Powered by Deep Web Technologies
Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)

2

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June

3

Guide to Critical Infrastructure Protection Cyber Vulnerability...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)...

4

Cyber and physical infrastructure interdependencies.  

SciTech Connect

The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

2008-09-01T23:59:59.000Z

5

Critical Infrastructure and Cyber Security  

E-Print Network (OSTI)

indicators vis-a-vis one another, which is especially important in the midst of the current budgetary uncertainty in Washington. In this study, we present our definitions of the three indicators; an overview of the eighteen sectors of critical infrastructure...

Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

2011-01-01T23:59:59.000Z

6

National Infrastructure Protection Plan  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Infrastructure Infrastructure Protection Plan 2006 Preface Preface i The ability to protect the critical infrastructure and key resources (CI/KR) of the United States is vital to our national security, public health and safety, economic vitality, and way of life. U.S. policy focuses on the importance of enhancing CI/KR protection to ensure that essential governmental missions, public services, and economic functions are maintained in the event of a

7

Cyber - Protection for utilities ... | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber - Protection for utilities ... Hackers hoping to disrupt the power grid, water or natural gas service may be foiled by an intrusion detection system developed by researchers...

8

ITL BULLETIN FOR MARCH 2013 NIST TO DEVELOP A CYBERSECURITY FRAMEWORK TO PROTECT CRITICAL INFRASTRUCTURE  

E-Print Network (OSTI)

ITL BULLETIN FOR MARCH 2013 NIST TO DEVELOP A CYBERSECURITY FRAMEWORK TO PROTECT CRITICAL, "Improving Critical Infrastructure Cybersecurity," the President has directed NIST to develop a voluntary framework for reducing cyber risks to our nation's critical infrastructure. The Cybersecurity Framework

9

INL Cyber Security Research (2008) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL Cyber Security Research (2008) INL Cyber Security Research (2008) Cybersecurity research at INL will help protect critical infrastructure control system computers against worms...

10

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

11

TCIP: Trustworthy CyberInfrastructure for the Power Grid | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid The TCIP, or Trustworthy CyberInfrastructure for the Power Grid, project's vision is to provide the fundamental science and technology to create an intelligent, adaptive power grid which survives malicious adversaries, provides continuous delivery of power, and supports dynamically varying trust requirements. This goal may be reached by creating the cyber building blocks, architecture, and validation technology to quantify the amount of trust provided by a proposed approach. The presentation below was given by William H. Saunders at the Visualization and Controls Program Peer Review in October 2006. TCIP: Trustworthy CyberInfrastructure for the Power Grid

12

Reducing Cyber Risk to Critical Infrastructure: NIST Framework...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

The Vulnerability Analysis of Energy Delivery Control Systems Report Guidelines for Smart Grid Cyber Security (3.4 MB PDF) A Guide to Developing a Cyber Security and Risk...

13

A hybrid systems model to simulate cyber interdependencies between critical infrastructures  

Science Journals Connector (OSTI)

Critical infrastructures (CI) depend on communications and information technology infrastructure (CITI) for many of their key functionalities, which is known as cyber interdependency. In this paper, we presented a cyber interdependency simulation technique that is based on the idea that overall performance of a CI network is determined by the behaviour of its components at multiple time scales. Accordingly, for cyber interdependency simulation, we decomposed CI network into two time scales; regular CI events are captured in large time-steps and data communication network events are captured in smaller time-steps. Two different simulators are used for each of these partitions and results from both simulations are synchronised appropriately. A real life example is presented to demonstrate the accuracy and usefulness of our approach. The hybrid simulation model gives significant flexibility to plug-in domain specific models into the critical infrastructure simulator for accurate and efficient solution.

Hafiz Abdur Rahman; José R. Martí; K.D. Srivastava

2011-01-01T23:59:59.000Z

14

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

15

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

16

Reducing Cyber Risk to Critical Infrastructure: NIST Framework  

Energy.gov (U.S. Department of Energy (DOE))

Recognizing that the national and economic security of the United States depends on the reliable functioning of critical infrastructure, the President under Executive Order (EO) 13636 Improving...

17

National Infrastructure Protection Plan | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Infrastructure Protection Plan Infrastructure Protection Plan National Infrastructure Protection Plan Protecting the critical infrastructure and key resources (CI/KR) of the United States is essential to the Nation's security, public health and safety, economic vitality, and way of life. Attacks on CI/KR could significantly disrupt the functioning of government and business alike and produce cascading effects far beyond the targeted sector and physical location of the incident. Direct terrorist attacks and natural, manmade, or technological hazards could produce catastrophic losses in terms of human casualties, property destruction, and economic effects, as well as profound damage to public morale and confidence. Attacks using components of the Nation's CI/KR as weapons of mass destruction could have even more

18

GAO-04-354, CRITICAL INFRASTRUCTURE PROTECTION: Challenges and Efforts to Secure Control Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report to Congressional Requesters Report to Congressional Requesters United States General Accounting Office GAO March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems GAO-04-354 www.gao.gov/cgi-bin/getrpt?GAO-04-354. To view the full product, including the scope and methodology, click on the link above. For more information, contact Robert F. Dacey at (202) 512-3317 or daceyr@gao.gov. Highlights of GAO-04-354, a report to congressional requesters March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems In addition to general cyber threats, which have been steadily increasing, several factors have contributed to the escalation of the risks of cyber attacks against control systems. These include the adoption of standardized

19

AstroCloud, a Cyber-Infrastructure for Astronomy Research: Data Archiving and Quality Control  

E-Print Network (OSTI)

AstroCloud is a cyber-Infrastructure for Astronomy Research initiated by Chinese Virtual Observatory (China-VO) under funding support from NDRC (National Development and Reform commission) and CAS (Chinese Academy of Sciences){\\url{http://astrocloud.china-vo.org}}\\citep{O8-5_Cui_adassxxiv}. To archive the astronomical data in China, we present the implementation of the astronomical data archiving system (ADAS). Data archiving and quality control are the infrastructure for the AstroCloud. Throughout the data of the entire life cycle, data archiving system standardized data, transferring data, logging observational data, archiving ambient data, And storing these data and metadata in database. Quality control covers the whole process and all aspects of data archiving.

He, Boliang; Fan, Dongwei; Li, Changhua; Xiao, Jian; Yu, Ce; Wang, Chuanjun; Cao, Zihuang; Chen, Junyi; Yi, Weimin; Li, Shanshan; Mi, Linying; Yang, Sisi

2014-01-01T23:59:59.000Z

20

The National Weather Sensor Grid: a large-scale cyber-sensor infrastructure for environmental monitoring  

Science Journals Connector (OSTI)

A sensor grid integrates sensor networks with grid infrastructures to enable the real-time collection of sensor data, and the sharing of computational and storage resources for sensor data processing and management. We have developed a sensor grid architecture framework, called the Scalable Proxy-based aRchItecture for seNsor Grid (SPRING). Based on the SPRING framework, we designed the National Weather Sensor Grid (NWSG), a large-scale cyber-sensor infrastructure for environmental monitoring. The NWSG integrates mini weather stations deployed geographically across Singapore for weather data collection, processing and management. We have designed and implemented core sensor grid middleware components and services such as resource discovery, meta scheduling, job migration and security. The NWSG is designed to support long-term weather monitoring. The performance of the NWSG has been demonstrated in terms of reduction in latency for end-user response, significant improvement in overall system throughput, and even load balance across the sensor grid infrastructure.

Hock Beng Lim; Mudasser Iqbal; Wenqiang Wang; Yuxia Yao

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

SciTech Connect

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

22

AstroCloud, a Cyber-Infrastructure for Astronomy Research: Architecture  

E-Print Network (OSTI)

AstroCloud is a cyber-Infrastructure for Astronomy Research initiated by Chinese Virtual Observatory (China-VO) under funding support from NDRC (National Development and Reform commission) and CAS (Chinese Academy of Sciences). The ultimate goal of this project is to provide a comprehensive end-to-end astronomy research environment where several independent systems seamlessly collaborate to support the full lifecycle of the modern observational astronomy based on big data, from proposal submission, to data archiving, data release, and to in-situ data analysis and processing. In this paper, the architecture and key designs of the AstroCloud platform are introduced, including data access middleware, access control and security framework, extendible proposal workflow, and system integration mechanism.

Xiao, Jian; Cui, Chenzhou; He, Boliang; Li, Changhua; Fan, Dongwei; Hong, Zhi; Yin, Shucheng; Wang, Chuanjun; Cao, Zihuang; Fan, Yufeng; Li, Shanshan; Mi, Linying; Wan, Wanghui; Wang, Jianguo; Zhang, Hailong

2014-01-01T23:59:59.000Z

23

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

24

Public Power Infrastructure Protection Act (Nebraska) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Power Infrastructure Protection Act (Nebraska) Power Infrastructure Protection Act (Nebraska) Public Power Infrastructure Protection Act (Nebraska) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Nebraska Program Type Safety and Operational Guidelines Provider Nebraska Public Power District This statute affirms the state's commitment to protecting electric

25

Risk Assessment Methodology for Protecting Our Critical Physical Infrastructures  

SciTech Connect

Critical infrastructures are central to our national defense and our economic well-being, but many are taken for granted. Presidential Decision Directive (PDD) 63 highlights the importance of eight of our critical infrastructures and outlines a plan for action. Greatly enhanced physical security systems will be required to protect these national assets from new and emerging threats. Sandia National Laboratories has been the lead laboratory for the Department of Energy (DOE) in developing and deploying physical security systems for the past twenty-five years. Many of the tools, processes, and systems employed in the protection of high consequence facilities can be adapted to the civilian infrastructure.

BIRINGER,BETTY E.; DANNEELS,JEFFREY J.

2000-12-13T23:59:59.000Z

26

Wireless Sensor Networks for the Protection of an Electrical Energy Distribution Infrastructure  

E-Print Network (OSTI)

Wireless Sensor Networks for the Protection of an Electrical Energy Distribution Infrastructure Ant. Keywords: Wireless Sensor Networks, Critical Infrastructure Protection, Electrical Energy Distribution of critical points of failure. Fig. 1. MV/LV electricity distribution infrastructure. The Wireless Sensor

Boyer, Edmond

27

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

28

17 - Protecting Commercial and Institutional Critical Infrastructure  

Science Journals Connector (OSTI)

This chapter focuses on protecting commercial and institutional sectors, including retail businesses, banks and financial businesses, educational institutions (a subsector of government facilities), and healthcare and public health institutions. Each of these topics begins with a broad perspective from U.S. Department of Homeland Security Sector-Specific Plans. Keywords shrinkage, shopping service, checkout counters, point-of-sale (POS) accounting systems, exception reporting, counterfeiting, kleptomania, organized retail theft, electronic article surveillance, source tagging, civil recovery, robbery, burglary, substitutability, U.S. Department of the Treasury, Bank Protection Act (BPA) of 1968, savings and loan (S&L) scandal, Bank Secrecy Act of 1986, Anti-Drug Abuse Act of 1988, The Antiterrorism and Effective Death Penalty Act of 1996, Gramm-Leach-Bliley Act of 1999, USA Patriot Act of 2001, Sarbanes-Oxley (SOX) Act of 2002, Regulation H, Code of Federal Regulations, suspicious activity reports, money laundering, tear gas/dye packs, Global Positioning System (GPS), skimming, Gun-Free Schools Act, zero-tolerance policy, Family Educational Rights and Privacy Act, Gang Resistance Education and Training (GREAT), soft targets, Safe and Drug-Free Schools and Communities Act, hard targets, Columbine High School massacre, Beslan Elementary School massacre, Virginia Tech massacre, Student-Right-to-Know and Campus Security Act of 1990, Campus Sexual Assault Victims Bill of Rights, community policing, Emergency Medical Treatment and Active Labor Act, Health Insurance Portability and Accountability Act of 1996 (HIPAA), The Joint Commission, National Center for Missing and Exploited Children, Controlled Substances Act of 1970, first receivers, personal protective equipment (PPE), Public Health Security and Bioterrorism Preparedness and Response Act of 2002, Centers for Disease Control and Prevention (CDC)

Philip P. Purpura

2013-01-01T23:59:59.000Z

29

Cyber Security & Smart Grid  

E-Print Network (OSTI)

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

30

An inter-realm, cyber-security infrastructure for virtual supercomputing  

SciTech Connect

Virtual supercomputing, (ise ., high-performance grid computing), is poised to revolutionize the way we think about and use computing. However, the security of the links interconnecting the nodes within such an environment will be its Achilles heel, particularly when secure communication is required to tunnel through heterogeneous domains. In this paper we examine existing security mechanisms, show their inadequacy, and design a comprehensive cybersecurity infrastructure that meets the security requirements of virtual supercomputing. Keywords Security, virtual supercomputing, grid computing, high-performance computing, GSS-API, SSL, IPsec, component-based software, dynamic reconfiguration.

Al-Muhtadi, J. (Jalal); Feng, W. C. (Wu-Chun); Fisk, M. E. (Mike E. )

2001-01-01T23:59:59.000Z

31

Help for the Developers of Control System Cyber Security Standards  

SciTech Connect

A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

Robert P. Evans

2008-05-01T23:59:59.000Z

32

CYBER SECURITY OF SUBSTATION AUTOMATION SYSTEMS .  

E-Print Network (OSTI)

??Cyber intrusions into substations of a power grid are a source of vulnerability since most substations are unmanned and with limited protection of the cyber (more)

[No author

2014-01-01T23:59:59.000Z

33

Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior  

Science Journals Connector (OSTI)

Abstract To protect complex power-grid control networks, efficient security assessment techniques are required. However, efficiently making sure that calculated security measures match the expert knowledge is a challenging endeavor. In this paper, we present EliMet, a framework that combines information from different sources and estimates the extent to which a control network meets its security objective. Initially, EliMet passively observes system operators' online reactive behavior against security incidents, and accordingly refines the calculated security measure values. To make the values comply with the expert knowledge, EliMet actively queries operators regarding those states for which sufficient information was not gained during the passive observation. Finally, EliMet makes use of the estimated security measure values for predictive situational awareness by ranking potential cyber-physical contingencies that the security administrators should plan for upfront. Our experimental results show that EliMet can optimally make use of prior knowledge as well as automated inference techniques to minimize human involvement and efficiently deduce the expert knowledge regarding individual states of that particular system.

Saman Zonouz; Parisa Haghani

2013-01-01T23:59:59.000Z

34

Microsoft Word - OE Cyber Release 10 18 07.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These projects will

35

infrastructure  

National Nuclear Security Administration (NNSA)

for Infrastructure and Operations develops and executes NNSA's infrastructure investment, maintenance, and operations programs and policies.

...

36

Networks, deregulation, and risk : the politics of critical infrastructure protection  

E-Print Network (OSTI)

system, rail network, and electric power grid operate reliably; minor disruptionspower system underscore the need to create cybersecurity standards to confront the threat of terrorism and intentional disruption.systems to disruption via cyber means. ? 31 Recall, the reorganization of electric power

Ellis, Ryan Nelson

2011-01-01T23:59:59.000Z

37

First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems  

Science Journals Connector (OSTI)

This extended abstract reports on steps towards an environment for repeatable and scalable experiments on wide-area cyber-physical systems. The cyber-physical systems that underlie the world's critical infrastructure are increasingly vulnerable to attack ... Keywords: cyber-physical, cyber-security, experimental research, overlay network, smart grid, testbed

Ryan Goodfellow; Robert Braden; Terry Benzel; David E. Bakken

2013-01-01T23:59:59.000Z

38

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

39

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

40

Cognitive Cyber Weapon Selection Tool Empirical Evaluation.  

E-Print Network (OSTI)

??Keeping in pace with the latest technological innovations in the cyber world, the misuse of this powerful infrastructure has also increased proportionally. Although a lot (more)

Ponangi, Preethi Vinayak

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 Steps to Improve Cyber Security of SCADA Networks 1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in cyber space today. By allowing the collection and analysis of data and control of equipment such as pumps and valves from remote locations, SCADA networks provide great efficiency and are widely used. However, they also present a security risk. 21 Steps to Improve Cyber Security of SCADA Networks

42

Report of the Cyber Security Research Needs for Open Science...  

Energy Savers (EERE)

Report of the Cyber Security Research Needs for Open Science Workshop Report of the Cyber Security Research Needs for Open Science Workshop Protecting systems and users, while...

43

INL@Work Cyber Security  

SciTech Connect

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

44

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z

45

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

46

Emergency response: an investigation on a possibility of establishing valuable flood protecting infrastructures in Bangkok  

Science Journals Connector (OSTI)

This paper aims to study the flooding event in Bangkok in 2011. Its objective is to seek for the possibility of creating the new flood preventing infrastructures, which may help reducing the flood impacts to the city in future crises, as well as to create a plan regarding to the creation of them in term of locations and sizes. The investigations on Bangkok's population and critical infrastructures suggested that the central area of Bangkok should be protected. As a result, the locations of the proposing infrastructures were selected accordingly and they are expecting to protect 76.02% of the population. Finally, it is concluded that this investment can be considered as worthwhile investment, in the case where there is a possibility that similar disaster may happen in the future, since the beneficial analysis showed that the value of preventable damages significantly exceeds the costs and expenses of the proposing infrastructures.

Thavalit Kampanartkosol

2013-01-01T23:59:59.000Z

47

White Paper: The Clinton Administration's Policy on Critical Infrastructure Protection: Presidential Decision Directive 63  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PAPER PAPER The Clinton Administration's Policy on Critical Infrastructure Protection: Presidential Decision Directive 63 May 22, 1998 WHITE PAPER The Clinton Administration's Policy on Critical Infrastructure Protection: Presidential Decision Directive 63 May 22, 1998 This White Paper explains key elements of the Clinton Administration's policy on critical infrastructure protection. It is intended for dissemination to all interested parties in both the private and public sectors. It will also be used in U.S. Government professional education institutions, such as the National Defense University and the National Foreign Affairs Training Center, for coursework and exercises on interagency practices and procedures. Wide dissemination of this unclassified White Paper is encouraged by all agencies of the U.S.

48

Seismic protection of critical infrastructures through innovative technologies  

Science Journals Connector (OSTI)

Development of new technologies for seismic protection will better support the sustainable urban systems. The paper focuses on development of an innovative technology for seismic protection of bridges using smart materials. The seismic protection of structures with the use of special devices is widely accepted as a very effective technique, both for new constructions and for retrofitting of existing ones. Shape memory alloys show the potential to eliminate the limitations of the present technologies, presenting broader application domain. Damper cum restraining device with recentering capabilities has been developed within the laboratory and shake table experiments were conducted on an equivalent SDOF system for a specific narrow band spectrum. The model was subjected to a strong resonant earthquake ground motion in the horizontal direction and analytical investigations were carried out. The damper is found to be very effective for seismic performance enhancement of critical facilities like bridges offering great benefits for the sustainable development of urban systems.

R. Sreekala; N. Gopalakrishnan; K. Muthumani; K. Sathishkumar; G.V. Rama Rao; Nagesh R. Iyer

2013-01-01T23:59:59.000Z

49

Chapter_14_Cyber_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

50

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

51

Policing Cyber Hate, Cyber Threats and Cyber Terrorism  

Science Journals Connector (OSTI)

What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. This ground-breaking text provides a comprehensive understanding of the range of activities ...

Imran Awan; Brian Blakemore

2012-07-01T23:59:59.000Z

52

Publication and Protection of Sensitive Site Information in a Grid Infrastructure  

SciTech Connect

In order to create a successful grid infrastructure, sites and resource providers must be able to publish information about their underlying resources and services. This information makes it easier for users and virtual organizations to make intelligent decisions about resource selection and scheduling, and can be used by the grid infrastructure for accounting and troubleshooting services. However, such an outbound stream may include data deemed sensitive by a resource-providing site, exposing potential security vulnerabilities or private user information to the world at large, including malicious entities. This study analyzes the various vectors of information being published from sites to grid infrastructures. In particular, it examines the data being published to, and collected by the Open Science Grid, including resource selection, monitoring, accounting, troubleshooting, logging and site verification data. We analyze the risks and potential threat models posed by the publication and collection of such data. We also offer some recommendations and best practices for sites and grid infrastructures to manage and protect sensitive data.

Cholia, Shreyas; Cholia, Shreyas; Porter, R. Jefferson

2008-03-31T23:59:59.000Z

53

Cyber Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

54

GAO-07-1036, CRITICAL INFRASTRUCTURE PROTECTION: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Congressional Requesters Congressional Requesters CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain September 2007 GAO-07-1036 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2007 CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain Highlights of GAO-07-1036, a report to congressional requesters Control systems-computer-based systems that monitor and control sensitive processes and physical functions-perform vital functions in many of our nation's critical infrastructures, including electric power, oil and gas, water treatment, and chemical production. The disruption of

55

DOE Issues Energy Sector Cyber Organization NOI  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues National Energy Sector Cyber Organization Notice of Intent Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. The cyber organization is expected to have the knowledge, expertise, capabilities, and capacity, at a minimum to: * Identify and prioritize cyber security research and development issues.

56

Cyber Incident Information | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Services » Guidance » Privacy » Cyber Incident Information Services » Guidance » Privacy » Cyber Incident Information Cyber Incident Information July 2013 Cyber Incident The Department of Energy has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information (PII). January 2013 Cyber Incident The Department of Energy (DOE) has confirmed a cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information (PII). Tips to Monitor Your Identity Here is a suggested list of tips to monitor and protect yourself. Assistive Technology Forms Guidance Capital Planning Information Collection Management

57

Chapter 20 - Cyber Security Countermeasures to Combat Cyber Terrorism  

Science Journals Connector (OSTI)

Abstracts: In this chapter we first consider what constitutes cyber terrorism, to distinguish such events from other forms of cybercrime, and to establish a rationale for that distinction. We discuss some of the characteristics of cyber terrorist events in comparison with cybercriminal events, and the changes that have occurred, socially and technologically, that make such events both more likely and more damaging. We then go on to consider three key aspects of cyber terrorist attacks, cyber attacks on physical systems, malware specifically developed for such attacks, and insider threats to enable or support such attacks. Next, we look at the countermeasures that can be adopted by organizations and individuals to address such threats, highlighting the significant human component of such systems through the need for standards-based policies and protocols, good security hygiene, and the training of system users at all levels. We also consider some issues of physical systems upgrade, and some software measures that can be used to identify and isolate cyber threats. Finally, we consider the future in terms of the likely further growth of cyber terrorist events, and the threat they pose to critical infrastructure and the systems on which, socially and technologically, we increasingly rely.

Lachlan MacKinnon; Liz Bacon; Diane Gan; Georgios Loukas; David Chadwick; Dimitrios Frangiskatos

2013-01-01T23:59:59.000Z

58

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

59

INFRASTRUCTURE Engineering and Physical Sciences  

E-Print Network (OSTI)

infrastructure and its competitiveness was 12th, down from 5th in 2005. The Council for Science and Technology2Engineering Sensor Development CyberSecurity SustainableEnergy Networks EnergyStorag e #12;EPSRC investment supports

Berzins, M.

