of this information to unauthorized parties would have a significant, detrimental impact on the organization's reputation, which would harm earnings. The valuable information stored in these servers pose obvious points of interest for an adversary. We constructed several scenarios around this environment to support studies in cyber SA and cyber FF that may be run in the test range. We describe mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approaches. Finally, we discuss possible future research directions.

Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

2011-09-01T23:59:59.000Z

95

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

96

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

97

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

98

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

99

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

100

Collaborative Utility Task Force Partners with DOE to Develop Cyber  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Collaborative Utility Task Force Partners with DOE to Develop Cyber Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure The Advanced Metering Infrastructure Security (AMI-SEC) Task Force announces the release of the AMI System Security Requirements, a first-of-its-kind for the utility industry that will help utilities procure and implement secure components and systems using a common set of security requirements. Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure More Documents & Publications AMI System Security Requirements - v1_01-1 Before the Senate Energy and Natural Resources Committee

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

CYBER SECURITY AWARENESS & TRAINING Program Plan of Activity...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Publications IM-31, Policy, Guidance, and Planning Division Course Catalogue Cyber Tips Book Mark (2009 NCSA Month) Protect Your Family Brochure (Training and Awareness Materail)...

102

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

103

Infrastructure sectors and the information infrastructure  

Science Conference Proceedings (OSTI)

The protection of Critical Information Infrastructures (CIIs) is usually framed in the larger context of protecting all the Critical Infrastructures (CIs) that a Nation or a group of Nations (as is the case of the European Union) consider as essential ...

Andrea Glorioso; Andrea Servida

2012-01-01T23:59:59.000Z

104

Cyber Incidents Involving Control Systems  

Science Conference Proceedings (OSTI)

The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

Robert J. Turk

2005-10-01T23:59:59.000Z

105

Critical infrastructure protection decision support system decision model : overview and quick-start user's guide.  

SciTech Connect

The Critical Infrastructure Protection Decision Support System Decision Model (CIPDSS-DM) is a useful tool for comparing the effectiveness of alternative risk-mitigation strategies on the basis of CIPDSS consequence scenarios. The model is designed to assist analysts and policy makers in evaluating and selecting the most effective risk-mitigation strategies, as affected by the importance assigned to various impact measures and the likelihood of an incident. A typical CIPDSS-DM decision map plots the relative preference of alternative risk-mitigation options versus the annual probability of an undesired incident occurring once during the protective life of the investment, assumed to be 20 years. The model also enables other types of comparisons, including a decision map that isolates a selected impact variable and displays the relative preference for the options of interest--parameterized on the basis of the contribution of the isolated variable to total impact, as well as the likelihood of the incident. Satisfaction/regret analysis further assists the analyst or policy maker in evaluating the confidence with which one option can be selected over another.

Samsa, M.; Van Kuiken, J.; Jusko, M.; Decision and Information Sciences

2008-12-01T23:59:59.000Z

106

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

107

Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure  

SciTech Connect

Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

Suski, N; Wuest, C

2011-02-04T23:59:59.000Z

108

A Mathematical Framework for the Analysis of Cyber-Resilient Control Systems  

Science Conference Proceedings (OSTI)

The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security (IT) techniques to control system networks. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective. Little research has focused on the design of closed-loop dynamics that are resilient to cyber-attack. The majority of control system protection measures are concerned with how to prevent unauthorized access and protect data integrity. We believe that the ability to analyze how an attacker can effect the closed loop dynamics of a control system configuration once they have access is just as important to the overall security of a control system. To begin to analyze this problem, consistent mathematical definitions of concepts within resilient control need to be established so that a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and configuration can be made. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.

Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Fugate, David L [ORNL; Kisner, Roger [ORNL

2013-01-01T23:59:59.000Z

109

Cyber sleuths face off  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber sleuths face off Cyber sleuths face off Computer specialists will meet for a grueling week that combines state-of-the-art training with opportunities to team up, solve...

110

Training Module for Cyber Security in Nuclear Plant Digital Modifications  

Science Conference Proceedings (OSTI)

Nuclear power plants face increasing regulatory requirements from the U.S. Nuclear Regulatory Commission (NRC) and the Federal Energy Regulatory Commission (FERC) for cyber security of digital devices, components, and systems. The focus of these cyber security requirements is to protect plant digital computer systems, communications systems, and networks from cyber attacks that would affect reactor safety or generation reliability. This Electric Power Research Institute (EPRI) computer-based training mod...

2011-04-28T23:59:59.000Z

111

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

112

Control Systems Cyber Security Standards Support Activities  

Science Conference Proceedings (OSTI)

The Department of Homeland Securitys Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSPs current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

Robert Evans

2009-01-01T23:59:59.000Z

113

Integrating Infrastructure Planning: The Role of Schools  

E-Print Network (OSTI)

Integrating Infrastructure Planning: The Role of Schools B Ypolice protection, and infrastructure that makes citiesplan to upgrade critical infrastructure. The plan calls for

McKoy, Deborah; Vincent, Jeffrey M.; Makarewicz, Carrie

2008-01-01T23:59:59.000Z

114

Protecting critical infrastructure: implementing integration and expanding education: first prize: 2007 Schubmehl-Prein Essay contest  

Science Conference Proceedings (OSTI)

The tenuous network of interconnected data that supports our nation's critical infrastructure has been built up, computer by computer, over only the last few decades. From punch cards to the supercomputers constructed by pioneers in today's fields, computers ...

David A. Martinez

2008-03-01T23:59:59.000Z

115

Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure  

Science Conference Proceedings (OSTI)

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. ... Keywords: Computer Science, Security

Jack Wiles

2008-07-01T23:59:59.000Z

116

Virtual Queue Based Distributed Data Traffic Scheduling for Cyber Physical Systems with Application in Smart Grid  

Science Conference Proceedings (OSTI)

Communication is needed in cyber physical system (CPS) to convey information from sensors to controllers. In this paper, a wireless network is considered to serve as the communication infrastructure in CPS. The data traffic scheduling problem is studied ... Keywords: Kalman filtering, cyber physical system, scheduling

Husheng Li

2012-06-01T23:59:59.000Z

117

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

118

Stability of a cyber-physical smart grid system using cooperating invariants  

Science Conference Proceedings (OSTI)

Cyber-Physical Systems (CPS) consist of computational components interconnected by computer networks that monitor and control switched physical entities interconnected by physical infrastructures. Ensuring stability and correctness (both logical and ...

Ashish Choudhari, Harini Ramaprasad, Tamal Paul, Jonathan W. Kimball, Maciej Zawodniok, Bruce McMillin, Sriram Chellappan

2013-04-01T23:59:59.000Z

119

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

120

DOE O 205.1B Chg 2, Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. ...

2011-05-16T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure  

Science Conference Proceedings (OSTI)

Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider design principals and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Cryptographic keys must be securely exchanged, then held and protected on either end of a communications link. This is challenging for a utility with numerous substations that must secure the intelligent electronic devices (IEDs) that may comprise complex control system of systems. For example, distribution and management of keys among the millions of intelligent meters within the Advanced Metering Infrastructure (AMI) is being implemented as part of the National Smart Grid initiative. Without a means for a secure cryptographic key management system (CKMS) no cryptographic solution can be widely deployed to protect the EDS infrastructure from cyber-attack. We consider 1) how security modeling is applied to key management and cyber security concerns on a continuous basis from design through operation, 2) how trusted models and key management architectures greatly impact failure scenarios, and 3) how hardware-enabled trust is a critical element to detecting, surviving, and recovering from attack.

Duren, Mike [Sypris Electronics, LLC; Aldridge, Hal [ORNL; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL

2013-01-01T23:59:59.000Z

122

Toward an ontology framework supporting the integration of geographic information with modeling and simulation for critical infrastructure protection  

Science Conference Proceedings (OSTI)

Protecting the nation's infrastructure from natural disasters, inadvertent failures, or intentional attacks is a major national security concern. Gauging the fragility of infrastructure assets, and understanding how interdependencies across critical infrastructures affect their behavior, is essential to predicting and mitigating cascading failures, as well as to planning for response and recovery. Modeling and simulation (M&S) is an indispensable part of characterizing this complex system of systems and anticipating its response to disruptions. Bringing together the necessary components to perform such analyses produces a wide-ranging and coarse-grained computational workflow that must be integrated with other analysis workflow elements. There are many points in both types of work flows in which geographic information (GI) services are required. The GIS community recognizes the essential contribution of GI in this problem domain as evidenced by past OGC initiatives. Typically such initiatives focus on the broader aspects of GI analysis workflows, leaving concepts crucial to integrating simulations within analysis workflows to that community. Our experience with large-scale modeling of interdependent critical infrastructures, and our recent participation in a DRS initiative concerning interoperability for this M&S domain, has led to high-level ontological concepts that we have begun to assemble into an architecture that spans both computational and 'world' views of the problem, and further recognizes the special requirements of simulations that go beyond common workflow ontologies. In this paper we present these ideas, and offer a high-level ontological framework that includes key geospatial concepts as special cases of a broader view.

Ambrosiano, John J [Los Alamos National Laboratory; Bent, Russell W [Los Alamos National Laboratory; Linger, Steve P [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

123

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO)...

124

Cyber Security Summer School: Lessons for the Modern Grid | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid June 20, 2011 - 4:34pm Addthis Carol Hawk Program Manager, Cyber Security for Energy Delivery Systems What does this mean for me? Computer systems do more than store and share information. They help control our traffic lights, trains and specifically, our electric grid -- tasks for which continuous function is the primary concern. Protecting control systems on the grid from cyber attack requires a completely different approach to cyber security than information technology systems. The Cyber Summer School gave aspiring attendees a practical understanding of the connection between power systems and computer science required to secure a clean, reliable energy future.

125

CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection  

SciTech Connect

Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

Marco Carvalho; Richard Ford

2012-05-14T23:59:59.000Z

126

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

127

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

128

July 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a recent cyberincident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable...

129

January 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a recent cyberincident that occurred in mid-January 2013 which targeted the Headquarters'network and resulted in the unauthorized disclosure of...

130

Organized Cyber Defense Competitions  

Science Conference Proceedings (OSTI)

The Cyber Defense Exercise (CDX), an annual competition between students at the five U.S. Service Academies has developed into an extraordinary educational experience for the participants. During the exercise students will design and implement a realistic ...

Ronald C. Dodge JR; Daniel J. Ragsdale

2004-08-01T23:59:59.000Z

131

July 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information ...

132

Cyber Security Testing and Training Programs for Industrial Control Systems  

DOE Green Energy (OSTI)

Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

Daniel Noyes

2012-03-01T23:59:59.000Z

133

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

Robert P. Evans

2006-05-01T23:59:59.000Z

134

Energy: Critical Infrastructure and Key Resources Sector-Specific...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy: Critical Infrastructure and Key...

135

Energy Critical Infrastructure and Key Resources Sector-Specific...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy Critical Infrastructure and Key...

136

Technical Guideline for Cyber Security Requirements and Life Cycle Implementation Guidelines for Nuclear Plant Digital Systems  

Science Conference Proceedings (OSTI)

Nuclear power plants face increasing regulatory requirements from the U.S. Nuclear Regulatory Commission (NRC) and the Federal Energy Regulatory Commission (FERC) for cyber security of digital devices, components, and systems. The focus of these cyber security requirements is to protect plant digital computer systems, communications systems, and networks from cyber attacks that would affect reactor safety or generation reliability. This EPRI guideline document provides technical guidance for addressing c...

2010-10-29T23:59:59.000Z

137

The cyber-physical attacker  

Science Conference Proceedings (OSTI)

The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker ... Keywords: attacker model, cyber-physical systems, cyber-physical threats, security protocol verification

Roberto Vigo

2012-09-01T23:59:59.000Z

138

State Experience in Hydrogen Infrastructure in California  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Infrastructure in California Gerhard H Achtelik Jr. February 17, 2011 Hydrogen Infrastructure Market Readiness Workshop California Environmental Protection Agency Air...

139

Cyber Security Recommendations for Digital I&C Systems Within Power Generation Facilities Unregulated by North American Electric Rel iability Corporation Critical Infrastructure Protection  

Science Conference Proceedings (OSTI)

Fossil generating facilities represent a significant investment, as well as a primary source of revenue, for many electric utilities. The digital instrumentation and control (I&C) systems of these generation facilities are essential to their successful operations. As such, the security of digital I&C systems is fundamental to ensure continued, reliable production. It is therefore prudent to employ appropriate ...

2012-12-12T23:59:59.000Z

140

Obama's Call for Public-Private Cyber Security Collaboration Reflected in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obama's Call for Public-Private Cyber Security Collaboration Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities May 29, 2009 - 4:08pm Addthis In releasing the results of his Administration's 60-day cyber security review, President Barack Obama today emphasized that partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the computer-based systems that monitor and control the nation's electric grid and oil and gas pipelines remains a shared challenge for the Department of Energy. As the industry quickly works to develop and demonstrate Smart Grid technologies to build a more reliable and resilient

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Advanced Metering Infrastructure (AMI) System Security Requirements  

Science Conference Proceedings (OSTI)

This report identifies key cyber security requirements and suggests basic security approaches for safeguarding the many interfaces of Advanced Metering Infrastructure (AMI) systems. These requirements, which were developed through a clearly defined security assessment procedure, are generic; but they can be used to develop more specific security requirements based on actual configurations and environments.

2009-12-21T23:59:59.000Z

142

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines September 2, 2010 - 3:15pm Addthis WASHINGTON, D.C. - The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats. The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set

143

Summary report on transportation of nuclear fuel materials in Japan : transportation infrastructure, threats identified in open literature, and physical protection regulations.  

SciTech Connect

This report summarizes the results of three detailed studies of the physical protection systems for the protection of nuclear materials transport in Japan, with an emphasis on the transportation of mixed oxide fuel materials1. The Japanese infrastructure for transporting nuclear fuel materials is addressed in the first section. The second section of this report presents a summary of baseline data from the open literature on the threats of sabotage and theft during the transport of nuclear fuel materials in Japan. The third section summarizes a review of current International Atomic Energy Agency, Japanese and United States guidelines and regulations concerning the physical protection for the transportation of nuclear fuel materials.

Cochran, John Russell; Ouchi, Yuichiro (Japan Atomic Energy Agency, Japan); Furaus, James Phillip; Marincel, Michelle K.

2008-03-01T23:59:59.000Z

144

Cyber threat metrics.  

SciTech Connect

Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

2012-03-01T23:59:59.000Z

145

CSCE Specialty Conference on Infrastructure Technologies, Management and Policy confrence spcialise sur la gestion, les politiques et les technologies des infrastructures  

E-Print Network (OSTI)

of the recent developments focused primarily on individual infrastructure assets, such as nuclear power plants Cities are complex and dynamic system of systems in which interconnected cyber, physical, social disasters requires designing cities that combine seemingly opposite characteristics, including redundancy

Hammad, Amin

146

Agent-based Cyber Control Strategy Design for Resilient Control Systems: Concepts, Architecture and Methodologies  

SciTech Connect

The implementation of automated regulatory control has been around since the middle of the last century through analog means. It has allowed engineers to operate the plant more consistently by focusing on overall operations and settings instead of individual monitoring of local instruments (inside and outside of a control room). A similar approach is proposed for cyber security, where current border-protection designs have been inherited from information technology developments that lack consideration of the high-reliability, high consequence nature of industrial control systems. Instead of an independent development, however, an integrated approach is taken to develop a holistic understanding of performance. This performance takes shape inside a multiagent design, which provides a notional context to model highly decentralized and complex industrial process control systems, the nervous system of critical infrastructure. The resulting strategy will provide a framework for researching solutions to security and unrecognized interdependency concerns with industrial control systems.

Craig Rieger; Milos Manic; Miles McQueen

2012-08-01T23:59:59.000Z

147

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network (OSTI)

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

Krings, Axel W.

148

PACIFIC NORTHWEST CYBER SUMMIT  

SciTech Connect

On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energys (DOEs) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOEs Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.

Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.; Smith, Karen S.

2013-08-07T23:59:59.000Z

149

Defending Critical Infrastructure  

Science Conference Proceedings (OSTI)

We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions ... Keywords: bilevel program, critical infrastructure protection, homeland defense, homeland security, mixed-integer program, trilevel program

Gerald Brown; Matthew Carlyle; Javier Salmern; Kevin Wood

2006-11-01T23:59:59.000Z

150

Office of Infrastructure Protection  

Science Conference Proceedings (OSTI)

... Transport Produce Crude Oil Refined products ... PADD 2 Crude Stocks Over ... North American natural gas production areas and pipeline capacities ...

2009-12-21T23:59:59.000Z

151

Office of Infrastructure Protection  

Science Conference Proceedings (OSTI)

... National Laboratory and Cambridge Energy Research ... Price signals should remain the ... approximately 200,000 households without wireline ...

2009-12-21T23:59:59.000Z

152

Infrastructural Optimism  

E-Print Network (OSTI)

means envisioning a new mobility network that incorporatesproposed plans for new public mobility infrastructure. Among2 For them, New Orleans damaged mobility infrastructure was

Samuels, Linda C.

2009-01-01T23:59:59.000Z

153

Cyber Security Management Memorandum | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Management Memorandum Cyber Security Management Memorandum On December 7, 2009, the Deputy Secretary of Energy released this memorandum directing the creation of a...

154

THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002, IG-0569 THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002,...

155

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

156

Building the Next Generation of Cyber Defenders  

Science Conference Proceedings (OSTI)

Page 1. Building the Next Generation of Cyber Defenders ... 19th Century 20th Century The Cyber Security Problem Space ? Historic Background ...

2013-03-28T23:59:59.000Z

157

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

158

Technical Options to Address Cyber Security, Interoperability...  

NLE Websites -- All DOE Office Websites (Extended Search)

Technical Options to Address Cyber Security, Interoperability and Other Issues with ZigBee SEP Title Technical Options to Address Cyber Security, Interoperability and Other Issues...

159

RFI Comments - Advanced Cyber Security Center  

Science Conference Proceedings (OSTI)

Page 1. Page 1 of 3 Advanced Cyber Security Center Rollout ... The Need The advanced cyber threat is real and growing. ...

2013-04-09T23:59:59.000Z

160

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Security and Cyber Guidance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April...

162

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

163

DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS. Key Cyber...

164

The Department's Unclassified Cyber Security Program 2002, IG...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Unclassified Cyber Security Program 2002, IG-0567 The Department's Unclassified Cyber Security Program 2002, IG-0567 The Department's Unclassified Cyber Security Program 2002,...

