Sample records for intermediate scada security

  1. National SCADA Test Bed - Enhancing control systems security...

    Energy Savers [EERE]

    SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

  2. Sandia Energy - The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Center for SCADA Security Assets Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure...

  3. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber...

  4. Network Traffic Analysis and SCADA Security

    E-Print Network [OSTI]

    Hu, Jiankun

    systems are widely used for monitoring and controlling industrial systems including power plants, water of traffic generated. Finally, network traffic monitoring can be used in security management to identify the vulnerabilities of SCADA systems because this 383 © Springer 2010 , Handbook of Information and Communication

  5. Framework for SCADA Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport inEnergy0.pdf Flash2010-60.pdf2 DOE March, 2015 TechnologyFramework for SCADA

  6. Lessons Learned from Cyber Security Assessments of SCADA and...

    Energy Savers [EERE]

    Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common...

  7. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Duggan, David P. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Chavez, Adrian R. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM

    2006-11-01T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  8. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  9. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  10. SCADA

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Historical Powerplant Data The data or SCADA (Supervisory Control and Data Aquisition) information in the links below consists of Elevation, Water Release, Generation and Ramping...

  11. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    E-Print Network [OSTI]

    Smith, Sean W.

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA) systems Supervisory Control And Data Acquisition (SCADA) systems, on which the proper operations of critical

  12. Towards a Standard for Highly Secure SCADA Systems

    SciTech Connect (OSTI)

    Carlson, R.

    1998-09-25T23:59:59.000Z

    The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied to automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the requirements analysis for a highly secure SCADA system. The fi-arnework for the discussion consists of the identification of SCADA security investment areas coupled with the tradeoffs that will force compromises in the solution. For example, computational and bandwidth requirements of a security standard could force the replacement of entire SCADA systems. The requirements for a real-time response in a cascading electric power failure could pose limitations on authentication and encryption mechanisms. The shortest path to the development of a high securi~ SC.ADA standard will be achieved by leveraging existing standards efforts and ensuring that security is being properly addressed in those standards. The Utility Communications Architecture 2.o (UC@, for real-time utili~ decision control, represents one such standard. The development of a SCADA secwiy specification is a complex task that will benefit from a systems engineering approach.

  13. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  14. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version)

    E-Print Network [OSTI]

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version security, and yet incurs minimal end-to-end communication latency. Keywords: SCADA network security, bump links between devices in legacy Supervisory Con- trol And Data Acquisition (SCADA) systems, on which

  15. Sandia Energy - SCADA FAQs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FAQs Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control and Data Acquisition (SCADA) SCADA Program Overview SCADA FAQs...

  16. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Documents Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control and Data Acquisition (SCADA) SCADA Documents SCADA...

  17. PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA

    E-Print Network [OSTI]

    PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA A Thesis Submitted Technical Report TR2010-665 #12;Abstract Message authentication with low latency is necessary to ensure- tication solutions by our lab and others looked at single messages and incurred no- ticeable latency

  18. Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability, and Security

    E-Print Network [OSTI]

    Heidemann, John

    Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability is that openness and support for disclosure of future SCADA data can in improved safety, reliability, and security-network processing are needed to make greater openness and data sharing data viable. Today's SCADA systems are often

  19. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    power generation plants and oil refineries often involve components that are geographically distributed. To continuously monitor and control the different sections of the plant in order to ensure its appropriate the concepts of SCADA systems, analyze the threats and vulnerabilities of these systems, and illustrate

  20. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    E-Print Network [OSTI]

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide minimal end-to-end communication latency. A microcontroller prototype of our solution is under development

  1. Sandia Energy - SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Testbeds Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory...

  2. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01T23:59:59.000Z

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  3. sSCADA: Securing SCADA Infrastructure Communications Yongge Wang and Bei-Tseng Chu

    E-Print Network [OSTI]

    ) systems. DCS systems typically are used within a single processing or generating plant or over a small. For exam- ple, a utility company may use a DCS to generate power and a SCADA system to distribute it. We, and wastewater industries. While control systems can be vulnerable to a variety of types of cyber attacks

  4. Hallmark Project Commercialization of the Secure SCADA Communications...

    Broader source: Energy.gov (indexed) [DOE]

    and data acquisition (SCADA) systems require a method to validate device-to-device communication and verify that information has come from a trusted source and not been altered in...