60

Intrusion-Tolerant Self-Healing Devices for Critical Infrastructure Protection Paulo Sousa, Alysson N. Bessani, Wagner S. Dantas, Fabio Souto, Miguel Correia, Nuno F. Neves  

E-Print Network (OSTI)

}@lasige.di.fc.ul.pt, {mpc, nuno}@di.fc.ul.pt Abstract Critical infrastructures like the power grid are essen- tially different resilience requirements. 1. Introduction Critical infrastructures (CI) like the power grid are esIntrusion-Tolerant Self-Healing Devices for Critical Infrastructure Protection Paulo Sousa

Correia, Miguel

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Department of Energy Cyber Security Management Program  

Directives, Delegations, and Requirements

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

62

Department of Energy Cyber Security Management  

Directives, Delegations, and Requirements

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

63

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

64

Engineering Energy Systems of the Future as Cyber-Physical Ecosystems  

E-Print Network (OSTI)

Engineering Energy Systems of the Future as Cyber-Physical Ecosystems Marija Ilic, Carnegie Mellon University milic@andrew.cmu.edu Keynote at the Workshop on eNetworks as Infrastructure for the Future Cyber · Examples of existing and evolving energy industry architectures as particular cases of cyber- physical

Ilic, Marija D.

65

CyberPhysical System Security for the Electric Power Grid  

E-Print Network (OSTI)

INVITED P A P E R Cyber­Physical System Security for the Electric Power Grid Control in power research efforts aimed at enhancing the smart grid's application and infrastructure security. Finally­physical systems (CPS); cyber security; electric grid; smart grid; supervisory control and data acquisi- tion

Manimaran, Govindarasu

66

Cyber Friendly Fire: Research Challenges for Security Informatics  

SciTech Connect

This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a systems topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approachesare discussed.

Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

2013-06-06T23:59:59.000Z

67

Collaborative Utility Task Force Partners with DOE to Develop Cyber  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Collaborative Utility Task Force Partners with DOE to Develop Cyber Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure The Advanced Metering Infrastructure Security (AMI-SEC) Task Force announces the release of the AMI System Security Requirements, a first-of-its-kind for the utility industry that will help utilities procure and implement secure components and systems using a common set of security requirements. Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure More Documents & Publications AMI System Security Requirements - v1_01-1 Before the Senate Energy and Natural Resources Committee

68

Voluntary Protection Program Onsite Review, Infrastructure Support Contract Paducah Gaseous Diffusion Plant- March 2012  

Energy.gov (U.S. Department of Energy (DOE))

Evaluation to determine whether the Infrastructure Support Contract Paducah Gaseous Diffusion Plant is continuing to perform at a level deserving DOE-VPP Star recognition.

69

Voluntary Protection Program Onsite Review, Infrastructure Support Contract Paducah Gaseous Diffusion Plant- May 2013  

Energy.gov (U.S. Department of Energy (DOE))

Evaluation to determine whether Infrastructure Support Contract Paducah Gaseous Diffusion Plant is continuing to perform at a level deserving DOE-VPP Star recognition.

70

Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure  

SciTech Connect

Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

Suski, N; Wuest, C

2011-02-04T23:59:59.000Z

71

Cyber-Physical Systems CPS Program  

E-Print Network (OSTI)

prosthetics Critical Infrastructure More reliable and efficient power grid Highways that allow denser traffic hybridization of computational (logical), physical, and human action." Examples of cyber-physical systems devices and systems, next-generation power grid, future defense systems, next-generation automobiles

Rajkumar, Ragunathan "Raj"

72

Cyber Incidents Involving Control Systems  

SciTech Connect

The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

Robert J. Turk

2005-10-01T23:59:59.000Z

73

Data Intensive Architecture for Scalable Cyber Analytics  

SciTech Connect

Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. In this paper, we describe a prototype implementation designed to provide cyber analysts an environment where they can interactively explore a months worth of cyber security data. This prototype utilized On-Line Analytical Processing (OLAP) techniques to present a data cube to the analysts. The cube provides a summary of the data, allowing trends to be easily identified as well as the ability to easily pull up the original records comprising an event of interest. The cube was built using SQL Server Analysis Services (SSAS), with the interface to the cube provided by Tableau. This software infrastructure was supported by a novel hardware architecture comprising a Netezza TwinFin for the underlying data warehouse and a cube server with a FusionIO drive hosting the data cube. We evaluated this environment on a months worth of artificial, but realistic, data using multiple queries provided by our cyber analysts. As our results indicate, OLAP technology has progressed to the point where it is in a unique position to provide novel insights to cyber analysts, as long as it is supported by an appropriate data intensive architecture.

Olsen, Bryan K.; Johnson, John R.; Critchlow, Terence J.

2011-12-19T23:59:59.000Z

74

Cyber Security Requirements for Wireless Devices and Information Systems  

Directives, Delegations, and Requirements

The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-11T23:59:59.000Z

75

Cyber Train Videos | The Ames Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Train Videos 1. Cyber Train Overview 2. Cyber Train Opt-Out Process 3. Cyber Train Complete Training 4. Submitting Course Completion Materials...

76

Toward an ontology framework supporting the integration of geographic information with modeling and simulation for critical infrastructure protection  

SciTech Connect

Protecting the nation's infrastructure from natural disasters, inadvertent failures, or intentional attacks is a major national security concern. Gauging the fragility of infrastructure assets, and understanding how interdependencies across critical infrastructures affect their behavior, is essential to predicting and mitigating cascading failures, as well as to planning for response and recovery. Modeling and simulation (M&S) is an indispensable part of characterizing this complex system of systems and anticipating its response to disruptions. Bringing together the necessary components to perform such analyses produces a wide-ranging and coarse-grained computational workflow that must be integrated with other analysis workflow elements. There are many points in both types of work flows in which geographic information (GI) services are required. The GIS community recognizes the essential contribution of GI in this problem domain as evidenced by past OGC initiatives. Typically such initiatives focus on the broader aspects of GI analysis workflows, leaving concepts crucial to integrating simulations within analysis workflows to that community. Our experience with large-scale modeling of interdependent critical infrastructures, and our recent participation in a DRS initiative concerning interoperability for this M&S domain, has led to high-level ontological concepts that we have begun to assemble into an architecture that spans both computational and 'world' views of the problem, and further recognizes the special requirements of simulations that go beyond common workflow ontologies. In this paper we present these ideas, and offer a high-level ontological framework that includes key geospatial concepts as special cases of a broader view.

Ambrosiano, John J [Los Alamos National Laboratory; Bent, Russell W [Los Alamos National Laboratory; Linger, Steve P [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

77

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

78

Cyber Security Architecture Guidelines  

Directives, Delegations, and Requirements

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

79

Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program (CSP) that protects information and information systems for the Department of Energy (DOE). Chg 1 dated 12-7-2012; Chg 2 dated 3-11-2013; Chg 3, dated 4-29-2014, cancels Chg 2.

2011-05-16T23:59:59.000Z

80

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Cyber Security Summer School: Lessons for the Modern Grid | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid June 20, 2011 - 4:34pm Addthis Carol Hawk Program Manager, Cyber Security for Energy Delivery Systems What does this mean for me? Computer systems do more than store and share information. They help control our traffic lights, trains and specifically, our electric grid -- tasks for which continuous function is the primary concern. Protecting control systems on the grid from cyber attack requires a completely different approach to cyber security than information technology systems. The Cyber Summer School gave aspiring attendees a practical understanding of the connection between power systems and computer science required to secure a clean, reliable energy future.

82

Cyber security best practices for the nuclear industry  

SciTech Connect

When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)

2012-07-01T23:59:59.000Z

83

Cyber sleuths face off  

NLE Websites -- All DOE Office Websites (Extended Search)

to plasma physics and new materials. Contact Communications Office (505) 667-7000 Hacking skills put to the test in week of hands-on cyber warfare training LOS ALAMOS, New...

84

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

85

Multilayered IT Security Requirements and Measures for the Complex Protection of Polish Domain-Specific Grid Infrastructure  

Science Journals Connector (OSTI)

The security of the Polish Domain-Specific Grid Infrastructure relies on applying appropriate security standards and practices by five Polish HPC ... We review both aspects of assuring in-depth security in the Po...

Bart?omiej Balcerek; Gerard Frankowski

2014-01-01T23:59:59.000Z

86

Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices  

E-Print Network (OSTI)

these requirements, some technologies such as Phasor Measurement Unit (PMU), Flexible AC Transmission System (FACTS. Therefore, cyber physical security is vitally important for smart grid infrastructure. The data representing on the U.S. infrastructure increased 17-fold from 2009 to 2011 [4]. The Supervisory Control and Data

Kundur, Deepa

87

Cyber security analysis testbed : combining real, emulation, and simulation.  

SciTech Connect

Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

2010-07-01T23:59:59.000Z

88

Departmental Cyber Security Management Policy  

Directives, Delegations, and Requirements

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

89

Cyber Security Process Requirements Manual  

Directives, Delegations, and Requirements

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

90

Cyber Security Requirements for Risk Management  

Directives, Delegations, and Requirements

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

91

Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012; Chg 2, dated 3-11-13.

2011-05-16T23:59:59.000Z

92

Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012.

2011-05-16T23:59:59.000Z

93

Obama's Call for Public-Private Cyber Security Collaboration Reflected in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obama's Call for Public-Private Cyber Security Collaboration Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities May 29, 2009 - 4:08pm Addthis In releasing the results of his Administration's 60-day cyber security review, President Barack Obama today emphasized that partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the computer-based systems that monitor and control the nation's electric grid and oil and gas pipelines remains a shared challenge for the Department of Energy. As the industry quickly works to develop and demonstrate Smart Grid technologies to build a more reliable and resilient

94

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines September 2, 2010 - 3:15pm Addthis WASHINGTON, D.C. - The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats. The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set

95

The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice  

Science Journals Connector (OSTI)

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and ...

Steve Winterfeld; Jason Andress

2012-12-01T23:59:59.000Z

96

A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure  

Science Journals Connector (OSTI)

Key management for secure communications of Advanced Metering Infrastructure is an unsolved problem until now. The ... proposing a key management scheme based on a hybrid-tree graph for AMI. The cyber security...

Jinshan Chen; Nian Liu; Wenxia Liu; Hong Luo

2011-01-01T23:59:59.000Z

97

PACIFIC NORTHWEST CYBER SUMMIT  

SciTech Connect

On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energys (DOEs) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOEs Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.

Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.; Smith, Karen S.

2013-08-07T23:59:59.000Z

98

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

99

Information Security: Coordination of Federal Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

100

Cyber Security Process Requirements Manual  

Directives, Delegations, and Requirements

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

The Cyber Security Crisis  

SciTech Connect

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

102

Cyber Defense Overview  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

infrastructure. New threats demand new defenses Page-3 SPIDERS Program Summary CAMP SMITH ENERGY ISLAND * Entire Installation Smart Microgrid * Islanded Installation * High...

103

THE ADVANCED COURSE IN ENGINEERING ON CYBER A Learning Community for Developing Cyber-Security Leaders  

E-Print Network (OSTI)

THE ADVANCED COURSE IN ENGINEERING ON CYBER SECURITY A Learning Community for Developing Cyber-Security in Engineering, ACE-CS immerses students in the cyber-security discipline through a combination of intense in Engineering on Cyber Security (ACE-CS) [1] is to develop the next generation of cyber-security leaders

Older, Susan

104

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

105

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

106

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

107

DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues Energy Sector Cyber Organization NOI, Feb 2010 Issues Energy Sector Cyber Organization NOI, Feb 2010 DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. DOE Issues Energy Sector Cyber Organization NOI More Documents & Publications FAQ: Funding Opportunity Announcement-Smart Grid Investment Grants Grantsdown.xls Before the House Science and Technology Subcommittee on Energy and

108

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Office of Environmental Management (EM)

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY...

109

DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS. Key Cyber...

110

Cyber-Physical Systems for Optimal Energy Management Scheme of Autonomous Electric Vehicle  

Science Journals Connector (OSTI)

......cyber-physical systems; autonomous electric vehicle; energy management...applications [e.g., autonomous electric vehicle (AEV) with wireless...systems, such as aircrafts and automobiles, to large-scale systems...infrastructure that supplies electric energy for the recharging......

Jiafu Wan; Hehua Yan; Di Li; Keliang Zhou; Lu Zeng

2013-08-01T23:59:59.000Z

111

Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

112

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

113

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

114

Monitoring Advanced Metering Infrastructures with Amilyzer  

E-Print Network (OSTI)

-way communications between smart meters and utility control centers. They are a key component of the smart grid mechanisms are part of communication standards such as the ANSI #12;C12.22. While those protective measures detecting intrusions in IT environments have been developed and evaluated. Through the Trustworthy Cyber

Sanders, William H.

115

Energy Cyber Other Degree Program  

E-Print Network (OSTI)

Rev. Energy Cyber Other Yes No Degree Program States National Security Implications of Energy & Environmental Stress New Theories of Cross-Advisor: Graduation Date: Curric Num: Power and Energy New Approaches to Understanding Dimensions of National Security

116

Cyber Security Process Requirements Manual  

Directives, Delegations, and Requirements

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

117

Cyber Attacks, Prevention, and Countermeasures  

Science Journals Connector (OSTI)

In response to the ever-increasing number of cyber attacks on both private companies and the United States government, U.S. Congress has introduced the Cybersecurity Enhancement Act of 2007, the National Commi...

Newton Lee

2013-01-01T23:59:59.000Z

118

Visualizing Cyber Security: Usable Workspaces  

SciTech Connect

An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

2009-10-11T23:59:59.000Z

119

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

120

Strengthening Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

E E n E rgyB i z November/December 2008 » TECHNOLOGY FRONTIER (Guest OpiniOn) remOte attaCks On systems that control power production and distribution are no longer hypothetical events. At least four utilities have been subjected to extortion demands by criminals who used the Internet to infect the utilities' computers and caused or threatened power outages. Cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption caused a power outage affecting multiple cities. These are criminal acts, but nation-states are actively targeting utility computers, as well, so that in time of war they can turn off their adversary's power. While all this is happening, most executives in the

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Pacific Basin Nuclear Conference (PBNC 2012), BEXCO, Busan, Korea, March 18 ~ 23, 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS  

E-Print Network (OSTI)

PBNC 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS Kwangjo Kim KAIST, Daejeon, Korea.kim@kustar.ac.ae Abstract Nuclear Power Plants (NPPs) become one of the most important infrastructures in providing improvement. 1. Introduction Nuclear Power Plants (NPPs) become one of the most important infrastructures

Kim, Kwangjo

122

Convergence Approach to Model Physical World and Cyber World of Aviation Cyber Physical System  

Science Journals Connector (OSTI)

Aviation Cyber-Physical Systems are the integration of cyber systems and physical systems. Recent concentration to Aviation Cyber Physical Systems (ACPS) is driven by the demand for deeper Convergence of design disciplines that integrate physical and ... Keywords: Aviation Cyber Physical System CPS, Modelica, AADL, SysML, Spatial-Temporal Features, Dynamic Continuous Features

Lichen Zhang

2014-08-01T23:59:59.000Z

123

THE ADVANCED COURSE IN ENGINEERING ON CYBER A Learning Community for Developing Cyber-Security Leaders  

E-Print Network (OSTI)

THE ADVANCED COURSE IN ENGINEERING ON CYBER SECURITY A Learning Community for Developing Cyber-Security Advanced Course in Engineering, ACE-CS immerses students in the cyber-security discipline through for the program. Key words: Cyber-security education, technical leadership, learning community. 1. INTRODUCTION

124

Social infrastructure  

E-Print Network (OSTI)

Current urbanization patterns and aging transportation infrastructures have marginalized millions of US citizens. The result is that 4 .5 million US residents live within 100 meters of a four-lane highway' and have become ...

Kurlbaum, Ryan E. (Ryan Edward)

2013-01-01T23:59:59.000Z

125

LOGISTICS INFRASTRUCTURE  

Science Journals Connector (OSTI)

exist at the national and company levels. The national consists of a nation's air, motor, rail, and shipping systems. This infrastructure consists of miles of improved highways, miles of railroad tracks, ...

2000-01-01T23:59:59.000Z

126

Green Infrastructure  

E-Print Network (OSTI)

SWM, Green Buildings, Energy Forum, Texas Smartscape) ? Deteriorating Roadways ? ASCE Report Card on Texas Infrastructure for 2008 identified roads as the #1 infrastructure concern ? Congestion ? DFW congestion is growing over 45% faster than... the national average (TTI) ? Crowded existing ROW ? utilities, pavement, sidewalk, parkway, etc. - with little room for widening Sustainable Public Rights of Way Subcommittee ? Subcommittee reports to the PWC ? Consists of PWC and other major interests...

Tildwell, J.

2011-01-01T23:59:59.000Z

127

The Fragmented Securitization of Cyber Threats  

Science Journals Connector (OSTI)

Cybersecurity is one of the most pressing national security issues nowadays. Cyber threats reached truly global scales, cyber attacks that potentially or actually cause physical damage are on the rise, and sec...

Agnes Kasper

2014-01-01T23:59:59.000Z

128

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

129

Protecting IT Systems from Cyber Crime  

Science Journals Connector (OSTI)

......company's own personnel. The rotation of...vetting and security training of that staff more...than for intramural personnel. (However, it...utilization, its operating procedures--and...Security awareness training (2) Integrated...PRIORITIZATION IN THE SELECTION OF DEFENCE OPTIONS......

R. Benjamin; B. Gladman; B. Randell

1998-01-01T23:59:59.000Z

130

Protecting Intelligent Distributed Power Grids Against Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But...

131

Materials Informatics for the ICME CyberInfrastructure  

Energy.gov (U.S. Department of Energy (DOE))

2011 DOE Hydrogen and Fuel Cells Program, and Vehicle Technologies Program Annual Merit Review and Peer Evaluation

132

PROTECTING URBAN FOREST INFRASTRUCTURE DURING  

E-Print Network (OSTI)

of Forestry, Horticulture, & Natural Resources New York City Parks & Recreation ISA Board Certified Master: 8 Regional Parks $386 million 290 Open Schoolyards $96 million 36 Field Lighting Sites $42 million

Minnesota, University of

133

Sandia National Laboratories: infrastructure protection  

NLE Websites -- All DOE Office Websites (Extended Search)

Doppler Velocimeter EC Top Publications A Comparison of Platform Options for Deep-water Floating Offshore Vertical Axis Wind Turbines: An Initial Study Nonlinear Time-Domain...

134

Towards an Experimental Testbed Facility for Cyber-Physical Security Research  

SciTech Connect

Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

2012-01-07T23:59:59.000Z

135

Cyber Security Standards.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

136

Recommended Practice: Creating Cyber Forensics Plans for Control Systems  

SciTech Connect

Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.

Eric Cornelius; Mark Fabro

2008-08-01T23:59:59.000Z

137

BROOKHAVEN NATIONAL LABORATORYS CAPABILITIES FOR ADVANCED ANALYSES OF CYBER THREATS  

SciTech Connect

BNL has several ongoing, mature, and successful programs and areas of core scientific expertise that readily could be modified to address problems facing national security and efforts by the IC related to securing our nations computer networks. In supporting these programs, BNL houses an expansive, scalable infrastructure built exclusively for transporting, storing, and analyzing large disparate data-sets. Our ongoing research projects on various infrastructural issues in computer science undoubtedly would be relevant to national security. Furthermore, BNL frequently partners with researchers in academia and industry worldwide to foster unique and innovative ideas for expanding research opportunities and extending our insights. Because the basic science conducted at BNL is unique, such projects have led to advanced techniques, unlike any others, to support our mission of discovery. Many of them are modular techniques, thus making them ideal for abstraction and retrofitting to other uses including those facing national security, specifically the safety of the nations cyber space.

DePhillips M. P.

2014-06-06T23:59:59.000Z

138

Cyber Assessment Methods for SCADA Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

139

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Reports Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO),

140

Transportation and its Infrastructure  

E-Print Network (OSTI)

Transport and its infrastructure Chapter 5 Hybrid vehiclesincluding hybrid- Transport and its infrastructure Chapter 5infrastructure Gt CO 2 -eq 1 - Diesels (LDVs) 2 - Hybrids (

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Transportation Infrastructure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Infrastructure Infrastructure New Technologies * Potential need for dual-use casks * DOE should look toward industry & international communities for innovations * Industry unclear about delivery & receipt locations * Advances in physical & tracking technologies need to be factored in * Cost-benefit analysis of new technology Training & Dry Runs * Begin as soon as possible * Suggested order: #1-demonstrations, #2-training, #3-dry-runs * Don't re-invent the wheel- look at international programs * Allows DOE to test POC info/training * Standardization of training & materials * DOE should consider centralized training center * Use real equipment in dry- runs * Need for regionalized dry runs Packages * Full-scale Testing - Funds requested in 2003, potential use of

142

Cyber-Security of Networked Control Systems Karl Henrik Johansson  

E-Print Network (OSTI)

7/3/12 1 Cyber-Security of Networked Control Systems Karl Henrik Johansson #12;7/3/12 2 Recent Cyber-ARacks on Control Systems Cyber-Security of Networked

Johansson, Karl Henrik

143

Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security  

Science Journals Connector (OSTI)

The cyber attack risks are threatening the smart grid security. Malicious worm could spread from meter to ... ) has thus developed several iterations of cyber security standards. According to the NERC cyber stand...

Yong Wang; Da Ruan; Jianping Xu; Mi Wen; Liwen Deng

2010-01-01T23:59:59.000Z

144

The Technology of Cyber Operations Symposium on Cyber Operations and National  

E-Print Network (OSTI)

operations can be conducted with plausible deniability But adversaries make mistakes too, and allThe Technology of Cyber Operations Herb Lin Symposium on Cyber Operations and National Security not acknowledge role of offensive operations. · Offensive cyber operations can also have non-defensive purposes

145

OCIO Technology Summit: Cyber Innovation | Department of Energy  

Energy Savers (EERE)

Articles OCIO Technology Summit: Cyber Innovation OCIO Technology Summit: Data Analytics OCIO Technology Summit: Cyber Innovation OCIO Technology Summit: High Performance Computing...

146

Common Cyber Security Vulnerabilities Observed in Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

147

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA Cybersecurity Program Manager (CSPM...

148

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

149

Office of Electricity Delivery and Energy Reliability Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On...

150

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

151

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

152

Sandia National Laboratories: Sandia Cyber Engineering Research...  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyberdefenders * CERL * computer security * Cyber Engineering Research Laboratory * cybersecurity * SAND2013-2827P * Sandia computing expertise * Sandia Science & Technology Park...

153

Security and Cyber Guidance | Department of Energy  

Office of Environmental Management (EM)

April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Performance Testing Guidance & Information Composite Adversary Team Brochure - April 9, 2008...

154

Graph anomalies in cyber communications  

SciTech Connect

Enterprises monitor cyber traffic for viruses, intruders and stolen information. Detection methods look for known signatures of malicious traffic or search for anomalies with respect to a nominal reference model. Traditional anomaly detection focuses on aggregate traffic at central nodes or on user-level monitoring. More recently, however, traffic is being viewed more holistically as a dynamic communication graph. Attention to the graph nature of the traffic has expanded the types of anomalies that are being sought. We give an overview of several cyber data streams collected at Los Alamos National Laboratory and discuss current work in modeling the graph dynamics of traffic over the network. We consider global properties and local properties within the communication graph. A method for monitoring relative entropy on multiple correlated properties is discussed in detail.