165

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

NLE Websites -- All DOE Office Websites (Extended Search)

CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY...

166

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

167

DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues Energy Sector Cyber Organization NOI, Feb 2010 Issues Energy Sector Cyber Organization NOI, Feb 2010 DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. DOE Issues Energy Sector Cyber Organization NOI More Documents & Publications FAQ: Funding Opportunity Announcement-Smart Grid Investment Grants Grantsdown.xls Before the House Science and Technology Subcommittee on Energy and

168

Protect Your Family Brochure (Training and Awareness Material...  

NLE Websites -- All DOE Office Websites (Extended Search)

Family Brochure (Training and Awareness Material) Training and Awareness Material for Cyber Security. How to protect your family. Protect Your Family Brochure (Training and...

169

Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor  

Science Conference Proceedings (OSTI)

Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.

Ondrej Linda; Todd Vollmer; Jason Wright; Milos Manic

2011-04-01T23:59:59.000Z

170

Water, Neighborhoods and Urban Design: Micro-Utilities and the Fifth Infrastructure  

E-Print Network (OSTI)

and wastewater systems infrastructure to protect ourselvesand stresses caused by this infrastructure. New and evolvingMicro-Utilities and the Fifth Infrastructure V. Elmer and H.

Elmer, Vicki; Fraker, Harrison

2011-01-01T23:59:59.000Z

171

Simulating non-stationary congestion systems using splitting with applications to cyber security  

Science Conference Proceedings (OSTI)

According to the former counterterrorism czar, Richard A. Clarke (2010), our national infrastructure could be severely damaged in 15 minutes by a cyber attack. A worm attack on an Internet Protocol (IP) network is one type of attack that is possible. ...

Martin J. Fischer; Denise M. B. Masi; John F. Shortle; Chun-Hung Chen

2010-12-01T23:59:59.000Z

172

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

173

A nexus of Cyber-Geography and Cyber-Psychology: Topos/"Notopia" and identity in hacking  

Science Conference Proceedings (OSTI)

This paper explores the Cyber-Psychological and Cyber-Geographic aspects of hacking and hacktivism. An examination of the literature related to hackers and hacking reveals a complex nexus of spatial (including cyber-spatial such as ''Notopia'') and psychological ... Keywords: Cyber-Geography, Cyber-Identity, Cyber-Psychology, Hacking, Identity, Notopia

Fivos Papadimitriou

2009-11-01T23:59:59.000Z

174

Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms  

Science Conference Proceedings (OSTI)

Evolution in cloud services and infrastructure has been constantly reshaping the way we conduct business and provide services in our day to day lives. Tools and technologies created to improve such cloud services can also be used to impair them. By using ... Keywords: cloud computing infrastructure, cyber security, denial of service (DoS), game theory

Harkeerat Singh Bedi; Sajjan Shiva

2012-08-01T23:59:59.000Z

175

Towards a Distributed, Service-Oriented Control Infrastructure for Smart Grid  

Science Conference Proceedings (OSTI)

Smart Grid initiatives aim to overlay the existing power grid infrastructure with a communication and computation infrastructure to enable integration of renewable resources and increased efficiency and reliability of the electric power grid. This requires ... Keywords: Smart Grid, Cyber Physical Systems, Power System Informatics, Hard Real-Time Systems, Web Services, Model Transformation

Muhammad Umer Tariq; Santiago Grijalva; Marilyn Wolf

2011-04-01T23:59:59.000Z

176

Built Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Built Infrastructure Print E-mail Climate change and its associated impacts, including thawing permafrost, changing sea-levels, rising temperatures, shifts in species distribution...

177

Strengthening Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

E E n E rgyB i z November/December 2008 » TECHNOLOGY FRONTIER (Guest OpiniOn) remOte attaCks On systems that control power production and distribution are no longer hypothetical events. At least four utilities have been subjected to extortion demands by criminals who used the Internet to infect the utilities' computers and caused or threatened power outages. Cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption caused a power outage affecting multiple cities. These are criminal acts, but nation-states are actively targeting utility computers, as well, so that in time of war they can turn off their adversary's power. While all this is happening, most executives in the

178

Infrastructure as Landscape [Infrastructure as Landscape, Landscape as Infrastructure  

E-Print Network (OSTI)

for appropriating infrastructure as landscape offersPress, 1991). PLACES10:3 STRANG: INFRASTRUCTURE AS LANDSCAPEInfrastr Infrastructure and Landscape In 1964, cultural

Strang, Gary L

1996-01-01T23:59:59.000Z

179

Cyber-physical systems: imminent challenges  

Science Conference Proceedings (OSTI)

A German project is presented which was initiated in order to analyse the potential and risks associated with Cyber-Physical Systems. These have been recognised as the next wave of innovation in information and communication technology. Cyber-Physical ...

Manfred Broy; Mara Victoria Cengarle; Eva Geisberger

2012-03-01T23:59:59.000Z

180

Smart Manufacturing, Construction, and Cyber-Physical ...  

Science Conference Proceedings (OSTI)

Strategic Goal:Smart Manufacturing, Construction, and Cyber-Physical Systems. Enable the next generation of innovative ...

2013-01-03T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Booz Allen Hamilton Cyber Assurance Testing Laboratory  

Science Conference Proceedings (OSTI)

Booz Allen Hamilton Cyber Assurance Testing Laboratory. NVLAP Lab Code: 200423-0. Address and Contact Information: ...

2013-08-16T23:59:59.000Z

182

CIKR Cyber Information Sharing and Collaboration Program ...  

Science Conference Proceedings (OSTI)

Page 1. CIKR Cyber Information Sharing and Collaboration Program (CISCP) In order to meet the Department of Homeland ...

2013-07-16T23:59:59.000Z

183

Comprehensive National Cyber Security: Leap-Ahead ...  

Science Conference Proceedings (OSTI)

Comprehensive National Cyber Security: Leap-Ahead Security for Interconnected Systems (+10 FTE, +$5,500,000). Challenge. image: ...

2010-10-05T23:59:59.000Z

184

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

185

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

186

The economic impact of cyber terrorism  

Science Conference Proceedings (OSTI)

What is the economic impact of cyber terrorism? Can organizations achieve strategic advantage in the cyber terrorism game? A general game theoretical model is proposed to study the optimal information systems (ISs) security investment and then applied ... Keywords: Cyber terrorism, Game theory, Information systems security, Security investment

Jian Hua, Sanjay Bapna

2013-06-01T23:59:59.000Z

187

Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

Science Conference Proceedings (OSTI)

Our reliance on the cyber infrastructure has further grown and the dependencies have become more complex. The infrastructure and applications running on it are not generally governed by the rules of bounded systems and inherit the properties of unbounded systems, such as the absence of global control, borders and barriers. Furthermore, the quest for increasing functionality and ease of operation is often at the cost of controllability, potentially opening up avenues for exploitation and failures. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. In the presence of information explosion, i.e., the pervasive abundance of (public/private) information and the effects of such, intelligence has the potential to shift the advantages in the dynamic game of defense and attacks in cyber space. Gathering, analyzing, and making use of information constitutes a business-/sociopolitical-/military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace. The goal of the workshop is to establish, debate and challenge the far-reaching agenda that broadly and comprehensively outlines a strategy for cyber security and information intelligence that is founded on sound principles and technologies.

Sheldon, Frederick T [ORNL; Peterson, Greg D [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2009-01-01T23:59:59.000Z

188

Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies To Meet The Cyber Security And Information Intelligence Challenges Ahead  

Science Conference Proceedings (OSTI)

As our dependence on the cyber infrastructure grows ever larger, more complex and more distributed, the systems that compose it become more prone to failures and/or exploitation. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. Information explosion describes the pervasive abundance of (public/private) information and the effects of such. Gathering, analyzing, and making use of information constitutes a business- / sociopolitical- / military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace "mechanization." The goal of the workshop was to challenge, establish and debate a far-reaching agenda that broadly and comprehensively outlined a strategy for cyber security and information intelligence that is founded on sound principles and technologies. We aimed to discuss novel theoretical and applied research focused on different aspects of software security/dependability, as software is at the heart of the cyber infrastructure.

Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2008-01-01T23:59:59.000Z

189

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

190

Towards an Experimental Testbed Facility for Cyber-Physical Security Research  

Science Conference Proceedings (OSTI)

Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

2012-01-07T23:59:59.000Z

191

A learning outcome driven cyber infrastructure for thermodynamics education  

Science Conference Proceedings (OSTI)

The Web portal TEST, the Expert System for Thermodynamics (www.thermofluids.net) is a courseware that is being used in Engineering Thermodynamics classes by more than 2000 registered educators around the world. The courseware combines a number of resources: ... Keywords: assessment, learning outcomes, problem solving, thermodynamics

Subrata Bhattacharjee; Christopher Paolini; Mahesh Kumar

2012-07-01T23:59:59.000Z

192

Ensuring a Secure and Robust Cyber Infrastructure (+$43.4 ...  

Science Conference Proceedings (OSTI)

... the Federal Information Security Management Act are ... the President's FY 2012 budget calls for ... National Program Office for the National Strategy for ...

2011-02-14T23:59:59.000Z

193

Framework for Reducing Cyber Risks to Critical Infrastructure  

Science Conference Proceedings (OSTI)

... Policies and standards are published on an ... Law enforcement and the Federal Bureau of ... Duke Energy comments for Developing a Framework to ...

2013-04-08T23:59:59.000Z

194

Cyber Security Standards.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

195

Social infrastructure  

E-Print Network (OSTI)

Current urbanization patterns and aging transportation infrastructures have marginalized millions of US citizens. The result is that 4 .5 million US residents live within 100 meters of a four-lane highway' and have become ...

Kurlbaum, Ryan E. (Ryan Edward)

2013-01-01T23:59:59.000Z

196

Recommended Practice: Creating Cyber Forensics Plans for Control Systems  

SciTech Connect

Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.

Eric Cornelius; Mark Fabro

2008-08-01T23:59:59.000Z

197

Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

SciTech Connect

The Annual Cyber Security and Information Intelligence Research Workshop [CSIIRW] was be held at Oak Ridge National Laboratory in Oak Ridge, TN on April 21 - 23, 2010. The aim of this workshop is to introduce and discuss novel theoretical and empirical research focused on (the many) different aspects of software security/dependability, because as we know, the heart of the cyber infrastructure is software. As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value (wiki). The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. Cyber crime is a very serious and growing problem which now has an annual global turnover in the criminal world of more than 1000 BUSD [recent numbers from an FBI white paper] with the hardest hit industries being the banks and the insurance companies. A recent EU study of the banking world showed that more than 60% of cyber crime in banks was carried out by insiders of which ~65% by senior managers. Moreover, cyber security practice and policy is largely heuristic, reactive, and increasingly cumbersome, struggling to keep pace with rapidly evolving threats. Advancing beyond this reactive posture will require a transformation in computing and communication systems architecture and new capabilities that do not merely solve today s plethora of security enigmas, but enable comprehensive game-changing strategies [A Scientific R&D Approach to Cyber Security, C. Catlett, et al., Community-driven report submitted to the DOE, Dec. 2008]. The aim of this workshop is to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. We encourage the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the ever evolving context of cyberspace.

Sheldon, Frederick T [ORNL; Prowell, Stacy J [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2010-01-01T23:59:59.000Z

198

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Reports Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO),

199

Disaster-Resilient Buildings, Infrastructure, and Communities  

Science Conference Proceedings (OSTI)

... the nation's buildings and infrastructure clustered in disaster-prone regions ... to fires through innovative fire protection and response technologies and ...

2011-12-02T23:59:59.000Z

200

Cyber Assessment Methods for SCADA Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Systems Infrastructure (SYS 18)  

E-Print Network (OSTI)

Networked Sensing Systems Infrastructure John Hicks, Karencomponents The Systems Infrastructure team assembles, tests,

Richard Guy; John Hicks; Karen Weeks

2006-01-01T23:59:59.000Z

202

SYS 5: Systems Infrastructure  

E-Print Network (OSTI)

Networked Sensing Systems Infrastructure Kevin Chang, Johnnents The Systems Infrastructure team assembles, tests, and

2006-01-01T23:59:59.000Z

203

Assessment of current cybersecurity practices in the public domain : cyber indications and warnings domain.  

SciTech Connect

This report assesses current public domain cyber security practices with respect to cyber indications and warnings. It describes cybersecurity industry and government activities, including cybersecurity tools, methods, practices, and international and government-wide initiatives known to be impacting current practice. Of particular note are the U.S. Government's Trusted Internet Connection (TIC) and 'Einstein' programs, which are serving to consolidate the Government's internet access points and to provide some capability to monitor and mitigate cyber attacks. Next, this report catalogs activities undertaken by various industry and government entities. In addition, it assesses the benchmarks of HPC capability and other HPC attributes that may lend themselves to assist in the solution of this problem. This report draws few conclusions, as it is intended to assess current practice in preparation for future work, however, no explicit references to HPC usage for the purpose of analyzing cyber infrastructure in near-real-time were found in the current practice. This report and a related SAND2010-4766 National Cyber Defense High Performance Computing and Analysis: Concepts, Planning and Roadmap report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

204

Information and Communication Infrastructure  

Science Conference Proceedings (OSTI)

... The scope of cyber security spans many of the other ... Healthcare, Banking .and Finance., Emergency Services, Nuclear Reactors-Material-Waste ...

2011-08-02T23:59:59.000Z

205

Cyber Fit Pyramid for the home user. | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pyramid for the home user. Cyber Fit Pyramid for the home user. Cyber Fit Pyramid for the home user. Developed for Security Awareness materials for the Department Cyber Fit Pyramid...

206

National Infrastructure Simulation and Analysis Center Overview  

Science Conference Proceedings (OSTI)

National Infrastructure Simulation and Analysis Center (NISAC) mission is to: (1) Improve the understanding, preparation, and mitigation of the consequences of infrastructure disruption; (2) Provide a common, comprehensive view of U.S. infrastructure and its response to disruptions - Scale & resolution appropriate to the issues and All threats; and (3) Built an operations-tested DHS capability to respond quickly to urgent infrastructure protection issues.

Berscheid, Alan P. [Los Alamos National Laboratory

2012-07-30T23:59:59.000Z

207

Data Intensive Architecture for Scalable Cyber Analytics  

SciTech Connect

Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. It is necessary to have analytical tools to help analysts identify anomalies that span seconds, days, and weeks. Unfortunately, providing analytical tools effective access to the volumes of underlying data requires novel architectures, which is often overlooked in operational deployments. Our work is focused on a summary record of communication, called a flow. Flow records are intended to summarize a communication session between a source and a destination, providing a level of aggregation from the base data. Despite this aggregation, many enterprise network perimeter sensors store millions of network flow records per day. The volume of data makes analytics difficult, requiring the development of new techniques to efficiently identify temporal patterns and potential threats. The massive volume makes analytics difficult, but there are other characteristics in the data which compound the problem. Within the billions of records of communication that transact, there are millions of distinct IP addresses involved. Characterizing patterns of entity behavior is very difficult with the vast number of entities that exist in the data. Research has struggled to validate a model for typical network behavior with hopes it will enable the identification of atypical behavior. Complicating matters more, typically analysts are only able to visualize and interact with fractions of data and have the potential to miss long term trends and behaviors. Our analysis approach focuses on aggregate views and visualization techniques to enable flexible and efficient data exploration as well as the capability to view trends over long periods of time. Realizing that interactively exploring summary data allowed analysts to effectively identify events, we utilized multidimensional OLAP data cubes. The data cube structure supports interactive analysis of summary data across multiple dimensions, such as location, time, and protocol. Cube technology also allows the analyst to drill-down into the underlying data set, when events of interest are identified and detailed analysis is required. Unfortunately, when creating these cubes, we ran into significant performance issues with our initial architecture, caused by a combination of the data volume and attribute characteristics. Overcoming, these issues required us to develop a novel, data intensive computing infrastructure. In particular, we ended up combining a Netezza Twin Fin data warehouse appliance, a solid state Fusion IO ioDrive, and the Tableau Desktop business intelligence analytic software. Using this architecture, we were able to analyze a month's worth of flow records comprising 4.9B records, totaling approximately 600GB of data. This paper describes our architecture, the challenges that we encountered, and the work that remains to deploy a fully generalized cyber analytical infrastructure.

Olsen, Bryan K.; Johnson, John R.; Critchlow, Terence J.

2011-11-15T23:59:59.000Z

208

NNSA Seeking Comments on Consolidated IT and Cyber Security Support...  

NLE Websites -- All DOE Office Websites (Extended Search)

NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013...

209

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY...

210

INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION, IG-0531 INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION, IG-0531 The Office of Inspector...

211

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

212

Strategy for Improvements in Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strategy for Improvements in Cyber Security Strategy for Improvements in Cyber Security Brase-LLNL-SEAB.10.11.pdf More Documents & Publications Computational Advances in Applied...

213

A Scalable Framework for Cyber Attack Discovery and Situational...  

NLE Websites -- All DOE Office Websites (Extended Search)

Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

214

Office of Electricity Delivery and Energy Reliability Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On September 23, 2010, speaking at the inaugural GridWise...

215

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

216

Evaluation Report on The Department's Unclassified Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report on The Department's Unclassified Cyber Security Program 2002, DOEIG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOEIG-0567 As...

217

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

218

Office of Cyber Security Evaluations - Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Evaluations Reports to the Independent Oversight Program Mission and Functions Mission The Office of Cyber Security Evaluations is responsible for the independent...

219

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee...

220

Cyber Tips Book Mark (2009 NCSA Month) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sites Power Marketing Administration Other Agencies You are here Home Cyber Tips Book Mark (2009 NCSA Month) Cyber Tips Book Mark (2009 NCSA Month) Training and Awareness...

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Strategy for Improvements in Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Improvements in Cyber Security Strategy for Improvements in Cyber Security Brase-LLNL-SEAB.10.11.pdf More Documents & Publications Mobile Device Security Checklist Open...

222

Cyber Effects Analysis Using VCSE Promoting Control System Reliability...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Effects Analysis Using VCSE Promoting Control System Reliability Cyber Effects Analysis Using VCSE Promoting Control System Reliability This report describes the Virtual...

223

Common Cyber Security Vulnerabilities Observed in Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

224

Smart Grid Investment Grant Program (SGIG): Cyber Security Issues...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

(SGIG): Cyber Security Issues and Requirements, November 19, 2009 Smart Grid Investment Grant Program (SGIG): Cyber Security Issues and Requirements, November 19, 2009 Presentation...

225

Cyber Security Procurement Methodology, Rev. 1  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or unclear division of responsibilities between the utility and vendor can often result in costly retrofits to meet the ...