  5. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    SciTech Connect (OSTI)

    Aissa, Anis Ben [Université de Tunis El Manar, Tunisia; Rabai, Latifa Ben Arfa [Université de Tunis, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2014-01-01T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost.

  6. Sandia Energy - SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security for Electric Infrastructure National Supervisory Control and Data Acquisition (SCADA) SCADA Program Overview SCADA Program OverviewTara Camacho-Lopez2015-05-11T18:41:05+00...

  7. Sandia Energy - National SCADA Testbed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National SCADA Testbed Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  8. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  9. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01T23:59:59.000Z

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  10. Lessons Learned from Cyber Security Assessments of SCADA and...

    Broader source: Energy.gov (indexed) [DOE]

    Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER...

  11. Intermediate SCADA Security Training Course Slides (September 2006) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment of EnergyIndustry15Among States inFederal Waters

  12. Intermediate SCADA Security Training Course Slides (September 2006) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking of BlytheDepartmentEnergyDemonstrationInteragency

  13. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    E-Print Network [OSTI]

    Teixeira, André; Sandberg, Henrik; Johansson, Karl H

    2010-01-01T23:59:59.000Z

    The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication channels. Therefore cyber security for state estimators becomes an important issue. In this paper we analyze the cyber security of state estimators in supervisory control and data acquisition (SCADA) for energy management systems (EMS) operating the power network. Current EMS state estimation algorithms have bad data detection (BDD) schemes to detect outliers in the measurement data. Such schemes are based on high measurement redundancy. Although these methods may detect a set of basic cyber attacks, they may fail in the presence of an intelligent attacker. We explore the latter by considering scenarios where stealthy de...

  14. Sandia Energy - Research and Development of Next Generation Scada...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research and Development of Next Generation Scada Systems Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for...

  15. Sandia SCADA Program -- High Surety SCADA LDRD Final Report

    SciTech Connect (OSTI)

    CARLSON, ROLF E.

    2002-04-01T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) systems are a part of the nation's critical infrastructure that is especially vulnerable to attack or disruption. Sandia National Laboratories is developing a high-security SCADA specification to increase the national security posture of the U.S. Because SCADA security is an international problem and is shaped by foreign and multinational interests, Sandia is working to develop a standards-based solution through committees such as the IEC TC 57 WG 15, the IEEE Substation Committee, and the IEEE P1547-related activity on communications and controls. The accepted standards are anticipated to take the form of a Common Criteria Protection Profile. This report provides the status of work completed and discusses several challenges ahead.

  16. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

  17. Review of Supervisory Control and Data Acquisition (SCADA) Systems

    SciTech Connect (OSTI)

    Reva Nickelson; Briam Johnson; Ken Barnes

    2004-01-01T23:59:59.000Z

    A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.

  18. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...

    Energy Savers [EERE]

    Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security...

  19. Dr. Ron Ross Computer Security Division,

    E-Print Network [OSTI]

    Dasgupta, Dipankar

    SPONSORS SCADA Security October 18th (1-5PM) Workshop/Tutorial on Automation and Control Devices/SCADA Dr

  20. JOB SUMMARY JOB TITLE: RESEARCH FELLOW (Multi-Agent Systems for Large-Scale Evolving SCADA (Research Fellows

    E-Print Network [OSTI]

    Liu, Weiru

    JOB SUMMARY JOB TITLE: RESEARCH FELLOW (Multi-Agent Systems for Large-Scale Evolving SCADA, the research topics include: (i) developing multi-agent system architecture for supporting SCADA systems-agent environments and integrating planning knowledge; (iii) investigating security vulnerabilities in MAS for SCADA

  1. Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong Ulf Lindqvist Keith Skinner

    E-Print Network [OSTI]

    Cheung, Steven

    Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong In a model-based intrusion detection approach for protecting SCADA networks, we construct models and a prototype implementation of them for monitoring Modbus TCP networks. Keywords: SCADA security, intrusion

  2. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    use of Supervisory Control and Data Acquisition (SCADA) systems and process control systems became popular in the 1960s as a need arose to more efficiently monitor and control...