Vander Wiel, Scott A [Los Alamos National Laboratory; Storlie, Curtis B [Los Alamos National Laboratory; Sandine, Gary [Los Alamos National Laboratory; Hagberg, Aric A [Los Alamos National Laboratory; Fisk, Michael [Los Alamos National Laboratory

2011-01-11T23:59:59.000Z

155

Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions  

SciTech Connect

Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

Maiden, Wendy M.

2009-12-01T23:59:59.000Z

156

Microgrid cyber security reference architecture.  

SciTech Connect

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

157

Energy Critical Infrastructure and Key Resources Sector-Specific  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Energy Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) May 2007 Department of Energy Energy Sector Government Coordinating Council Letter of Support i ii Energy Sector-Specific Plan (Redacted) Energy Sector Coordinating Councils Letter of Concurrence The National Infrastructure Protection Plan (NIPP) provides the unifying structure for the integration of federal critical infrastructures and key resources (CI/KR) protection efforts into a single national program. The NIPP includes an overall framework integrating federal programs and activities that are currently underway in the various sectors, as well as new and developing CI/KR protection efforts. The Energy

158

Energy: Critical Infrastructure and Key Resources Sector-Specific...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

comprehensive risk management framework that defines critical infrastructure protection (CIP) roles and responsibilities for all levels of government, private industry, and other...

159

From Manual Cyber Attacks Forensic to  

E-Print Network (OSTI)

From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut-00995211,version1- #12;From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers, or governmental organisations. Experimental results of these forensic and high level characteriza- tion methods

Paris-Sud XI, Université de

160

Cyber-Physical System Verification Embedded Systems Group  

E-Print Network (OSTI)

(Felipe Bichued) 21 Introducing Simulation of Hybrid Systems with the Modelica Tool 32 #12;Cyber Physical

Berns, Karsten

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

A Two-Constraint Approach to Risky CyberSecurity  

E-Print Network (OSTI)

A Two-Constraint Approach to Risky CyberSecurity Experiment Management John Wroclawski, Jelena Mirkovic, Ted Faber, Stephen Schwab #12;Risky CyberSecurity Research CyberSecurity systems becoming more;Domains of interest Traditional risky experiment Virus dissection Modern risky CyberSecurity

Faber, Ted

162

The Science, Engineering, and Business of Cyber Security  

E-Print Network (OSTI)

's nuclear football © Ravi Sandhu 7 World-Leading Research with Real-World Impact! Cyber Security Goal ManyThe Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University of Texas at San

Sandhu, Ravi

163

Gamification for Measuring Cyber Security Situational Awareness  

SciTech Connect

Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

2013-03-01T23:59:59.000Z

164

Cyber Innovation Technology Summit | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Innovation Technology Summit Cyber Innovation Technology Summit Cyber Innovation Technology Summit November 5, 2013 8:00AM EST Course Title: Cyber Innovation Technology Summit Course Start/End Date: November 5, 2013 Start/End Time: 8:00AM-12:00 PM Course Type: Classrooom Course Location: Forrestal Large Auditorium Course Description: Every October and November, the Department of Energy (DOE) joins the Department of Homeland Security (DHS) and other federal, state and local agencies across the country in support of National Cybersecurity Awareness Month and the "Stop. Think. Connect." campaign. This year marks the tenth year of the cyber security awareness campaign. The theme for this year is Achieving Cybersecurity Together: It's Our Shared Responsibility. By consistently following simple

165

Cyber security in the Smart Grid: Survey and challenges  

Science Journals Connector (OSTI)

The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, the Smart Grid is expected to greatly enhance efficiency and reliability of future power systems with renewable energy resources, as well as distributed intelligence and demand response. Along with the silent features of the Smart Grid, cyber security emerges to be a critical issue because millions of electronic devices are inter-connected via communication networks throughout critical power facilities, which has an immediate impact on reliability of such a widespread infrastructure. In this paper, we present a comprehensive survey of cyber security issues for the Smart Grid. Specifically, we focus on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid. We aim to provide a deep understanding of security vulnerabilities and solutions in the Smart Grid and shed light on future research directions for Smart Grid security.

Wenye Wang; Zhuo Lu

2013-01-01T23:59:59.000Z

166

Michigan SHOPP  

Annual Energy Outlook 2012 (EIA)

statistical analysis * Critical infrastructure protection * Cyber Security * MPSC website operations MICHIGAN PUBLIC SERVICE COMMISSION Energy Market Monitoring * Monitoring...

167

Secure control systems with application to cyber-physical systems  

SciTech Connect

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

Dong, Jin [ORNL] [ORNL; Djouadi, Seddik M [ORNL] [ORNL; Nutaro, James J [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL

2014-01-01T23:59:59.000Z

168

Control Systems Cyber Security:Defense in Depth Strategies  

SciTech Connect

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing defense-in-depth strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

David Kuipers; Mark Fabro

2006-05-01T23:59:59.000Z

169

Monitoring Infrastructure Capacity Monitoring Infrastructure Capacity  

E-Print Network (OSTI)

Levinson, D. (2000) Monitoring Infrastructure Capacity p. 165-181 in Land Market Monitoring for Smart Urban) task. Monitoring infrastructure capacity is at least as complex as monitoring urban land markets Levinson, D. (2000) Monitoring Infrastructure Capacity p. 165-181 in Land Market Monitoring for Smart Urban

Levinson, David M.

170

Infrastructure Institutional Change Principle  

Energy.gov (U.S. Department of Energy (DOE))

Research shows that changes in infrastructure prompt changes in behavior (for better or worse). Federal agencies can modify their infrastructure to promote sustainability-oriented behavior change,...

171

National cyber defense high performance computing and analysis : concepts, planning and roadmap.  

SciTech Connect

There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

172

Cyber Security Evaluations Appraisal Process Guide - April 2008 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 April 2008 Cyber Security Evaluations Appraisal Process Guide was developed for the purpose of documenting the appraisal approach and techniques specific to evaluations of classified and unclassified cyber security programs throughout DOE. Office of Cyber Security Evaluations Appraisal Process Guide provides additional insight into the Office of Cyber Security Evaluations (HS-62) evaluation approach and processes associated with assessing classified and unclassified cyber security programs. The objective of this document is to establish a standard approach and methodology for conducting cyber security reviews that is well understood by all inspection participants.

173

NETL: Carbon Storage - Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Infrastructure Carbon Storage Infrastructure The Infrastructure Element of DOE's Carbon Storage Program is focused on research and development (R&D) initiatives to advance geologic CO2 storage toward commercialization. DOE determined early in the program's development that addressing CO2 mitigation on a regional level is the most effective way to address differences in geology, climate, population density, infrastructure, and socioeconomic development. This element includes the following efforts designed to support the development of regional infrastructure for carbon capture and storage (CCS). Click on Image to Navigate Infrastructure Content on this page requires a newer version of Adobe Flash Player. Get Adobe Flash player Regional Carbon Sequestration Partnerships (RCSP) - This

174

Security and Cyber Evaluations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential

175

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

176

Chapter 2 - Definitions of Cyber Terrorism  

Science Journals Connector (OSTI)

Abstract The term cyber terror appeared for the first time in the mid-eighties. Since then the notion has been misused a number of times by journalists and politicians. It does not help that cyber terror does not have a clear, agreed definition. This chapter first analyses the background of the confusion. Secondly, the chapter provides a definition of cyber terrorism which aligns with national definitions of terrorism. From this, it becomes clear that no act of cyber terror has yet occurred. We need to be prepared however as the increasing societal critical reliance on ICT will make ICT systems and services as well as embedded ICT an interesting target for future terrorists.

Eric Luiijf

2014-01-01T23:59:59.000Z

177

A rational jurisdiction for cyber terrorism  

Science Journals Connector (OSTI)

Abstract Cyberspace is a cross-national world that transcends geopolitical national borders. Jurisdiction is the focal point for any dispute arising in the international arena, because it determines which state court has the authority to settle a dispute. The objective of this paper is to analyse territorial and universal jurisdiction principles which can be specifically related to cyberspace to determine which of them is best suited to providing the appropriate jurisdiction in combating cyber terrorism and how conflicts arising between them can be settled. The transnational nature of cyber terrorism offences leads to jurisdictional complexity, thereby investigation and prosecution is difficult. Lack of harmonisation in legislating among countries leads to difficulty in investigation and prosecution of cyber terrorism offences. This paper notes that universal jurisdiction is the most feasible and effective method to deter cyber terrorism.

Pardis Moslemzadeh Tehrani; Nazura Abdul Manap

2013-01-01T23:59:59.000Z

178

Model Transformation for Cyber Physical Systems  

Science Journals Connector (OSTI)

Cyber Physical Systems(CPS) are composed with discrete and continuous dynamics. Traditional modeling techniques cant implement the requirement of modeling CPS. One way of solving this is to model CPS parts wi...

Shuguang Feng; Lichen Zhang

2014-01-01T23:59:59.000Z

179

Cyber Security Audit and Attack Detection Toolkit  

SciTech Connect

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

180

A nexus of Cyber-Geography and Cyber-Psychology: Topos/Notopia and identity in hacking  

Science Journals Connector (OSTI)

This paper explores the Cyber-Psychological and Cyber-Geographic aspects of hacking and hacktivism. An examination of the literature related to hackers and hacking reveals a complex nexus of spatial (including cyber-spatial such as Notopia) and psychological aspects of hacking, from which emerges a central question of how humans perceive and manipulate their cyber-identities. Concealing (real and cyber) identities is typical in hacking. With our progressive acculturation with identity-less and place-less modes of existence, our cyber-identities through time may be studied from within John Lockes criterion of memory and the spatial-geographical criterion of identity.

Fivos Papadimitriou

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Interdependence of Electricity System Infrastructure and Natural...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Interdependence of Electricity System Infrastructure and Natural Gas Infrastructure - EAC 2011 Interdependence of Electricity System Infrastructure and Natural Gas Infrastructure -...

182

cyber  

National Nuclear Security Administration (NNSA)

and the review of information prior to public release or posting to publicly available web sites to assure it does not contain data that would assist an adversary.

183

Toward Developing Genetic Algorithms to Aid in Critical Infrastructure Modeling  

SciTech Connect

Todays society relies upon an array of complex national and international infrastructure networks such as transportation, telecommunication, financial and energy. Understanding these interdependencies is necessary in order to protect our critical infrastructure. The Critical Infrastructure Modeling System, CIMS, examines the interrelationships between infrastructure networks. CIMS development is sponsored by the National Security Division at the Idaho National Laboratory (INL) in its ongoing mission for providing critical infrastructure protection and preparedness. A genetic algorithm (GA) is an optimization technique based on Darwins theory of evolution. A GA can be coupled with CIMS to search for optimum ways to protect infrastructure assets. This includes identifying optimum assets to enforce or protect, testing the addition of or change to infrastructure before implementation, or finding the optimum response to an emergency for response planning. This paper describes the addition of a GA to infrastructure modeling for infrastructure planning. It first introduces the CIMS infrastructure modeling software used as the modeling engine to support the GA. Next, the GA techniques and parameters are defined. Then a test scenario illustrates the integration with CIMS and the preliminary results.

Not Available

2007-05-01T23:59:59.000Z

184

Cyber-security Research Ethics Dialogue & Strategy Erin Kenneally  

E-Print Network (OSTI)

Cyber-security Research Ethics Dialogue & Strategy Workshop Erin Kenneally CAIDA/UC, San Diego La The inaugural Cyber-security Research Ethics Dialogue & Strat- egy Workshop was held on May 23, 2013

California at San Diego, University of

185

NISTIR 7916 Proceedings of the Cybersecurity in Cyber-  

E-Print Network (OSTI)

NISTIR 7916 Proceedings of the Cybersecurity in Cyber- Physical Systems Workshop, April 23 ­ 24 of the Cybersecurity in Cyber- Physical Systems Workshop, April 23 ­ 24, 2012 Editor: Tanya Brewer Computer Security

186

National Environmental Information Infrastructure  

E-Print Network (OSTI)

National Environmental Information Infrastructure: Reference Architecture Contributing Information Infrastructure: Reference Architecture v1.1 Environmental Information Programme Publication Series: Reference Architecture, Environmental Information Programme Publication Series, document no. 4, Bureau

Greenslade, Diana

187

Formulating Cyber-Security as Convex Optimization Problems  

E-Print Network (OSTI)

Formulating Cyber-Security as Convex Optimization Problems Kyriakos G. Vamvoudakis, Jo~ao P. Mission-centric cyber-security analysts require a complete overview and understanding of the state. Keywords: Cyber-Security, Convex Optimization, System Identifica- tion, iCTF 1 Introduction Guaranteeing

Hespanha, João Pedro

188

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network (OSTI)

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director cai@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Squicciarini, Anna Cinzia

189

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network (OSTI)

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Giles, C. Lee

190

Formulating Cyber-Security as Convex Optimization Problems  

E-Print Network (OSTI)

Formulating Cyber-Security as Convex Optimization Problems? Kyriakos G. Vamvoudakis1 , Jo~ao P,vigna}@cs.ucsb.edu Abstract. Mission-centric cyber-security analysts require a complete overview and understanding The Flag (iCTF) hacking competition. Keywords: Cyber-Security, Convex Optimization, System Identifica- tion

Vigna, Giovanni

191

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain ... Keywords: Culture of security, Cyber crime, Cyber exploitation, Policing and preventative strategy, Public private partnership, Routine Activity Theory

Kim-Kwang Raymond Choo

2011-11-01T23:59:59.000Z

192

Modeling and simulation for cyber-physical system security research, development and applications.  

SciTech Connect

This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

2010-02-01T23:59:59.000Z

193

Ant-Based Cyber Security  

SciTech Connect

We describe a swarming-agent-based, mixed-initiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem by sharing insights and solutions without violating proprietary boundaries. The system places human administrators at the appropriate level where they provide system guidance while lower-level agents carry out tasks humans are unable to perform quickly enough to mitigate todays security threats. Cooperative Infrastructure Defense (CID) uses our ant-based approach to enable dialogue between humans and agents to foster a collaborative problem-solving environment, increase human situational awareness and influence using visualization and shared control. We discuss theoretical implementation characteristics along with results from recent proof-of-concept implementations.

Haack, Jereme N.; Fink, Glenn A.; Maiden, Wendy M.; McKinnon, Archibald D.; Templeton, Steven J.; Fulp, Errin W.

2011-07-12T23:59:59.000Z

194

Cyber Assessment Methods for SCADA Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

195

Los Alamos director echoes cyber concerns  

NLE Websites -- All DOE Office Websites (Extended Search)

Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Director Charlie McMillan told a gathering of energy executives that securing the electrical grid is a major concern now and it's only becoming more serious. May 21, 2013 Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Contact Fred deSousa

196

The Department's Unclassified Cyber Security Program - 2012, IG-0877  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information technology resources continues to expand, the number of cyber security threats against Federal agencies has also increased. In fact, Federal cyber security officials have warned that the number of cyber attackers has increased and that the Nation's

197

DOE Cyber Security Role, Competency and Functional Matrix  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

198

Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8

2011-05-16T23:59:59.000Z

199

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

infrastructure systems in the analysis of safety and stability - a significant contribution to the theory of hybrid

Amin, Saurabh

2011-01-01T23:59:59.000Z

200

Shopping For Danger: E-commerce techniques applied to collaboration in cyber security  

SciTech Connect

Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today, but it is uncommonly practiced or encouraged in operating environments. Barriers to productive collaboration often include data sensitivity, time and effort to communicate, institutional policy, and protection of domain knowledge. We propose an ambient collaboration framework, Vulcan, designed to remove the barriers of time and effort and mitigate the others. Vulcan automated data collection, collaborative filtering, and asynchronous dissemination, eliminating the effort implied by explicit collaboration among peers. We instrumented two analytic applications and performed a mock analysis session to build a dataset and test the output of the system.

Bruce, Joseph R.; Fink, Glenn A.

2012-05-24T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Benefits of green infrastructure Benefits of green infrastructure  

E-Print Network (OSTI)

Benefits of green infrastructure 1 #12;Benefits of green infrastructure 2 #12;Benefits of green infrastructure 3 Benefits of green infrastructure Report to Defra and CLG October 2010 Prepared by Land The report should be cited as: Forest Research (2010). Benefits of green infrastructure. Report to Defra

202

Continuity in Critical Network Infrastructures: Accounting for Nodal Disruptions  

Science Journals Connector (OSTI)

Since the attacks of September 11 2001, there has been a renewed interest in identifying, protecting and maintaining the functionality of critical infrastructure systems in the United States and abroad. Howeve...

Tony H. Grubesic; Alan T. Murray; Jessica N. Mefford

2007-01-01T23:59:59.000Z

203

Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy: Critical Infrastructure and Key Resources Sector-Specific Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan (Redacted) In June 2006, the U.S. Department of Homeland Security (DHS) announced completion of the National Infrastructure Protection Plan (NIPP) Base Plan, a comprehensive risk management framework that defines critical infrastructure protection (CIP) roles and responsibilities for all levels of government, private industry, and other security partners. The U.S. Department of Energy (DOE) has been designated the Sector-Specific Agency (SSA) for the Energy Sector,and is tasked with coordinating preparation of

204

DECISION TECHNOLOGIES FOR PROTECTION OF CRITICAL INFRASTRUCTURES  

E-Print Network (OSTI)

be used for system design, vulnerability analysis and restoration following a disruption. INTRODUCTION-built systems and processes. These systems include transportation, electric power, gas and liquid fuels. The reliance of any of these systems on power is obvious. Failures, by whatever cause, within

Mitchell, John E.

205

6/16/13 New search tool developed to catch cyber thieves post.jagran.com/new-search-tool-developed-to-catch-cyber-thieves-1370602608 1/5  

E-Print Network (OSTI)

cyber thieves Montreal: A new search tool developed by researchers in Canada can now help crime Lifestyle News Desk Cyber thief child porn search tool Canada cyber crime #12;6/16/13 New search tool6/16/13 New search tool developed to catch cyber thieves post.jagran.com/new-search-tool

Fung, Benjamin C. M.

206

ENERGY EFFICIENT INTERNET INFRASTRUCTURE  

E-Print Network (OSTI)

. D R A F T October 27, 2010, 11:34pm D R A F T #12;2 ENERGY EFFICIENT INTERNET INFRASTRUCTURE FigureCHAPTER 1 ENERGY EFFICIENT INTERNET INFRASTRUCTURE Weirong Jiang, Ph.D.1 , and Viktor K. Prasanna]. In other words, an IP address may match multiple prefixes, but only the longest D R A F T October 27, 2010

Prasanna, Viktor K.

207

HYDROGEN REGIONAL INFRASTRUCTURE PROGRAM  

E-Print Network (OSTI)

to serve as "go-to" organization to catalyze PA Hydrogen and Fuel Cell Economy development #12;FundingHYDROGEN REGIONAL INFRASTRUCTURE PROGRAM IN PENNSYLVANIA HYDROGEN REGIONAL INFRASTRUCTURE PROGRAM IN PENNSYLVANIA Melissa Klingenberg, PhDMelissa Klingenberg, PhD #12;Hydrogen ProgramHydrogen Program Air Products

208

The NIAC Convergence of Physical and Cyber Technbologies and Related  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The NIAC Convergence of Physical and Cyber Technbologies and The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC convened the Physical/Cyber Convergence Working Group (CWG), in October 2005, to investigate the ongoing convergence of physical and cyber technologies for Supervisory Control and Data Acquisition (SCADA) and process control systems and their consolidated network management. The Working Group convened a Study Group of subject matter experts to inform its work. The Working Group report informed the NIAC's deliberations. The NIAC Convergence of Physical and Cyber Technbologies and Related

209

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

210

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber...

211

Sandia National Laboratories: Cyber Security for Electric Infrastructu...  

NLE Websites -- All DOE Office Websites (Extended Search)

advancements in phasor measurement units (PMUs), distributed energy resources (DER), smart-grid technologies, and cloud computing services represent significant cyber security...

212

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information, as highlighted in this paper. We describe how the Routine Activity Theory can be applied to mitigate these risks by reducing the opportunities for cyber crime to occur, making cyber crime more difficult to commit and by increasing the risks of detection and punishment associated with committing cyber crime. Potential research questions are also identified.

Kim-Kwang Raymond Choo

2011-01-01T23:59:59.000Z

213

Control Systems Cyber Security: Defense in Depth Strategies ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

that use control system networks while maintaining a multi-tier information architecture. Control Systems Cyber Security: Defense in Depth Strategies More Documents &...

214

Office of Security and Cyber Evaluations  

NLE Websites -- All DOE Office Websites (Extended Search)

Welcome to the Office of Security and Cyber Evaluations The Office of Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential differences in approach since your last interaction with us.

215

Geographically-Based Infrastructure Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Infrastructure Analysis Margo Melendez & Keith Parks January 26, 2006 Geographically-Based Infrastructure Analysis (GIA) Utilizes GIS, geographically segregated data, and transition expertise to add the spatial component to infrastructure analysis NREL Core Competencies * Geographic data, tools, and expertise * Flexibility to address a wide array of transition issues NREL Capability Diagram Geographically-based Infrastructure Analysis GIS Transportation Technologies & Systems Electric & Hydrogen Technologies Energy Analysis Office GIA Activities Previous and Ongoing * HYDS ME - Evaluates best infrastructure options * Interstate Infrastructure Analysis - Minimal infrastructure to facilitate interstate travel during transition New Analyses * Quantifying transitional hydrogen demand

216

infrastructure | netl.doe.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Storage Infrastructure Core Storage R&D Storage Infrastructure Strategic Program Support NATCARBAtlas Program Plan Project Portfolio Publications Carbon Storage Newsletter FAQs...

217

Innovations in Nuclear Infrastructure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovations in Nuclear Infrastructure Innovations in Nuclear Infrastructure and Education (INIE) Innovations in Nuclear Infrastructure and Education (INIE) Presented to the Nuclear Energy Research Advisory Committee Crystal City, Virginia John Gutteridge Director, University Programs Office of Nuclear Energy, Science and Technology September 30 - October 1, 2002 Office of Nuclear Energy, Science and Technology Gutteridge/Sep-Oct_02 INIE-NERAC.ppt (2) INIE The Stimuli .... INIE The Stimuli .... 6 Declining number of operating university research/training reactors 6 Dwindling student population in nuclear engineering 6 Closing or loss of identity of university nuclear engineering programs 6 Looming shortage of nuclear engineering graduates 6 Threat of additional reactor closures -- Cornell, Michigan, MIT

218

BNL | Cloud Lifecycle Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Cloud Life Cycle Infrastructure Cloud Life Cycle Infrastructure An important component of any long-term atmospheric measurement program is the quality control and maintenance of the datastreams from instrument systems. Further, the raw measurements from atmospheric remote sensing instrumentation are not directly useable by the majority of the scientific community. These raw measurements must be interpreted and converted to geophysical quantities that can be more readily used by a greater number of scientists to address important questions regarding the Earth's climate system. The cloud life cycle infrastructure group at BNL is led by Dr. Michael Jensen and is responsible for the development and production of cloud-related value-added products (VAPs). The cloud life cycle infrastructure group also provides mentorships for the millimeter cloud

219

IPHE Infrastructure Workshop Proceedings  

Fuel Cell Technologies Publication and Product Library (EERE)

This proceedings contains information from the IPHE Infrastructure Workshop, a two-day interactive workshop held on February 25-26, 2010, to explore the market implementation needs for hydrogen fuelin

220

Sandia National Laboratories: National Fire Protection Association  

NLE Websites -- All DOE Office Websites (Extended Search)

Fire Protection Association More California Gas Stations Can Provide Hydrogen than Previously Thought, Sandia Study Says On July 29, 2014, in Center for Infrastructure Research and...