2013-12-17T23:59:59.000Z

226

Cyber Security Metrics and Measures abstract  

Science Conference Proceedings (OSTI)

Paul E. Black, Karen Scarfone, and Murugiah Souppaya, Cyber Security Metrics and Measures, in Wiley Handbook of Science and Technology for ...

2013-05-07T23:59:59.000Z

227

Computer Use Agreement, BNL Cyber Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Users Be aware of, knowledgeable about, and comply with the requirements of the BNL Cyber Security Program as described in SBMS. Follow BNL policy regarding the use and...

228

DOE Issues Energy Sector Cyber Organization NOI  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan....

229

Cybersecurity for Cyber-Physical Systems  

Science Conference Proceedings (OSTI)

... The second day will focus on cyber security needs of CPSs in the electric Smart Grid. ... NIST - Smart Grid http://www.nist.gov/smartgrid/. ...

2013-01-11T23:59:59.000Z

230

Transportation and its Infrastructure  

E-Print Network (OSTI)

Transport and its infrastructure Coordinating Lead Authors:5 Transport and its infrastructure Chandler, K. , E. Eberts,5 Transport and its infrastructure Sausen, R. , I. Isaksen,

2007-01-01T23:59:59.000Z

231

Transportation Infrastructure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Infrastructure Infrastructure New Technologies * Potential need for dual-use casks * DOE should look toward industry & international communities for innovations * Industry unclear about delivery & receipt locations * Advances in physical & tracking technologies need to be factored in * Cost-benefit analysis of new technology Training & Dry Runs * Begin as soon as possible * Suggested order: #1-demonstrations, #2-training, #3-dry-runs * Don't re-invent the wheel- look at international programs * Allows DOE to test POC info/training * Standardization of training & materials * DOE should consider centralized training center * Use real equipment in dry- runs * Need for regionalized dry runs Packages * Full-scale Testing - Funds requested in 2003, potential use of

232

Graph anomalies in cyber communications  

Science Conference Proceedings (OSTI)

Enterprises monitor cyber traffic for viruses, intruders and stolen information. Detection methods look for known signatures of malicious traffic or search for anomalies with respect to a nominal reference model. Traditional anomaly detection focuses on aggregate traffic at central nodes or on user-level monitoring. More recently, however, traffic is being viewed more holistically as a dynamic communication graph. Attention to the graph nature of the traffic has expanded the types of anomalies that are being sought. We give an overview of several cyber data streams collected at Los Alamos National Laboratory and discuss current work in modeling the graph dynamics of traffic over the network. We consider global properties and local properties within the communication graph. A method for monitoring relative entropy on multiple correlated properties is discussed in detail.

Vander Wiel, Scott A [Los Alamos National Laboratory; Storlie, Curtis B [Los Alamos National Laboratory; Sandine, Gary [Los Alamos National Laboratory; Hagberg, Aric A [Los Alamos National Laboratory; Fisk, Michael [Los Alamos National Laboratory

2011-01-11T23:59:59.000Z

233

Distribution System Cyber Security Architecture  

Science Conference Proceedings (OSTI)

The National Institute of Standards and Technology (NIST) has developed the NISTIR 7628: Guidelines for Smart Grid Cyber Security, while ASAP-SG has developed both the Security Profile for AMI (v2.0) and the Security Profile for Distribution Management. These documents are necessarily high level and generic, covering a broad range of smart grid assets, and focus exclusively on determining the security requirements. However, utilities and their vendors often cannot get a clear picture of what existing tec...

2010-12-31T23:59:59.000Z

234

Energy Infrastructure Events and Expansions Infrastructure Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Year-in-Review: 2010 Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability U.S....

235

Microgrid cyber security reference architecture.  

SciTech Connect

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

236

NIST Improves Tool for Hardening Software Against Cyber ...  

Science Conference Proceedings (OSTI)

NIST Improves Tool for Hardening Software Against Cyber Attack. From NIST Tech Beat: November 22, 2011. ...

2011-11-22T23:59:59.000Z

237

Cyber Security in Smart Grid Substations  

E-Print Network (OSTI)

Cyber Security in Smart Grid Substations Thijs Baars Lucas van den Bemd Michail Theuns Robin van.089 3508 TB Utrecht The Netherlands #12;CYBER SECURITY IN SMART GRID SUBSTATIONS Thijs Baars T.Brinkkemper@uu.nl Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands

Utrecht, Universiteit

238

Cyber Innovation Technology Summit | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Innovation Technology Summit Cyber Innovation Technology Summit Cyber Innovation Technology Summit November 5, 2013 8:00AM EST Course Title: Cyber Innovation Technology Summit Course Start/End Date: November 5, 2013 Start/End Time: 8:00AM-12:00 PM Course Type: Classrooom Course Location: Forrestal Large Auditorium Course Description: Every October and November, the Department of Energy (DOE) joins the Department of Homeland Security (DHS) and other federal, state and local agencies across the country in support of National Cybersecurity Awareness Month and the "Stop. Think. Connect." campaign. This year marks the tenth year of the cyber security awareness campaign. The theme for this year is Achieving Cybersecurity Together: It's Our Shared Responsibility. By consistently following simple

239

Security aspects of cyber-physical device safety in assistive environments  

Science Conference Proceedings (OSTI)

As more devices that affect their environment come into use, their proper functioning to protect the welfare of their charges is a concern. Examples include assistive transport devices, robotics, drug delivery systems, etc. Here privacy is not the primary ... Keywords: assistive-environments, cyber-physical systems, pervasive computing, safety, security, standards

Steven J. Templeton

2011-05-01T23:59:59.000Z

240

Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions  

Science Conference Proceedings (OSTI)

Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

Maiden, Wendy M.

2009-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks  

E-Print Network (OSTI)

CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

Tilaro, F

2011-01-01T23:59:59.000Z

242

National cyber defense high performance computing and analysis : concepts, planning and roadmap.  

SciTech Connect

There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

243

Cyber Security Evaluations Appraisal Process Guide - April 2008 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 April 2008 Cyber Security Evaluations Appraisal Process Guide was developed for the purpose of documenting the appraisal approach and techniques specific to evaluations of classified and unclassified cyber security programs throughout DOE. Office of Cyber Security Evaluations Appraisal Process Guide provides additional insight into the Office of Cyber Security Evaluations (HS-62) evaluation approach and processes associated with assessing classified and unclassified cyber security programs. The objective of this document is to establish a standard approach and methodology for conducting cyber security reviews that is well understood by all inspection participants.

244

Transportation Infrastructure and Sustainable Development  

E-Print Network (OSTI)

Transportation Infrastructure AND Sustainable Developmentnext two decades, urban infrastructure will be under immenseboth expansions in infrastructure that supports automobile

Boarnet, Marlon G.

2008-01-01T23:59:59.000Z

245

Security and Cyber Evaluations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential

246

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

247

Definition: Critical Cyber Assets | Open Energy Information  

Open Energy Info (EERE)

Related Terms Cyber Assets References Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline...

248

Cyber-Physical Challenges for Space Systems  

Science Conference Proceedings (OSTI)

Modern space systems necessarily have a tight coupling between onboard cyber (processing, communication) and physical (sensing, actuation) elements to survive the harsh extraterrestrial environment and successfully complete ambitious missions. This article ... Keywords: attitude control, communication, robotics, space systems

Andrew T. Klesh; James W. Cutler; Ella M. Atkins

2012-04-01T23:59:59.000Z

249

AMI Cyber Security Incident Response Guidelines  

Science Conference Proceedings (OSTI)

This document is intended to be used by system and asset owners to assist in the preparation and response to AMI cyber security incidents. This document was developed by conducting interviews with EPRI members, AMI asset owners, and vendors, regarding practices involved in responding to AMI cyber security incidents and mapping the responses to requirements put forth by the Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Open Smart Grid (Open-SG) Working ...

2012-12-07T23:59:59.000Z

250

Cyber Security Audit and Attack Detection Toolkit  

Science Conference Proceedings (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

251

Hydrogen and Infrastructure Costs  

NLE Websites -- All DOE Office Websites (Extended Search)

FUEL CELL TECHNOLOGIES PROGRAM Hydrogen and Infrastructure Costs Hydrogen Infrastructure Market Readiness Workshop Washington D.C. February 17, 2011 Fred Joseck U.S. Department of...

252

Location and Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Facts, Figures Location and Infrastructure Location and Infrastructure LANL's mission is to develop and apply science and technology to ensure the safety, security, and...

253

Microelectronics Manufacturing Infrastructure  

Science Conference Proceedings (OSTI)

... But the manufacturing infrastructure is aging. ... to create an integrated infrastructure for manufacturing ... will enhance the value and utility of portable ...

2011-10-19T23:59:59.000Z

254

East Coast Infrastructure  

U.S. Energy Information Administration (EIA)

East Coast Infrastructure. Uncheck or check an item to hide or show it in the map. ... InfrastructureEnergy Information Administration (GasTran System), ...

255

Cyber security exercises and competitions as a platform for cyber security experiments  

Science Conference Proceedings (OSTI)

This paper discusses the use of cyber security exercises and competitions to produce data valuable for security research. Cyber security exercises and competitions are primarily arranged to train participants and/or to offer competence contests for those ... Keywords: data collection, research method, security competitions, security exercises

Teodor Sommestad; Jonas Hallberg

2012-10-01T23:59:59.000Z

256

Intrusion Detection System for Advanced Metering Infrastructure  

Science Conference Proceedings (OSTI)

The deployment of Advanced Metering Infrastructure (AMI) technology significantly increases the attack surface that utilities have to protect. As a result, there is a critical need for efficient monitoring solutions to supplement protective measures and keep the infrastructure secure. This document investigates current industrial and academic efforts to address the challenge of detecting security events across the range of AMI networks and devices. The goal of this study is to help utilities and ...

2012-12-31T23:59:59.000Z

257

Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber security and information intelligence challenges and strategies  

SciTech Connect

As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information, which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value. The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. The aim of this workshop (www.csiir.ornl.gov/csiirw) was to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. Topics include: Scalable trustworthy systems Enterprise-level metrics Coping with insider and life-cycle threats Coping with malware and polymorphism Phishing/whaling, spam and cyber crime High assurance system survivability Cyber security for the Smart Grid Digital provenance and data integrity Privacy-aware security and usable security Social networking models for managing trust and security A principle goal of the workshop was to foster discussions and dialog among the 150 registered attendees from North America, Europe, Asia, and Africa. This goal was initiated and facilitated by 14 plenary keynote addresses including a banquet presentation and the CIO / CTO perspectives panel. A total of 98 papers (i.e., extended abstracts [EAs]) were submitted and 54 EAs were accepted plus 11 posters were invited. All of the abstracts and either presentation materials or posters are included in the proceedings. The subject areas span the topics above and were organized into eight tracks: Trust, Design, Malware, Network, Privacy and Metrics, Enterprise, Survivability and Formal Methods.

Sheldon, Frederick T [ORNL; Prowell, Stacy J [ORNL; Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2010-01-01T23:59:59.000Z

258

Energy Critical Infrastructure and Key Resources Sector-Specific  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Energy Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) May 2007 Department of Energy Energy Sector Government Coordinating Council Letter of Support i ii Energy Sector-Specific Plan (Redacted) Energy Sector Coordinating Councils Letter of Concurrence The National Infrastructure Protection Plan (NIPP) provides the unifying structure for the integration of federal critical infrastructures and key resources (CI/KR) protection efforts into a single national program. The NIPP includes an overall framework integrating federal programs and activities that are currently underway in the various sectors, as well as new and developing CI/KR protection efforts. The Energy

259

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Boot Camps The Cyber Boot Camp Program was developed to help make science and technology more exciting by treating students to hands-on experience and interaction with...

260

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical Systems Security for the Smart Grid...

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Energy Sector-Specific Plan: An Annex to the National Infrastructure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sector-Specific Plan: An Annex to the National Infrastructure Protection Plan Energy Sector-Specific Plan: An Annex to the National Infrastructure Protection Plan In its role as...

262

Small Business Cyber Security Workshop for Portland, Oregon ...  

Science Conference Proceedings (OSTI)

Page 1. Portland District Office Small Business Cyber Security Workshop Portland District Office 601 SW Second Ave. Suite ...

2013-07-24T23:59:59.000Z

263

NISTIR 7628 Volume 3, Guidelines for Smart Grid Cyber ...  

Science Conference Proceedings (OSTI)

Page 1. NISTIR 7628 Guidelines for Smart Grid Cyber Security: Vol. 3, Supportive Analyses and References The Smart ...

2012-03-01T23:59:59.000Z

264

NETL: Carbon Storage - Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Infrastructure Carbon Storage Infrastructure The Infrastructure Element of DOE's Carbon Storage Program is focused on research and development (R&D) initiatives to advance geologic CO2 storage toward commercialization. DOE determined early in the program's development that addressing CO2 mitigation on a regional level is the most effective way to address differences in geology, climate, population density, infrastructure, and socioeconomic development. This element includes the following efforts designed to support the development of regional infrastructure for carbon capture and storage (CCS). Click on Image to Navigate Infrastructure Content on this page requires a newer version of Adobe Flash Player. Get Adobe Flash player Regional Carbon Sequestration Partnerships (RCSP) - This

265

Security Issues and Challenges for Cyber Physical System  

Science Conference Proceedings (OSTI)

In this paper, we investigate the security challenges and issues of cyber-physical systems. (1)We abstract the general workflow of cyber physical systems, (2)identify the possible vulnerabilities, attack issues, adversaries characteristics and a set ... Keywords: Cyber-Physical System, Security, actuation, context-aware

Eric Ke Wang; Yunming Ye; Xiaofei Xu; S. M. Yiu; L. C. K. Hui; K. P. Chow

2010-12-01T23:59:59.000Z

266

DOE Cyber Security Role, Competency and Functional Matrix  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

267

The Department's Unclassified Cyber Security Program - 2012, IG-0877  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information technology resources continues to expand, the number of cyber security threats against Federal agencies has also increased. In fact, Federal cyber security officials have warned that the number of cyber attackers has increased and that the Nation's

268

Los Alamos director echoes cyber concerns  

NLE Websites -- All DOE Office Websites (Extended Search)

Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Director Charlie McMillan told a gathering of energy executives that securing the electrical grid is a major concern now and it's only becoming more serious. May 21, 2013 Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Contact Fred deSousa

269

Cyber Assessment Methods for SCADA Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

270

Interdependence of Electricity System Infrastructure and Natural...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Interdependence of Electricity System Infrastructure and Natural Gas Infrastructure - EAC 2011 Interdependence of Electricity System Infrastructure and Natural Gas Infrastructure -...

271

Improving Californias Infrastructure Services: The California Infrastructure Initiative  

E-Print Network (OSTI)

in the US to improve infrastructure planning, provision andtool for improving infrastructure planning, provision andBuilding Canada: Modern infrastructure for a Strong Canada (

David E. Dowall; Robin Ried

2008-01-01T23:59:59.000Z

272

A Strategy for Infrastructure: The California Infrastructure Initiative  

E-Print Network (OSTI)

has an enormous backlog of infrastructure investment needs,proposed two critical infrastructure policy institutions:and the Performance- Based Infrastructure Initiative (PBI

Dowall, David E.; Ried, Robin

2008-01-01T23:59:59.000Z

273

Modeling and simulation for cyber-physical system security research, development and applications.  

SciTech Connect

This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

2010-02-01T23:59:59.000Z

274

Russia's sorry infrastructure  

Science Conference Proceedings (OSTI)

The loss of the nuclear submarine Kursk and the fire in Moscow's TV tower are indications of an infrastructure in grievous disrepair. The outlook for Russia's technological infrastructure remains grim, experts insist. Almost 70 percent of the population ...

J. Oberg

2000-12-01T23:59:59.000Z

275

Financing infrastructure projects  

E-Print Network (OSTI)

Infrastructure is of great importance to the development and economic growth of communities. Due to the increased demand on sophisticated infrastructure, governments' budgets are not anymore able to satisfy this growing ...

Eid, Serge Emile

2008-01-01T23:59:59.000Z

276

Parking Infrastructure and the Environment  

E-Print Network (OSTI)

A B O U T how parking infrastructure affects energy demand,the extensive parking infrastructure, including the costs ofdata on parking infrastructure. For example, consider the

Chester, Mikhail; Horvath, Aprad; Madanat, Samer

2011-01-01T23:59:59.000Z

277

Biofuel Supply Chain Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Research Areas Freight Flows Passenger Flows Supply Chain Efficiency Transportation: Energy Environment Safety Security Vehicle Technologies The Infrastructure Challenge of...

278

Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues  

SciTech Connect

This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nations current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

Wayne F. Boyer; Scott A. McBride

2009-04-01T23:59:59.000Z

279

Simplifying cyber foraging for mobile devices  

Science Conference Proceedings (OSTI)

Cyber foraging is the transient and opportunistic use of compute servers bymobile devices. The short market life of such devices makes rapid modification of applications for remote execution an important problem. We describe a solution that combines ... Keywords: mobile computing, programmer productivity, rapid prototyping, retargeting applications, software engineering, user study

Rajesh Krishna Balan; Darren Gergle; Mahadev Satyanarayanan; James Herbsleb

2007-06-01T23:59:59.000Z

280

What are we teaching in cyber competitions?  

Science Conference Proceedings (OSTI)

Student competitions are widespread across all academic disciplines, and are often touted as a means to motivate and educate students. Competitions may be internal within a single class or course, or vie school against school as regional, national, or ... Keywords: Educational institutions,Computer security,Robots,Computers,Organizations,Programming,Security Education,Cyber,Competitions

Steven Fulton, Dino Schweitzer, Judson Dressler

2012-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Toward Developing Genetic Algorithms to Aid in Critical Infrastructure Modeling  

SciTech Connect

Todays society relies upon an array of complex national and international infrastructure networks such as transportation, telecommunication, financial and energy. Understanding these interdependencies is necessary in order to protect our critical infrastructure. The Critical Infrastructure Modeling System, CIMS, examines the interrelationships between infrastructure networks. CIMS development is sponsored by the National Security Division at the Idaho National Laboratory (INL) in its ongoing mission for providing critical infrastructure protection and preparedness. A genetic algorithm (GA) is an optimization technique based on Darwins theory of evolution. A GA can be coupled with CIMS to search for optimum ways to protect infrastructure assets. This includes identifying optimum assets to enforce or protect, testing the addition of or change to infrastructure before implementation, or finding the optimum response to an emergency for response planning. This paper describes the addition of a GA to infrastructure modeling for infrastructure planning. It first introduces the CIMS infrastructure modeling software used as the modeling engine to support the GA. Next, the GA techniques and parameters are defined. Then a test scenario illustrates the integration with CIMS and the preliminary results.