  3. Toward Survivable SCADA Jonathan Kirsch

    E-Print Network [OSTI]

    Amir, Yair

    Toward Survivable SCADA Jonathan Kirsch Siemens Technology to Business Center 1995 University the first survivable SCADA system ­ one capable of providing correct behavior with minimal performance degra faced while at- tempting to integrate modern intrusion-tolerant protocols with the SCADA architecture

  4. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01T23:59:59.000Z

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  5. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    J. [2004], Low-latency cryptographic protection for SCADAlatency high-integrity security retrofit for lecacy SCADA

  6. Real-Time SCADA Cyber Protection Using Compression Techniques

    SciTech Connect (OSTI)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01T23:59:59.000Z

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

  7. SCADA System Security ECE 478 Network Security

    E-Print Network [OSTI]

    water treatment systems; electric power transmission, distribution, and generation; petroleum storage variety of industries including Electric power generation, transmission, and distribution, Environmental. A Human-machine interface allows the operator to view the state of the plant equipment. Dumb terminals

  8. On Cyber Security for Networked Control Systems Saurabh Amin

    E-Print Network [OSTI]

    random failures and secu- rity attacks. Cyber-security of Supervisory Control and Data Acquisition (SCADA, cyber-security assessment for SCADA systems is performed based on well-defined attacker and defender objectives. The mathematical model of SCADA systems considered in this work has two control levels

  9. Stealthy Deception Attacks on Water SCADA Systems

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

  10. October 23, 2012 11:49 World Scientific Review Volume -9in x 6in ywangsmartgrid Smart Grid, Automation, and SCADA Systems Security

    E-Print Network [OSTI]

    Wang, Yongge

    discuss the challenges for secure smart energy grid and automation systems. We first describe the current system as an example to show the challenges to secure the automation systems and smart power grid systems: a high level introduction As stated in DOE smart grid white paper,1 United States is in the process

  11. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    SciTech Connect (OSTI)

    Marco Carvalho; Richard Ford

    2012-05-14T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

  12. Metrics for the National SCADA Test Bed Program

    SciTech Connect (OSTI)

    Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

    2008-12-05T23:59:59.000Z

    The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

  13. "Supervisory Control and Data Acquisition (SCADA) Systems." The...

    Energy Savers [EERE]

    "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8...

  14. Good Practice Guide on Firewall Deployment for SCADA and Process...

    Energy Savers [EERE]

    Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks In recent years,...

  15. Detecting Integrity Attacks on SCADA Systems Rohan Chabukswar, Yilin Mo, Bruno Sinopoli

    E-Print Network [OSTI]

    Sinopoli, Bruno

    susceptibilities in industrial control systems. In view of the present threat of global terrorism, a power grid. To validate the results, we apply our findings to an industrial control problem concerning a chemical plant and then a simplified model of a power system. Keywords: Cyber-Physical Systems, SCADA, Secure, Control 1. INTRODUCTION

  16. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs HomeProgramSCADA

  17. Sandia Energy - National SCADA Testbed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution Grid Integration Permalink GalleryNational SCADA Testbed Home

  18. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    SciTech Connect (OSTI)

    Jared Verba; Michael Milvich

    2008-05-01T23:59:59.000Z

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  19. Sandia Energy - SCADA Training Courses

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Courses Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory...