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Building safeguards infrastructure  

SciTech Connect

Much has been written in recent years about the nuclear renaissance - the rebirth of nuclear power as a clean and safe source of electricity around the world. Those who question the nuclear renaissance often cite the risk of proliferation, accidents or an attack on a facility as concerns, all of which merit serious consideration. The integration of these three areas - sometimes referred to as 3S, for safety, security and safeguards - is essential to supporting the growth of nuclear power, and the infrastructure that supports them should be strengthened. The focus of this paper will be on the role safeguards plays in the 3S concept and how to support the development of the infrastructure necessary to support safeguards. The objective of this paper has been to provide a working definition of safeguards infrastructure, and to discuss xamples of how building safeguards infrastructure is presented in several models. The guidelines outlined in the milestones document provide a clear path for establishing both the safeguards and the related infrastructures needed to support the development of nuclear power. The model employed by the INSEP program of engaging with partner states on safeguards-related topics that are of current interest to the level of nuclear development in that state provides another way of approaching the concept of building safeguards infrastructure. The Next Generation Safeguards Initiative is yet another approach that underscored five principal areas for growth, and the United States commitment to working with partners to promote this growth both at home and abroad.

Stevens, Rebecca S [Los Alamos National Laboratory; Mcclelland - Kerr, John [NNSA/NA-242

2009-01-01T23:59:59.000Z

222

MFC Communications Infrastructure Study  

SciTech Connect

Unprecedented growth of required telecommunications services and telecommunications applications change the way the INL does business today. High speed connectivity compiled with a high demand for telephony and network services requires a robust communications infrastructure. The current state of the MFC communication infrastructure limits growth opportunities of current and future communication infrastructure services. This limitation is largely due to equipment capacity issues, aging cabling infrastructure (external/internal fiber and copper cable) and inadequate space for telecommunication equipment. While some communication infrastructure improvements have been implemented over time projects, it has been completed without a clear overall plan and technology standard. This document identifies critical deficiencies with the current state of the communication infrastructure in operation at the MFC facilities and provides an analysis to identify needs and deficiencies to be addressed in order to achieve target architectural standards as defined in STD-170. The intent of STD-170 is to provide a robust, flexible, long-term solution to make communications capabilities align with the INL mission and fit the various programmatic growth and expansion needs.

Michael Cannon; Terry Barney; Gary Cook; George Danklefsen, Jr.; Paul Fairbourn; Susan Gihring; Lisa Stearns

2012-01-01T23:59:59.000Z

223

Time-based intrusion detection in cyber-physical systems  

Science Journals Connector (OSTI)

Embedded systems, particularly real-time systems with temporal constraints, are increasingly deployed in every day life. Such systems that interact with the physical world are also referred to as cyber-physical systems (CPS). These systems commonly find ... Keywords: cyber-physical systems, real-time systems, security, timing analysis

Christopher Zimmer; Balasubramanya Bhat; Frank Mueller; Sibin Mohan

2010-04-01T23:59:59.000Z

224

Cyber-physical energy systems: focus on smart buildings  

Science Journals Connector (OSTI)

Operating at the intersection of multiple sensing and control systems designed for occupant comfort, performability and operational efficiency, modern buildings represent a prototypical cyber-physical system with deeply coupled embedded sensing and networked ... Keywords: LEED, ZNEB, buildings, cyber-physical, embedded, energy management, energy metering, smart grid

Jan Kleissl; Yuvraj Agarwal

2010-06-01T23:59:59.000Z

225

Cyber Threat Trees for Large System Threat Cataloging and Analysis*  

E-Print Network (OSTI)

Cyber Threat Trees for Large System Threat Cataloging and Analysis* P. Ongsakorn, K. Turney, M, kturney, mitch, nair, szygenda, manikas}@lyle.smu.edu Abstract--The implementation of cyber threat. Because large systems have many possible threats that may be interdependent, it is crucial

Thornton, Mitchell

226

Implementing constrained cyber-physical systems with IEC 61499  

Science Journals Connector (OSTI)

Cyber-physical systems (CPS) are integrations of computation and control with sensing and actuation of the physical environment. Typically, such systems consist of embedded computers that monitor and control physical processes in a feedback loop. While ... Keywords: Compilers, IEC 61499, cyber-physical systems, function blocks, software synthesis, synchronous

Li Hsien Yoong; Partha S. Roop; Zoran Salcic

2012-12-01T23:59:59.000Z

227

Deception used for Cyber Defense of Control Systems  

SciTech Connect

Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

Wayne F. Boyer; Miles A. McQueen

2009-05-01T23:59:59.000Z

228

View Consistency in Architectures for Cyber-Physical Systems  

Science Journals Connector (OSTI)

Current methods for modeling, analysis, and design of cyber-physical systems lack a unifying framework due to the complexity and heterogeneity of the constituent elements and their interactions. Our approach is to define relationships between system ... Keywords: system architecture, view consistency, graph morphism, multi-domain modeling, cyber-physical systems

Ajinkya Bhave; Bruce H. Krogh; David Garlan; Bradley Schmerl

2011-04-01T23:59:59.000Z

229

A modelica coordination pattern library for cyber-physical systems  

Science Journals Connector (OSTI)

Today's embedded systems often do not operate individually anymore. Instead, they form so called cyber-physical systems, where the overall functionality is provided by the collaboration of systems. Consequently, the design of this collaboration is an ... Keywords: cyber-physical systems, design patterns, modelica, real-time coordination, simulation

Uwe Pohlmann; Stefan Dziwok; Matthias Meyer; Matthias Tichy; Sebastian Thiele

2014-03-01T23:59:59.000Z

230

Towards a theory for cyber-physical systems modeling  

Science Journals Connector (OSTI)

Modeling the heterogeneous composition of physical, computational and communication systems is an important challenge in engineering Cyber-Physical Systems (CPS), where the major sources of heterogeneity are causality, time semantics, and different physical ... Keywords: cyber-physical systems, formalization, heterogeneous composition, model-based engineering

Gabor Simko; Tihamer Levendovszky; Miklos Maroti; Janos Sztipanovits

2014-04-01T23:59:59.000Z

231

Survey on Security Threats and Protection Mechanisms  

E-Print Network (OSTI)

Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks Ivan Studnia1 and can be seen as entry points for cyber attacks. In this paper, we present a survey on security threats in the embedded networks of current vehicles, we then analyze the potential threats targeting these networks

Paris-Sud XI, Université de

232

Hydrogen Production Infrastructure Options Analysis  

Energy.gov (U.S. Department of Energy (DOE))

Presentation on hydrogen production and infrastructure options presented at the DOE Transition Workshop.

233

Public Works Transportation Infrastructure Study  

E-Print Network (OSTI)

and Alleys · Street Lights · Traffic Signals #12;Public Works Transportation Infrastructure Study Minneapolis Infrastructure Study Minneapolis City of Lakes Infrastructure Included in Analysis: · Bridges · Streets Infrastructure Study Minneapolis City of Lakes Existing Inventory & Current Conditions Street Pavement Before

Minnesota, University of

234

Hydrogen Fueling Systems and Infrastructure  

E-Print Network (OSTI)

Infrastructure Development TIAX Sunline LAX, Praxair · Fuels Choice · Renewable Energy Transportation System

235

The Department's Cyber Security Incident Management Program, IG-0787 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

236

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

237

Cyber Effects Analysis Using VCSE Promoting Control System Reliability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Effects Analysis Using VCSE Promoting Control System Cyber Effects Analysis Using VCSE Promoting Control System Reliability Cyber Effects Analysis Using VCSE Promoting Control System Reliability This report describes the Virtual Control System Environment (VCSE) technology- developed at Sandia National Laboratories-to investigate Supervisory Control And Data Acquisition (SCADA) vulnerabilities associated with energy systems; and it describes a set of experiments with findings from using that environment. The report explains how VCSE can be used to analyze and develop an understanding of cyber attacks. Specific analyses in this report focus on unencrypted, unsecured data channels on Internet protocol (IP)-routed computer networks within electric power systems. Cyber Effects Analysis Using VCSE Promoting Control System Reliability

238

LNG infrastructure and equipment  

SciTech Connect

Sound engineering principals have been used by every company involved in the development of the LNG infrastructure, but there is very little that is new. The same cryogenic technology that is used in the manufacture and sale of nitrogen, argon, and oxygen infrastructure is used in LNG infrastructure. The key component of the refueling infrastructure is the LNG tank which should have a capacity of at least 15,000 gallons. These stainless steel tanks are actually a tank within a tank separated by an annular space that is void of air creating a vacuum between the inner and outer tank where superinsulation is applied. Dispensing can be accomplished by pressure or pump. Either works well and has been demonstrated in the field. Until work is complete on NFPA 57 or The Texas Railroad Commission Rules for LNG are complete, the industry is setting the standards for the safe installation of refueling infrastructure. As a new industry, the safety record to date has been outstanding.

Forgash, D.J.

1995-12-31T23:59:59.000Z

239

EV Charging Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Charging Infrastructure Charging Infrastructure JOHN DAVIS: Virtually anywhere in the U.S. you can bring light to a room with the flick of a finger. We take it for granted, but creating the national electric grid to make that possible took decades to accomplish. Now, in just a few years, we've seen the birth of a new infrastructure that allows electric vehicles to quickly recharge their batteries at home, work, or wherever they may roam. But this rapid growth has come with a few growing pains. Starting with less than 500 in 2009, there are now over 19,000 public-access charging outlets available to electric vehicles owners at commuter lots, parking garages, airports, retail areas and thousands of

240

Department of Energy Launches Initiative with Industry to Better Protect  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Initiative with Industry to Better Initiative with Industry to Better Protect the Nation's Electric Grid from Cyber Threats Department of Energy Launches Initiative with Industry to Better Protect the Nation's Electric Grid from Cyber Threats January 5, 2012 - 12:20pm Addthis Washington, D.C. - As part of the Obama Administration's efforts to enhance the security and reliability of the nation's electrical grid, U.S. Energy Secretary Steven Chu today announced an initiative to further protect the electrical grid from cyber attacks. The "Electric Sector Cybersecurity Risk Management Maturity" project, a White House initiative led by the Department of Energy in partnership with the Department of Homeland Security (DHS), will leverage the insight of private industry and public sector experts to build on existing cybersecurity measures and

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Infrastructure Assurance Center  

E-Print Network (OSTI)

, the United States relied on natural gas to meet about 22% of its energy needs. Therefore, assuring efficient, natural gas processing plants, and other industrial customers, along with the changes in the utilizationInfrastructure Assurance Center NGReal-time: processing and analysis tool for natural gas delivery

242

e-infrastructures  

Science Journals Connector (OSTI)

In the last decades, the Internet and the World Wide Web have evolved into a new infrastructure for science, business, and the public. Driven by the need to better cope with recent trends and developments caused by globalization, complexity, and the ...

Wolfgang Gentzsch

2007-09-01T23:59:59.000Z

243

Primer Control System Cyber Security Framework and Technical Metrics  

SciTech Connect

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

244

Energy Sector-Specific Plan: An Annex to the National Infrastructure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sector-Specific Plan: An Annex to the National Sector-Specific Plan: An Annex to the National Infrastructure Protection Plan Energy Sector-Specific Plan: An Annex to the National Infrastructure Protection Plan In its role as the lead Sector-Specific Agency for the Energy Sector, the Department of Energy has worked closely with dozens of government and industry partners to prepare this updated 2010 Energy Sector-Specific Plan (SSP). Much of that work was conducted through the two Energy Sector Coordinating Councils (SCCs) and the Energy Government Coordinating Council (GCC). Energy Sector-Specific Plan: An Annex to the National Infrastructure Protection Plan More Documents & Publications National Infrastructure Protection Plan Energy: Critical Infrastructure and Key Resources Sector-Specific Plan as

245

Statement of Patricia Hoffman, Assistant Secretary for Electricity...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

protection of the bulk power system and electric infrastructure from cyber security threats. Statement of Patricia Hoffman Before the Committee Energy and Natural Resources...

246

Energy Department Broadens Public-Private Initiative to Help...  

Office of Environmental Management (EM)

Moniz today announced the release of new tools to strengthen protection of the nation's oil and natural gas infrastructure and the electric grid from cyber attack. The new...

247

Genetic Algorithms for Agent-Based Infrastructure Interdependency Modeling and Analysis  

SciTech Connect

Todays society relies greatly upon an array of complex national and international infrastructure networks such as transportation, electric power, telecommunication, and financial networks. This paper describes initial research combining agent-based infrastructure modeling software and genetic algorithms (GAs) to help optimize infrastructure protection and restoration decisions. This research proposes to apply GAs to the problem of infrastructure modeling and analysis in order to determine the optimum assets to restore or protect from attack or other disaster. This research is just commencing and therefore the focus of this paper is the integration of a GA optimization method with a simulation through the simulations agents.

May Permann

2007-03-01T23:59:59.000Z

248

A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes  

E-Print Network (OSTI)

hardware for this deployment was based on the ability of the TSMP protocol to facilitate long battery life,

Kerkez, Branko

2012-01-01T23:59:59.000Z

249

Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures  

SciTech Connect

There were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, o Heterogeneous DataPlane Testing, o Simulation, o Project Publications, Reports, and Presentations.

Summerhill, Richard

2009-08-14T23:59:59.000Z

250

Collaborative-Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures  

SciTech Connect

At a high level, there were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, including ? OSCARS layer2 and InterDomain Adaptation, ? Integration of LambdaStation and Terapaths with Layer2 dynamic provisioning, ? Control plane software release, ? Scheduling, AAA, security architecture, ? Network Virtualization architecture, ? Multi-Layer Network Architecture Framework Definition; o Heterogeneous DataPlane Testing; o Simulation; o Project Publications, Reports, and Presentations.

Lehman, Tom [USC] [USC; Ghani, Nasir [UNM] [UNM; Boyd, Eric [UCAID] [UCAID

2010-08-31T23:59:59.000Z

251

A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes  

E-Print Network (OSTI)

well as solar and thermal radiation. As energy is introducedenergy into the system, usually in the form of solar and thermal

Kerkez, Branko

2012-01-01T23:59:59.000Z

252

A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes  

E-Print Network (OSTI)

Potential Changes in hydropower production from globalirrigation, recreation, hydropower generation, and otheris also generated via hydropower. The major hydrologic

Kerkez, Branko

2012-01-01T23:59:59.000Z

253

A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes  

E-Print Network (OSTI)

radiation sensor, (8) 10W solar panel, (9) external 8dBiradiation sensor, (8) 10W solar panel, (9) external 8dBibatteries and a 120 Watt solar panel. Careful selection of

Kerkez, Branko

2012-01-01T23:59:59.000Z

254

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeking Comments on Consolidated IT and Cyber Security Support Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

255

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NNSA Seeking Comments on Consolidated IT and Cyber Security Support NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

256

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

257

Office of Cyber Security Evaluations Appraisal Process Guide, April 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER SECURITY EVALUATIONS CYBER SECURITY EVALUATIONS APPRAISAL PROCESS GUIDE April 2008 Office of Health, Safety and Security U.S. Department of Energy Office of Cyber Security Evaluations Appraisal Process Guide Preface April 2008 i Preface Department of Energy (DOE) Order 470.2B, Independent Oversight and Performance Assurance Program, and Office of Health, Safety and Security (HSS) Standard Operating Procedure, SOP-10-01, Independent Oversight Appraisal Process Protocols, February 2008, provide direction for the Office of Independent Oversight (HS-60) to establish the requirements, responsibilities, and processes for the development and maintenance of Appraisal Process Protocols that describe the activities for evaluating the effectiveness of DOE safeguards and security; cyber security; emergency management; and

258

Ruminati : modeling the detection of textual cyber-bullying  

E-Print Network (OSTI)

The scourge of cyber-bullying has received widespread attention at all levels of society including parents, educators, adolescents, social scientists, psychiatrists and policy makers at the highest echelons of power. ...

Dinakar, Karthik

2012-01-01T23:59:59.000Z

259

CYBER SECURITY Software firm identifies hacking program against chemical makers  

Science Journals Connector (OSTI)

A cyber-attack campaign emanating from China targeted private companies involved in the research, development, and manufacture of chemicals and advanced materials between July and September of this year, according to a report from the computer security ...

RICK MULLIN

2011-11-07T23:59:59.000Z

260

Advances in Materials Genomics: Making CyberSteels Fly | Argonne...  

NLE Websites -- All DOE Office Websites (Extended Search)

Events Upcoming Events Upcoming Events Advances in Materials Genomics: Making CyberSteels Fly January 7, 2015 3:00PM to 4:00PM Presenter Greg Olson, Northwestern University and...

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Managing Threats to Web Databases and Cyber Systems  

Science Journals Connector (OSTI)

This chapter provides an overview of some of the cyber threats information systems as well as data management ... then discusses potential solutions and challenges. The threats include access control violations, ...

Bhavani Thuraisingham

2005-01-01T23:59:59.000Z

262

Towards a modeling language for cyber-physical systems  

Science Journals Connector (OSTI)

A cyber-physical system (CPS) is an interactive system of continuous plants and real-time controller programs. These systems usually feature a tight relationship between the physical and computational components and exhibit true concurrency with respect ...

Longfei Zhu; Yongxin Zhao; Huibiao Zhu; Qiwen Xu

2013-01-01T23:59:59.000Z

263

Good Things in Small Packages: Micro Worlds and Cyber Security  

SciTech Connect

Cyber events, as perpetrated by terrorists and nation states, have become commonplace as evidenced in national and international news media. Cyber attacks affect day-to-day activities of end users through exploitation of social networks, businesses such as banking and stock exchanges, and government entities including Departments of Defense. They are becoming more frequent and sophisticated. Currently, efforts are directed to understanding the methods employed by attackers and towards dissecting the planning and activities of the perpetrator, including review of psychosocial factors.

David I Gertman

2013-11-01T23:59:59.000Z

264

Cyber Security Vulnerability Impact on I&C Reliability  

SciTech Connect

We present a discussion of the cyber security vulnerability impact on instrument and control reliability. In the discussion we demonstrate the likely vector of attack and vulnerabilities associated with commodity hardware, protocols and communication media. The current fleet of nuclear power plants in the United States utilizes aging analog instrument and control systems which are more frequently suffering from obsolescence and failure. The commodity equipment available now and in the near future incorporates features from information technology systems which compound cyber vulnerabilities.

Hadley, Mark D.; McBride, Justin B.

2006-11-01T23:59:59.000Z

265

infrastructure and operations  

National Nuclear Security Administration (NNSA)

the Baseline Change Proposal process. Two 400,000-gallon fire protection water supply tanks and associated pumping facilities were added. Later in the project, an additional...

266

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

267

Upcoming Webinar December 16: International Hydrogen Infrastructure...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Upcoming Webinar December 16: International Hydrogen Infrastructure Challenges NOW, DOE, and NEDO Upcoming Webinar December 16: International Hydrogen Infrastructure Challenges...

268

Electric Drive Vehicle Demonstration and Vehicle Infrastructure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electric Drive Vehicle Demonstration and Vehicle Infrastructure Evaluation Electric Drive Vehicle Demonstration and Vehicle Infrastructure Evaluation 2010 DOE Vehicle Technologies...

269

International Hydrogen Infrastructure Challenges Workshop Summary...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

International Hydrogen Infrastructure Challenges Workshop Summary - NOW, NEDO, and DOE International Hydrogen Infrastructure Challenges Workshop Summary - NOW, NEDO, and DOE...

270

Electrical power systems protection and interdependencies with ICT  

Science Journals Connector (OSTI)

This section discusses the protection of electrical power systems (EPS) and its relation to the supporting Information and Communication Technologies (ICT) infrastructure. Several dimensions are addressed, ranging from the need of protection and available ... Keywords: critical infrastructures, disturbance, electrical power system, interdependencies, protection

George M. Milis; Elias Kyriakides; Antonis M. Hadjiantonis

2012-01-01T23:59:59.000Z

271

Workshop on Scalable Cyber-Security Challenges in Large-Scale Networks: Deployment Obstacles  

E-Print Network (OSTI)

Workshop on Scalable Cyber-Security Challenges in Large-Scale Networks: Deployment Obstacles Large, and Definitions of Cybersecurity.... 8 Conventional Wisdom is Inadequate....................................... 9 Directions in Scalable Cyber-Security in Large-Scale Networks: Deployment Obstacles." The workshop

Feigenbaum, Joan

272

On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem  

E-Print Network (OSTI)

1 On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson Abstract--This paper considers a smart grid cyber-security problem

Johansson, Karl Henrik

273

WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING CLEANUP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING CLEANUP WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING CLEANUP December 1, 2009 - 12:00pm Addthis Richland, WA - In direct support of Hanford cleanup and the American Reinvestment and Recovery Act (ARRA) accelerated cleanup initiatives, the U.S. Department of Energy (DOE) Richland Operations Office (RL) is teaming with the Site services contractor, Mission Support Alliance, LLC (MSA), CH2M HILL Plateau Remediation Company and Washington River Protection Services Company to implement a WiMAX-based communications infrastructure at Hanford to augment the existing fiber optic and Wi-Fi-based systems. Wi-Fi and WiMAX are both considered last mile technologies that carry signals from telecommunications backbones (in this case hubs or access

274

WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING CLEANUP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING CLEANUP WIMAX TECHNOLOGY AT HANFORD: UPDATING INFRASTRUCTURE, ACCELERATING CLEANUP December 1, 2009 - 12:00pm Addthis Richland, WA - In direct support of Hanford cleanup and the American Reinvestment and Recovery Act (ARRA) accelerated cleanup initiatives, the U.S. Department of Energy (DOE) Richland Operations Office (RL) is teaming with the Site services contractor, Mission Support Alliance, LLC (MSA), CH2M HILL Plateau Remediation Company and Washington River Protection Services Company to implement a WiMAX-based communications infrastructure at Hanford to augment the existing fiber optic and Wi-Fi-based systems. Wi-Fi and WiMAX are both considered last mile technologies that carry signals from telecommunications backbones (in this case hubs or access

275

Pennsylvania Regional Infrastructure Project  

NLE Websites -- All DOE Office Websites (Extended Search)

CTC Team CTC Team 1 Pennsylvania Regional Infrastructure Project Presentation by: The Concurrent Technologies Corporation (CTC) Team January 6, 2004 The CTC Team 2 Presentation Outline Introduction of CTC Team CTC Background Technical Approach - CTC Team Member Presentations Conclusions The CTC Team 3 The CTC Project Team Concurrent Technologies Corporation Program Management and Coordination Hydrogen Delivery and Storage Material Development Hydrogen Sensors Concurrent Technologies Corporation Program Management and Coordination Hydrogen Delivery and Storage Material Development Hydrogen Sensors Air Products and Chemicals, Inc. Hydrogen Separation Hydrogen Sensors Air Products and Chemicals, Inc. Hydrogen Separation Hydrogen Sensors Resource Dynamics Corp. Tradeoff Analyses of Hydrogen

276

Smarter Physical Infrastructure  

E-Print Network (OSTI)

Building Operations, Montreal, Quebec, October 8-11, 2013 Bending the Spoon ESL-IC-13-10-57 Proceedings of the 13th International Conference for Enhanced Building Operations, Montreal, Quebec, October 8-11, 2013 Data Points ESL-IC-13-10-57 Proceedings... of the 13th International Conference for Enhanced Building Operations, Montreal, Quebec, October 8-11, 2013 IT Enablers for Physical Infrastructure ?M2M ?IOT ?Big Data ?Mobility ?Cloud ESL-IC-13-10-57 Proceedings of the 13th International Conference...