Not Available

2007-05-01T23:59:59.000Z

282

Public Works Transportation Infrastructure Study  

E-Print Network (OSTI)

Public Works Transportation Infrastructure Study Minneapolis City of Lakes Minneapolis Public Works Transportation Infrastructure Study #12;Public Works Transportation Infrastructure Study Minneapolis City Works Transportation Infrastructure Study Minneapolis City of Lakes Background: · Currently, funding

Minnesota, University of

283

Parallel digital forensics infrastructure.  

Science Conference Proceedings (OSTI)

This report documents the architecture and implementation of a Parallel Digital Forensics infrastructure. This infrastructure is necessary for supporting the design, implementation, and testing of new classes of parallel digital forensics tools. Digital Forensics has become extremely difficult with data sets of one terabyte and larger. The only way to overcome the processing time of these large sets is to identify and develop new parallel algorithms for performing the analysis. To support algorithm research, a flexible base infrastructure is required. A candidate architecture for this base infrastructure was designed, instantiated, and tested by this project, in collaboration with New Mexico Tech. Previous infrastructures were not designed and built specifically for the development and testing of parallel algorithms. With the size of forensics data sets only expected to increase significantly, this type of infrastructure support is necessary for continued research in parallel digital forensics. This report documents the implementation of the parallel digital forensics (PDF) infrastructure architecture and implementation.

Liebrock, Lorie M. (New Mexico Tech, Socorro, NM); Duggan, David Patrick

2009-10-01T23:59:59.000Z

284

ICME Infrastructure Challenges and Opportunities  

Science Conference Proceedings (OSTI)

... industrial-standard, robust infrastructure. Challenges and opportunities relative to an ICME infrastructure will be presented. Proceedings Inclusion? Undecided...

285

Fluxnet Synthesis Dataset Collaboration Infrastructure  

E-Print Network (OSTI)

Dataset Collaboration Infrastructure Deb Agarwal (LBNL),for the support infrastructure. As a result of this effort,

Agarwal, Deborah A.

2009-01-01T23:59:59.000Z

286

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber...

287

Cyber Framework NIST In Support of CIS 4-12-13  

Science Conference Proceedings (OSTI)

... April 12, 2013 Cyber Framework NIST ... Our state and local governments are on the front lines of the cyber battle every day. ...

2013-04-13T23:59:59.000Z

288

Cyber Security and Information Intelligence Research Workshop (CSIIRW'11) Proceedings  

SciTech Connect

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Moreover, Massachusetts Institute of Technology (MIT) released the results of a two-year study, The Future of the Electric Grid.

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2011-01-01T23:59:59.000Z

289

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

290

The NIAC Convergence of Physical and Cyber Technbologies and Related  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The NIAC Convergence of Physical and Cyber Technbologies and The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC convened the Physical/Cyber Convergence Working Group (CWG), in October 2005, to investigate the ongoing convergence of physical and cyber technologies for Supervisory Control and Data Acquisition (SCADA) and process control systems and their consolidated network management. The Working Group convened a Study Group of subject matter experts to inform its work. The Working Group report informed the NIAC's deliberations. The NIAC Convergence of Physical and Cyber Technbologies and Related

291

NSS Labs - NIST: Cyber Security Framework RFI  

Science Conference Proceedings (OSTI)

... All rights reserved. 8 Page 9. ... upon other critical physical and information infrastructures, including telecommunications, energy, financial services ...

2013-04-10T23:59:59.000Z

292

Cyber Security: Innovative Technologies for National Security  

Science Conference Proceedings (OSTI)

... infrastructurestransportation, financial, power grids, military ... is inherently an open network, these systems ... dollars in direct losses, downtime, stolen ...

2010-10-05T23:59:59.000Z

293

Cyber Security Procurement Methodology for Power Delivery Systems  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new power delivery systems requires cyber security experts, power system engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly backfit to meet requirements.The Electric Power Research ...

2012-12-31T23:59:59.000Z

294

Shopping For Danger: E-commerce techniques applied to collaboration in cyber security  

SciTech Connect

Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today, but it is uncommonly practiced or encouraged in operating environments. Barriers to productive collaboration often include data sensitivity, time and effort to communicate, institutional policy, and protection of domain knowledge. We propose an ambient collaboration framework, Vulcan, designed to remove the barriers of time and effort and mitigate the others. Vulcan automated data collection, collaborative filtering, and asynchronous dissemination, eliminating the effort implied by explicit collaboration among peers. We instrumented two analytic applications and performed a mock analysis session to build a dataset and test the output of the system.

Bruce, Joseph R.; Fink, Glenn A.

2012-05-24T23:59:59.000Z

295

Enhancing NASA Cyber Security Awareness From the C-Suite ...  

Science Conference Proceedings (OSTI)

... Leadership concerns with IT security impacts ? Cyber Security Summit Full day of workshops / panel sessions on transformation of IT / IT security ...

2013-03-28T23:59:59.000Z

296

Cyber-Enabled Materials Simulations via NanoHUB.org  

Science Conference Proceedings (OSTI)

Symposium, Integrating and Leveraging Collaborative Efforts for ICME Education . Presentation Title, Cyber-Enabled Materials Simulations via NanoHUB.org.

297

The NIAC Convergence of Physical and Cyber Technbologies and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC Convergence of Physical...

298

The Department of Energy Launches Cyber Security Initiative ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

launching an initiative to enhance cyber security on the electric grid. The initiative, led by the Department's Office of Electricity Delivery and Energy Reliability (OE), the...

299

DOE P 205.1, Departmental Cyber Security Management Policy  

Directives, Delegations, and Requirements

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security ...

2001-05-08T23:59:59.000Z

300

Lab hosts multi-lab cyber security games  

NLE Websites -- All DOE Office Websites (Extended Search)

Joint Cyber Coordination Center, or JC3. The JC3 is focused on improving the national response to threats, leveraging complex resources, and sharing information to meet...

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

NERSC Cyber Security Challenges That Require DOE Development and Support  

E-Print Network (OSTI)

network segments. Table 1. Network Comparison: NERSC vs.Large Corporation NERSC External Network Traffic patternsLBNL-62284 NERSC Cyber Security Challenges That Require DOE

Draney, Brent; Campbell, Scott; Walter, Howard

2008-01-01T23:59:59.000Z

302

Cyber Security Audit and Attack Detection Toolkit: National SCADA...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and...

303

Proceedings of the Cybersecurity in Cyber-Physical Workshop ...  

Science Conference Proceedings (OSTI)

... modes of operation (such as home health setting ... temperature, pressure, and cooling/heating rates. ... other cyber-physical domains (ie oil/ natural gas ...

2013-02-14T23:59:59.000Z

304

NISTIR 7628 Volume 2, Guidelines for Smart Grid Cyber ...  

Science Conference Proceedings (OSTI)

... Volume 1 Smart Grid Cyber Security Strategy, Architecture, and High-Level ... Appendix F Logical Architecture and Interfaces of the Smart Grid ...

2012-03-01T23:59:59.000Z

305

Low-Latency Cryptographic Protection for SCADA Communications  

E-Print Network (OSTI)

Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors including power, gas, oil, and water. However, SCADA networks generally have little protection from the rising danger of cyber attack. A retrofit solution to protect existing SCADA communications links must assure the integrity of commands and responses that are typically transmitted over serial lines at speeds from 300 to 19200 bits per second, while introducing minimal additional latency into the real-time SCADA traffic. This paper describes the key aspects of a cryptographic protocol for retrofit SCADA link protection that leverages the Cyclic Redundancy Checks (CRC) transmitted by existing SCADA equipment to achieve strong integrity while introducing minimal latency. The protocol is based on a new position embedding encryption mode which, for a b-bit block cipher, ensures that any unauthentic message an adversary can construct (i) includes at least b randomly chosen bits, and therefore, by a new result proved for error detection by systematic shortened cyclic codes, (ii) contains a correct h-bit CRC with probability 2 ?h. The low speed of the communications channel limits the rate at which an adversary can make trials, enabling detection of potential attacks before enough trials can be made to achieve any significant likelihood of success. The protocol avoids the need for a decrypting link protection module to buffer decrypted data until an end-of-message integrity check is verified, which would otherwise add significant latency. 1

Andrew K. Wright; John A. Kinast; Joe Mccarty

2004-01-01T23:59:59.000Z

306

Infrastructure Operation Report  

E-Print Network (OSTI)

e-Infrastructures for scientific communitiesD4Science No. 212488 www.d4science.eu DOCUMENT INFORMATION Project Project acronym: Project full title:

Dsa. B; Pedro Andrade; Pedro Andrade; Pasquale Pagano; Andrea Manieri

2009-01-01T23:59:59.000Z

307

Hydrogen Transition Infrastructure Analysis  

DOE Green Energy (OSTI)

Presentation for the 2005 U.S. Department of Energy Hydrogen Program review analyzes the hydrogen infrastructure needed to accommodate a transitional hydrogen fuel cell vehicle demand.

Melendez, M.; Milbrandt, A.

2005-05-01T23:59:59.000Z

308

Physical Infrastructure: Connections  

Science Conference Proceedings (OSTI)

... Due to years of limited investment and maintenance, the US transportation infrastructure network (including approximately 6.5 million kilometers of ...

2012-10-05T23:59:59.000Z

309

Office of Security and Cyber Evaluations  

NLE Websites -- All DOE Office Websites (Extended Search)

Welcome to the Office of Security and Cyber Evaluations The Office of Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential differences in approach since your last interaction with us.

310

Extensible, Self-Optimizing Phase Equilibrium Infrastructure (ESPEI)  

Science Conference Proceedings (OSTI)

Cyber-Enabled Ab Initio Simulations in Nanohub.org: Simulation Tools and Learning Modules Cyber-Enabled Materials Simulations Via Nanohub.org.

311

An Advanced Decision Support Tool for Electricity Infrastructure Operations  

Science Conference Proceedings (OSTI)

Electricity infrastructure, as one of the most critical infrastructures in the U.S., plays an important role in modern societies. Its failure would lead to significant disruption of peoples lives, industry and commercial activities, and result in massive economic losses. Reliable operation of electricity infrastructure is an extremely challenging task because human operators need to consider thousands of possible configurations in near real-time to choose the best option and operate the network effectively. In todays practice, electricity infrastructure operation is largely based on operators experience with very limited real-time decision support, resulting in inadequate management of complex predictions and the inability to anticipate, recognize, and respond to situations caused by human errors, natural disasters, or cyber attacks. Therefore, a systematic approach is needed to manage the complex operational paradigms and choose the best option in a near-real-time manner. This paper proposes an advanced decision support tool for electricity infrastructure operations. The tool has the functions of turning large amount of data into actionable information to help operators monitor power grid status in real time; performing trend analysis to indentify system trend at the regional level or system level to help the operator to foresee and discern emergencies, studying clustering analysis to assist operators to identify the relationships between system configurations and affected assets, and interactively evaluating the alternative remedial actions to aid operators to make effective and timely decisions. This tool can provide significant decision support on electricity infrastructure operations and lead to better reliability in power grids. This paper presents examples with actual electricity infrastructure data to demonstrate the capability of this tool.

Chen, Yousu; Huang, Zhenyu; Wong, Pak C.; Mackey, Patrick S.; Allwardt, Craig H.; Ma, Jian; Greitzer, Frank L.

2010-01-31T23:59:59.000Z

312

The UNICORE Grid infrastructure  

Science Conference Proceedings (OSTI)

UNICORE (Uniform Interface to Computer Resources) is a software infrastructure supporting seamless and secure access to distributed resources. UNICORE allows uniform access to different hardware and software platforms as well as different organizational ... Keywords: Abstract Job, HPC portal, Java, UNICORE, grid infrastructure, seamless access

Mathilde Romberg

2002-04-01T23:59:59.000Z

313

NIST Manuscript Publication Search  

Science Conference Proceedings (OSTI)

... Title: The Economic Benefits from Improved Cyber Security Infrastructure. ... Pages: 6 pp. Keywords: cyber security; economic; cyber infrastructure. ...

2013-05-22T23:59:59.000Z

314

Energy Department Announces New Investments of Over $30 Million...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Over 30 Million to Better Protect the Nation's Critical Infrastructure from Cyber Attack Energy Department Announces New Investments of Over 30 Million to Better Protect the...

315

Discovering collaborative cyber attack patterns using social network analysis  

Science Conference Proceedings (OSTI)

This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle ... Keywords: collaborative attacks, degree centrality, hierarchical clustering, network security

Haitao Du; Shanchieh Jay Yang

2011-03-01T23:59:59.000Z

316

Theorem-based, data-driven, cyber event detection  

Science Conference Proceedings (OSTI)

Nonlinear dynamics and graph theory may provide a theorem-based path to improve design security and aid detection of anomalous events in cyber applications. Using side-channel information such as power taken from underlying computer components and analyzing ... Keywords: cyber anomaly detection, graph theory, nonlinear dynamics, phasespace analysis, power measurement

Lee M. Hively; J. Todd McDonald

2013-01-01T23:59:59.000Z

317

Time-based intrusion detection in cyber-physical systems  

Science Conference Proceedings (OSTI)

Embedded systems, particularly real-time systems with temporal constraints, are increasingly deployed in every day life. Such systems that interact with the physical world are also referred to as cyber-physical systems (CPS). These systems commonly find ... Keywords: cyber-physical systems, real-time systems, security, timing analysis

Christopher Zimmer; Balasubramanya Bhat; Frank Mueller; Sibin Mohan

2010-04-01T23:59:59.000Z

318

Cyber-physical energy systems: focus on smart buildings  

Science Conference Proceedings (OSTI)

Operating at the intersection of multiple sensing and control systems designed for occupant comfort, performability and operational efficiency, modern buildings represent a prototypical cyber-physical system with deeply coupled embedded sensing and networked ... Keywords: LEED, ZNEB, buildings, cyber-physical, embedded, energy management, energy metering, smart grid

Jan Kleissl; Yuvraj Agarwal

2010-06-01T23:59:59.000Z

319

Review: From wireless sensor networks towards cyber physical systems  

Science Conference Proceedings (OSTI)

In the past two decades, a lot of research activities have been dedicated to the fields of mobile ad hoc network (MANET) and wireless sensor networks (WSN). More recently, the cyber physical system (CPS) has emerged as a promising direction to enrich ... Keywords: Cyber physical system, Internet technology, Mobile ad hoc network, Pervasive computing, Sensing and actuation, Wireless sensor network

Fang-Jing Wu; Yu-Fen Kao; Yu-Chee Tseng

2011-08-01T23:59:59.000Z

320

Cyber-Terrorism and Ethical Journalism: A Need for Rationalism  

Science Conference Proceedings (OSTI)

Terrorism has been a constant threat in traditional and contemporary societies. Recently, it has been converged with new media technology and cyberspace, resulting in the modern tactic, cyber-terrorism, which has become most effective in achieving terrorist ... Keywords: Computer Security, Cyber-Terrorism, Decision-Making, Ethics, Game Theory, Journalism, Rationality

Mahmoud Eid

2010-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Embedded Cyber-Physical Anomaly Detection in Smart Meters  

E-Print Network (OSTI)

Embedded Cyber-Physical Anomaly Detection in Smart Meters Massimiliano Raciti, Simin Nadjm vulnerabilities that arise from deployment of local cyber-physical attacks at a smart metering location at destabilisation. In this paper we study a smart metering device that uses a trusted platform for storage

322

Deception used for Cyber Defense of Control Systems  

Science Conference Proceedings (OSTI)

Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

Wayne F. Boyer; Miles A. McQueen

2009-05-01T23:59:59.000Z

323

Scanning the Technology Energy Infrastructure Defense Systems  

E-Print Network (OSTI)

of their own telecommunications systems, which often consist of backbone fiber-optic or microwave connectingScanning the Technology Energy Infrastructure Defense Systems MASSOUD AMIN, SENIOR MEMBER, IEEE systems and to develop de- fense plans to protect the network against extreme contingencies caused

Amin, S. Massoud

324

Thermal Spray Coatings for Coastal Infrastructure  

Science Conference Proceedings (OSTI)

Several protection strategies for coastal infrastructure using thermal-spray technology are presented from research at the Albany Research Center. Thermal-sprayed zinc coatings for anodes in impressed current cathodic protection systems are used to extend the service lives of reinforced concrete bridges along the Oregon coast. Thermal-sprayed Ti is examined as an alternative to the consumable zinc anode. Sealed thermal-sprayed Al is examined as an alternative coating to zinc dust filled polyurethane paint for steel structures.

Holcomb, G.R.; Covino, BernardS. Jr.; Cramer, S.D.; Bullard, S.J.

1997-11-01T23:59:59.000Z

325

PNNL Electricity Infrastructure Operations Center | Open Energy...  

Open Energy Info (EERE)

Electricity Infrastructure Operations Center Jump to: navigation, search Logo: Electricity Infrastructure Operations Center Name Electricity Infrastructure Operations Center...