  20. Sandia Energy - SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering Solutions Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  1. Cyber Assessment Methods for SCADA Security

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,Office of Policy, OAPM | Department of Energy Current5 by ISA - The

  2. Agent Interaction and State Determination in SCADA Systems

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    Agent Interaction and State Determination in SCADA Systems Thomas Richard McEvoy2 and Stephen D to continue to operate in a compromised state. Finally, the scale and complex- ity of SCADA systems makes

  3. Risk Modelling the Transition of SCADA System to IPv6

    E-Print Network [OSTI]

    Boyer, Edmond

    Risk Modelling the Transition of SCADA System to IPv6 Suriadi Suriadi, Alan Tickle, Ejaz Ahmed.morarji@qut.edu.au Abstract. SCADA is one of a set of manufacturing-and-control systems that are used to monitor and control6 protocol and inevitably this change will affect SCADA systems. However IPv6 introduces its own set

  4. DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ

    E-Print Network [OSTI]

    Smith, Sean W.

    Chapter 1 DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ Rebecca Shapiro, Sergey Bratus, for SCADA software used in critical infrastructure, the widespread use of propri- etary protocols makes't apply in real-world infrastructure such as power SCADA. Domain experts often do not have the time

  5. An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications

    SciTech Connect (OSTI)

    Beaver, Justin M [ORNL] [ORNL; Borges, Raymond Charles [ORNL] [ORNL; Buckner, Mark A [ORNL] [ORNL

    2013-01-01T23:59:59.000Z

    Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in a critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.

  6. Routing SCADA data through an enterprise WAN

    SciTech Connect (OSTI)

    Flowers, T.; Houle, B. [Houston Lighting and Power, TX (United States)] [Houston Lighting and Power, TX (United States); Retzer, J.; Ramanathan, R. [National Systems and Research, Camas, WA (United States)] [National Systems and Research, Camas, WA (United States)

    1995-07-01T23:59:59.000Z

    Houston Lighting and Power (HL and P) and many other large utilities have investigated substantial resources in developing integrated enterprise wide area networks (WANs). The WAN provides unprecedented opportunities for integrating information throughout the corporation, resulting in improved efficiency and reduced costs of operation. In contrast, present dedicated point-to-point SCADA data circuits from the energy management system (EMS) to remote terminal units (RTUs) are not currently integrated with the network, nor replicated in any offsite backup system. An integrated approach might integrate communications from selected RTUs over the WAN to a backup system or the EMS. Such an approach would potentially provide improved disaster recovery, more efficient use of communications, reduced maintenance costs, and improved availability of operational data. RTU data, however, is fundamentally different from most other WAN traffic in that it is critical to the moment-to-moment operation of the utility and consists of a large number of messages repeated frequently and continuously. There are valid concerns as to whether the stability, availability, and inherent latency of the WAN would be adequate to support operations of a backup or primary SCADA system. There are also concerns about the adverse effects that SCADA traffic might have on the WAN. These concerns led to the project featured in this article, which tested the operational suitability and effectiveness of routing SCADA data between selected RTUs and a central site on the WAN.

  7. attacks security mechanisms: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Catherine 2009-05-15 232 SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Systems Fission and Nuclear Technologies Websites...

  8. Sandia National Laboratories: Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FAQs On November 2, 2011, in What is SCADA? What comprises a SCADA system? Where are SCADA systems used? Why the sudden concern about SCADA systems? Q: What is SCADA? A: SCADA...

  9. Use of SCADA Data for Failure Detection in Wind Turbines

    SciTech Connect (OSTI)

    Kim, K.; Parthasarathy, G.; Uluyol, O.; Foslien, W.; Sheng, S.; Fleming, P.

    2011-10-01T23:59:59.000Z

    This paper discusses the use of existing wind turbine SCADA data for development of fault detection and diagnostic techniques for wind turbines.

  10. acquisition scada systems: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Permission from IEEE must Engineering Websites Summary: of Real-Time Locational Marginal Price to SCADA Sensor Data Corruption Dae-Hyun Choi, Student Member, IEEE acquisition...

  11. Remote Structural Health Monitoring Systems for Next Generation SCADA

    E-Print Network [OSTI]

    Chou, Pai H.