Bartlett, D.

2013-01-01T23:59:59.000Z

277

Security Infrastructure for Dynamically Provisioned Cloud Infrastructure Services  

Science Journals Connector (OSTI)

This chapter discusses conceptual issues, basic requirements and practical suggestions for designing dynamically configured security infrastructure provisioned on demand as part of the cloud-based infrastructu...

Yuri Demchenko; Canh Ngo; Cees de Laat

2013-01-01T23:59:59.000Z

278

CYSEP --A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao  

E-Print Network (OSTI)

1 of 9 CYSEP -- A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao.2Interface Memory Controller Cyber-Security Processor SPI4.2Interface To PCI Bus To Memory ToFramer To NP or End Sy stem Figure 1. Cyber-Security Processor (CYSEP) architecture The Firewall and Intrusion

Chao, Jonathan

279

Cumulative strategic capability and performance of early movers and followers in the cyber market  

Science Journals Connector (OSTI)

Today, the cyber market is evolving rapidly in the networked age. In the cyber market, the traditional competitive strategy appears to no longer be effective. This study investigates the strategic choice differences of online firms based on their strategic ... Keywords: Cyber market, Early mover, Follower, Porter's generic strategies, Sand Cone model

Sang-Gun Lee; Chulmo Koo; Kichan Nam

2010-06-01T23:59:59.000Z

280

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network (OSTI)

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang Rochester Institute on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment

Jay Yang, Shanchieh

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

California Hydrogen Infrastructure Project  

SciTech Connect

Air Products and Chemicals, Inc. has completed a comprehensive, multiyear project to demonstrate a hydrogen infrastructure in California. The specific primary objective of the project was to demonstrate a model of a ???¢????????real-world???¢??????? retail hydrogen infrastructure and acquire sufficient data within the project to assess the feasibility of achieving the nation???¢????????s hydrogen infrastructure goals. The project helped to advance hydrogen station technology, including the vehicle-to-station fueling interface, through consumer experiences and feedback. By encompassing a variety of fuel cell vehicles, customer profiles and fueling experiences, this project was able to obtain a complete portrait of real market needs. The project also opened its stations to other qualified vehicle providers at the appropriate time to promote widespread use and gain even broader public understanding of a hydrogen infrastructure. The project engaged major energy companies to provide a fueling experience similar to traditional gasoline station sites to foster public acceptance of hydrogen. Work over the course of the project was focused in multiple areas. With respect to the equipment needed, technical design specifications (including both safety and operational considerations) were written, reviewed, and finalized. After finalizing individual equipment designs, complete station designs were started including process flow diagrams and systems safety reviews. Material quotes were obtained, and in some cases, depending on the project status and the lead time, equipment was placed on order and fabrication began. Consideration was given for expected vehicle usage and station capacity, standard features needed, and the ability to upgrade the station at a later date. In parallel with work on the equipment, discussions were started with various vehicle manufacturers to identify vehicle demand (short- and long-term needs). Discussions included identifying potential areas most suited for hydrogen fueling stations with a focus on safe, convenient, fast-fills. These potential areas were then compared to and overlaid with suitable sites from various energy companies and other potential station operators. Work continues to match vehicle needs with suitable fueling station locations. Once a specific site was identified, the necessary agreements could be completed with the station operator and expected station users. Detailed work could then begin on the site drawings, permits, safety procedures and training needs. Permanent stations were successfully installed in Irvine (delivered liquid hydrogen), Torrance (delivered pipeline hydrogen) and Fountain Valley (renewable hydrogen from anaerobic digester gas). Mobile fueling stations were also deployed to meet short-term fueling needs in Long Beach and Placerville. Once these stations were brought online, infrastructure data was collected and reported to DOE using Air Products???¢???????? Enterprise Remote Access Monitoring system. Feedback from station operators was incorporated to improve the station user???¢????????s fueling experience.

Edward C. Heydorn

2013-03-12T23:59:59.000Z

282

NREL: Energy Analysis: Transmission Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Transmission Infrastructure Transmission Infrastructure Grid expansion and planning to allow large scale deployment of renewable generation Large scale deployment of renewable electricity generation will require additional transmission to connect renewable resources, which are wide-spread across the US, but regionally-constrained, to load centers. Long-term transmission planning, based on potential future growth in electric loads and generation resource expansion options, is critical to maintaining the necessary flexibility required for a reliable and robust transmission system. NREL's analyses support transmission infrastructure planning and expansion to enable large-scale deployment of renewable energy in the future. NREL's transmission infrastructure expansion and planning analyses show

283

Sandia National Laboratories: Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Wind Generator Modeling On June 26, 2014, in Computational Modeling & Simulation, Energy, Energy Surety, Grid Integration, Infrastructure Security, Modeling, Modeling & Analysis,...

284

Forecourt and Gas Infrastructure Optimization  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Forecourt and Gas Infrastructure Optimization Bruce Kelly Nexant, Inc. Hydrogen Delivery Analysis Meeting May 8-9, 2007 Columbia, Maryland 2 Analysis of Market Demand and Supply...

285

millionImaging research infrastructure  

E-Print Network (OSTI)

Centre for Imaging Technology Commercialization, led by Aaron Fenster $34 million Hybrid imaging infrastructureimaging #12;IMAGING Investment $100 millionImaging research infrastructure Formation

Denham, Graham

286

Sandia National Laboratories: Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

More California Gas Stations Can Provide Hydrogen than Previously Thought, Sandia Study Says On July 29, 2014, in Center for Infrastructure Research and Innovation (CIRI), CRF,...

287

Sandia National Laboratories: Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

July 31, 2014, in DETL, Distribution Grid Integration, Energy, Energy Surety, Facilities, Grid Integration, Infrastructure Security, News, News & Events, Photovoltaic, Renewable...

288

Fluxnet Synthesis Dataset Collaboration Infrastructure  

E-Print Network (OSTI)

Fluxnet Synthesis Dataset Collaboration Infrastructure DebUCB) The Fluxnet synthesis dataset originally compiled forhave been added and the dataset now contains over 920 site

Agarwal, Deborah A.

2009-01-01T23:59:59.000Z

289

Sandia National Laboratories: Energy Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

power is essential to key infrastructure such as military installations. Economically, electricity outages presently cost our economy 150 billion annually. Energy Surety The...

290

Geographically-Based Infrastructure Analysis  

Energy.gov (U.S. Department of Energy (DOE))

Presentation on Geographically-Based Infrastructure Analysis given by Keith Parks of the National Renewable Energy Laboratory during the DOE Hydrogen Transition Analysis Workshop on January 26, 2006.

291

Sandia National Laboratories: Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Sandia Study Shows Large LNG Fires Hotter but Smaller Than Expected On December 6, 2011, in Analysis, Energy Assurance, Infrastructure Security, Modeling, Modeling & Analysis,...

292

Data-Intensive Visual Analysis for Cyber Security  

SciTech Connect

Protecting communications networks against attacks where the aim is to steal information, disrupt order, or harm critical infrastructure can require the collection and analysis of staggering amounts of data. The ability to detect and respond to threats quickly is a paramount concern across sectors, and especially for critical government, utility and financial networks. Yet detecting emerging or incipient threats in immense volumes of network traffic requires new computational and analytic approaches. Network security increasingly requires cooperation between human analysts able to spot suspicious events through means such as data visualization and automated systems that process streaming network data in near real-time to triage events so that human analysts are best able to focus their work.

Pike, William A.; Best, Daniel M.; Love, Douglas V.; Bohn, Shawn J.

2013-01-29T23:59:59.000Z

293

Michigan E85 Infrastructure  

SciTech Connect

This is the final report for a grant-funded project to financially assist and otherwise provide support to projects that increase E85 infrastructure in Michigan at retail fueling locations. Over the two-year project timeframe, nine E85 and/or flex-fuel pumps were installed around the State of Michigan at locations currently lacking E85 infrastructure. A total of five stations installed the nine pumps, all providing cost share toward the project. By using cost sharing by station partners, the $200,000 provided by the Department of Energy facilitated a total project worth $746,332.85. This project was completed over a two-year timetable (eight quarters). The first quarter of the project focused on project outreach to station owners about the incentive on the installation and/or conversion of E85 compatible fueling equipment including fueling pumps, tanks, and all necessary electrical and plumbing connections. Utilizing Clean Energy Coalition (CEC) extensive knowledge of gasoline/ethanol infrastructure throughout Michigan, CEC strategically placed these pumps in locations to strengthen the broad availability of E85 in Michigan. During the first and second quarters, CEC staff approved projects for funding and secured contracts with station owners; the second through eighth quarters were spent working with fueling station owners to complete projects; the third through eighth quarters included time spent promoting projects; and beginning in the second quarter and running for the duration of the project was spent performing project reporting and evaluation to the US DOE. A total of 9 pumps were installed (four in Elkton, two in Sebewaing, one in East Lansing, one in Howell, and one in Whitmore Lake). At these combined station locations, a total of 192,445 gallons of E85, 10,786 gallons of E50, and 19,159 gallons of E30 were sold in all reporting quarters for 2011. Overall, the project has successfully displaced 162,611 gallons (2,663 barrels) of petroleum, and reduced regional GHG emissions by 375 tons in the first year of station deployment.

Sandstrom, Matthew M.

2012-03-30T23:59:59.000Z

294

Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems  

E-Print Network (OSTI)

The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities ...

Michaud, David, 1975-

2005-01-01T23:59:59.000Z

295

Energy Transmission and Infrastructure  

SciTech Connect

The objective of Energy Transmission and Infrastructure Northern Ohio (OH) was to lay the conceptual and analytical foundation for an energy economy in northern Ohio that will: improve the efficiency with which energy is used in the residential, commercial, industrial, agricultural, and transportation sectors for Oberlin, Ohio as a district-wide model for Congressional District OH-09; identify the potential to deploy wind and solar technologies and the most effective configuration for the regional energy system (i.e., the ratio of distributed or centralized power generation); analyze the potential within the district to utilize farm wastes to produce biofuels; enhance long-term energy security by identifying ways to deploy local resources and building Ohio-based enterprises; identify the policy, regulatory, and financial barriers impeding development of a new energy system; and improve energy infrastructure within Congressional District OH-09. This objective of laying the foundation for a renewable energy system in Ohio was achieved through four primary areas of activity: 1. district-wide energy infrastructure assessments and alternative-energy transmission studies; 2. energy infrastructure improvement projects undertaken by American Municipal Power (AMP) affiliates in the northern Ohio communities of Elmore, Oak Harbor, and Wellington; 3. Oberlin, OH-area energy assessment initiatives; and 4. a district-wide conference held in September 2011 to disseminate year-one findings. The grant supported 17 research studies by leading energy, policy, and financial specialists, including studies on: current energy use in the district and the Oberlin area; regional potential for energy generation from renewable sources such as solar power, wind, and farm-waste; energy and transportation strategies for transitioning the City of Oberlin entirely to renewable resources and considering pedestrians, bicyclists, and public transportation as well as drivers in developing transportation policies; energy audits and efficiency studies for Oberlin-area businesses and Oberlin College; identification of barriers to residential energy efficiency and development of programming to remove these barriers; mapping of the solar-photovoltaic and wind-energy supply chains in northwest Ohio; and opportunities for vehicle sharing and collaboration among the ten organizations in Lorain County from the private, government, non-profit, and educational sectors. With non-grant funds, organizations have begun or completed projects that drew on the findings of the studies, including: creation of a residential energy-efficiency program for the Oberlin community; installation of energy-efficient lighting in Oberlin College facilities; and development by the City of Oberlin and Oberlin College of a 2.27 megawatt solar photovoltaic facility that is expected to produce 3,000 megawatt-hours of renewable energy annually, 12% of the Colleges yearly power needs. Implementation of these and other projects is evidence of the economic feasibility and technical effectiveness of grant-supported studies, and additional projects are expected to advance to implementation in the coming years. The public has benefited through improved energydelivery systems and reduced energy use for street lighting in Elmore, Oak Harbor, and Wellington; new opportunities for assistance and incentives for residential energy efficiency in the Oberlin community; new opportunities for financial and energy savings through vehicle collaboration within Lorain County; and decreased reliance on fossil fuels and expanded production of renewable energy in the region. The dissemination conference and the summary report developed for the conference also benefited the public, but making the findings and recommendations of the regional studies broadly available to elected officials, city managers, educators, representatives of the private sector, and the general public.

Mathison, Jane

2012-12-31T23:59:59.000Z

296

Clean Cities: Electric Vehicle Infrastructure Training Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Electric Vehicle Infrastructure Electric Vehicle Infrastructure Training Program to someone by E-mail Share Clean Cities: Electric Vehicle Infrastructure Training Program on Facebook Tweet about Clean Cities: Electric Vehicle Infrastructure Training Program on Twitter Bookmark Clean Cities: Electric Vehicle Infrastructure Training Program on Google Bookmark Clean Cities: Electric Vehicle Infrastructure Training Program on Delicious Rank Clean Cities: Electric Vehicle Infrastructure Training Program on Digg Find More places to share Clean Cities: Electric Vehicle Infrastructure Training Program on AddThis.com... Goals & Accomplishments Partnerships National Clean Fleets Partnership National Parks Initiative Electric Vehicle Infrastructure Training Program Advanced Vehicle Technology Competitions

297

Evaluation Report on The Department's Unclassified Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report on The Department's Unclassified Cyber Security Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security information. It requires agencies to conduct annual reviews and evaluations of unclassified and

298

Computational Infrastructure for Nuclear Astrophysics  

SciTech Connect

A Computational Infrastructure for Nuclear Astrophysics has been developed to streamline the inclusion of the latest nuclear physics data in astrophysics simulations. The infrastructure consists of a platform-independent suite of computer codes that is freely available online at nucastrodata.org. Features of, and future plans for, this software suite are given.

Smith, Michael S.; Hix, W. Raphael; Bardayan, Daniel W.; Blackmon, Jeffery C. [Physics Division, Oak Ridge National Laboratory, Oak Ridge, TN, 37831-6354 (United States); Lingerfelt, Eric J.; Scott, Jason P.; Nesaraja, Caroline D. [Physics Division, Oak Ridge National Laboratory, Oak Ridge, TN, 37831-6354 (United States); Dept. Physics and Astronomy, Univ. of Tennessee, Knoxville, TN 37996-1200 (United States); Chae, Kyungyuk; Guidry, Michael W. [Dept. Physics and Astronomy, Univ. of Tennessee, Knoxville, TN 37996-1200 (United States); Physics Division, Oak Ridge National Laboratory, Oak Ridge, TN, 37831-6354 (United States); Koura, Hiroyuki [Japan Atomic Energy Agency, Tokai, Naka-gun, Ibaraki 319-1195 (Japan); Meyer, Richard A. [RAME' Inc., Teaticket, MA, 02536 (United States)

2006-07-12T23:59:59.000Z

299

Critical Infrastructure and Internal Controls  

Science Journals Connector (OSTI)

Critical refers to infrastructure that provides an essential support for economic and social well-being, for public safety and for the functioning of key government responsibilities. According to Resolution of the National Security Strategy of the Republic ... Keywords: Risk management,Process control,Government,Standards,Security,Uncertainty,internal controls,critical infrastructure,risk,risk management

Iztok Podbregar; Mojca Ferjancic Podbregar

2012-08-01T23:59:59.000Z

300

Hydrogen, Fuel Cells & Infrastructure Technologies ProgramHydrogen, Fuel Cells & Infrastructure Technologies Program Hydrogen Codes &  

E-Print Network (OSTI)

Hydrogen, Fuel Cells & Infrastructure Technologies ProgramHydrogen, Fuel Cells & Infrastructure)DescriptionMilestone #12;Hydrogen, Fuel Cells & Infrastructure Technologies ProgramHydrogen, Fuel Cells & Infrastructure Technologies Program Hydrogen Codes & Standards #12;Hydrogen Codes & Standards: Goal & Objectives Goal

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

302

of Western Area Power Administration's Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Western Area Power Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 October 22, 2012 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Western Area Power Administration's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Department of Energy's Western Area Power Administration (Western) markets and delivers hydroelectric power and related services to 15 states within the central and western United States. As the largest U.S. Power Marketing Administration, millions of households and

303

The Department's Unclassified Cyber Security Program 2002, IG-0567  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT'S UNCLASSIFIED DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security

304

Cyber Security Evaluation of II&C Technologies  

SciTech Connect

The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industrys template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

Ken Thomas

2014-11-01T23:59:59.000Z

305

Towards Truly Ubiquitous and Opportunistic Trust Infrastructures: Position for Next Generation Cybersecurity Infrastructure Workshop  

E-Print Network (OSTI)

: Position for Next Generation Cybersecurity Infrastructure Workshop Stephen Nightingale Generation Cybersecurity Infrastructure workshop, we note that Federated Identities [1

Tennessee, University of

306

Innovative Financing for Green Infrastructure | Department of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Innovative Financing for Green Infrastructure Innovative Financing for Green Infrastructure November 4, 2014 1:00PM to 2:30PM EST Topic Overview Financing green infrastructure is...

307

Advanced Metering Infrastructure  

SciTech Connect

The report provides an overview of the development of Advanced Metering Infrastructure (AMI). Metering has historically served as the cash register for the utility industry. It measured the amount of energy used and supported the billing of customers for that usage. However, utilities are starting to look at meters in a whole different way, viewing them as the point of contact with customers in supporting a number of operational imperatives. The combination of smart meters and advanced communications has opened up a variety of methods for utilities to reduce operating costs while offering new services to customers. A concise look is given at what's driving interest in AMI, the components of AMI, and the creation of a business case for AMI. Topics covered include: an overview of AMI including the history of metering and development of smart meters; a description of the key technologies involved in AMI; a description of key government initiatives to support AMI; an evaluation of the current market position of AMI; an analysis of business case development for AMI; and, profiles of 21 key AMI vendors.

NONE

2007-10-15T23:59:59.000Z

308

Federal Energy Management Program: Infrastructure Institutional Change  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Infrastructure Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Infrastructure Institutional Change Principle on Facebook Tweet about Federal Energy Management Program: Infrastructure Institutional Change Principle on Twitter Bookmark Federal Energy Management Program: Infrastructure Institutional Change Principle on Google Bookmark Federal Energy Management Program: Infrastructure Institutional Change Principle on Delicious Rank Federal Energy Management Program: Infrastructure Institutional Change Principle on Digg Find More places to share Federal Energy Management Program: Infrastructure Institutional Change Principle on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Greenhouse Gases

309

The regulatory anticommons of green infrastructures  

Science Journals Connector (OSTI)

Development of green infrastructures (renewable energy plants and transmission networks) is urgently needed ... improve planning and siting procedures for cross-border green infrastructures. The literature on ant...

Giuseppe Bellantuono

2014-04-01T23:59:59.000Z

310

Natural Gas and Hydrogen Infrastructure Opportunities: Markets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Natural Gas and Hydrogen Infrastructure Opportunities: Markets and Barriers to Growth Natural Gas and Hydrogen Infrastructure Opportunities: Markets and Barriers to Growth...

311

Natural Gas and Hydrogen Infrastructure Opportunities Workshop...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Natural Gas and Hydrogen Infrastructure Opportunities Workshop Agenda Natural Gas and Hydrogen Infrastructure Opportunities Workshop Agenda Agenda for the Natural Gas and Hydrogen...

312

NREL: Energy Systems Integration Facility - Research Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure The foundation of the Energy Systems Integration Facility is its research infrastructure. In addition to extensive fixed equipment, the facility incorporates...

313

Electric Drive Vehicle Infrastructure Deployment | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Infrastructure Deployment Electric Drive Vehicle Infrastructure Deployment 2011 DOE Hydrogen and Fuel Cells Program, and Vehicle Technologies Program Annual Merit Review and Peer...

314

California Low Carbon Fuels Infrastructure Investment Initiative...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

California Low Carbon Fuels Infrastructure Investment Initiative California Low Carbon Fuels Infrastructure Investment Initiative 2012 DOE Hydrogen and Fuel Cells Program and...

315

Department of Energy Cites Parsons Infrastructure & Technology...  

Office of Environmental Management (EM)

Parsons Infrastructure & Technology Group, Inc. for Worker Safety and Health Violations Department of Energy Cites Parsons Infrastructure & Technology Group, Inc. for Worker Safety...

316

Advanced Metering Infrastructure Security Considerations | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Infrastructure Security Considerations The purpose of this report is to provide utilities implementing Advanced Metering Infrastructure (AMI) with the knowledge necessary to...

317

Controlled Hydrogen Fleet & Infrastructure Analysis | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

& Infrastructure Analysis Controlled Hydrogen Fleet & Infrastructure Analysis 2009 DOE Hydrogen Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation...

318

Hydrogen Vehicle and Infrastructure Demonstration and Validation...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Vehicle and Infrastructure Demonstration and Validation Hydrogen Vehicle and Infrastructure Demonstration and Validation 2009 DOE Hydrogen Program and Vehicle Technologies Program...

319

California Hydrogen Infrastructure Project | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Hydrogen Infrastructure Project California Hydrogen Infrastructure Project 2009 DOE Hydrogen Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation...

320

Hydrogen Fueling Infrastructure Research and Station Technology...  

Energy Savers (EERE)

Infrastructure Research and Station Technology Download presentation slides from the DOE Fuel Cell Technologies Office webinar "An Overview of the Hydrogen Fueling Infrastructure...

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Hydrogen, Fuel Cells and Infrastructure Technologies Program...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hydrogen, Fuel Cells and Infrastructure Technologies Program: 2002 Annual Progress Report Hydrogen, Fuel Cells and Infrastructure Technologies Program: 2002 Annual Progress Report...

322

Webinar: International Hydrogen Infrastructure Challenges-NOW...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

International Hydrogen Infrastructure Challenges-NOW, DOE, and NEDO Webinar: International Hydrogen Infrastructure Challenges-NOW, DOE, and NEDO December 16, 2013 1:00PM EST...

323

Design Security and Cyber-Physical Threats  

Science Journals Connector (OSTI)

The trustworthiness of reconfigurable hardware, such as FPGAs is defined by the mechanisms protecting the configuration data. The field programmability of an FPGA is a distinct feature enabling various possibi...

Thomas Feller

2014-01-01T23:59:59.000Z

324

Overcoming performance collapse for 100Gbps cyber security  

Science Journals Connector (OSTI)

In this paper, we present a series of performance tests carried out on R-Scope Dominate-T (RDT), a 1U network security appliance configured with four Tilera Gx-36 processors and with an aggregated network IO capacity of 160Gbps. RDT is optimized with ... Keywords: cyber-security

Jordi Ros-Giralt; Bob Rotsted; Alan Commike

2013-06-01T23:59:59.000Z

325

Synthesis of Optimal Controllers for Cyber Physical Systems Salar Moarref  

E-Print Network (OSTI)

Synthesis of Optimal Controllers for Cyber Physical Systems Salar Moarref November 16, 2012 construction. In this framework, we consider controller synthesis problem: given a model of the system.e. a controller that optimizes a quantitative measure.We review some of the recent works on synthesis of optimal

Plotkin, Joshua B.