326

Cyber Effects Analysis Using VCSE Promoting Control System Reliability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Effects Analysis Using VCSE Promoting Control System Cyber Effects Analysis Using VCSE Promoting Control System Reliability Cyber Effects Analysis Using VCSE Promoting Control System Reliability This report describes the Virtual Control System Environment (VCSE) technology- developed at Sandia National Laboratories-to investigate Supervisory Control And Data Acquisition (SCADA) vulnerabilities associated with energy systems; and it describes a set of experiments with findings from using that environment. The report explains how VCSE can be used to analyze and develop an understanding of cyber attacks. Specific analyses in this report focus on unencrypted, unsecured data channels on Internet protocol (IP)-routed computer networks within electric power systems. Cyber Effects Analysis Using VCSE Promoting Control System Reliability

327

The Department's Cyber Security Incident Management Program, IG-0787 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

328

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

329

NCSec: a national cyber security referential for the development of a code of practice in national cyber security management  

Science Conference Proceedings (OSTI)

Governments worldwide have faced computer security challenges. These challenges are serious in a context where there is an absence of appropriate organizational and institutional structures to deal with incidents. But more important which agency or agencies ... Keywords: ISO27002, cyber criminality, cyber security, organizational structure, referential

Mohamed Dafir Ech-cherif el Kettani; Taieb Debbagh

2008-12-01T23:59:59.000Z

330

Innovations in Nuclear Infrastructure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovations in Nuclear Infrastructure Innovations in Nuclear Infrastructure and Education (INIE) Innovations in Nuclear Infrastructure and Education (INIE) Presented to the Nuclear Energy Research Advisory Committee Crystal City, Virginia John Gutteridge Director, University Programs Office of Nuclear Energy, Science and Technology September 30 - October 1, 2002 Office of Nuclear Energy, Science and Technology Gutteridge/Sep-Oct_02 INIE-NERAC.ppt (2) INIE The Stimuli .... INIE The Stimuli .... 6 Declining number of operating university research/training reactors 6 Dwindling student population in nuclear engineering 6 Closing or loss of identity of university nuclear engineering programs 6 Looming shortage of nuclear engineering graduates 6 Threat of additional reactor closures -- Cornell, Michigan, MIT

331

Geographically-Based Infrastructure Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Infrastructure Analysis Margo Melendez & Keith Parks January 26, 2006 Geographically-Based Infrastructure Analysis (GIA) Utilizes GIS, geographically segregated data, and transition expertise to add the spatial component to infrastructure analysis NREL Core Competencies * Geographic data, tools, and expertise * Flexibility to address a wide array of transition issues NREL Capability Diagram Geographically-based Infrastructure Analysis GIS Transportation Technologies & Systems Electric & Hydrogen Technologies Energy Analysis Office GIA Activities Previous and Ongoing * HYDS ME - Evaluates best infrastructure options * Interstate Infrastructure Analysis - Minimal infrastructure to facilitate interstate travel during transition New Analyses * Quantifying transitional hydrogen demand

332

GIS-Based Infrastructure Modeling  

NLE Websites -- All DOE Office Websites (Extended Search)

GIS-Based Infrastructure Modeling Hydrogen Scenario Meeting August 9-10, 2006 Keith Parks, NREL GIS-Based Infrastructure Modeling * Station Analysis - Selection Criteria - Los...

333

BNL | Cloud Lifecycle Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Cloud Life Cycle Infrastructure Cloud Life Cycle Infrastructure An important component of any long-term atmospheric measurement program is the quality control and maintenance of the datastreams from instrument systems. Further, the raw measurements from atmospheric remote sensing instrumentation are not directly useable by the majority of the scientific community. These raw measurements must be interpreted and converted to geophysical quantities that can be more readily used by a greater number of scientists to address important questions regarding the Earth's climate system. The cloud life cycle infrastructure group at BNL is led by Dr. Michael Jensen and is responsible for the development and production of cloud-related value-added products (VAPs). The cloud life cycle infrastructure group also provides mentorships for the millimeter cloud

334

IPHE Infrastructure Workshop Proceedings  

Fuel Cell Technologies Publication and Product Library (EERE)

This proceedings contains information from the IPHE Infrastructure Workshop, a two-day interactive workshop held on February 25-26, 2010, to explore the market implementation needs for hydrogen fuelin

335

Electric Vehicle Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure JOHN DAVIS: Nearly everyone who owns a plug-in electric vehicle has some capacity to replenish the battery at home, either with a dedicated 220-volt charger, or by...

336

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

337

Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy: Critical Infrastructure and Key Resources Sector-Specific Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) In June 2006, the U.S. Department of Homeland Security (DHS) announced completion of the National Infrastructure Protection Plan (NIPP) Base Plan, a comprehensive risk management framework that defines critical infrastructure protection (CIP) roles and responsibilities for all levels of government, private industry, and other security partners. The U.S. Department of Energy (DOE) has been designated the Sector-Specific Agency (SSA) for the Energy Sector,and is tasked with coordinating preparation of

338

Guidelines for Infrastructure Planning  

Science Conference Proceedings (OSTI)

There are already over 60,000 plug-in electric vehicles (PEVs) on the road, and PEVs sales are rapidly growing. Although several hundred million dollars have been invested in infrastructure to support PEVs, additional investment will be needed as the number of non-petroleum-fueled vehicles increases. This project attempted to answer the question: how much charging infrastructure is really required for PEVs? This question is difficult to answer due to significant differences between the way PEVs and ...

2012-12-07T23:59:59.000Z

339

MFC Communications Infrastructure Study  

SciTech Connect

Unprecedented growth of required telecommunications services and telecommunications applications change the way the INL does business today. High speed connectivity compiled with a high demand for telephony and network services requires a robust communications infrastructure. The current state of the MFC communication infrastructure limits growth opportunities of current and future communication infrastructure services. This limitation is largely due to equipment capacity issues, aging cabling infrastructure (external/internal fiber and copper cable) and inadequate space for telecommunication equipment. While some communication infrastructure improvements have been implemented over time projects, it has been completed without a clear overall plan and technology standard. This document identifies critical deficiencies with the current state of the communication infrastructure in operation at the MFC facilities and provides an analysis to identify needs and deficiencies to be addressed in order to achieve target architectural standards as defined in STD-170. The intent of STD-170 is to provide a robust, flexible, long-term solution to make communications capabilities align with the INL mission and fit the various programmatic growth and expansion needs.

Michael Cannon; Terry Barney; Gary Cook; George Danklefsen, Jr.; Paul Fairbourn; Susan Gihring; Lisa Stearns

2012-01-01T23:59:59.000Z

340

CyberGIS software: a synthetic review and integration roadmap  

Science Conference Proceedings (OSTI)

CyberGIS defined as cyberinfrastructure-based geographic information systems (GIS) has emerged as a new generation of GIS representing an important research direction for both cyberinfrastructure and geographic information science. This study introduces a 5-year effort funded by the US National Science Foundation to advance the science and applications of CyberGIS, particularly for enabling the analysis of big spatial data, computationally intensive spatial analysis and modeling (SAM), and collaborative geospatial problem-solving and decision-making, simultaneously conducted by a large number of users. Several fundamental research questions are raised and addressed while a set of CyberGIS challenges and opportunities are identified from scientific perspectives. The study reviews several key CyberGIS software tools that are used to elucidate a vision and roadmap for CyberGIS software research. The roadmap focuses on software integration and synthesis of cyberinfrastructure, GIS, and SAM by defining several key integration dimensions and strategies. CyberGIS, based on this holistic integration roadmap, exhibits the following key characteristics: high-performance and scalable, open and distributed, collaborative, service-oriented, user-centric, and community-driven. As a major result of the roadmap, two key CyberGIS modalities gateway and toolkit combined with a community-driven and participatory approach have laid a solid foundation to achieve scientific breakthroughs across many geospatial communities that would be otherwise impossible.

Wang, Shaowen [University of Illinois, Urbana-Champaign; Anselin, Luc [Arizona State University; Bhaduri, Budhendra L [ORNL; Cosby, Christopher [University Navstar Consortium, Boulder, CO; Goodchild, Michael [University of California, Santa Barbara; Liu, Yan [University of Illinois, Urbana-Champaign; Nygers, Timothy L. [University of Washington, Seattle

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Primer Control System Cyber Security Framework and Technical Metrics  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

342

Evaluation Report on "The Department's Unclassified Cyber Security Program"  

SciTech Connect

Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing discl

2009-10-01T23:59:59.000Z

343

Cyber Security in Smart Grid Substations  

E-Print Network (OSTI)

Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands, and the cyber security of substations in particular. The focus of this study is the perception of risks and threats in smart grid cyber security and the international standards implemented in smart grids. The created overview is based on semi-structured interviews with 13 experts originating from eight different European countries. These participants are employed at electricity producers, grid operators, technology consultants and technology providers in the utilities sector. Their expertise ranges from information security to electricity grids, specifically smart grid security. Some of them are members of smart grid security related standard committees. The key results of the state of practice are the following: 1. The interconnectivity of the smart grid with multiple stakeholders and European colleagues is indicated as the biggest threat to the security of the smart grid. 2. Another often mentioned threat is awareness. The experts generally indicate that awareness within top management is high. However, personnel on lower levels are reluctant to incorporate security in their processes. 3. All organizations are in a certain stage of implementing standards, the ISO27000 series

Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schnbeck; Sjaak Brinkkemper; Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schnbeck; Sjaak Brinkkemper

2012-01-01T23:59:59.000Z

344

EV Charging Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Charging Infrastructure Charging Infrastructure JOHN DAVIS: Virtually anywhere in the U.S. you can bring light to a room with the flick of a finger. We take it for granted, but creating the national electric grid to make that possible took decades to accomplish. Now, in just a few years, we've seen the birth of a new infrastructure that allows electric vehicles to quickly recharge their batteries at home, work, or wherever they may roam. But this rapid growth has come with a few growing pains. Starting with less than 500 in 2009, there are now over 19,000 public-access charging outlets available to electric vehicles owners at commuter lots, parking garages, airports, retail areas and thousands of

345

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

346

Office of Cyber Security Evaluations Appraisal Process Guide, April 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER SECURITY EVALUATIONS CYBER SECURITY EVALUATIONS APPRAISAL PROCESS GUIDE April 2008 Office of Health, Safety and Security U.S. Department of Energy Office of Cyber Security Evaluations Appraisal Process Guide Preface April 2008 i Preface Department of Energy (DOE) Order 470.2B, Independent Oversight and Performance Assurance Program, and Office of Health, Safety and Security (HSS) Standard Operating Procedure, SOP-10-01, Independent Oversight Appraisal Process Protocols, February 2008, provide direction for the Office of Independent Oversight (HS-60) to establish the requirements, responsibilities, and processes for the development and maintenance of Appraisal Process Protocols that describe the activities for evaluating the effectiveness of DOE safeguards and security; cyber security; emergency management; and

347

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

with the CCD have created a reputation on college campuses of Sandia as leader in cyber security. Interactions between the diverse group of students in the CCD has cultivated...

348

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

Us Screen reader users: click here for plain HTML Go to Google Maps Home The Center for Cyber Defenders Loading... Still loading... Slow? Use the troubleshooting guide or basic...

349

CYBER SECURITY AWARENESS & TRAINING Program Plan of Activity...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

III. Theme The theme for the 2009 Summer Takin' It to the Streets awareness event is "Shape Up...Get Cyber Fit." 3 7222009 Last update: 5312011 IV. Audience The intended...

350

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeking Comments on Consolidated IT and Cyber Security Support Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

351

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NNSA Seeking Comments on Consolidated IT and Cyber Security Support NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

352

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC is offering a free, public webinar series from January to May 2012 entitled "Issues in Designing the...

353

UPBOT: a testbed for cyber-physical systems  

Science Conference Proceedings (OSTI)

Developing software for cyber-physical systems presents a unique challenge. These systems are not simply software; they are composed of software running on a collection of machines that present a risk to human safety if anything goes wrong. Researchers ...

Tanya L. Crenshaw; Steven Beyer

2010-08-01T23:59:59.000Z

354

Microsoft Word - Cyber Security Strat Plan final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

R R A A T T E E G G I I C C P P L L A A N N FEBRUARY 12, 2007 CYBER SECURITY STRATEGIC PLAN VERSION 1.0 2 Table of Contents INTRODUCTION ......

355

Loosely time-triggered architectures for cyber-physical systems  

Science Conference Proceedings (OSTI)

Cyber-Physical Systems require distributed architectures to support safety critical real-time control. Kopetz' Time-Triggered Architectures (TTA) have been proposed as both an architecture and a comprehensive paradigm for systems architecture, for such ...

Albert Benveniste

2010-03-01T23:59:59.000Z

356

Towards A Network-of-Networks Framework for Cyber Security  

Science Conference Proceedings (OSTI)

Networks-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in this paper we build towards a three-layer NoN model for an enterprise cyber system. Each layer captures a different facet of a cyber system. We then discuss the potential benefits of graph-theoretic analysis enabled from such a model. Our goal is to provide a novel and powerful tool for modeling and analyzing problems in cyber security.

Halappanavar, Mahantesh; Choudhury, Sutanay; Hogan, Emilie A.; Hui, Peter SY; Johnson, John R.; Ray, Indrajit; Holder, Lawrence B.

2013-06-07T23:59:59.000Z

357

The ATLAS Simulation Infrastructure  

E-Print Network (OSTI)

The simulation software for the ATLAS Experiment at the Large Hadron Collider is being used for large-scale production of events on the LHC Computing Grid. This simulation requires many components, from the generators that simulate particle collisions, through packages simulating the response of the various detectors and triggers. All of these components come together under the ATLAS simulation infrastructure. In this paper, that infrastructure is discussed, including that supporting the detector description, interfacing the event generation, and combining the GEANT4 simulation of the response of the individual detectors. Also described are the tools allowing the software validation, performance testing, and the validation of the simulated output against known physics processes.

The ATLAS Collaboration

2010-05-25T23:59:59.000Z

358

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-12-20T23:59:59.000Z

359

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-10-01T23:59:59.000Z

360

Cyber Security Strategy Guidance for the Electric Sector  

Science Conference Proceedings (OSTI)

Smart grid technologies are introducing millions of new intelligent components to the electric grid that communicate in much more advanced ways (two-way communication, dynamic optimization, and wired and wireless communications) than in the past. Cyber security is important because the bi-directional flow of two-way communication and the control capabilities in the smart grid will enable an array of new functionalities and applications. Two areas of critical importance for the smart grid are cyber securi...

2012-05-30T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Engineering cyber infrastructure for U-Pb geochronology: Tripoli and U-Pb_Redux  

E-Print Network (OSTI)

In the past decade, major advancements in precision and accuracy of U-Pb geochronology, which stem from improved sample pretreatment and refined measurement techniques, have revealed previously unresolvable discrepancies ...

Bowring, J. F.

362

A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes  

E-Print Network (OSTI)

1992), Estimating net solar radiation using Landsat Thematicand temperature sensor, (7) solar radiation sensor, (8) 10Wwith snow depth, solar radiation, and relative-humidity

Kerkez, Branko

2012-01-01T23:59:59.000Z

363

A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes  

E-Print Network (OSTI)

solar panel requirements, in which case radio power consumption would begin to play a larger role in overall energy efficiency.

Kerkez, Branko

2012-01-01T23:59:59.000Z

364

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

365

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

366

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

367

REQUEST FOR QUALIFICATIONS Siting, Transmission, and Environmental Protection  

E-Print Network (OSTI)

REQUEST FOR QUALIFICATIONS FOR Siting, Transmission, and Environmental Protection Peak Workload RFQ ON ELECTRICITY INFRASTRUCTURE PERMITTING AND OPERATION

368

Asset Management of Critical Infrastructure ur critical infrastructure--  

E-Print Network (OSTI)

Asset Management of Critical Infrastructure O ur critical infrastructure-- roads, bridges, transit-of-the-art approach to asset management of public infrastructure. ORNL's Capabilities · Simulation-based, optimization. · Innovative optimization tools to assess tradeoffs between construction, maintenance, and demolition over

369

Experiences and Challenges with Using Cert Data to Analyze International Cyber Security  

E-Print Network (OSTI)

With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The ...

Madnick, Stuart

370

Critical Infrastructure Modeling: An Approach to Characterizing Interdependencies of Complex Networks & Control Systems  

SciTech Connect

Critical infrastructure control systems face many challenges entering the 21st century, including natural disasters, cyber attacks, and terrorist attacks. Revolutionary change is required to solve many existing issues, including gaining greater situational awareness and resiliency through embedding modeling and advanced control algorithms in smart sensors and control devices instead of in a central controller. To support design, testing, and component analysis, a flexible simulation and modeling capability is needed. Researchers at Idaho National Laboratory are developing and evaluating such a capability through their CIPRsim modeling and simulation framework.

Stuart Walsh; Shane Cherry; Lyle Roybal

2009-05-01T23:59:59.000Z

371

Underground Infrastructure Research and Education  

E-Print Network (OSTI)

productivity, environmental improvement and renewal of the aging underground infrastructure. OrganizationalCenter for Underground Infrastructure Research and Education CUIRE Board Members Sam Arnaout Pipe Association Tim Kennedy, AMERON NOV Chad Kopecki, Dallas Water Utilities David Marshall, Tarrant

Texas at Arlington, University of

372

Refueling Infrastructure for Alternative Fuel Vehicles: Lessons...  

NLE Websites -- All DOE Office Websites (Extended Search)

NextEnergy (Detroit) Station Infrastructure Lessons Learned 4 UNITED STATES Department of Energy Infrastructure Lessons Learned Infrastructure Legal Contracts Legal agreements take...

373

Intelligent Fluid Infrastructure for Embedded Networking  

E-Print Network (OSTI)

mobile element into the networking infrastructure.Our fluid infrastructure design saves significant energy inIntelligent Fluid Infrastructure for Embedded Networks Aman

Kansal, Aman; Somasundara, Arun; Jea, David C; Srivastava, Mani B; Estrin, D

2004-01-01T23:59:59.000Z

374

Re-imagining Infrastructure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Re-imagining Infrastructure Re-imagining Infrastructure Document was provided during March 4, 2011 DOE-QTR meeting Re-imagining Infrastructure More Documents & Publications INL...

375

Intelligent Fluid Infrastructure for Embedded Networks  

E-Print Network (OSTI)

Intelligent Fluid Infrastructure for Embedded Networks Amanto develop a fluid infrastructure: mobile components arebuilt into the system infrastructure for enabling specific

Aman Kansal; Arun Somasundara; David Jea; Mani Srivastava; Deborah Estrin

2004-01-01T23:59:59.000Z

376

Transit Infrastructure Finance Through Station Location Auctions  

E-Print Network (OSTI)

as the primary transit infrastructure finance method.Paper 2009-04 Transit Infrastructure Finance Through StationWP-2009-04 Transit Infrastructure Finance Through Station

Ian Carlton

2009-01-01T23:59:59.000Z

377

Middleware for Cooperative Vehicle-Infrastructure Systems  

E-Print Network (OSTI)

Cooperative vehicle-infrastructure systems." COM Safety:of Transportation. Vehicle-Infrastructure Integration (VII).for Cooperative Vehicle-Infrastructure Systems Christian

Manasseh, Christian; Sengupta, Raja

2008-01-01T23:59:59.000Z

378

Resilient Everyday Infrastructure [To Rally Discussion  

E-Print Network (OSTI)

and redundant civic infrastructure. Opposite: Users at theand gardens are users of infrastructure, demanding more andResilient Everyday Infrastructure William R. Morrish When a

Morrish, William R.

2008-01-01T23:59:59.000Z

379

Infrastructure for Integrated Electronics Design & ...  

Science Conference Proceedings (OSTI)

Infrastructure for Integrated Electronics Design & Manufacturing (IIEDM) Project. ... designed to support distributed supply chain integration and e ...

2010-11-05T23:59:59.000Z

380

Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry  

SciTech Connect

This document contains introductory material that discusses cyber security challenges in using cloud computing in the electric utility industry.