    Remote Structural Health Monitoring Systems for Next Generation SCADA Sehwan Kim1 Marco Torbol2, and to validate its effectiveness with long-term field deployment results. Keywords: structural health monitoring, SCADA system, remote monitoring system 1. INTRODUCTION Structural health monitoring (SHM) is the use

  12. Flatness-based control of an irrigation canal using SCADA

    E-Print Network [OSTI]

    -time irrigation operations using a supervision, control, and data acquisition (SCADA) system with automatic centralized controller. Irrigation canals can be viewed and modeled as delay systems since it takes timeFlatness-based control of an irrigation canal using SCADA Tarek Rabbani, Simon Munier, David

  13. Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin

    E-Print Network [OSTI]

    day irrigation canal systems. This type of monitoring and control infrastructure is also commonStealthy Deception Attacks on Water SCADA Systems Saurabh Amin Department of CEE UC Berkeley, CA the vulnerabilities of Supervisory Control and Data Acquisition (SCADA) systems which mon- itor and control the modern

  14. Demonstration of SCADA system to Manage Oilfield Pump Off Controllers

    SciTech Connect (OSTI)

    Newquist, Dan

    2000-09-11T23:59:59.000Z

    PC-based SCADA systems are today widely accepted by the oil and gas industry, thanks to the increased power and capabilities of PCs, their reduced costs, and the wider use of PCs by energy companies in office and field operations. More and more field operators are using laptops in their daily work duties. This has made the PC the choice for field SCADA systems, and for making SCADA data available throughout company operations. As PCs have become more powerful, it has allowed SCADA software developers to add more capabilities to their systems. SCADA systems have become tools that now help field operators perform their jobs more efficiently, facilitate in optimizing producing wells, provide an active interface for monitoring and controlling plants and compressors, and provide real-time and historical well data to engineers to help them develop strategies for optimizing field operations.

  15. Control and Operation of the LHCb Readout Boards using Embedded Microcontrollers and the PVSSII SCADA System

    E-Print Network [OSTI]

    Koestner, Stefan

    2006-01-01T23:59:59.000Z

    Control and Operation of the LHCb Readout Boards using Embedded Microcontrollers and the PVSSII SCADA System

  16. [1] B. Genge, C. Siaterlis, and M. Hohenadel. AMICI: an assessment platform for multi-domain security experimentation on critical infrastructures. In B. M. Hmmerli, N. Kalstad Svendsen, and

    E-Print Network [OSTI]

    Briesemeister, Linda

    close to laboratory systems. Keywords: Virtual testbed; Industrial control system; SCADA; Cybersecurity- physical security experimentation. IEEE Transactions on Emerging Topics in Computing, 1(2):319-330, Dec

  17. SCADA computer sytem controls major Saudi Aramco crude oil pipeline

    SciTech Connect (OSTI)

    Dempsey, J.; Al-Habib, R. [Saudi Aramco, Dhahran (Saudi Arabia)

    1996-12-31T23:59:59.000Z

    A replacement Supervisory Control and Data Acquisition (SCADA) computer system which monitors and controls two 1,100 kilometer pipelines and eleven associated pump stations is described. The SCADA system was designed to meet two objectives: (1) decentralize the overall control system and provide a distributed control system capable of regulatory control at each pump and pressure reducing station, and (2) provide system wide monitoring and supervisory control function during normal operations at the crude oil terminal. The SCADA computer system hardware (host computers and consoles), software modules, and applications are overviewed. A data flow diagram and a hardware configuration diagram are provided. 3 figs.

  18. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Attacks Against Water SCADA Systems . . . . . . . . . .2 d (bottom) [simulated results]. . Gignac SCADA supervisoryGignac canal network and SCADA system . . . . . . . . .

  19. Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

    2006-01-01T23:59:59.000Z

    We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

  20. Flatness-Based Control of Open-Channel Flow in an Irrigation Canal Using SCADA

    E-Print Network [OSTI]

    Boyer, Edmond

    Flatness-Based Control of Open-Channel Flow in an Irrigation Canal Using SCADA Tarek Rabbani, Simon of an algorithm for real-time irrigation operations using a supervision, control, and data acquisition (SCADA

  1. An Architecture of a Multi-Agent System for SCADA -dealing with uncertainty, plans and actions

    E-Print Network [OSTI]