326

CyberWalk: Enabling unconstrained omnidirectional walking through virtual environments  

Science Journals Connector (OSTI)

Despite many recent developments in virtual reality, an effective locomotion interface which allows for normal walking through large virtual environments was until recently still lacking. Here, we describe the new CyberWalk omnidirectional treadmill ... Keywords: Virtual reality, control system, locomotion, spatial navigation, treadmill

J. L. Souman; P. Robuffo Giordano; M. Schwaiger; I. Frissen; T. Thmmel; H. Ulbrich; A. De Luca; H. H. Blthoff; M. O. Ernst

2011-11-01T23:59:59.000Z

327

Statistical Model Checking for Cyber-Physical Systems  

E-Print Network (OSTI)

-Physical System (CPS). The autopilot is a software which provides inputs to the aircraft's engines and flight to keep control of the vehicle and improving safety. Cyber-Physical Systems enjoy wide adoption in our society, even in safety- critical applications, but are difficult to reason about. In particular

Clarke, Edmund M.

328

Secure control systems with application to cyber-physical systems  

Science Journals Connector (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power ... Keywords: SCADA systems, cyber-physical systems, secure control, security

Jin Dong; Seddik. M. Djouadi; James J. Nutaro; Teja Kuruganti

2014-04-01T23:59:59.000Z

329

Cyber-Physical Energy Systems: Focus on Smart Buildings  

E-Print Network (OSTI)

of a deeply coupled system of energy usage, comfort and work derived. At a macroscale, buildings use approxiCyber-Physical Energy Systems: Focus on Smart Buildings Jan Kleissl Dept. of Mechanical- tributions: one, a careful examination of different types of buildings and their energy use; two

Gupta, Rajesh

330

Cyber-Physical Systems Energy and the Environment  

E-Print Network (OSTI)

to Restructure · Generate energy locally ­ Wind, Solar ­ Energy Storage Plug in Hybrids ­ Share Power ­ Economics12/16/2008 1 Cyber-Physical Systems Energy and the Environment Bruce McMillin Department FREEDM ­ Future Renewable Electric Energy Delivery and Management Systems McMillin, 12/15/2008 Major

Rajkumar, Ragunathan "Raj"

331

Domestic campsites and cyber landscapes in the Rocky Mountains  

E-Print Network (OSTI)

Domestic campsites and cyber landscapes in the Rocky Mountains Laura L. Scheiber1 & Judson Byrd, Central Rocky Mountains, GIS, GPS, stone circles, architecture, multi-scalar, households, technology, tipis, horses and wagons occupying a flat clearing along a valley floor c. 1907. Photograph by Richard

Scheiber, Laura L.

332

Hydrogen Delivery Infrastructure Options Analysis  

Fuel Cell Technologies Publication and Product Library (EERE)

This report, by the Nexant team, documents an in-depth analysis of seven hydrogen delivery options to identify the most cost-effective hydrogen infrastructure for the transition and long term. The pro

333

Electric Vehicle Smart Charging Infrastructure  

E-Print Network (OSTI)

Vehicles on the US Power Grid." The 25th World Battery,infrastructure assignment and power grid impacts assessmentfrom the vehicle to the power grid and overcome its current

Chung, Ching-Yen

2014-01-01T23:59:59.000Z

334

Intelligent Infrastructure for Energy Efficiency  

Science Journals Connector (OSTI)

...their faults. Intelligent infrastructure extends smart grid initiatives that seek to save energy by allowing utilities...4 National Institute of Standards and Technology , Smart Grid Interoperability Standards Project (http://nist...

Neil Gershenfeld; Stephen Samouhos; Bruce Nordman

2010-02-26T23:59:59.000Z

335

Hydrogen Infrastructure Market Readiness Workshop  

Energy.gov (U.S. Department of Energy (DOE))

The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL) hosted the Hydrogen Infrastructure Market Readiness Workshop February 1617, 2011, in Washington, D.C....

336

GIS-Based Infrastructure Modeling  

Energy.gov (U.S. Department of Energy (DOE))

Presentation by NREL's Keith Parks at the 2010 - 2025 Scenario Analysis for Hydrogen Fuel Cell Vehicles and Infrastructure Meeting on August 9 - 10, 2006 in Washington, D.C.

337

Microsoft Word - Cyber-Wireless-CIP_Draft_ 5 1_2-25-09_clean.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wireless System Considerations When Implementing Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards Teja Kuruganti 1 , Walter Dykas 1 , Wayne Manges 1 , Tom Flowers 2 , Mark Hadley 3 , Paul Ewing 1 , Thomas King 1 1 Oak Ridge National Laboratory, Oak Ridge, TN 37831 2 Flowers Control Center Solutions, Todd Mission, TX 77363 3 Pacific Northwest National Laboratory, Richland, WA 99352 February 25, 2009 Introduction Energy asset owners are facing a monumental challenge as they address compliance with the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Standards (CIP-002 through CIP-009). The increased use of wireless technologies and their introduction into control center networks and field devices compound this challenge, as

338

Hydrogen Regional Infrastructure Program in Pennsylvania  

Energy.gov (U.S. Department of Energy (DOE))

Hydrogen Regional Infrastructure Program in Pennsylvania. Objectives: Capture data pertinent to H2 delivery in PA

339

CLOUD COMPUTING INFRASTRUCTURE AND OPERATIONS PROGRAM  

E-Print Network (OSTI)

CLOUD COMPUTING INFRASTRUCTURE AND OPERATIONS PROGRAM A six-week in-depth program in the architectures, infrastructure, and operations of Cloud Computing DePaul University's Cloud Computing Infrastructure and Operations Program provides specialized knowledge in Cloud infrastructure with emphasis

Schaefer, Marcus

340

2012 Annual Report Research Reactor Infrastructure Program  

SciTech Connect

The content of this report is the 2012 Annual Report for the Research Reactor Infrastructure Program.

Douglas Morrell

2012-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Controlled Hydrogen Fleet and Infrastructure Analysis (Presentation)  

SciTech Connect

This presentation summarizes controlled hydrogen fleet & infrastructure analysis undertaken for the DOE Fuel Cell Technologies Program.

Wipke, K.; Sprik, S.; Kurtz, J.; Ramsden, T.

2010-06-10T23:59:59.000Z

342

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

SciTech Connect

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

343

Alternative Fuels Data Center: Alternative Fueling Infrastructure  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Alternative Fueling Alternative Fueling Infrastructure Development to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

344

Infrastructure and Facilities Management | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Infrastructure and Facilities Management | National Nuclear Security Infrastructure and Facilities Management | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Infrastructure and Facilities Management Home > content > Infrastructure and Facilities Management Infrastructure and Facilities Management NNSA restores, rebuilds, and revitalizes the physical infrastructure of the

345

Alternative Fuels Data Center: Ethanol Infrastructure Funding  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Ethanol Infrastructure Ethanol Infrastructure Funding to someone by E-mail Share Alternative Fuels Data Center: Ethanol Infrastructure Funding on Facebook Tweet about Alternative Fuels Data Center: Ethanol Infrastructure Funding on Twitter Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Funding on Google Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Funding on Delicious Rank Alternative Fuels Data Center: Ethanol Infrastructure Funding on Digg Find More places to share Alternative Fuels Data Center: Ethanol Infrastructure Funding on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol Infrastructure Funding The Ethanol Infrastructure Incentive Program provides funding to offset the cost of installing ethanol blender pumps at retail fueling stations

346

NETL Publications: Carbon Storage Program Infrastructure Annual Review  

NLE Websites -- All DOE Office Websites (Extended Search)

Carbon Storage Program Infrastructure Annual Review Meeting Carbon Storage Program Infrastructure Annual Review Meeting November 15-17, 2011 Table of Contents Disclaimer Presentations PRESENTATIONS Tuesday, November 15, 2011 Welcoming Remarks [PDF-2.18MB] Sean Plasynski, DOE/NETL Keynote Session 1 - Regulatory Issues Moderator: Traci Rodosta, DOE/NETL EPA's Greenhouse Gas Reporting Program: Geological Sequestration and Injection of Carbon Dioxide [PDF-604KB] Mark Defigueiredo, U.S. Environmental Protection Agency Update on Implementation of EPA's Class VI GS Program [PDF-420KB] Bruce Kobelski, U.S. Environmental Protection Agency CCS on the OCS: Sub-Seabed Geologic CO2 Sequestration Authorities and Ongoing Actions Covering the Outer Continental Shelf [PDF-MB] Melissa Batum, , U. S. Bureau of Ocean Energy Management, Regulation, and Enforcement

347

Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Year-in-Review: 2010 Year-in-Review: 2010 Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability U.S. Department of Energy August 2011 OE/ISER Report 8/31/11 i For Further Information This report was prepared by the Office of Electricity Delivery and Energy Reliability under the direction of Patricia Hoffman, Assistant Secretary, and William Bryan, Deputy Assistant Secretary. Specific questions about information in this report may be directed to Alice Lippert, Senior Technical Advisor (alice.lippert@hq.doe.gov). Contributors include Mindi Farber-DeAnda, Robert Laramey, Carleen Lewandowski, Max

348

Use and Abuse of the Internet: Parental Knowledge of Cyber Bullying in Middle School.  

E-Print Network (OSTI)

??The current literature has emphasized the impact of cyber bullying on the lives of children and adolescents. However there are gaps in the literature in (more)

Rowe, Na Lisa

2008-01-01T23:59:59.000Z

349

Terrorism or hacking? A law interpretation on the concept of cyber terrorism.  

E-Print Network (OSTI)

?? Cyber-crime, terrorism and hacking is a topic discussed widely and many independent groups as for example Wikileaks and Anonymous are often taken into consideration (more)

Synnestvedt Jensen, Louise

2013-01-01T23:59:59.000Z

350

Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation.  

E-Print Network (OSTI)

??While smart grid technologies are deployed to help achieve improved grid resiliency and efficiency, they also present an increased dependency on cyber resources which may (more)

Hahn, Adam

2013-01-01T23:59:59.000Z

351

Breaking into a computer : attack techniques and tools used by cyber-criminals  

ScienceCinema (OSTI)

Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

None

2011-10-06T23:59:59.000Z

352

Department of Energy's July 2013 Cyber Security Breach  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Department of Energy's July The Department of Energy's July 2013 Cyber Security Breach DOE/IG-0900 December 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 December 6, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Review of the "Department of Energy's July 2013 Cyber Security Breach" BACKGROUND To facilitate its administrative and operational needs, the Department of Energy maintains a substantial amount of personally identifiable information (PII). The Department's Management Information System (MIS) provides a gateway for users to access a system known as the DOE Employee Data Repository (DOEInfo) database. That system was implemented in 1994, and

353

Wireless Policy, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

354

A Comparison of Cross-Sector Cyber Security Standards  

SciTech Connect

This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

Robert P. Evans

2005-09-01T23:59:59.000Z

355

Alternative Fuels Data Center: Ethanol Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Ethanol Infrastructure Ethanol Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Ethanol Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Ethanol Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Ethanol Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Ethanol Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol Infrastructure Grants The Kentucky Corn Growers' Association (KyCGA) offers grants of $5,000 per pump to retailers installing new E85 dispensers in Kentucky. For more

356

Alternative Fuels Data Center: Biofuels Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Biofuels Biofuels Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Biofuels Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Biofuels Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Biofuels Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Biofuels Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Biofuels Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Biofuels Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Biofuels Infrastructure Grants The Renewable Fuel Infrastructure Program provides financial assistance to qualified E85 and biodiesel retailers. Cost-share grants are available for

357

Alternative Fuels Data Center: Ethanol Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Ethanol Infrastructure Ethanol Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Ethanol Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Ethanol Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Ethanol Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Ethanol Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol Infrastructure Grants The Colorado Corn Blender Pump Pilot Program provides funding assistance for each qualified station dispensing mid-level ethanol blends. Projects

358

Alternative Fuels Data Center: Biofuel Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Biofuel Infrastructure Biofuel Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Biofuel Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Biofuel Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Biofuel Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Biofuel Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Biofuel Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Biofuel Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Biofuel Infrastructure Grants The Arizona Biofuel Conversion Program distributes grants to encourage the use of biofuels in the state and to promote the development of fueling

359

GridStat Cyber Security and Regional Deployment Project Report  

SciTech Connect

GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStats cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

Clements, Samuel L.

2009-02-18T23:59:59.000Z

360

Intelligent Infrastructure for Energy Efficiency  

Science Journals Connector (OSTI)

...infrastructure extends smart grid initiatives that seek...demand (4). However, a grid cannot be smart if it is connected to...exhausts (17). The energy benefits in these I2E systems will...Standards and Technology , Smart Grid Interoperability Standards...

Neil Gershenfeld; Stephen Samouhos; Bruce Nordman

2010-02-26T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Control-theoretic cyber-physical system modeling and synthesis: A case study of an active direct methanol fuel cell  

Science Journals Connector (OSTI)

A joint optimization of the physical system and the cyber world is one of the key problems in the design of a cyber-physical system (CPS). The major mechanical forces and/or chemical reactions in a plant are commonly modified by actuators in the balance-of-plant ... Keywords: Balance of plants system, Cyber-physical systems, Direct methanol fuel cell

Donghwa Shin; Jaehyun Park; Younghyun Kim; Jaeam Seo; Naehyuck Chang

2012-12-01T23:59:59.000Z

362

Positive affect predicting worker psychological response to cyber-bullying in the high-tech industry in Northern Taiwan  

Science Journals Connector (OSTI)

Online cyber-bullying has become a frequent occurrence in organizations. To understand individual dispositions and the organizational factors that effect online cyber-bullying, the present study investigates the relationship among positive affect, the ... Keywords: Cyber-bullying, Organizational innovation climate, Positive thinking, Psychological response, Workplace bullying

Jon-Chao Hong; Lin Chien-Hou; Ming-Yueh Hwang; Ru-Ping Hu; Yi-Ling Chen

2014-01-01T23:59:59.000Z

363

A multi-level approach to understanding the impact of cyber crime on the financial sector  

Science Journals Connector (OSTI)

This paper puts forward a multi-level model, based on system dynamics methodology, to understand the impact of cyber crime on the financial sector. Consistent with recent findings, our results show that strong dynamic relationships, amongst tangible ... Keywords: Causal loop diagram, Cyber crime, Economic impact, Financial sector, System dynamics

Monica Lagazio, Nazneen Sherif, Mike Cushman

2014-09-01T23:59:59.000Z

364

Emergent Behavior in Cybersecurity Example 2: Program VerificationExample 1: Cyber Epidemics  

E-Print Network (OSTI)

Emergent Behavior in Cybersecurity Example 2: Program VerificationExample 1: Cyber Epidemics Informal Definition and Implication Abstract We argue that emergent behavior is inherent to cybersecurity). Scenario: Illustration of cyber epidemics model (which is a specific kind of Cybersecurity Dynamics model

Xu, Shouhuai

365

Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid  

E-Print Network (OSTI)

Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid Jin Wei and Deepa stability in the smart grid in the face of cyber-physical attack. We model the smart grid as a networked the proposed framework. I. INTRODUCTION It is well known that the smart grid promises increased reliability

Kundur, Deepa

366

Participatory infrastructure monitoring : design factors and limitations of accountability technologies  

E-Print Network (OSTI)

This dissertation investigates practices of participatory infrastructure monitoring and their implications for the governance of urban infrastructure services. By introducing the concept of infrastructure legibility, the ...

Offenhuber, Dietmar

2014-01-01T23:59:59.000Z

367

H2FIRST: Hydrogen Fueling Infrastructure Research and Station...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

FIRST: Hydrogen Fueling Infrastructure Research and Station Technology H2FIRST: Hydrogen Fueling Infrastructure Research and Station Technology Hydrogen Fueling Infrastructure...

368

The Electricity and Transportation Infrastructure Convergence  

E-Print Network (OSTI)

The Electricity and Transportation Infrastructure Convergence Using Electrical Vehicles Final Project Report Power Systems Engineering Research Center Empowering Minds to Engineer the Future Electric Energy System #12;#12;The Electricity and Transportation Infrastructure Convergence Using Electrical

369

"Mapping" Nonprofit Infrastructure Organizations in Texas  

E-Print Network (OSTI)

The stability of the nonprofit sector and its ability to meet our nations needs in an era of unprecedented challenges requires a solid nonprofit infrastructure (Brown, et al., 2008). These organizations that comprise this infrastructure system work...

Aho, Andrea; Harris, Amanda; Kessel, Kendall; Park, Jongsoo; Park, Jong Taek; Rios, Lisa; Swendig, Brett

2010-01-01T23:59:59.000Z

370

National Environmental Information Infrastructure Reference Architecture  

E-Print Network (OSTI)

National Environmental Information Infrastructure Reference Architecture Consultation Draft Environmental Information Infrastructure Reference Architecture: Consultation Draft Environmental Information Contributing to the Australian Government National Plan for Environmental Information initiative #12;National

Greenslade, Diana

371

Electric Drive Vehicle Demonstration and Vehicle Infrastructure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Utilities Employers Develop long-range Plan Deployment area Vehicle penetration Infrastructure requirements Develop EV Micro-Climate Support...

372

Electric Drive Vehicle Demonstration and Vehicle Infrastructure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Utilities Employers Develop Long-Range Plan Deployment Area Vehicle Penetration Infrastructure Requirements Develop EV Micro-Climate Initial...

373

Controlled Hydrogen Fleet and Infrastructure Demonstration and...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

More Documents & Publications Fuel Cell Technologies Program Overview: 2012 DOE Hydrogen Compression, Storage, and Dispensing Workshop Refueling Infrastructure for...

374

Controlled Hydrogen Fleet and Infrastructure Demonstration and...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

3veenstra.pdf More Documents & Publications Technology Validation Controlled Hydrogen Fleet & Infrastructure Analysis HYDROGEN TO THE HIGHWAYS...

375

Networks, deregulation, and risk : the politics of critical infrastructure protection  

E-Print Network (OSTI)

for Economic Scheduling and Control of Power Systems. ?for Economic Scheduling and Control of Power Systems. ?

Ellis, Ryan Nelson

2011-01-01T23:59:59.000Z

376

Networks, deregulation, and risk : the politics of critical infrastructure protection  

E-Print Network (OSTI)

facilities (QFs) at the avoided cost at which the purchasingthat in tabulating avoided costs, incremental costs ratheras to how to calculate avoided costs, the Federal Energy

Ellis, Ryan Nelson

2011-01-01T23:59:59.000Z

377

Networks, deregulation, and risk : the politics of critical infrastructure protection  

E-Print Network (OSTI)

situated throughout the power grid, rather than a singleand the electric power gridand considers the ways in whichthe postal system, the electric power grid, and freight rail

Ellis, Ryan Nelson

2011-01-01T23:59:59.000Z

378

Networks, deregulation, and risk : the politics of critical infrastructure protection  

E-Print Network (OSTI)

E. ?A Brief History of Electrical Engineering Education. ?A Brief History of Electrical Engineering Education. ?Stuart. A History of Control Engineering, 1800-1930. New

Ellis, Ryan Nelson

2011-01-01T23:59:59.000Z

379

Networks, deregulation, and risk : the politics of critical infrastructure protection  

E-Print Network (OSTI)

and saved. 123 The proposed CIP standards, in this regard,43981. Ibid. 43974. NERC. ?Cybersecurity: Standard CIP-002-1CIP-009-1. ? FERC. ?Notice of Proposed Rulemaking. ? FERC.

Ellis, Ryan Nelson

2011-01-01T23:59:59.000Z

380

Federated Modelling and Simulation for Critical Infrastructure Protection  

Science Journals Connector (OSTI)

The EPOCHS approach[46...] was driven by the need to better understand the effects of integrating network communication systems into electric power control systems on the stability of the electric power systems....

Erich Rome; Peter Langeslag; Andrij Usov

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

The generative mechanisms of digital infrastructure evolution  

Science Journals Connector (OSTI)

The current literature on digital infrastructure offers powerful lenses for conceptualizing the increasingly interconnected information system collectives found in contemporary organizations. However, little attention has been paid to the generative ... Keywords: adoption, case study, case survey, configuration theory, critical realism, digital infrastructure, generative mechanism, information infrastructure, innovation, multimethod, scaling

Ola Henfridsson, Bendik Bygstad

2013-09-01T23:59:59.000Z

382

Audit Report: IG-0545 | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

5 5 Audit Report: IG-0545 March 20, 2002 Cyber-Related Critical Infrastructure Identification and Protection Measures In recent years, critical infrastructure protection has taken on increasing national importance as attacks and resulting damage to the country's critical cyber interests have increased. In 1998, in response to these threats, the Administration issued a directive to demonstrate the Federal government's commitment to protecting critical assets. More recently, President Bush signaled his support for critical infrastructure protection efforts by issuing Executive Order 13231, Critical Infrastructure Protection in the Information Age. The President's order seeks to strengthen the protection of critical information systems, including emergency preparedness communications, and the physical assets that support

383

Hydrogen Delivery Infrastructure Option Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Delivery Infrastructure Hydrogen Delivery Infrastructure Option Analysis Option Analysis DOE and FreedomCAR & Fuel Partnership Hydrogen Delivery and On-Board Storage Analysis Workshop January 25, 2005 Washington DC This presentation does not contain any proprietary or confidential information Tan-Ping Chen Nexant Jim Campbell Bhadra Grover Air Liquide Stefan Unnasch TIAX Glyn Hazelden GTI Graham Moore Chevron Matt Ringer NREL Ray Hobbs Pinnacle West 2 Presentation Outline Project Background Knowledge Collected and Preliminary Results for Each Delivery Option Summary of Observations Next Step Project Background Project Background 4 Delivery Options Option 1* GH delivery by new pipelines Option 2 Converting NG/oil pipelines for GH delivery Option 3 Blending GH into NG pipelines Option 4* GH tube trailers

384

A scalable tools communication infrastructure.  

SciTech Connect

The Scalable Tools Communication Infrastructure (STCI) is an open source collaborative effort intended to provide high-performance, scalable, resilient, and portable communications and process control services for a wide variety of user and system tools. STCI is aimed specifically at tools for ultrascale computing and uses a component architecture to simplify tailoring the infrastructure to a wide range of scenarios. This paper describes STCI's design philosophy, the various components that will be used to provide an STCI implementation for a range of ultrascale platforms, and a range of tool types. These include tools supporting parallel run-time environments, such as MPI, parallel application correctness tools and performance analysis tools, as well as system monitoring and management tools.

Buntinas, D.; Bosilca, G.; Graham, R. L.; Vallee, G.; Watson, G. R.; Mathematics and Computer Science; Univ. of Tennessee; ORNL; IBM

2008-07-01T23:59:59.000Z

385

A Scalable Tools Communication Infrastructure  

SciTech Connect

The Scalable Tools Communication Infrastructure (STCI) is an open source collaborative effort intended to provide high-performance, scalable, resilient, and portable communications and process control services for a wide variety of user and system tools. STCI is aimed specifically at tools for ultrascale computing and uses a component architecture to simplify tailoring the infrastructure to a wide range of scenarios. This paper describes STCI's design philosophy, the various components that will be used to provide an STCI implementation for a range of ultrascale platforms, and a range of tool types. These include tools supporting parallel run-time environments, such as MPI, parallel application correctness tools and performance analysis tools, as well as system monitoring and management tools.