Akyol, Bora A.

2012-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Cyber Security ProcurementApplication of the Methodology, Third Example: Digital Feedwater Control  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements to new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of cyber security controls due to lack of proper requirements and/or unclear division of responsibilities between the utility and vendor can result in costly retrofits to meet the ...

2013-12-19T23:59:59.000Z

382

Cyber Security Procurement - Application of the Methodology, Second Example: Feedpump Turbine Speed Control  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of cyber security controls owing to a lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly retrofits to meet the ...

2013-12-20T23:59:59.000Z

383

ORISE: Faculty Research Experiences - Dr. Jessie Walker  

NLE Websites -- All DOE Office Websites (Extended Search)

Jessie Walker Faculty and student team examines cyber security threats, explores options to protect nation's technology infrastructures Kierra Smith, Jessie Walker, and Tarsheika...

384

Plug-in Electric Vehicle (PEV) Real-World Data from DOE's AVTA...  

NLE Websites -- All DOE Office Websites (Extended Search)

P t ti - Energy Critical Infrastructure Protection - Homeland Security and Cyber Security Nuclear 3 Hydropower Geothermal AVTA Participants and Goals P ti i t * Participants - The...

385

Semiannual Report to Congress: April 1 to September 30, 2002...  

NLE Websites -- All DOE Office Websites (Extended Search)

and situational vulnerabilities in the areas of cyber and physical security, counterintelligence, and nuclear materials and critical infrastructure protection. Although the...

386

Improving Utilization of Infrastructure Clouds  

Science Conference Proceedings (OSTI)

A key advantage of infrastructure-as-a-service (IaaS) clouds is providing users on-demand access to resources. To provide on-demand access, however, cloud providers must either significantly overprovision their infrastructure (and pay a high price for ... Keywords: Cloud Computing, Infrastructure-as-a-Service, High Throughput Computing

Paul Marshall; Kate Keahey; Tim Freeman

2011-05-01T23:59:59.000Z

387

Advanced Metering Infrastructure Technology  

Science Conference Proceedings (OSTI)

Revenue security is a major concern for utilities. Theft of electric service in the United States is widespread. In 2006, the revenue estimate for non-technical losses was 6.5 billion. Non-technical losses are associated with unidentified and uncollected revenue from pilferage, tampering with meters, defective meters, and errors in meter reading. In this report, revenue security describes the use of advanced metering infrastructure (AMI) technology to minimize non-technical losses.

2008-12-08T23:59:59.000Z

388

Synchrophasor Communication Infrastructure  

Science Conference Proceedings (OSTI)

This report details ongoing work begun in 2011 evaluating benefits of various wide-area communications approaches for transport of synchrophasor measurements, with a focus on latency. Recent discussions on synchrophasor use in the North American SynchroPhasor Initiative (NASPI) community have included consideration of automated closed-loop control over an Internet protocol (IP) network infrastructure.The projects focus in 2012 has been twofold: NASPInet architecture design and ...

2012-11-26T23:59:59.000Z

389

Cumulative strategic capability and performance of early movers and followers in the cyber market  

Science Conference Proceedings (OSTI)

Today, the cyber market is evolving rapidly in the networked age. In the cyber market, the traditional competitive strategy appears to no longer be effective. This study investigates the strategic choice differences of online firms based on their strategic ... Keywords: Cyber market, Early mover, Follower, Porter's generic strategies, Sand Cone model

Sang-Gun Lee; Chulmo Koo; Kichan Nam

2010-06-01T23:59:59.000Z

390

On the impact of physical-cyber world interactions during unexpected events  

Science Conference Proceedings (OSTI)

Physical world events have a strong and direct impact on the communication activity seen in the cyber world. In this paper, we present three physical world events where we conducted passive network traffic measurements to study the interaction between ... Keywords: cyber world behavior, cyber-physical world interactions, emergency response, high network traffic deviation, non-invasive network measurement, unexpected events, wireless mesh networks

B. S. Manoj; Bheemarjuna Reddy Tamma; Ramesh R. Rao

2011-12-01T23:59:59.000Z

391

Department of Energy Launches Initiative with Industry to Better Protect  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Initiative with Industry to Better Initiative with Industry to Better Protect the Nation's Electric Grid from Cyber Threats Department of Energy Launches Initiative with Industry to Better Protect the Nation's Electric Grid from Cyber Threats January 5, 2012 - 12:20pm Addthis Washington, D.C. - As part of the Obama Administration's efforts to enhance the security and reliability of the nation's electrical grid, U.S. Energy Secretary Steven Chu today announced an initiative to further protect the electrical grid from cyber attacks. The "Electric Sector Cybersecurity Risk Management Maturity" project, a White House initiative led by the Department of Energy in partnership with the Department of Homeland Security (DHS), will leverage the insight of private industry and public sector experts to build on existing cybersecurity measures and

392

or are "Cyberspace " and "Cyber Space " the same?  

E-Print Network (OSTI)

This project has at least two facets to it: (1) advancing the algorithms in the sub-field of bibliometrics often referred to as "text mining " whereby hundreds of thousands of documents (such as journal articles) are scanned and relationships amongst words and phrases are established and (2) applying these tools in support of the Explorations in Cyber International Relations (ECIR) research effort. In international relations, it is important that all the parties understand each other. Although dictionaries, glossaries, and other sources tell you what words/phrases are supposed to mean (somewhat complicated by the fact that they often contradict each other), they do not tell you how people are actually using them. As an example, when we started, we assumed that "cyberspace " and "cyber space " were essentially the same word with just a minor variation in punctuation (i.e., the space, or lack thereof, between "cyber " and "space") and that the choice of the punctuation was a rather random occurrence. With that assumption in mind, we would expect that the taxonomies that would be constructed by our algorithms using "cyberspace " and "cyber space " as seed terms would be basically the same. As it turned out, they were quite different, both in overall shape and groupings within the taxonomy. Since the overall field of cyber international relations is so new, understanding the field and how people think about (as evidenced by their actual usage of terminology, and how usage changes over time) is an important goal as part of the overall ECIR project. 1.

Steven Camia; Stuart Madnick; Nazli Choucri; Wei Lee Woon; Steven Camia; Wei Lee Woon

2011-01-01T23:59:59.000Z

393

Alternative Fuels Data Center: Alternative Fuel Infrastructure...  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Type Alternative Fuel Infrastructure Development Program The Tennessee Department of Environment and Conservation provides funding for alternative fueling infrastructure...

394

Before the House Transportation and Infrastructure Subcommittee...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transportation and Infrastructure Subcommittee on Economic Development, Public Buildings, and Emergency Management Before the House Transportation and Infrastructure Subcommittee...

395

Before the House Transportation and Infrastructure Subcommittee...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the House Transportation and Infrastructure Subcommittee on Economic Development, Public Buildings, and Emergency Management Before the House Transportation and Infrastructure...

396

Sustainable Buildings and Infrastructure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sustainable Buildings and Infrastructure Sustainable Buildings and Infrastructure Aviation Management Green Leases Executive Secretariat Energy Reduction at HQ Real Estate...

397

Advanced Metering Infrastructure Security Considerations | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Metering Infrastructure Security Considerations Advanced Metering Infrastructure Security Considerations The purpose of this report is to provide utilities implementing Advanced...

398

Civil Infrastructure - Advanced Sensing Technologies and ...  

Science Conference Proceedings (OSTI)

... Municipal utilities are not able to ... will complete the infrastructure manager's toolkit ... more effectively the challenges presented by aging infrastructure. ...

2011-03-01T23:59:59.000Z

399

Clean Cities: Electric Vehicle Infrastructure Training Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Electric Vehicle Infrastructure Training Program The Electric Vehicle Infrastructure Training Program (EVITP) provides training and certification for people installing electric...

400

Infrastructure and Operations | National Nuclear Security Administrati...  

NLE Websites -- All DOE Office Websites (Extended Search)

for Infrastructure and Operations develops and executes NNSA's infrastructure investment, maintenance, and operations programs and policies. Printer-friendly version...

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Africa's Transport Infrastructure Mainstreaming Maintenance and...  

Open Energy Info (EERE)

icon Twitter icon Africa's Transport Infrastructure Mainstreaming Maintenance and Management Jump to: navigation, search Tool Summary Name: Africa's Transport Infrastructure...

402

California Hydrogen Infrastructure Project | Open Energy Information  

Open Energy Info (EERE)

Hydrogen Infrastructure Project Jump to: navigation, search Name California Hydrogen Infrastructure Project Place California Sector Hydro, Hydrogen Product String representation...

403

A Cyber-Physical Experimentation Environment for the Security Analysis  

E-Print Network (OSTI)

Although many studies address the security of Networked Industrial Control Systems (NICS), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these systems. This paper presents an innovative framework for an experimentation environment that can reproduce concurrently physical and cyber systems. The proposed approach uses an emulation testbed based on Emulab to recreate cyber components and a real-time simulator, based on Simulink, to recreate physical processes. The main novelty of the proposed framework is that it provides a set of experimental capabilities that are missing from other approaches, e.g. safe experimentation with real malware, flexibility to use different physical processes. The feasibility of the approach is confirmed by the development of a fully functional prototype, while its applicability is proven through two case studies of industrial systems from the electrical and chemical domain.

Bla Genge; Christos Siaterlis; Igor Nai Fovino; Marcelo Masera

2012-01-01T23:59:59.000Z

404

Evaluation Report on The Department's Unclassified Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report on The Department's Unclassified Cyber Security Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security information. It requires agencies to conduct annual reviews and evaluations of unclassified and

405

Pennsylvania Regional Infrastructure Project  

NLE Websites -- All DOE Office Websites (Extended Search)

CTC Team CTC Team 1 Pennsylvania Regional Infrastructure Project Presentation by: The Concurrent Technologies Corporation (CTC) Team January 6, 2004 The CTC Team 2 Presentation Outline Introduction of CTC Team CTC Background Technical Approach - CTC Team Member Presentations Conclusions The CTC Team 3 The CTC Project Team Concurrent Technologies Corporation Program Management and Coordination Hydrogen Delivery and Storage Material Development Hydrogen Sensors Concurrent Technologies Corporation Program Management and Coordination Hydrogen Delivery and Storage Material Development Hydrogen Sensors Air Products and Chemicals, Inc. Hydrogen Separation Hydrogen Sensors Air Products and Chemicals, Inc. Hydrogen Separation Hydrogen Sensors Resource Dynamics Corp. Tradeoff Analyses of Hydrogen

406

Genetic Algorithms for Agent-Based Infrastructure Interdependency Modeling and Analysis  

SciTech Connect

Todays society relies greatly upon an array of complex national and international infrastructure networks such as transportation, electric power, telecommunication, and financial networks. This paper describes initial research combining agent-based infrastructure modeling software and genetic algorithms (GAs) to help optimize infrastructure protection and restoration decisions. This research proposes to apply GAs to the problem of infrastructure modeling and analysis in order to determine the optimum assets to restore or protect from attack or other disaster. This research is just commencing and therefore the focus of this paper is the integration of a GA optimization method with a simulation through the simulations agents.

May Permann

2007-03-01T23:59:59.000Z

407

Energy Sector-Specific Plan: An Annex to the National Infrastructure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sector-Specific Plan: An Annex to the National Sector-Specific Plan: An Annex to the National Infrastructure Protection Plan Energy Sector-Specific Plan: An Annex to the National Infrastructure Protection Plan In its role as the lead Sector-Specific Agency for the Energy Sector, the Department of Energy has worked closely with dozens of government and industry partners to prepare this updated 2010 Energy Sector-Specific Plan (SSP). Much of that work was conducted through the two Energy Sector Coordinating Councils (SCCs) and the Energy Government Coordinating Council (GCC). Energy Sector-Specific Plan: An Annex to the National Infrastructure Protection Plan More Documents & Publications National Infrastructure Protection Plan Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as

408

NIST Issues Expanded Draft of Smart Grid Cyber Security ...  

Science Conference Proceedings (OSTI)

... including electric transportation, electric storage, advanced metering infrastructure, distribution grid management, energy management in homes ...

2010-12-07T23:59:59.000Z

409

Human dimensions in cyber operations research and development priorities.  

SciTech Connect

Within cyber security, the human element represents one of the greatest untapped opportunities for increasing the effectiveness of network defenses. However, there has been little research to understand the human dimension in cyber operations. To better understand the needs and priorities for research and development to address these issues, a workshop was conducted August 28-29, 2012 in Washington DC. A synthesis was developed that captured the key issues and associated research questions. Research and development needs were identified that fell into three parallel paths: (1) human factors analysis and scientific studies to establish foundational knowledge concerning factors underlying the performance of cyber defenders; (2) development of models that capture key processes that mediate interactions between defenders, users, adversaries and the public; and (3) development of a multi-purpose test environment for conducting controlled experiments that enables systems and human performance measurement. These research and development investments would transform cyber operations from an art to a science, enabling systems solutions to be engineered to address a range of situations. Organizations would be able to move beyond the current state where key decisions (e.g. personnel assignment) are made on a largely ad hoc basis to a state in which there exist institutionalized processes for assuring the right people are doing the right jobs in the right way. These developments lay the groundwork for emergence of a professional class of cyber defenders with defined roles and career progressions, with higher levels of personnel commitment and retention. Finally, the operational impact would be evident in improved performance, accompanied by a shift to a more proactive response in which defenders have the capacity to exert greater control over the cyber battlespace.

Forsythe, James Chris; Silva, Austin Ray; Stevens-Adams, Susan Marie; Bradshaw, Jeffrey [Institute for Human and Machine Cognition] Institute for Human and Machine Cognition

2012-11-01T23:59:59.000Z

410

The Department's Unclassified Cyber Security Program 2002, IG-0567  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT'S UNCLASSIFIED DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security

411

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

412

of Western Area Power Administration's Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Western Area Power Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 October 22, 2012 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Western Area Power Administration's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Department of Energy's Western Area Power Administration (Western) markets and delivers hydroelectric power and related services to 15 states within the central and western United States. As the largest U.S. Power Marketing Administration, millions of households and

413

California Hydrogen Infrastructure Project  

Science Conference Proceedings (OSTI)

Air Products and Chemicals, Inc. has completed a comprehensive, multiyear project to demonstrate a hydrogen infrastructure in California. The specific primary objective of the project was to demonstrate a model of a ???¢????????real-world???¢??????? retail hydrogen infrastructure and acquire sufficient data within the project to assess the feasibility of achieving the nation???¢????????s hydrogen infrastructure goals. The project helped to advance hydrogen station technology, including the vehicle-to-station fueling interface, through consumer experiences and feedback. By encompassing a variety of fuel cell vehicles, customer profiles and fueling experiences, this project was able to obtain a complete portrait of real market needs. The project also opened its stations to other qualified vehicle providers at the appropriate time to promote widespread use and gain even broader public understanding of a hydrogen infrastructure. The project engaged major energy companies to provide a fueling experience similar to traditional gasoline station sites to foster public acceptance of hydrogen. Work over the course of the project was focused in multiple areas. With respect to the equipment needed, technical design specifications (including both safety and operational considerations) were written, reviewed, and finalized. After finalizing individual equipment designs, complete station designs were started including process flow diagrams and systems safety reviews. Material quotes were obtained, and in some cases, depending on the project status and the lead time, equipment was placed on order and fabrication began. Consideration was given for expected vehicle usage and station capacity, standard features needed, and the ability to upgrade the station at a later date. In parallel with work on the equipment, discussions were started with various vehicle manufacturers to identify vehicle demand (short- and long-term needs). Discussions included identifying potential areas most suited for hydrogen fueling stations with a focus on safe, convenient, fast-fills. These potential areas were then compared to and overlaid with suitable sites from various energy companies and other potential station operators. Work continues to match vehicle needs with suitable fueling station locations. Once a specific site was identified, the necessary agreements could be completed with the station operator and expected station users. Detailed work could then begin on the site drawings, permits, safety procedures and training needs. Permanent stations were successfully installed in Irvine (delivered liquid hydrogen), Torrance (delivered pipeline hydrogen) and Fountain Valley (renewable hydrogen from anaerobic digester gas). Mobile fueling stations were also deployed to meet short-term fueling needs in Long Beach and Placerville. Once these stations were brought online, infrastructure data was collected and reported to DOE using Air Products???¢???????? Enterprise Remote Access Monitoring system. Feedback from station operators was incorporated to improve the station user???¢????????s fueling experience.

Edward C. Heydorn

2013-03-12T23:59:59.000Z

414

NREL: Energy Analysis: Transmission Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Transmission Infrastructure Transmission Infrastructure Grid expansion and planning to allow large scale deployment of renewable generation Large scale deployment of renewable electricity generation will require additional transmission to connect renewable resources, which are wide-spread across the US, but regionally-constrained, to load centers. Long-term transmission planning, based on potential future growth in electric loads and generation resource expansion options, is critical to maintaining the necessary flexibility required for a reliable and robust transmission system. NREL's analyses support transmission infrastructure planning and expansion to enable large-scale deployment of renewable energy in the future. NREL's transmission infrastructure expansion and planning analyses show

415

IT Infrastructure for Strategic Agility  

E-Print Network (OSTI)

nvesting in IT infrastructure is one of the most challenging tasks facing senior managers who often feel ill equipped to make these decisions. Investing in the right ...

Weill, Peter

2003-02-24T23:59:59.000Z

416

Materials for Infrastructure Applications - TMS  

Science Conference Proceedings (OSTI)

Jun 18, 2008 ... This presentation was given as part of the special Materials in Society session " Materials for Infrastructure: Building Bridges in the Global...

417

Infrastructure Failure - Types and Frequency  

U.S. Energy Information Administration (EIA)

Infrastructure Failure - Types and Frequency. Small events that have no impact on supplies Events that require supply/demand responses Events that result in a ...

418

Data Infrastructure - Programmaster.org  

Science Conference Proceedings (OSTI)

Software Infrastructure for First-Principles Electronic Structure Computations: Francois Gygi1; 1University of California Davis First-Principles simulations play an...

419

ADVANCE TECHNOLOGIES FOR THE INFRASTRUCTURE ...  

Science Conference Proceedings (OSTI)

... relationship to a public utility operation is ... place an added stress on this aging infrastructure. ... management approaches by utilities, and is supporting ...

2011-08-02T23:59:59.000Z

420

Second Cybersecurity Infrastructure Framework Workshop ...  

Science Conference Proceedings (OSTI)

... framework to reduce cybersecurity risks for critical infrastructure from May 29 ... industry experts in all sectorssuch as energy, finance, transportation ...