    Liu, Weiru

    An Architecture of a Multi-Agent System for SCADA - dealing with uncertainty, plans and actions.loughlin@ecit.qub.ac.uk Keywords: Autonomous Agents, Multi-agent Systems, Sensors, SCADA, Uncertainty, Plans, Actions, Fusion in traditional SCADA systems deployed in critical environments such as electrical power generation, transmission

  2. BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur

    E-Print Network [OSTI]

    Kundur, Deepa

    BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur for implementation across multiple resource constrained SCADA field devices in the smart grid. The predictable and regular nature of the SCADA communication patterns is exploited to detect intrusions in the field devices

  3. 60 IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 1, JANUARY 2014 Survivable SCADA Via

    E-Print Network [OSTI]

    Amir, Yair

    60 IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 1, JANUARY 2014 Survivable SCADA Via Intrusion availability of their SCADA systems. This paper reports on our experience designing, architecting, and evaluating the first survivable SCADA system--one that is able to ensure cor- rect behavior with minimal

  4. Framework for SCADA Security Policy (October 2005) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport inEnergy0.pdf Flash2010-60.pdf2 DOE March, 2015 TechnologyFramework for

  5. Cyber Assessment Methods for SCADA Security | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartment of Energy Cut Gas Costs

  6. Introduction SCADA Security for Managers and Operators | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment of EnergyIndustry15AmongPartnership

  7. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report:40PMDepartment ofs o u t h e22

  8. Secure SCADA Communication ProtocolPerformance Test Results | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMay 2015ParentsMiddle| DepartmentAchievementEnergy ICCPSecure

  9. Framework for SCADA Security Policy (October 2005) | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM Flash2011-12 OPAM Revised DOEDepartment ofFossil EnergyFracFocus 2.0

  10. Hallmark Project Commercialization of the Secure SCADA Communications

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM Flash2011-12 OPAMGeneralGuiding Documents and Linksl W SHVDCProtocol, a

  11. Sandia Energy - The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocumentsInstitute ofSitingStaffSunshineMoltenThe Center

  12. Cyber Assessment Methods for SCADA Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof"Wave theJuly 30,Crafty Gifts forHeavy-Duty| DepartmentAir

  13. Introduction SCADA Security for Managers and Operators | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas » Methane Hydrate »Department ofIntroducing

  14. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOil & Gas »of EnergyLearningMarch 2015 Lessons LearnedManagement

  15. Secure SCADA Communication ProtocolPerformance Test Results | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSection

  16. Hallmark Project Commercialization of the Secure SCADA Communications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(Fact Sheet), GeothermalGridHYDROGEN TO THE HIGHWAYSProject Commercialization

  17. Developments on the SCADA of CERN Accelerators Vacuum

    E-Print Network [OSTI]

    Antoniotti, F; Boccioli, M; Gomes, P; Pereira, H F; Kopylov, L; Merker, S; Mikheev, M S

    2014-01-01T23:59:59.000Z

    During the first 3 years of LHC operation, the priority for the SCADA of vacuum controls was to attend to user requests, and to improve its ergonomics and efficiency: access & presentation of information simplified and normalized; coherent functionalities & menus across all accelerators; automatic

  18. Developments on the SCADA of CERN Accelerators Vacuum

    E-Print Network [OSTI]

    Antoniotti, F; Boccioli, M; Gomes, P; Pereira, H; Kopylov, L; Mikheev, M; Merker, S

    2014-01-01T23:59:59.000Z

    During the first 3 years of LHC operation, the priority for the SCADA (Supervisory Control And Data Acquisition) of vacuum controls was to attend to user requests, and to improve its ergonomics and efficiency: access & presentation of information simplified and normalized; coherent functionalities & menus across all accelerators; automatic scripts instead of fastidious manual actions; enhanced tools for data analysis and for maintenance interventions. Several decades of cumulative developments, based on heterogeneous technologies and architectures, have been asking for a homogenization effort. The first LHC Long Shutdown (LS1) provides the opportunity to further standardize the vacuum controls systems [1], around Siemens-S7 PLCs (Programmable Logic Controllers) and PVSS SCADA. Meanwhile, exchanges with other Groups at CERN and outside Institutes have been promoted: to follow the global update policy for software libraries; to discuss philosophies and development details; and to accomplish common pro...