Buntinas, Darius [Argonne National Laboratory (ANL); Bosilca, George [University of Tennessee, Knoxville (UTK); Graham, Richard L [ORNL; Vallee, Geoffroy R [ORNL; Watson, Gregory R. [IBM T. J. Watson Research Center

2008-01-01T23:59:59.000Z

386

Presented by Petascale System Infrastructure  

E-Print Network (OSTI)

National Center for Computational Sciences #12;2 Managed by UT-Battelle for the U.S. Department of Energy and analysis cluster #12;3 Managed by UT-Battelle for the U.S. Department of Energy Shipman_Infrastructure_SC10 Area Network ­ Over 3,000 InfiniBand ports ­ Over 3 miles of cables ­ Scales as computational

387

Protection 1 Protection 1  

E-Print Network (OSTI)

Protection 1 Protection 1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract is a malicious act or accident that crashes the system--- this might be considered the ultimate degradation. 1, p 437. It was reprinted in ACM Operating Systems Rev. 8, 1 (Jan. 1974), p 18. This version

Lampson, Butler W.

388

Protection 1 Protection1  

E-Print Network (OSTI)

Protection 1 Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract is a malicious act or accident that crashes the system-- this might be considered the ultimate degradation. 1, p 437. It was reprinted in ACM Operating Systems Rev. 8, 1 (Jan. 1974), p 18. This version

Lampson, Butler W.

389

Infrastructure and Operations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Operations | National Nuclear Security Administration Operations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Infrastructure and Operations Home > About Us > Our Operations > Infrastructure and Operations Infrastructure and Operations NNSA's missions require a secure production and laboratory infrastructure meeting immediate and long term needs. The Associate Administrator for

390

NNSA Completes Successful Facilities and Infrastructure Recapitalization  

National Nuclear Security Administration (NNSA)

Completes Successful Facilities and Infrastructure Recapitalization Completes Successful Facilities and Infrastructure Recapitalization Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Press Releases > NNSA Completes Successful Facilities and Infrastructure Recapitalization Program Press Release NNSA Completes Successful Facilities and Infrastructure Recapitalization

391

Probabilistic Characterization of Adversary Behavior in Cyber Security  

SciTech Connect

The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

Meyers, C A; Powers, S S; Faissol, D M

2009-10-08T23:59:59.000Z

392

Infrastructure Institutional Change Principle | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Infrastructure Institutional Change Principle Infrastructure Institutional Change Principle Infrastructure Institutional Change Principle October 8, 2013 - 11:09am Addthis Research shows that changes in infrastructure prompt changes in behavior (for better or worse). Federal agencies can modify their infrastructure to promote sustainability-oriented behavior change, ideally in ways that make new behaviors easier and more desirable to follow than existing patterns of behavior. The physical structures, technologies, systems, and processes that constitute the infrastructure of a workplace should be aligned with sustainability goals and desired behavioral changes. For example, a rule requiring double-sided printing necessitates the availability and access to functioning duplex printers. Methods Modifying infrastructure so that it promotes sustainable behavior change is

393

Comparison of two methods to quantify cyber and physical security effectiveness.  

SciTech Connect

With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

Wyss, Gregory Dane; Gordon, Kristl A.

2005-11-01T23:59:59.000Z

394

CyberCrime - A Clear and Present Danger The Ceo's Guide to Cyber Security  

Science Journals Connector (OSTI)

Is Your Information Easy to Steal? Every business has something it needs to protect. Whether it's top-secret Ip, an exclusive client list, or a secure payment portal, your data is what sets you apart from the competition. But most businesses aren't doing ...

Roger Smith

2014-06-01T23:59:59.000Z

395

Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department's Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates numerous networks and systems to help accomplish its strategic missions in the areas of energy, defense, science and the environment. The systems are frequently subjected to sophisticated cyber attacks that could impact the Department's

396

IG-0545.pub  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 5 AUDIT REPORT CYBER-RELATED CRITICAL INFRASTRUCTURE IDENTIFICATION AND PROTECTION MEASURES MARCH 2002 U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF AUDIT SERVICES U. S. DEPARTMENT OF ENERGY Washington, DC 20585 March 20, 2002 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman (Signed) Inspector General SUBJECT: INFORMATION: Cyber-Related Critical Infrastructure Identification and Protection Measures BACKGROUND In recent years, critical infrastructure protection has taken on increasing national importance as attacks and resulting damage to the country's critical cyber interests have increased. In 1998, in response to these threats, the Administration issued a directive to demonstrate the Federal

397

International Materials Protection and Cooperation | National Nuclear  

National Nuclear Security Administration (NNSA)

Materials Protection and Cooperation | National Nuclear Materials Protection and Cooperation | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog International Materials Protection and Cooperation Home > About Us > Our Programs > Nonproliferation > International Materials Protection and Cooperation International Materials Protection and Cooperation

398

Breakout Session #2 - Discussion of Technology and Infrastructure Needs  

NLE Websites -- All DOE Office Websites (Extended Search)

Batteries Breakout Session #2 - Discussion of Technology and Infrastructure Needs Key points about challenges * 1 Question of Safety - What is safe enough? Brain to Drain, Catastrophic protections, growing body of knowledge. * 2 Cost -Cost Valuation: Bill of Material (BOM), Material, Lifecycle, Residual, Performance Key points about opportunities (almost unlimited) * 1 Appropriate standardization * 2 Broad spectrum of technical opportunities incl. Balance of System(BOS): Materials, anode, cathode, cell design, pack design, complexity reduction Key points about DOE roles and suggestions for upcoming workshops * 1 Goals and Context for success * 2 Effective aggregator of DOE Resources; Natnl Labs, Existing Programs and partnerships, universities.

399

Natural Gas and Hydrogen Infrastructure Opportunities Workshop  

Energy.gov (U.S. Department of Energy (DOE))

Argonne National Laboratory held a Natural Gas and Hydrogen Infrastructure Opportunities Workshop October 18-19, 2011, in Lemont, Illinois. The workshop objectives were to convene industry and...

400

Natural Gas and Hydrogen Infrastructure Opportunities Workshop...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

* Convene industry and other stakeholders to share current statusstate-of-the art for natural gas and hydrogen infrastructure. * Identify key challenges (both technical and...

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Agenda: Energy Infrastructure Finance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CAPITAL FOR ENERGY TRANSMISSION, STORAGE, AND DISTRIBUTION How do investors and capital markets view energy TS&D infrastructure as an asset class, especially compared to other...

402

Policy Option for Hydrogen Vehicles and Infrastructure  

Energy.gov (U.S. Department of Energy (DOE))

Presentation by Stefan Unnasch at the 2010-2025 Scenario Analysis for Hydrogen Fuel Cell Vehicles and Infrastructure meeting on January 31, 2007.

403

Grant Helps Efficiently Rebuild Ohio Infrastructure | Department...  

Energy Savers (EERE)

ourselves to move forward with doing additional energy conservation and promoting renewables," Donna Winchester, environment manager for Dayton, says. "Our aging infrastructure...

404

Refueling Infrastructure for Alternative Fuel Vehicles: Lessons...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the AFV Experience Moderator: Dan Sperling, Institute of Transportation Studies at UC Davis, Director Lessons and Challenges for Early Hydrogen Refueling Infrastructure (PDF 1.2...

405

Forecourt and Gas Infrastructure Optimization | Department of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Optimization Forecourt and Gas Infrastructure Optimization Presentation by Bruce Kelly of Nexant at the Joint Meeting on Hydrogen Delivery Modeling and Analysis, May 8-9,...

406

Hydrogen Fueling Infrastructure Research and Station Technology  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

box hydrogenandfuelcells.energy.gov Hydrogen Fueling Infrastructure Research and Station Technology Chris Ainscough, Joe Pratt, Jennifer Kurtz, Brian Somerday, Danny Terlip, Terry...

407

Final Report- Hydrogen Delivery Infrastructure Options Analysis  

Energy.gov (U.S. Department of Energy (DOE))

This report provides in-depth analysis of various hydrogen delivery options to determine the most cost effective infrastructure and R&D efforts for the long term.

408

EV Everywhere Consumer Acceptance and Charging Infrastructure...  

NLE Websites -- All DOE Office Websites (Extended Search)

Introduction EV Everywhere Consumer Acceptance and Charging Infrastructure Workshop Introduction Presentation given at the EV Everywhere Grand Challenge: Consumer Acceptance and...

409

Hydrogen Infrastructure Market Readiness: Opportunities and Potential...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Opportunities and Potential for Near-term Cost Reductions. Proceedings of the Hydrogen Infrastructure Market Readiness Workshop and Summary of Feedback Provided through the...

410

Geographically Based Hydrogen Demand and Infrastructure Rollout...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Rollout Scenario Analysis Geographically Based Hydrogen Demand and Infrastructure Rollout Scenario Analysis Presentation by Margo Melendez at the 2010-2025 Scenario Analysis for...

411

California Hydrogen Infrastructure Project | Open Energy Information  

Open Energy Info (EERE)

Project Jump to: navigation, search Name: California Hydrogen Infrastructure Project Place: California Sector: Hydro, Hydrogen Product: String representation "The CHIP progra ... s...

412

Briefing Memo: Enhancing Resilience in Energy Infrastructure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two...

413

Alternative Ways of Financing Infrastructure Investment: Potential...  

Open Energy Info (EERE)

'Novel' Financing Models Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Alternative Ways of Financing Infrastructure Investment: Potential for 'Novel' Financing Models...

414

Refueling Infrastructure for Alternative Fuel Vehicles: Lessons...  

NLE Websites -- All DOE Office Websites (Extended Search)

Refueling Infrastructure for Alternative Fuel Vehicles: Lessons Learned for Hydrogen Workshop Proceedings M.W. Melaina National Renewable Energy Laboratory S. McQueen and J. Brinch...

415

Africa's Transport Infrastructure Mainstreaming Maintenance and  

Open Energy Info (EERE)

Africa's Transport Infrastructure Mainstreaming Maintenance and Africa's Transport Infrastructure Mainstreaming Maintenance and Management Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Africa's Transport Infrastructure Mainstreaming Maintenance and Management Agency/Company /Organization: World Bank Complexity/Ease of Use: Not Available Website: www.infrastructureafrica.org/system/files/Africa%27s%20Transport%20Inf Transport Toolkit Region(s): Africa & Middle East Related Tools The BEST Experiences with Bioethanol Buses The Sourcebook on Sustainable Urban Transport Alternative Fuels and Advanced Vehicles Data Center ... further results Find Another Tool FIND TRANSPORTATION TOOLS Transport infrastructure is a key requirement for economic growth. In Africa today, networks are sparse, conditions poor, transit slow and

416

Africa Infrastructure Country Diagnostic Documents: ARCGIS Shape...  

Open Energy Info (EERE)

Shape File, all Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Africa Infrastructure Country Diagnostic Documents: ARCGIS Shape File, all Countries Agency...

417

Africa Infrastructure Country Diagnostic Documents: Interactive...  

Open Energy Info (EERE)

MAP in PDF, all Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Africa Infrastructure Country Diagnostic Documents: Interactive MAP in PDF, all Countries...

418

State Experience in Hydrogen Infrastructure in California  

Energy.gov (U.S. Department of Energy (DOE))

Presentation by Gerhard Achtelik, California Air Resources Board, at the Hydrogen Infrastructure Market Readiness Workshop, February 17, 2011, in Washington, DC.

419

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC is offering a free, public webinar series from January to May 2012 entitled "Issues in Designing the Future Grid," focusing on the information hierarchy for the future grid and grid enablers of sustainable energy systems. The second webinar, Cyber-Physical Systems Security for the Smart Grid, will be held on Fecruary 7, 2012 by Manimaran Govindarasu, Professor if Electrical and Computer Engineering at Iowa State University. Govindarasu_PSERC_Webinar_Feb_2012.pdf More Documents & Publications April 2012 PSERC Webinars on Issues in Designing the Future Grid

420

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed More Documents & Publications Security is Not an Option ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004)

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Leadership Development Series: "A Holistic Look at Cyber Security" |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" January 30, 2014 10:30AM to 12:00PM EST Registration link: By e-mail, $0 Course type: Classroom/Auditorium, Video Cast & Teleconference Course Location: DOE Headquarters, Forrestal Building, Washington, DC/ Main Auditorium Course Description: Dr. Steven Bucci, Director, Douglas and Sarah Allison Center for Foreign Policy Studies. The sheer volume of cyber activity is masking serious threats that impact government, business and our personal lives every day. Incidents are now ubiquitous, pervasive and constitute the new "normal". These day to day threats are not existential, but if not addressed, will hinder our

422

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network (OSTI)

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

423

Multiple Tenure/Tenure-Track Faculty Positions Software Engineering Focus: CyberSecurity and Big Data  

E-Print Network (OSTI)

Multiple Tenure/Tenure-Track Faculty Positions Software Engineering Focus: CyberSecurity and Big to cybersecurity and big data. Outstanding candidates from all areas of software engineering and computer science

Carver, Jeffrey C.

424

Treatment outcomes using CyberKnife for brain metastases from lung cancer  

Science Journals Connector (OSTI)

......Treatment outcomes using CyberKnife for brain metastases from lung cancer Keisuke Tamari...fractionated stereotactic radiotherapy (SRT) for brain metastases from lung cancer. A total of 67 patients with 109 brain metastases from lung cancer treated using......

Keisuke Tamari; Osamu Suzuki; Naoya Hashimoto; Naoki Kagawa; Masateru Fujiwara; Iori Sumida; Yuji Seo; Fumiaki Isohashi; Yasuo Yoshioka; Toshiki Yoshimine; Kazuhiko Ogawa

2014-10-01T23:59:59.000Z

425

Cyber visual training as a new method for the mastery of endoscopic surgery  

Science Journals Connector (OSTI)

We devised a new method incorporating cyber visual training whereby novices in endoscopic surgery are instructed via repetition of a video-recorded procedure. We then conducted a study designed to investigate ...

S. Takiguchi; M. Sekimoto; M. Yasui

2005-09-01T23:59:59.000Z

426

A quantitative man-machine model for cyber security efficiency analysis  

E-Print Network (OSTI)

of the level of their security defense processes' efficiency and the impact of their investment. Modeling and characterization of the dynamics of cyber security management are essential to risk prediction, damage assessment, and resource allocations...

Jung, Sung-Oh

2007-04-25T23:59:59.000Z

427

Cyber in the Cloud -- Lessons Learned from INL's Cloud E-Mail Acquisition  

SciTech Connect

As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.

Troy Hiltbrand; Daniel Jones

2012-12-01T23:59:59.000Z

428

Automatic Library Tracking Database Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Libraries » ALTD Libraries » ALTD ALTD Automatic Library Tracking Database Infrastructure To track and monitor library usage and better serve your software needs, we have enabled the Automatic Library Tracking Database (ALTD) on our prodcution systems, Hopper and Edison. ALTD is also availailable on Carver, but has not enabled for all users by default yet. ALTD, developed by National Institute for Computational Sciences, automatically and transparently tracks all libraries linked into an application at compile time, as well as the libraries used at run time, by intercepting the linker (ld) and the job launcher (aprun, or mpirun). It is a light-weight tool, and should not change your experience with compilation and execution of codes on the machine. However, if you encounter any problems due to ALTD,

429

Hydrogen Production Infrastructure Options Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

Production Production Infrastructure Options Analysis January 26, 2006 Brian D. James Julie Perez Peter Schmidt (703) 243 - 3383 Brian_James@DirectedTechnologies.com Directed Technologies, Inc. Page 1 of 39 26 January 2006 2006-1-26 DOE Transition Workshop Agenda 1. Project Description and Objective 2. Team Members 3. Approach 4. Model Theory, Structure and Assumptions 5. Model Description 1. Logic 2. Features 3. Cost Components (Production, Delivery & Dispensing) 6. Los Angeles Transitional Example 7. Model Flexibility Page 2 of 39 26 January 2006 2006-1-26 DOE Transition Workshop Team Members & Interactions Start: May 2005 (effective) End: Summer 2007 * Directed Technologies, Inc.- Prime * Sentech, Inc., Research Partner * Air Products, Industrial Gas Supplier * Advisory Board * Graham Moore, Chevron Technology Ventures

430

Microsoft Word - Cyber Effects Analysis Using VCSE 09.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8-5954 8-5954 Unlimited Release Printed September 2008 Cyber Effects Analysis Using VCSE Promoting Control System Reliability Michael J. McDonald, Gregory N. Conrad, Travis C. Service, Regis H. Cassidy Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of

431

Predicting Cyber-Production deviance in the workplace  

Science Journals Connector (OSTI)

The excessive use of the internet for non-work-related activities is a form of white-collar deviant behaviour at work. Applying the Theory of Reasoned Action, structural equation modelling was used to predict Cyber-Production (CP) deviant behaviours in the workplace. Attitude and intention to visit non-work-related websites were found to be important predictors of such behaviours. Workplace Subjective Norms (SN) had no impact on the tendency to perform CP deviant activities but did influence intention to visit work-related websites. The findings of the study contributed to an expanded understanding of the potential predictors of CP deviance in the workplace and suggested appropriate strategies for effective internet management.

Pruthikrai Mahatanankoon

2006-01-01T23:59:59.000Z

432

Alternative Fuels Data Center: Propane Fueling Infrastructure Development  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Infrastructure Development to someone by E-mail Infrastructure Development to someone by E-mail Share Alternative Fuels Data Center: Propane Fueling Infrastructure Development on Facebook Tweet about Alternative Fuels Data Center: Propane Fueling Infrastructure Development on Twitter Bookmark Alternative Fuels Data Center: Propane Fueling Infrastructure Development on Google Bookmark Alternative Fuels Data Center: Propane Fueling Infrastructure Development on Delicious Rank Alternative Fuels Data Center: Propane Fueling Infrastructure Development on Digg Find More places to share Alternative Fuels Data Center: Propane Fueling Infrastructure Development on AddThis.com... More in this section... Propane Basics Benefits & Considerations Stations Locations Infrastructure Development Vehicles Laws & Incentives

433

Alternative Fuels Data Center: Biodiesel Fueling Infrastructure Development  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Infrastructure Development to someone by E-mail Infrastructure Development to someone by E-mail Share Alternative Fuels Data Center: Biodiesel Fueling Infrastructure Development on Facebook Tweet about Alternative Fuels Data Center: Biodiesel Fueling Infrastructure Development on Twitter Bookmark Alternative Fuels Data Center: Biodiesel Fueling Infrastructure Development on Google Bookmark Alternative Fuels Data Center: Biodiesel Fueling Infrastructure Development on Delicious Rank Alternative Fuels Data Center: Biodiesel Fueling Infrastructure Development on Digg Find More places to share Alternative Fuels Data Center: Biodiesel Fueling Infrastructure Development on AddThis.com... More in this section... Biodiesel Basics Benefits & Considerations Stations Locations Infrastructure Development Vehicles Laws & Incentives

434

Site Support Program Plan Infrastructure Program  

SciTech Connect

The Fiscal Year 1996 Infrastructure Program Site Support Program Plan addresses the mission objectives, workscope, work breakdown structures (WBS), management approach, and resource requirements for the Infrastructure Program. Attached to the plan are appendices that provide more detailed information associated with scope definition. The Hanford Site`s infrastructure has served the Site for nearly 50 years during defense materials production. Now with the challenges of the new environmental cleanup mission, Hanford`s infrastructure must meet current and future mission needs in a constrained budget environment, while complying with more stringent environmental, safety, and health regulations. The infrastructure requires upgrading, streamlining, and enhancement in order to successfully support the site mission of cleaning up the Site, research and development, and economic transition.

NONE

1995-09-26T23:59:59.000Z

435

Reinventing Infrastructure: The 101 Freeway and the Revisioning of Downtown Los Angeles  

E-Print Network (OSTI)

hybrid of architecture, landscape, and infrastructure andforms of infrastructure/architecture hybrids, these projectsa hybrid: landscape becomes plinth, infrastructure becomes

Samuels, Linda C.

2012-01-01T23:59:59.000Z

436

Perspective: The Climate-Population-Infrastructure Modeling and Simulation Fertile Area for New Research  

SciTech Connect

Managing the risks posed by climate change and extreme weather to energy production and delivery is a challenge to communities worldwide. As climate conditions change, populations will shift, and demand will re-locate; and networked infrastructures will evolve to accommodate new load centers, and, hopefully, minimize vulnerability to natural disaster. Climate effects such as sea level rise, increased frequency and intensity of natural disasters, force populations to move locations. Displaced population creates new demand for built infrastructure that in turn generates new economic activity that attracts new workers and associated households to the new locations. Infrastructures and their interdependencies will change in reaction to climate drivers as the networks expand into new population areas and as portions of the networks are abandoned as people leave. Thus, infrastructures will evolve to accommodate new load centers while some parts of the network are underused, and these changes will create emerging vulnerabilities. Forecasting the location of these vulnerabilities by combining climate predictions and agent based population movement models shows promise for defining these future population distributions and changes in coastal infrastructure configurations. By combining climate and weather data, engineering algorithms and social theory it has been only recently possible to examine electricity demand response to increased climactic temperatures, population relocation in response to extreme cyclonic events, consequent net population changes and new regional patterns in electricity demand. These emerging results suggest a research agenda of coupling these disparate modelling approaches to understand the implications of climate change for protecting the nation s critical infrastructure.

Allen, Melissa R [ORNL; Fernandez, Steven J [ORNL; Walker, Kimberly A [ORNL; Fu, Joshua S [ORNL

2014-01-01T23:59:59.000Z

437

Critical Infrastructure Interdependency Modeling: A Survey of U.S. and International Research  

SciTech Connect

The Nations health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes, and organizations across which these goods and services move are called "critical infrastructures".1 This statement is as true in the U.S. as in any country in the world. Recent world events such as the 9-11 terrorist attacks, London bombings, and gulf coast hurricanes have highlighted the importance of stable electric, gas and oil, water, transportation, banking and finance, and control and communication infrastructure systems. Be it through direct connectivity, policies and procedures, or geospatial proximity, most critical infrastructure systems interact. These interactions often create complex relationships, dependencies, and interdependencies that cross infrastructure boundaries. The modeling and analysis of interdependencies between critical infrastructure elements is a relatively new and very important field of study. The U.S. Technical Support Working Group (TSWG) has sponsored this survey to identify and describe this current area of research including the current activities in this field being conducted both in the U.S. and internationally. The main objective of this study is to develop a single source reference of critical infrastructure interdependency modeling tools (CIIMT) that could be applied to allow users to objectively assess the capabilities of CIIMT. This information will provide guidance for directing research and development to address the gaps in development. The results will inform researchers of the TSWG Infrastructure Protection Subgroup of research and development efforts and allow a more focused approach to addressing the needs of CIIMT end-user needs. This report first presents the field of infrastructure interdependency analysis, describes the survey methodology, and presents the leading research efforts in both a cumulative table and through individual datasheets. Data was collected from open source material and when possible through direct contact with the individuals leading the research.