2013-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Michigan E85 Infrastructure  

Science Conference Proceedings (OSTI)

This is the final report for a grant-funded project to financially assist and otherwise provide support to projects that increase E85 infrastructure in Michigan at retail fueling locations. Over the two-year project timeframe, nine E85 and/or flex-fuel pumps were installed around the State of Michigan at locations currently lacking E85 infrastructure. A total of five stations installed the nine pumps, all providing cost share toward the project. By using cost sharing by station partners, the $200,000 provided by the Department of Energy facilitated a total project worth $746,332.85. This project was completed over a two-year timetable (eight quarters). The first quarter of the project focused on project outreach to station owners about the incentive on the installation and/or conversion of E85 compatible fueling equipment including fueling pumps, tanks, and all necessary electrical and plumbing connections. Utilizing Clean Energy Coalition (CEC) extensive knowledge of gasoline/ethanol infrastructure throughout Michigan, CEC strategically placed these pumps in locations to strengthen the broad availability of E85 in Michigan. During the first and second quarters, CEC staff approved projects for funding and secured contracts with station owners; the second through eighth quarters were spent working with fueling station owners to complete projects; the third through eighth quarters included time spent promoting projects; and beginning in the second quarter and running for the duration of the project was spent performing project reporting and evaluation to the US DOE. A total of 9 pumps were installed (four in Elkton, two in Sebewaing, one in East Lansing, one in Howell, and one in Whitmore Lake). At these combined station locations, a total of 192,445 gallons of E85, 10,786 gallons of E50, and 19,159 gallons of E30 were sold in all reporting quarters for 2011. Overall, the project has successfully displaced 162,611 gallons (2,663 barrels) of petroleum, and reduced regional GHG emissions by 375 tons in the first year of station deployment.

Sandstrom, Matthew M.

2012-03-30T23:59:59.000Z

422

WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING CLEANUP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING CLEANUP WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING CLEANUP December 1, 2009 - 12:00pm Addthis Richland, WA - In direct support of Hanford cleanup and the American Reinvestment and Recovery Act (ARRA) accelerated cleanup initiatives, the U.S. Department of Energy (DOE) Richland Operations Office (RL) is teaming with the Site services contractor, Mission Support Alliance, LLC (MSA), CH2M HILL Plateau Remediation Company and Washington River Protection Services Company to implement a WiMAX-based communications infrastructure at Hanford to augment the existing fiber optic and Wi-Fi-based systems. Wi-Fi and WiMAX are both considered last mile technologies that carry signals from telecommunications backbones (in this case hubs or access

423

WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING CLEANUP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING CLEANUP WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING CLEANUP December 1, 2009 - 12:00pm Addthis Richland, WA - In direct support of Hanford cleanup and the American Reinvestment and Recovery Act (ARRA) accelerated cleanup initiatives, the U.S. Department of Energy (DOE) Richland Operations Office (RL) is teaming with the Site services contractor, Mission Support Alliance, LLC (MSA), CH2M HILL Plateau Remediation Company and Washington River Protection Services Company to implement a WiMAX-based communications infrastructure at Hanford to augment the existing fiber optic and Wi-Fi-based systems. Wi-Fi and WiMAX are both considered last mile technologies that carry signals from telecommunications backbones (in this case hubs or access

424

Energy Transmission and Infrastructure  

SciTech Connect

The objective of Energy Transmission and Infrastructure Northern Ohio (OH) was to lay the conceptual and analytical foundation for an energy economy in northern Ohio that will: improve the efficiency with which energy is used in the residential, commercial, industrial, agricultural, and transportation sectors for Oberlin, Ohio as a district-wide model for Congressional District OH-09; identify the potential to deploy wind and solar technologies and the most effective configuration for the regional energy system (i.e., the ratio of distributed or centralized power generation); analyze the potential within the district to utilize farm wastes to produce biofuels; enhance long-term energy security by identifying ways to deploy local resources and building Ohio-based enterprises; identify the policy, regulatory, and financial barriers impeding development of a new energy system; and improve energy infrastructure within Congressional District OH-09. This objective of laying the foundation for a renewable energy system in Ohio was achieved through four primary areas of activity: 1. district-wide energy infrastructure assessments and alternative-energy transmission studies; 2. energy infrastructure improvement projects undertaken by American Municipal Power (AMP) affiliates in the northern Ohio communities of Elmore, Oak Harbor, and Wellington; 3. Oberlin, OH-area energy assessment initiatives; and 4. a district-wide conference held in September 2011 to disseminate year-one findings. The grant supported 17 research studies by leading energy, policy, and financial specialists, including studies on: current energy use in the district and the Oberlin area; regional potential for energy generation from renewable sources such as solar power, wind, and farm-waste; energy and transportation strategies for transitioning the City of Oberlin entirely to renewable resources and considering pedestrians, bicyclists, and public transportation as well as drivers in developing transportation policies; energy audits and efficiency studies for Oberlin-area businesses and Oberlin College; identification of barriers to residential energy efficiency and development of programming to remove these barriers; mapping of the solar-photovoltaic and wind-energy supply chains in northwest Ohio; and opportunities for vehicle sharing and collaboration among the ten organizations in Lorain County from the private, government, non-profit, and educational sectors. With non-grant funds, organizations have begun or completed projects that drew on the findings of the studies, including: creation of a residential energy-efficiency program for the Oberlin community; installation of energy-efficient lighting in Oberlin College facilities; and development by the City of Oberlin and Oberlin College of a 2.27 megawatt solar photovoltaic facility that is expected to produce 3,000 megawatt-hours of renewable energy annually, 12% of the Colleges yearly power needs. Implementation of these and other projects is evidence of the economic feasibility and technical effectiveness of grant-supported studies, and additional projects are expected to advance to implementation in the coming years. The public has benefited through improved energydelivery systems and reduced energy use for street lighting in Elmore, Oak Harbor, and Wellington; new opportunities for assistance and incentives for residential energy efficiency in the Oberlin community; new opportunities for financial and energy savings through vehicle collaboration within Lorain County; and decreased reliance on fossil fuels and expanded production of renewable energy in the region. The dissemination conference and the summary report developed for the conference also benefited the public, but making the findings and recommendations of the regional studies broadly available to elected officials, city managers, educators, representatives of the private sector, and the general public.

Mathison, Jane

2012-12-31T23:59:59.000Z

425

The development of cyber security warning, advice and report points  

Science Conference Proceedings (OSTI)

The threat to electronic information systems increasingly has origins in organised crime or nation-state sponsored or supported activity. Any successful cyber security programme relies upon the sharing of information. How this is achieved is a question ... Keywords: information sharing, security information, warning advice and reporting points

Tony Proctor

2012-10-01T23:59:59.000Z

426

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

This project provides ongoing updates on the status of research and development activities, federal and state policy and regulatory proposals, standards and guidance document development, key personnel, and organizations that are funding or executing smart grid cyber security and privacy activities.

2012-04-17T23:59:59.000Z

427

Cyber-sustainability: leaving a lasting legacy of human wellbeing  

Science Conference Proceedings (OSTI)

This paper presents a case for the importance of sustainability in HCI as it relates to the Web. So far, the discussion about sustainability in HCI has focused on environmental aspects. However, our belief is that cyber-sustainability is much greater ... Keywords: cyberspace, design, environment, sustainability, wellbeing, worldview

Bran Richards; Stuart Walker; Lynne Blair

2011-07-01T23:59:59.000Z

428

Survey Cyber security in the Smart Grid: Survey and challenges  

Science Conference Proceedings (OSTI)

The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, ... Keywords: Attacks and countermeasures, Cryptography, Cyber security, Security protocols, Smart Grid

Wenye Wang; Zhuo Lu

2013-04-01T23:59:59.000Z

429

Overcoming performance collapse for 100Gbps cyber security  

Science Conference Proceedings (OSTI)

In this paper, we present a series of performance tests carried out on R-Scope Dominate-T (RDT), a 1U network security appliance configured with four Tilera Gx-36 processors and with an aggregated network IO capacity of 160Gbps. RDT is optimized with ... Keywords: cyber-security

Jordi Ros-Giralt; Bob Rotsted; Alan Commike

2013-06-01T23:59:59.000Z

430

Cyber-physical systems for next generation intelligent buildings  

Science Conference Proceedings (OSTI)

The proliferation of the smart grid creates new opportunities for large buildings to act as smart end-points that provide mutually beneficial services for building occupants and the grid. In this article we describe how Cyber-Physical systems that provide ...

Andreas Savvides; Ioannis Paschalidis; Michael Caramanis

2011-06-01T23:59:59.000Z

431

Cyber-Physical Systems Security for Smart Grid  

E-Print Network (OSTI)

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy, mitigation, and resilience ­ is among the most important R&D needs for the emerging smart grid. One

432

Cyber-Physical Systems Security for Smart Grid  

E-Print Network (OSTI)

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy important R&D needs for the emerging smart grid. One of the overarching goals of the future research

433

Critical infrastructure security curriculum modules  

Science Conference Proceedings (OSTI)

Critical infrastructures have succumbed to the demands of greater connectivity. Although the scheme of connecting these critical equipment and devices to cyberspace has brought us tremendous convenience, it also enabled certain unimaginable risks and ... Keywords: SCADA, control systems, course modules, critical infrastructures, cybersecurity, programmable logic controllers, security, vulnerability

Guillermo A. Francia, III

2011-09-01T23:59:59.000Z

434

Clean Cities: Electric Vehicle Infrastructure Training Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Electric Vehicle Infrastructure Electric Vehicle Infrastructure Training Program to someone by E-mail Share Clean Cities: Electric Vehicle Infrastructure Training Program on Facebook Tweet about Clean Cities: Electric Vehicle Infrastructure Training Program on Twitter Bookmark Clean Cities: Electric Vehicle Infrastructure Training Program on Google Bookmark Clean Cities: Electric Vehicle Infrastructure Training Program on Delicious Rank Clean Cities: Electric Vehicle Infrastructure Training Program on Digg Find More places to share Clean Cities: Electric Vehicle Infrastructure Training Program on AddThis.com... Goals & Accomplishments Partnerships National Clean Fleets Partnership National Parks Initiative Electric Vehicle Infrastructure Training Program Advanced Vehicle Technology Competitions

435

GAO Information Security Update  

Science Conference Proceedings (OSTI)

... infrastructures Detecting, responding to, and mitigating cyber incidents ... Supporting cyber research and development ...

2013-06-04T23:59:59.000Z

436

Cyber Criminals on the Internet Super Highways: A Technical Investigation of Different Shades and Colours within the Nigerian Cyber Space  

Science Conference Proceedings (OSTI)

The internet has impacted the lives of individuals, organisations, and governments all over the world. However, it is now viewed and adopted with caution due mainly to the criminal tendencies of some misguided elements within the society. The internet ... Keywords: Cyber Crimes, E-Mails, Internet, Nigeria, Stakeholders

Edwin Agwu

2013-04-01T23:59:59.000Z

437

Distributed Data Integration Infrastructure  

SciTech Connect

The Internet is becoming the preferred method for disseminating scientific data from a variety of disciplines. This can result in information overload on the part of the scientists, who are unable to query all of the relevant sources, even if they knew where to find them, what they contained, how to interact with them, and how to interpret the results. A related issue is keeping up with current trends in information technology often taxes the end-user's expertise and time. Thus instead of benefiting from this information rich environment, scientists become experts on a small number of sources and technologies, use them almost exclusively, and develop a resistance to innovations that can enhance their productivity. Enabling information based scientific advances, in domains such as functional genomics, requires fully utilizing all available information and the latest technologies. In order to address this problem we are developing a end-user centric, domain-sensitive workflow-based infrastructure, shown in Figure 1, that will allow scientists to design complex scientific workflows that reflect the data manipulation required to perform their research without an undue burden. We are taking a three-tiered approach to designing this infrastructure utilizing (1) abstract workflow definition, construction, and automatic deployment, (2) complex agent-based workflow execution and (3) automatic wrapper generation. In order to construct a workflow, the scientist defines an abstract workflow (AWF) in terminology (semantics and context) that is familiar to him/her. This AWF includes all of the data transformations, selections, and analyses required by the scientist, but does not necessarily specify particular data sources. This abstract workflow is then compiled into an executable workflow (EWF, in our case XPDL) that is then evaluated and executed by the workflow engine. This EWF contains references to specific data source and interfaces capable of performing the desired actions. In order to provide access to the largest number of resources possible, our lowest level utilizes automatic wrapper generation techniques to create information and data wrappers capable of interacting with the complex interfaces typical in scientific analysis. The remainder of this document outlines our work in these three areas, the impact our work has made, and our plans for the future.

Critchlow, T; Ludaescher, B; Vouk, M; Pu, C

2003-02-24T23:59:59.000Z

438

Infrastructure Time: Long-term Matters in Collaborative Development  

E-Print Network (OSTI)

Creating information infrastructure through communitymythology and infrastructure. In L. Bud-Frierman (Ed. ),Towards information infrastructure studies: Ways of knowing

Karasti, Helena; Baker, Karen S.; Millerand, Florence

2010-01-01T23:59:59.000Z

439

Planning a sustainable community: infrastructure development and natural areas management  

E-Print Network (OSTI)

associated with county infrastructure projects. Despiteby transportation infrastructure. Field-investigationfor innovative design of infrastructure, land-acquisition

Swanson, Sherri R.; Kurz, Raymond C.

2005-01-01T23:59:59.000Z

440

Cyber Security and Information Intelligence Research Workshop (CSIIRW'11) Proceedings  

SciTech Connect

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Moreover, Massachusetts Institute of Technology (MIT) released the results of a two-year study, The Future of the Electric Grid.

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop  

SciTech Connect

Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on rebalancing cyberspace to mitigate threats and maximize benefits, ensuring security and privacy in a constantly changing adversarial environment. Recognizing this great need, we requested original paper submissions in four general areas derived from the Federal Cybersecurity R&D program thrusts: Designed-In-Security (DIS) Builds the capability to design, develop, and evolve high-assurance, software-intensive systems predictably and reliably while effectively managing risk, cost, schedule, quality, and complexity. Tailored Trustworthy Spaces (TTS) Provides flexible, adaptive, distributed trust environments that can support functional and policy requirements arising from a wide spectrum of activities in the face of an evolving range of threats--recognizing the user's context and evolves as the context evolves. Moving Target (MT) Enables us to create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency. Cyber Economic Incentives (CEI) Develops effective incentives to make cybersecurity ubiquitous, including incentives affecting individuals and organizations.

Sheldon, Frederick T [ORNL; Giani, Annarita N. [Los Alamos National Laboratory (LANL); Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2013-01-01T23:59:59.000Z

442

2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop  

SciTech Connect

Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on rebalancing cyberspace to mitigate threats and maximize benefits, ensuring security and privacy in a constantly changing adversarial environment. Recognizing this great need, we requested original paper submissions in four general areas derived from the Federal Cybersecurity R&D program thrusts: Designed-In-Security (DIS) Builds the capability to design, develop, and evolve high-assurance, software-intensive systems predictably and reliably while effectively managing risk, cost, schedule, quality, and complexity. Tailored Trustworthy Spaces (TTS) Provides flexible, adaptive, distributed trust environments that can support functional and policy requirements arising from a wide spectrum of activities in the face of an evolving range of threats--recognizing the user's context and evolves as the context evolves. Moving Target (MT) Enables us to create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency. Cyber Economic Incentives (CEI) Develops effective incentives to make cybersecurity ubiquitous, including incentives affecting individuals and organizations.

Sheldon, Frederick T [ORNL; Giani, Annarita N. [Los Alamos National Laboratory (LANL); Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2013-01-01T23:59:59.000Z

443

Advanced Metering Infrastructure  

SciTech Connect

The report provides an overview of the development of Advanced Metering Infrastructure (AMI). Metering has historically served as the cash register for the utility industry. It measured the amount of energy used and supported the billing of customers for that usage. However, utilities are starting to look at meters in a whole different way, viewing them as the point of contact with customers in supporting a number of operational imperatives. The combination of smart meters and advanced communications has opened up a variety of methods for utilities to reduce operating costs while offering new services to customers. A concise look is given at what's driving interest in AMI, the components of AMI, and the creation of a business case for AMI. Topics covered include: an overview of AMI including the history of metering and development of smart meters; a description of the key technologies involved in AMI; a description of key government initiatives to support AMI; an evaluation of the current market position of AMI; an analysis of business case development for AMI; and, profiles of 21 key AMI vendors.

NONE

2007-10-15T23:59:59.000Z

444

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

445

Designing and embedding reliable virtual infrastructures  

Science Conference Proceedings (OSTI)

In a virtualized infrastructure where physical resources are shared, a single physical server failure will terminate several virtual servers and crippling the virtual infrastructures which contained those virtual servers. In the worst case, more failures ... Keywords: infrastructure virtualization

Wai-Leong Yeow; Cdric Westphal; Ula? Kozat

2010-09-01T23:59:59.000Z

446

Cyber Security Procurement - Application of the Methodology, First Example: Single Loop  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly backfits to meet the requirements.The ...

2013-07-29T23:59:59.000Z

447

The Fermilab data storage infrastructure  

SciTech Connect

Fermilab, in collaboration with the DESY laboratory in Hamburg, Germany, has created a petabyte scale data storage infrastructure to meet the requirements of experiments to store and access large data sets. The Fermilab data storage infrastructure consists of the following major storage and data transfer components: Enstore mass storage system, DCache distributed data cache, ftp and Grid ftp for primarily external data transfers. This infrastructure provides a data throughput sufficient for transferring data from experiments' data acquisition systems. It also allows access to data in the Grid framework.

Jon A Bakken et al.

2003-02-06T23:59:59.000Z

448

Federal Energy Management Program: Infrastructure Institutional Change  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Infrastructure Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Infrastructure Institutional Change Principle on Facebook Tweet about Federal Energy Management Program: Infrastructure Institutional Change Principle on Twitter Bookmark Federal Energy Management Program: Infrastructure Institutional Change Principle on Google Bookmark Federal Energy Management Program: Infrastructure Institutional Change Principle on Delicious Rank Federal Energy Management Program: Infrastructure Institutional Change Principle on Digg Find More places to share Federal Energy Management Program: Infrastructure Institutional Change Principle on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Greenhouse Gases

449

Offshore Infrastructure Associates Inc | Open Energy Information  

Open Energy Info (EERE)

Infrastructure Associates Inc Jump to: navigation, search Name Offshore Infrastructure Associates Inc Sector Marine and Hydrokinetic Website http:http:www.offinf.com Region...