  19. Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network Isolation and System Restoration (FISR) service, delivered by SCADA system are computed, discussed and correlated to quality indicators of power supplied to customers. In delivering FISR service, SCADA system

  20. Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    on SCADA systems was first proposed in [2]. It is assumed an operator has a model of a control system are manipulated. If no such manipulation takes place and the control signal is still anomalous, we can assume Supervisory control and data acquisition (SCADA) systems form a vital part of the critical infrastructure

  1. Sandia Energy - National Supervisory Control and Data Acquisition (SCADA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution Grid Integration Permalink GalleryNational SCADA

  2. On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    terminal units (RTUs), SCADA systems measure data such as trans- mission line power flows, bus power1 On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson Abstract--This paper considers a smart grid cyber-security problem

  3. IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JUNE 2010 99 Security Technology for Smart Grid Networks

    E-Print Network [OSTI]

    Hu, Fei

    IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JUNE 2010 99 Security Technology for Smart Grid for a smart grid system, including public key infrastructures and trusted computing. Index Terms--Attestation, public key infrastructure (PKI), Su- pervisory Control And Data Acquisition (SCADA), security, smart grid

  4. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    ). Keyword: SCADA, PLC, SCADA security, SCADA networks, PLC security, Trusted computing, TCM, TPM, Embedded). Nyckelord:SCADA, PLC, SCADA säkerhet, SCADA-nätverk, PLC säkerhet, pĺlitlig datoranvändning, TCM, TPM

  5. Test suite for the archiver of a SCADA system

    E-Print Network [OSTI]

    Voitier, Axel

    2009-01-01T23:59:59.000Z

    Topic: The group responsible for providing the main control system applications for all machines at CERN has to validate that every piece of the control systems used will be reliable and fully functional when the LHC and its experiments will do collisions of particles. CERN use PVSS from ETM/Siemens for the SCADA part of its control systems. This software has a component dedicated to archive into a centralised Oracle database values and commands of tenth of thousands hardware devices. This component, named RDB, has to be tested and validated in terms of functionality and performance. The need is high for that because archiving is a critical part of the control systems. In case of an incident on one of the machine, it will be unacceptable to not benefit of archiving the machine context at this moment just because of a bug in RDB. Bugs have to be spotted and reported to ETM. Results: The proposed solution is an extensible automatic tester able to evaluate currently around 160 cases of potential bugs. Since the ...

  6. USC/ISI Technical Report ISI-TR-625, October 2006 1 Enabling Interoperability and Extensibility of Future SCADA Systems

    E-Print Network [OSTI]

    Heidemann, John

    well in an oilfield is only connected with a few sensors at the well it resides. The RTU usually of the current SCADA systems is their limited extensibility to new applications. In the above oilfield monitoring for Interactive Smart Oilfield Technologies (CiSoft). wants to extend its SCADA system by adding a safety alarm

  7. Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding

    SciTech Connect (OSTI)

    Yan, Guanhua [Los Alamos National Laboratory; Nicol, David M [UNIV OF IL; Jin, Dong [UNIV OF IL

    2010-12-16T23:59:59.000Z

    The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

  8. Cyber Security Analysis of State Estimators in Electric Power Systems Andre Teixeira, Saurabh Amin, Henrik Sandberg, Karl H. Johansson, and Shankar S. Sastry

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Cyber Security Analysis of State Estimators in Electric Power Systems Andr´e Teixeira, Saurabh Amin security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power random outliers in the measurement data. Such schemes are based on high measurement redundancy. Although

  9. Secure Demand Shaping for Smart Grid On constructing probabilistic demand response schemes

    E-Print Network [OSTI]

    Sastry, S. Shankar

    Secure Demand Shaping for Smart Grid On constructing probabilistic demand response schemes. Developing novel schemes for demand response in smart electric gird is an increasingly active research area/SCADA for demand response in smart infrastructures face the following dilemma: On one hand, in order to increase