Not Available

2006-08-01T23:59:59.000Z

438

Alternative Fuels Data Center: Alternative Fueling Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Alternative Fueling Alternative Fueling Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fueling Infrastructure Grants

439

Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Fueling Fueling Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fueling Infrastructure Tax Credit

440

Alternative Fuels Data Center: Biofuel Fueling Infrastructure Tax Credit  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Biofuel Fueling Biofuel Fueling Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Biofuel Fueling Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Biofuel Fueling Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Biofuel Fueling Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Biofuel Fueling Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Biofuel Fueling Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Biofuel Fueling Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Biofuel Fueling Infrastructure Tax Credit

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Alternative Fuels Data Center: Natural Gas Fueling Infrastructure  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Fueling Fueling Infrastructure Development to someone by E-mail Share Alternative Fuels Data Center: Natural Gas Fueling Infrastructure Development on Facebook Tweet about Alternative Fuels Data Center: Natural Gas Fueling Infrastructure Development on Twitter Bookmark Alternative Fuels Data Center: Natural Gas Fueling Infrastructure Development on Google Bookmark Alternative Fuels Data Center: Natural Gas Fueling Infrastructure Development on Delicious Rank Alternative Fuels Data Center: Natural Gas Fueling Infrastructure Development on Digg Find More places to share Alternative Fuels Data Center: Natural Gas Fueling Infrastructure Development on AddThis.com... More in this section... Natural Gas Basics Benefits & Considerations Stations Locations Infrastructure Development

442

DOE Hydrogen Analysis Repository: Analysis of Energy Infrastructures  

NLE Websites -- All DOE Office Websites (Extended Search)

Analysis of Energy Infrastructures Analysis of Energy Infrastructures Project Summary Full Title: Analysis of Energy Infrastructures and Potential Impacts from an Emergent Hydrogen Fueling Infrastructure Project ID: 250 Principal Investigator: David Reichmuth Brief Description: Sandia National Laboratories is using a system dynamics approach to simulate the interaction of vehicle adoption and infrastructure for hydrogen, electricity, natural gas, and gasoline. Purpose It is envisioned that the transition to hydrogen vehicles will begin by taking advantage of the existing infrastructure for natural gas. This project will study the impact of hydrogen vehicles on demand for natural gas, electricity, and gasoline. The impact of existing energy infrastructures on hydrogen infrastructure growth will also be considered.

443

Midstream Infrastructure Improvements Key to Realizing Full Potential...  

Office of Environmental Management (EM)

Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

444

Antioch University and EPA Webinar: Green Infrastructure and...  

Office of Environmental Management (EM)

Antioch University and EPA Webinar: Green Infrastructure and Flood Resiliency Webinar Antioch University and EPA Webinar: Green Infrastructure and Flood Resiliency Webinar January...

445

FY 2014 Scientific Infrastructure Support for Consolidated Innovative...  

Office of Environmental Management (EM)

4 Scientific Infrastructure Support for Consolidated Innovative Nuclear Research FOA FY 2014 Scientific Infrastructure Support for Consolidated Innovative Nuclear Research FOA The...

446

CHP: Enabling Resilient Energy Infrastructure for Critical Facilities...  

Energy Savers (EERE)

CHP: Enabling Resilient Energy Infrastructure for Critical Facilities - Report, March 2013 CHP: Enabling Resilient Energy Infrastructure for Critical Facilities - Report, March...

447

2011 Biomass Program Platform Peer Review: Infrastructure | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Infrastructure 2011 Biomass Program Platform Peer Review: Infrastructure This document summarizes the recommendations and evaluations provided by an independent external panel of...

448

taking charge : optimizing urban charging infrastructure for shared electric vehicles  

E-Print Network (OSTI)

This thesis analyses the opportunities and constraints of deploying charging infrastructure for shared electric vehicles in urban environments. Existing electric vehicle charging infrastructure for privately owned vehicles ...

Subramani, Praveen

2012-01-01T23:59:59.000Z

449

Infrastructure Analysis Tools: A Focus on Cash Flow Analysis...  

NLE Websites -- All DOE Office Websites (Extended Search)

hydrogen infrastructure: 1. Infrastructure costs 2. Realistic market growth scenarios 3. Return on investment expectations 4. Policy support options * NREL has been developing...

450

H2A Hydrogen Delivery Infrastructure Analysis Models and Conventional...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

H2A Hydrogen Delivery Infrastructure Analysis Models and Conventional Pathway Options Analysis Results - Interim Report H2A Hydrogen Delivery Infrastructure Analysis Models and...

451

HyDIVE (Hydrogen Dynamic Infrastructure and Vehicle Evolution...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

HyDIVE (Hydrogen Dynamic Infrastructure and Vehicle Evolution) Model Analysis HyDIVE (Hydrogen Dynamic Infrastructure and Vehicle Evolution) Model Analysis Presentation by NREL's...

452

Connecticut Company to Advance Hydrogen Infrastructure and Fueling...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Connecticut Company to Advance Hydrogen Infrastructure and Fueling Station Technologies Connecticut Company to Advance Hydrogen Infrastructure and Fueling Station Technologies July...

453

Webinar: An Overview of the Hydrogen Fueling Infrastructure Research...  

Office of Environmental Management (EM)

An Overview of the Hydrogen Fueling Infrastructure Research and Station Technology (H2FIRST) Project Webinar: An Overview of the Hydrogen Fueling Infrastructure Research and...

454

FY 2003 Progress Report for Hydrogen, Fuel Cells and Infrastructure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FY 2003 Progress Report for Hydrogen, Fuel Cells and Infrastructure Technologies Program FY 2003 Progress Report for Hydrogen, Fuel Cells and Infrastructure Technologies Program...

455

Green Infrastructure and Flood Resiliency-Land Use Management...  

Office of Environmental Management (EM)

Green Infrastructure and Flood Resiliency-Land Use Management as an Adaptation Strategy in the Built Environment Green Infrastructure and Flood Resiliency-Land Use Management as an...

456

Webinar: Creating a Green Infrastructure Plan to Transform Your...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Webinar: Creating a Green Infrastructure Plan to Transform Your Community Webinar: Creating a Green Infrastructure Plan to Transform Your Community November 18, 2014 3:00PM to...

457

EPA Webcast - Creating a Green Infrastructure Plan to Transform...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

EPA Webcast - Creating a Green Infrastructure Plan to Transform Your Community EPA Webcast - Creating a Green Infrastructure Plan to Transform Your Community November 18, 2014...

458

Fuel Cell Electric Vehicles and Hydrogen Infrastructure: Deployment...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Electric Vehicles and Hydrogen Infrastructure: Deployment and Issues Fuel Cell Electric Vehicles and Hydrogen Infrastructure: Deployment and Issues This presentation by Bill Elrick...

459

Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Alternative Fueling Alternative Fueling Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fueling Infrastructure Tax Credit

460

Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Fueling Fueling Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fueling Infrastructure Tax Credit

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Alternative Fuels Data Center: Ethanol Fueling Infrastructure Development  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Fueling Fueling Infrastructure Development to someone by E-mail Share Alternative Fuels Data Center: Ethanol Fueling Infrastructure Development on Facebook Tweet about Alternative Fuels Data Center: Ethanol Fueling Infrastructure Development on Twitter Bookmark Alternative Fuels Data Center: Ethanol Fueling Infrastructure Development on Google Bookmark Alternative Fuels Data Center: Ethanol Fueling Infrastructure Development on Delicious Rank Alternative Fuels Data Center: Ethanol Fueling Infrastructure Development on Digg Find More places to share Alternative Fuels Data Center: Ethanol Fueling Infrastructure Development on AddThis.com... More in this section... Ethanol Basics Benefits & Considerations Stations Locations Infrastructure Development Business Case Equipment Options

462

Alternative Fuels Data Center: Alternative Fuel Infrastructure Tax Credit  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Alternative Fuel Alternative Fuel Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Alternative Fuel Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Alternative Fuel Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Alternative Fuel Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Alternative Fuel Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Alternative Fuel Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Alternative Fuel Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fuel Infrastructure Tax Credit

463

Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives -  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Propane Infrastructure Propane Infrastructure and Fuel Incentives - Boulden Propane to someone by E-mail Share Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - Boulden Propane on Facebook Tweet about Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - Boulden Propane on Twitter Bookmark Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - Boulden Propane on Google Bookmark Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - Boulden Propane on Delicious Rank Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - Boulden Propane on Digg Find More places to share Alternative Fuels Data Center: Propane Infrastructure and Fuel Incentives - Boulden Propane on AddThis.com...

464

Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Development  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Fueling Fueling Infrastructure Development to someone by E-mail Share Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Development on Facebook Tweet about Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Development on Twitter Bookmark Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Development on Google Bookmark Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Development on Delicious Rank Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Development on Digg Find More places to share Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Development on AddThis.com... More in this section... Hydrogen Basics Benefits & Considerations Stations Locations Infrastructure Development Vehicles Laws & Incentives

465

Alternative Fuels Data Center: Ethanol Fueling Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Ethanol Fueling Ethanol Fueling Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Ethanol Fueling Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Ethanol Fueling Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Ethanol Fueling Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Ethanol Fueling Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Ethanol Fueling Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Ethanol Fueling Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol Fueling Infrastructure Grants The Minnesota Corn Research & Promotion Council and the Minnesota

466

Alternative Fuels Data Center: Biofuels Distribution Infrastructure Tax  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Distribution Distribution Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Biofuels Distribution Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Biofuels Distribution Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Biofuels Distribution Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Biofuels Distribution Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Biofuels Distribution Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Biofuels Distribution Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Biofuels Distribution Infrastructure Tax Credit

467

Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Fueling Fueling Infrastructure Tax Credit to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Tax Credit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fueling Infrastructure Tax Credit

468

Alternative Fuels Data Center: Ethanol Blend Infrastructure Grant Program  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Ethanol Blend Ethanol Blend Infrastructure Grant Program to someone by E-mail Share Alternative Fuels Data Center: Ethanol Blend Infrastructure Grant Program on Facebook Tweet about Alternative Fuels Data Center: Ethanol Blend Infrastructure Grant Program on Twitter Bookmark Alternative Fuels Data Center: Ethanol Blend Infrastructure Grant Program on Google Bookmark Alternative Fuels Data Center: Ethanol Blend Infrastructure Grant Program on Delicious Rank Alternative Fuels Data Center: Ethanol Blend Infrastructure Grant Program on Digg Find More places to share Alternative Fuels Data Center: Ethanol Blend Infrastructure Grant Program on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol Blend Infrastructure Grant Program

469

SECURING OIL AND NATURAL GAS INFRASTRUCTURES IN THE NEW ECONOMY...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SECURING OIL AND NATURAL GAS INFRASTRUCTURES IN THE NEW ECONOMY SECURING OIL AND NATURAL GAS INFRASTRUCTURES IN THE NEW ECONOMY Based on the finding of a growing potential...

470

Computerization and Competitiveness: National Information Infrastructure in the USA  

E-Print Network (OSTI)

stay 'fairly intense,' USA Today, August 1994. Clinton,INFRASTRUCTURE IN THE USA Kenneth L. Kraemer Professor ofINFRASTRUCTURE IN THE USA INTRODUCTION The production and

Kraemer, Kenneth L.

1994-01-01T23:59:59.000Z

471

SLT Power Infrastructure Projects Pvt Ltd | Open Energy Information  

Open Energy Info (EERE)

SLT Power Infrastructure Projects Pvt Ltd Jump to: navigation, search Name: SLT Power & Infrastructure Projects Pvt Ltd. Place: Hyderabad, Andhra Pradesh, India Zip: 500044 Sector:...

472

Deadline Extended for RFI Regarding Hydrogen Infrastructure and...  

Energy Savers (EERE)

Regarding Hydrogen Infrastructure and FCEVs Deadline Extended for RFI Regarding Hydrogen Infrastructure and FCEVs February 4, 2014 - 12:00am Addthis DOE has extended the submission...

473

Fermilab | Recovery Act | General Infrastructure Projects  

NLE Websites -- All DOE Office Websites (Extended Search)

General Infrastructure Projects General Infrastructure Projects High Availability Computing Center The Computing Division provides administrative, technical and physical support of central computing, storage and networking equipment critical to the success of the lab’s scientific mission. Before the renovation, Feynman Computing Center housed the only high availability computing center on the Fermilab campus, which operated at its electrical capacity. The requirements for a high availability computing center include backup infrastructure support for computing equipment that operates continuously, such as networking, web and email services, experiment databases and file serving. Electrical service must be backed up by both an uninterrupted power supply system and a standby electrical generator.

474

Transforming the U.S. Energy Infrastructure  

SciTech Connect

The U.S. energy infrastructure is among the most reliable, accessible and economic in the world. On the other hand, the U.S. energy infrastructure is excessively reliant on foreign sources of energy, experiences high volatility in energy prices, does not practice good stewardship of finite indigenous energy resources and emits significant quantities of greenhouse gases (GHG). This report presents a Technology Based Strategy to achieve a full transformation of the U.S. energy infrastructure that corrects these negative factors while retaining the positives.

Larry Demick

2010-07-01T23:59:59.000Z

475

Hydrogen Regional Infrastructure Program in Pennsylvania  

NLE Websites -- All DOE Office Websites (Extended Search)

REGIONAL REGIONAL INFRASTRUCTURE PROGRAM IN PENNSYLVANIA HYDROGEN REGIONAL INFRASTRUCTURE PROGRAM IN PENNSYLVANIA Melissa Klingenberg, PhD Melissa Klingenberg, PhD Hydrogen Program Hydrogen Program Air Products and Chemicals, Inc. (APCI) Hydrogen Separation Hydrogen Sensors Resource Dynamics Corporation (RDC) Tradeoff/Sensitivity Analyses of Hydrogen Delivery Approaches EDO Fiber Science High Pressure/High Strength Composite Material Development and Prototyping CTC * Program Management * Hydrogen Delivery - CH 4 /H 2 co-transport - H 2 separation - Delivery approaches * Advanced Materials - Characterization - Testing/Analyses - Predictive Modeling * Sensors SRNL Pipeline Life Management Program Develop infrastructure technology for a H 2 economy Aims to serve as "go-to" organization to catalyze PA Hydrogen

476

Optimizing protections against cascades in network systems: a modified binary  

E-Print Network (OSTI)

to the topology of an electricity infrastructure, i.e. the 380 kV Italian power transmission network. We only protection; line switching; cascading failure; differential evolution algorithm; multi-objective optimization protection (NP) by line switching, done automatically or by a system operator, following an attack

Paris-Sud XI, Université de

477

Fast multi-core co-simulation of Cyber-Physical Systems : Application to internal combustion engines  

E-Print Network (OSTI)

on renewable energy and energy efficiency. This challenge affects the whole energy cycle: production, transport. Automobiles are typical examples of Cyber-Physical Systems, where chem- ical energy (gasoline, diesel, ethanol. Currently, building high fidelity system-level models of Cyber-Physical Sys- tems in general and automotive

Boyer, Edmond

478

Natural Gas and Hydrogen Infrastructure Opportunities: Markets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

h presentation slides: Natural Gas and hydrogen Infrastructure opportunities: markets and Barriers to Growth Matt Most, Encana Natural Gas 1 OctOber 2011 | ArgOnne nAtiOnAl...

479

Delaware Transportation Infrastructure Forum Problem Identification Statements  

E-Print Network (OSTI)

2013 Delaware Transportation Infrastructure Forum Problem Identification Statements Sponsored by The Delaware Center for Transportation and the Delaware Department of Transportation Delaware Center for Transportation Your main resource for transportation education and research Identifying Important Issues Related

Firestone, Jeremy

480

Distributed Water Infrastructure for Sustainable Communities  

Science Journals Connector (OSTI)

Distributed water infrastructure (located at the community or the household level) is relatively untried and unproven, compared with technologies for managing urban water at higher (e.g. regional) levels. This...

Christos K. Makropoulos; David Butler

2010-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "infrastructure protection cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Hydrogen Fueling Infrastructure Research and Station Technology  

Energy.gov (U.S. Department of Energy (DOE))

Presentation slides from the DOE Fuel Cell Technologies Office webinar "An Overview of the Hydrogen Fueling Infrastructure Research and Station Technology (H2FIRST) Project" held on November 18, 2014.

482

Offshore Infrastructure Associates Inc | Open Energy Information  

Open Energy Info (EERE)

Database. This article is a stub. You can help OpenEI by expanding it. Retrieved from "http:en.openei.orgwindex.php?titleOffshoreInfrastructureAssociatesInc&oldid769313...

483

Costs Associated With Propane Vehicle Fueling Infrastructure  

SciTech Connect

This document is designed to help fleets understand the cost factors associated with propane vehicle fueling infrastructure. It provides an overview of the equipment and processes necessary to develop a propane fueling station and offers estimated cost ranges.

Smith, M.; Gonzales, J.

2014-08-01T23:59:59.000Z

484

Geographically Based Infrastructure Margo Melendez & Keith Parks  

E-Print Network (OSTI)

is incentive to purchase Alternative Fuels Data Center, EERE #12;Description of Metrics Vehicle Clean Cities Coalitions Alternative Fuels Data Center, EERE #12;Preliminary Findings #12;Preliminary;Geographically-Based Infrastructure Analysis (GIA) Utilizes GIS, geographically segregated data, and transition

485

Modeling Risks in Infrastructure Asset Management  

E-Print Network (OSTI)

The goal of this dissertation research is to model risk in delivery, operation and maintenance phases of infrastructure asset management. More specifically, the two main objectives of this research are to quantify and measure financial risk...

Seyedolshohadaie, Seyed Reza

2012-10-19T23:59:59.000Z

486

Dispersion of agglomeration through transport infrastructure  

E-Print Network (OSTI)

My dissertation aims to assess transport infrastructure's influence on the productivity, scale and distribution of urban economic activities through changing intercity accessibility. Standard project-level cost-benefit ...

Fang, Wanli, Ph. D. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

487

Hydrogen Infrastructure Market Readiness Workshop: Preliminary Results  

Energy.gov (U.S. Department of Energy (DOE))

Preliminary results from the Hydrogen Infrastructure Market Readiness Workshop held February 16-17, 2011. This presentation was disseminated to workshop attendees to convey the aggregate and "raw" feedback collected during the workshop.

488

Geographically-Based Infrastructure Analysis for California  

Energy.gov (U.S. Department of Energy (DOE))

Presentation by Joan Ogden of the University of California at the 2010 - 2025 Scenario Analysis for Hydrogen Fuel Cell Vehicles and Infrastructure Meeting on August 9 - 10, 2006 in Washington, D.C.

489

Public private partnership in infrastructure financing  

E-Print Network (OSTI)

The global financial crisis, which was unique in its magnitude and after effects, has generated significant interest in Public Private Partnership (PPP). Lack of investments and deteriorated infrastructure challenges ...

Ahmed, Anas

2014-01-01T23:59:59.000Z

490

Geographically Based Hydrogen Demand and Infrastructure Analysis  

Energy.gov (U.S. Department of Energy (DOE))

Presentation by NREL's Margo Melendez at the 2010 - 2025 Scenario Analysis for Hydrogen Fuel Cell Vehicles and Infrastructure Meeting on August 9 - 10, 2006 in Washington, D.C.

491

Georgia Utility Facility Protection Act (Georgia) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Georgia Utility Facility Protection Act (Georgia) Georgia Utility Facility Protection Act (Georgia) Georgia Utility Facility Protection Act (Georgia) < Back Eligibility Agricultural Commercial Construction General Public/Consumer Industrial Installer/Contractor Investor-Owned Utility Municipal/Public Utility Rural Electric Cooperative Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Georgia Program Type Safety and Operational Guidelines Siting and Permitting Provider Utilities Protection Center of Georgia The Georgia Utility Facility Protection Act (GUFPA) was established to protect the underground utility infrastructure of Georgia. GUFPA mandates that, before starting any mechanized digging or excavation work, you must

492

EA-1936: Proposed Changes to Parcel ED-1 Land Uses, Utility Infrastructure,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Proposed Changes to Parcel ED-1 Land Uses, Utility 6: Proposed Changes to Parcel ED-1 Land Uses, Utility Infrastructure, and Natural Area Management Responsibility, Oak Ridge, Tennessee EA-1936: Proposed Changes to Parcel ED-1 Land Uses, Utility Infrastructure, and Natural Area Management Responsibility, Oak Ridge, Tennessee SUMMARY NOTE: This EA has been cancelled. This EA will evaluate the environmental impacts of DOE's proposed modifications to the allowable land uses, utility infrastructure, and Natural Area management responsibility for Parcel ED-1. The purpose of the modifications is to enhance the development potential of the Horizon Center business/industrial park, while ensuring protection of the adjacent Natural Area. The area addressed by the proposed action was evaluated for various industrial/business uses in the

493

warhead protection  

National Nuclear Security Administration (NNSA)

1%2A en Office of Nuclear Warhead Protection http:nnsa.energy.govaboutusourprogramsnonproliferationprogramofficesinternationalmaterialprotectionandcooperation-0

494

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

495

Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the  

NLE Websites -- All DOE Office Websites (Extended Search)

Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web of Things, and Social Media Speaker(s): Edward Curry Date: April 24, 2013 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: James O'Donnell Philip Haves Cyber-Physical Energy Systems (CPES) exploit the potential of information technology to boost energy efficiency while minimising environmental impacts. CPES can help manage energy more efficiently by providing a functional view of the entire energy system so that energy activities can be understood, changed, and reinvented to better support sustainable practices. CPES can be applied at different scales from Smart Grids and Smart Cities to Smart Enterprises and Smart Buildings. Significant technical challenges exist in terms of information management, leveraging

496

Office of Cyber and Security Assessments | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

security policies and programs throughout the Department, including protection of special nuclear material, and classified and sensitive information. The Office has established and...

497

Presidential Proclamation: Critical Infrastructure Security and Resilience Month, 2013  

Energy.gov (U.S. Department of Energy (DOE))

A proclamation from President Barack Obama declaring November 2013 Critical Infrastructure Security and Resilience Month.

498

International Hydrogen Infrastructure Challenges Workshop Summary NOW, NEDO, and DOE  

Energy.gov (U.S. Department of Energy (DOE))

Webinar slides for the International Hydrogen Infrastructure Challenges Workshop Summary from NOW, NEDO, and DOE.

499

Hydrogen Vehicle and Infrastructure Codes and Standards Citations  

Energy.gov (U.S. Department of Energy (DOE))

This document lists codes and standards typically used for US hydrogen vehicle and infrastructure projects.

500

Fuel Cell Technologies Office: Natural Gas and Hydrogen Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Natural Gas and Natural Gas and Hydrogen Infrastructure Opportunities Workshop to someone by E-mail Share Fuel Cell Technologies Office: Natural Gas and Hydrogen Infrastructure Opportunities Workshop on Facebook Tweet about Fuel Cell Technologies Office: Natural Gas and Hydrogen Infrastructure Opportunities Workshop on Twitter Bookmark Fuel Cell Technologies Office: Natural Gas and Hydrogen Infrastructure Opportunities Workshop on Google Bookmark Fuel Cell Technologies Office: Natural Gas and Hydrogen Infrastructure Opportunities Workshop on Delicious Rank Fuel Cell Technologies Office: Natural Gas and Hydrogen Infrastructure Opportunities Workshop on Digg Find More places to share Fuel Cell Technologies Office: Natural Gas and Hydrogen Infrastructure Opportunities Workshop on AddThis.com...