450

DOE Hydrogen Analysis Repository: Infrastructure Costs Associated...  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Costs Associated with Central Hydrogen Production from Biomass and Coal Project Summary Full Title: Infrastructure Costs Associated with Central Hydrogen Production...

451

Facilities and Infrastructure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Facilities and Infrastructure Facilities and Infrastructure Aviation Management Green Leases Executive Secretariat Energy Reduction at HQ Real Estate Approvals Documents and...

452

Fuel Cell Technologies Office: IPHE Infrastructure Workshop  

NLE Websites -- All DOE Office Websites (Extended Search)

IPHE Infrastructure Workshop to someone by E-mail Share Fuel Cell Technologies Office: IPHE Infrastructure Workshop on Facebook Tweet about Fuel Cell Technologies Office: IPHE...

453

DOE Hydrogen Analysis Repository: Hydrogen Infrastructure Costs  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Costs Project Summary Full Title: Fuel Choice for Fuel Cell Vehicles: Hydrogen Infrastructure Costs Previous Title(s): Guidance for Transportation Technologies: Fuel...

454

SLAC National Accelerator Laboratory - Infrastructure and Safety  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure and Safety Photo - Aerial view of the klystron gallery. The Infrastructure and Safety directorate is committed to creating, operating and sustaining world-class,...

455

Department of Energy Cites Parsons Infrastructure & Technology...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Parsons Infrastructure & Technology Group, Inc. for Worker Safety and Health Violations Department of Energy Cites Parsons Infrastructure & Technology Group, Inc. for Worker Safety...

456

Fuel Cell Technologies Office: Hydrogen Infrastructure Market...  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Market Readiness Workshop The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL) hosted the Hydrogen Infrastructure Market Readiness...

457

DOE Hydrogen Analysis Repository: Hydrogen Refueling Infrastructure...  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Refueling Infrastructure Cost Analysis Project Summary Full Title: Hydrogen Refueling Infrastructure Cost Analysis Project ID: 273 Principal Investigator: Marc Melaina...

458

DOE Hydrogen Analysis Repository: Hydrogen Infrastructure Market...  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Infrastructure Market Readiness Analysis Project Summary Full Title: Hydrogen Infrastructure Market Readiness Analysis Project ID: 268 Principal Investigator: Marc Melaina...

459

Microsoft Word - Infrastructure_Introduction_2011.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

Carbon Sequestration Program - Infrastructure Element U.S. Department of Energy - National Energy Technology Laboratory The Infrastructure Element of DOE's Carbon Sequestration...

460

Hydrogen Infrastructure Transition Analysis: Milestone Report  

DOE Green Energy (OSTI)

This milestone report identifies a minimum infrastructure that could support the introduction of hydrogen vehicles and develops and evaluates transition scenarios supported by this infrastructure.

Melendez, M.; Milbrandt, A.

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

IPHE Infrastructure Workshop - Workshop Proceedings, February...  

NLE Websites -- All DOE Office Websites (Extended Search)

plan *Identify risks and benefits *Allocate equity Responsible Parties *Program management office *All stakeholders E-16 IPHE INFRASTRUCTURE WORKSHOP E-17 IPHE INFRASTRUCTURE...

462

Geographically Based Infrastructure Margo Melendez & Keith Parks  

E-Print Network (OSTI)

Diagram Geographically-based Infrastructure Analysis GIS Transportation Technologies & Systems Electric resulting H2 demand and changing demand ­ Estimate infrastructure needs and usage ­ Predict transition

463

Webinar: International Hydrogen Infrastructure Challenges-NOW...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Webinar: International Hydrogen Infrastructure Challenges-NOW, DOE, and NEDO Webinar: International Hydrogen Infrastructure Challenges-NOW, DOE, and NEDO December 16, 2013 8:00AM...

464

Cyber-Enabled Ab Initio Simulations in Nanohub.org: Simulation ...  

Science Conference Proceedings (OSTI)

This presentation describes recent progress in cyber-enabling ab initio codes and in the development and deployment of supporting material and learning...

465

Agenda for the Designed-in Cybersecurity for Cyber-Physical ...  

Science Conference Proceedings (OSTI)

Page 1. Designed-in Cybersecurity for Cyber-Physical Systems Workshop Thursday, April 4, 2013 8:00 Breakfast 9:00 Plenary ...

2013-04-03T23:59:59.000Z

466

Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation.  

E-Print Network (OSTI)

??While smart grid technologies are deployed to help achieve improved grid resiliency and efficiency, they also present an increased dependency on cyber resources which may (more)

Hahn, Adam

2013-01-01T23:59:59.000Z

467

Hydrogen Delivery Infrastructure Options Analysis  

Fuel Cell Technologies Publication and Product Library (EERE)

This report, by the Nexant team, documents an in-depth analysis of seven hydrogen delivery options to identify the most cost-effective hydrogen infrastructure for the transition and long term. The pro

468

Towards Manageable Mobile Agent Infrastructures  

Science Conference Proceedings (OSTI)

This paper addresses the problem of managing distributed mobile agent infrastructures. First, the weaknesses of current mobile agent implementations will be discussed and identified from the manageability viewpoint. The solutions devised and experimented ...

Paulo Simes; Paulo Marques; Lus Moura Silva; Joo Gabriel Silva; Fernando Boavida

2001-07-01T23:59:59.000Z

469

Towards an Infrastructure for Authorization  

E-Print Network (OSTI)

In recent years, there has been a great deal of debate about whether a large-scale "publickey infrastructure" is needed for electronic commerce and, if so, whether the technical difficulty of building and deploying such an infrastructure will impede the growth of electronic commerce. We argue here that much of the controversy is attributable to the fact that the term "public-key infrastructure" has not been clearly and correctly defined. We explain why the informal definition most often associated with the term, i.e., that of a global mapping between users' identities and public keys, is not the right definition for electronic commerce and hence that whether such a mapping can and will be built and deployed with available resources is not an especially pressing question. Finally, we describe an alternative type of infrastructural development that we believe really would enable electronic commerce. 1

Position Paper Joan; Joan Feigenbaum

1998-01-01T23:59:59.000Z

470

Modeling hydrogen fuel distribution infrastructure  

E-Print Network (OSTI)

This thesis' fundamental research question is to evaluate the structure of the hydrogen production, distribution, and dispensing infrastructure under various scenarios and to discover if any trends become apparent after ...

Pulido, Jon R. (Jon Ramon), 1974-

2004-01-01T23:59:59.000Z

471

Strategic plan for infrastructure optimization  

SciTech Connect

This document represents Fluor Daniel Hanford`s and DynCorp`s Tri-Cities Strategic Plan for Fiscal Years 1998--2002, the road map that will guide them into the next century and their sixth year of providing safe and cost effective infrastructure services and support to the Department of Energy (DOE) and the Hanford Site. The Plan responds directly to the issues raised in the FDH/DOE Critical Self Assessment specifically: (1) a strategy in place to give DOE the management (systems) and physical infrastructure for the future; (2) dealing with the barriers that exist to making change; and (3) a plan to right-size the infrastructure and services, and reduce the cost of providing services. The Plan incorporates initiatives from several studies conducted in Fiscal Year 1997 to include: the Systems Functional Analysis, 200 Area Water Commercial Practices Plan, $ million Originated Cost Budget Achievement Plan, the 1OO Area Vacate Plan, the Railroad Shutdown Plan, as well as recommendations from the recently completed Review of Hanford Electrical Utility. These and other initiatives identified over the next five years will result in significant improvements in efficiency, allowing a greater portion of the infrastructure budget to be applied to Site cleanup. The Plan outlines a planning and management process that defines infrastructure services and structure by linking site technical base line data and customer requirements to work scope and resources. The Plan also provides a vision of where Site infrastructure is going and specific initiatives to get there.

Donley, C.D.

1998-05-27T23:59:59.000Z

472

Wireless Policy, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

473

Department of Energy's July 2013 Cyber Security Breach  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Department of Energy's July The Department of Energy's July 2013 Cyber Security Breach DOE/IG-0900 December 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 December 6, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Review of the "Department of Energy's July 2013 Cyber Security Breach" BACKGROUND To facilitate its administrative and operational needs, the Department of Energy maintains a substantial amount of personally identifiable information (PII). The Department's Management Information System (MIS) provides a gateway for users to access a system known as the DOE Employee Data Repository (DOEInfo) database. That system was implemented in 1994, and

474

Cyber Security and Privacy Industry Tracking Newsletter, April 2012  

Science Conference Proceedings (OSTI)

EPRIs tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-04-11T23:59:59.000Z

475

Cyber Security and Privacy Industry Tracking Newsletter, April, 2013  

Science Conference Proceedings (OSTI)

EPRIs tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-03-26T23:59:59.000Z

476

Cyber Security and Privacy Industry Tracking Newsletter, July 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-06-25T23:59:59.000Z

477

Cyber Security and Privacy Industry Tracking Newsletter: December 2012  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute (EPRI) remains committed to supporting the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts, EPRI works diligently to stay abreast of the present state of standards and guideline developments, as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups and insights into future activities.This ...

2012-12-28T23:59:59.000Z

478

A Comparison of Cross-Sector Cyber Security Standards  

Science Conference Proceedings (OSTI)

This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

Robert P. Evans

2005-09-01T23:59:59.000Z

479

Cyber Security and Privacy Industry Tracking Newsletter, October 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-10-11T23:59:59.000Z

480

Framework for Evaluating Cyber Security Posture for Power Delivery Systems  

Science Conference Proceedings (OSTI)

While many asset owners and operators are performing self-assessments of their control systems, the methods used vary widely across the electric sector. This lack of consistent criteria and metrics makes it difficult to benchmark and compare the cyber security posture of power delivery systems.The objective of this technical update is to develop an evaluation framework that uses both the Department of Energy (DOE) Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) ...

2013-11-28T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Cyber Security and Privacy Industry Tracking Newsletter, October 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-09-26T23:59:59.000Z

482

Cyber Security and Privacy Industry Tracking Newsletter, July 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-07-02T23:59:59.000Z

483

A modeling framework for investment planning in interdependent infrastructures in multi-hazard environments.  

Science Conference Proceedings (OSTI)

Currently, much of protection planning is conducted separately for each infrastructure and hazard. Limited funding requires a balance of expenditures between terrorism and natural hazards based on potential impacts. This report documents the results of a Laboratory Directed Research&Development (LDRD) project that created a modeling framework for investment planning in interdependent infrastructures focused on multiple hazards, including terrorism. To develop this framework, three modeling elements were integrated: natural hazards, terrorism, and interdependent infrastructures. For natural hazards, a methodology was created for specifying events consistent with regional hazards. For terrorism, we modeled the terrorist's actions based on assumptions regarding their knowledge, goals, and target identification strategy. For infrastructures, we focused on predicting post-event performance due to specific terrorist attacks and natural hazard events, tempered by appropriate infrastructure investments. We demonstrate the utility of this framework with various examples, including protection of electric power, roadway, and hospital networks.

Brown, Nathanael J. K.; Gearhart, Jared Lee; Jones, Dean A.; Nozick, Linda Karen; Prince, Michael

2013-09-01T23:59:59.000Z

484

GridStat Cyber Security and Regional Deployment Project Report  

Science Conference Proceedings (OSTI)

GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStats cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

Clements, Samuel L.

2009-02-18T23:59:59.000Z

485

A Novel Cyber-Insurance for Internet Security  

E-Print Network (OSTI)

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In reality, an Internet user faces risks due to security attacks as well as risks due to non-security related failures (e.g., reliability faults in the form of hardware crash, buffer overflow, etc.) . These risk types are often indistinguishable by a naive user. However, a cyber-insurance agency would most likely insure risks only due to security attacks. In this case, it becomes a challenge for an Internet user to choose the right type of cyber-insurance contract as standard optimal contracts, i.e., contracts under security attacks only, might prove to be sub-optimal for ...

Pal, Ranjan; Psounis, Konstantinos

2011-01-01T23:59:59.000Z

486

Microsoft Word - Cyber-Wireless-CIP_Draft_ 5 1_2-25-09_clean.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wireless System Considerations When Implementing Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards Teja Kuruganti 1 , Walter Dykas 1 , Wayne Manges 1 , Tom Flowers 2 , Mark Hadley 3 , Paul Ewing 1 , Thomas King 1 1 Oak Ridge National Laboratory, Oak Ridge, TN 37831 2 Flowers Control Center Solutions, Todd Mission, TX 77363 3 Pacific Northwest National Laboratory, Richland, WA 99352 February 25, 2009 Introduction Energy asset owners are facing a monumental challenge as they address compliance with the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Standards (CIP-002 through CIP-009). The increased use of wireless technologies and their introduction into control center networks and field devices compound this challenge, as

487

Smart Grid Cyber Security Strategy and Requirements  

E-Print Network (OSTI)

(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nations measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITLs responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Interagency Report discusses ITLs research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Interagency Report 7628 (draft) 305 pages (February 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. Acknowledgments

The Smart; Grid Interoperability

2010-01-01T23:59:59.000Z

488

2012 Annual Report Research Reactor Infrastructure Program  

SciTech Connect

The content of this report is the 2012 Annual Report for the Research Reactor Infrastructure Program.

Douglas Morrell

2012-11-01T23:59:59.000Z

489

Controlled Hydrogen Fleet and Infrastructure Analysis (Presentation)  

SciTech Connect

This presentation summarizes controlled hydrogen fleet & infrastructure analysis undertaken for the DOE Fuel Cell Technologies Program.

Wipke, K.; Sprik, S.; Kurtz, J.; Ramsden, T.

2010-06-10T23:59:59.000Z

490

Alternative Fuels Data Center: Alternative Fueling Infrastructure  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Alternative Fueling Alternative Fueling Infrastructure Development to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

491

Infrastructure and Facilities Management | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Infrastructure and Facilities Management | National Nuclear Security Infrastructure and Facilities Management | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Infrastructure and Facilities Management Home > content > Infrastructure and Facilities Management Infrastructure and Facilities Management NNSA restores, rebuilds, and revitalizes the physical infrastructure of the

492

Electrical power systems protection and interdependencies with ICT  

Science Conference Proceedings (OSTI)

This section discusses the protection of electrical power systems (EPS) and its relation to the supporting Information and Communication Technologies (ICT) infrastructure. Several dimensions are addressed, ranging from the need of protection and available ... Keywords: critical infrastructures, disturbance, electrical power system, interdependencies, protection

George M. Milis; Elias Kyriakides; Antonis M. Hadjiantonis

2012-01-01T23:59:59.000Z

493

Alternative Fuels Data Center: Ethanol Infrastructure Funding  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Ethanol Infrastructure Ethanol Infrastructure Funding to someone by E-mail Share Alternative Fuels Data Center: Ethanol Infrastructure Funding on Facebook Tweet about Alternative Fuels Data Center: Ethanol Infrastructure Funding on Twitter Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Funding on Google Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Funding on Delicious Rank Alternative Fuels Data Center: Ethanol Infrastructure Funding on Digg Find More places to share Alternative Fuels Data Center: Ethanol Infrastructure Funding on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol Infrastructure Funding The Ethanol Infrastructure Incentive Program provides funding to offset the cost of installing ethanol blender pumps at retail fueling stations

494

Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Year-in-Review: 2010 Year-in-Review: 2010 Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability U.S. Department of Energy August 2011 OE/ISER Report 8/31/11 i For Further Information This report was prepared by the Office of Electricity Delivery and Energy Reliability under the direction of Patricia Hoffman, Assistant Secretary, and William Bryan, Deputy Assistant Secretary. Specific questions about information in this report may be directed to Alice Lippert, Senior Technical Advisor (alice.lippert@hq.doe.gov). Contributors include Mindi Farber-DeAnda, Robert Laramey, Carleen Lewandowski, Max

495

Chinese Attack Tools: Chinese cyber-attack tools continue to evolve  

Science Conference Proceedings (OSTI)

Cyber-attacks from China are on the rise. In September 2008, SecureWorks, a leading security services provider, published a report citing the locations of the computers from which the greatest number of cyber attacks were attempted against its clients. ...

Dennis Dwyer

2009-04-01T23:59:59.000Z

496

Toward a cyber-physical topology language: applications to NERC CIP audit  

Science Conference Proceedings (OSTI)

Our Cyber-Physical Topology Language (CPTL) provides a language that utilities can use to programmatically analyze current and future cyber-physical architectures. The motivation for our research emerged from the importance and limitations of several ... Keywords: NERC CIP, audit, graph theory

Gabriel A. Weaver, Carmen Cheh, Edmond J. Rogers, William H. Sanders, Dennis Gammel

2013-11-01T23:59:59.000Z

497

Modeling Effects of Physical Factors on Controller Area Network in Cyber-physical Systems  

Science Conference Proceedings (OSTI)

Cyber-physical systems (CPS) are becoming a promising research field to integrate the computing components, the physical processes, and the communication networks. A primary challenge in designing CPS is to understand the effect of physical factors on ... Keywords: Cyber-physical systems (CPS), Controller Area Network (CAN), performance analysis, temperature, electromagnetic interference

Bo Shen, Xingshe Zhou, Ru Wang

2013-08-01T23:59:59.000Z

498

Routing in Cyber Physical Systems with Application for Voltage Control in Microgrids: A Hybrid System Approach  

Science Conference Proceedings (OSTI)

A key challenge of cyber physical system is how to design the communication system. In this paper, the framework of hybrid system which consists of both continuous and discrete system states is adopted for the communication system design, particularly ... Keywords: cyber physical system, hybrid systems, routing

Husheng Li; Robert C. Qiu; Zhiqiang Wu

2012-06-01T23:59:59.000Z

499

Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems  

Science Conference Proceedings (OSTI)

This volume contains the papers presented at the Fourth IEEE/ACM International Conference on Cyber-Physical Systems (ICCPS 2013), which was held with the Cyber- Physical Systems Week in Philadelphia, USA, on 8-11 April 2013. ICCPS has been the flagship ...

Chenyang Lu, P. R. Kumar, R. Stoleru

2013-04-01T23:59:59.000Z

500

Cybercrime and cyber-security issues associated with China: some economic and institutional considerations  

Science Conference Proceedings (OSTI)

China is linked to cybercrimes of diverse types, scales, motivations and objectives. The Chinese cyberspace thus provides an interesting setting for the study of cybercrimes. In this paper, we first develop typology, classification and characterization ... Keywords: China, Cyber-security, Cyber-security related alliances, Cybercrime, International relations, International trade, Intrinsic and extrinsic motivations

Nir Kshetri

2013-03-01T23:59:59.000Z