  10. Enabling Interoperability and Extensibility of Future SCADA Systems Wei Ye and John Heidemann

    E-Print Network [OSTI]

    Heidemann, John

    (RTU) that monitors and controls a production well in an oilfield is only connected with a few sensors applications. In the above oilfield monitoring example, a user in the field can only access a sensor's data. through the USC Center for Interactive Smart Oilfield Technologies (CiSoft). wants to extend its SCADA

  11. Risk analysis via heterogeneous models of SCADA interconnecting Power Grids and Telco Networks

    E-Print Network [OSTI]

    Tronci, Enrico

    for an electrical power distribution grid. The modeling techniques we discuss aim at providing a probabilistic propagation of disturbances and adverse events between Electrical infrastructures and Telco networks. Many demonstrate their applicability by modeling and #12;analyzing an actual SCADA system for an electrical power

  12. Development and Demonstration of a Security Core Component

    SciTech Connect (OSTI)

    Turke, Andy

    2014-02-28T23:59:59.000Z

    In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more data about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from “normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.

  13. The Drinking Water Security and Safety Amendments of 2002: Is America's Drinking Water Infrastructure Safer Four Years Later?

    E-Print Network [OSTI]

    Shermer, Steven D.

    2006-01-01T23:59:59.000Z

    and Data Acquisition ("SCADA") systems for managing keyprominent vulnerability. 137 "SCADA systems allow utilitywww.securityfocus.com/news/319. SCADA systems are used in

  14. National SCADA Test Bed Substation Automation Evaluation Report

    SciTech Connect (OSTI)

    Kenneth Barnes; Briam Johnson

    2009-10-01T23:59:59.000Z

    Increased awareness of the potential for cyber attack has recently resulted in improved cyber security practices associated with the electrical power grid. However, the level of practical understanding and deployment of cyber security practices has not been evenly applied across all business sectors. Much of the focus has been centered on information technology business centers and control rooms. This report explores the current level of substation automation, communication, and cyber security protection deployed in electrical substations throughout existing utilities in the United States. This report documents the evaluation of substation automation implementation and associated vulnerabilities. This evaluation used research conducted by Newton-Evans Research Company for some of its observations and results. The Newton Evans Report aided in the determination of what is the state of substation automation in North American electric utilities. Idaho National Laboratory cyber security experts aided in the determination of what cyber vulnerabilities may pose a threat to electrical substations. This report includes cyber vulnerabilities as well as recommended mitigations. It also describes specific cyber issues found in typical substation automation configurations within the electric utility industry. The evaluation report was performed over a 5-month period starting in October 2008

  15. Supervisory Control and Data Acquisition (SCADA). January 1975-December 1989 (A Bibliography from the COMPENDEX data base). Report for January 1975-December 1989

    SciTech Connect (OSTI)

    Not Available

    1990-03-01T23:59:59.000Z

    This bibliography contains citations concerning software, hardware, and implementation of Supervisory Control and Data Acquisition (SCADA) Systems. SCADA is applied to the control and monitoring of systems covering large geographical areas, such as electric power distribution, gas pipelines, water supply distribution, and offshore-platform operations. Topics include personnel training, man-machine interfaces, satellite communication links for SCADA, and networking technology. (Contains 137 citations fully indexed and including a title list.)

  16. SCADA system aids BGE`s Notch Cliff propane-air facility

    SciTech Connect (OSTI)

    Miller, B.A. [Baltimore Gas and Electric Co., MD (United States)

    1997-02-01T23:59:59.000Z

    SCADA systems in the natural gas industry are commonly associated with distribution networks and transmission pipelines. There is however, another application for SCADA technology that is increasingly being utilized in the industry. By implementing automation technology and process control concepts more typically associated with industrial and petrochemical process facilities, Baltimore Gas and Electric Co. (BGE) has significantly improved the efficiency, performance, and safety at its Notch Cliff Propane-Air peak shaving facility. These results have contributed to BGE`s ongoing efforts to effectively operate in the competitive energy marketplace. When the Notch Cliff plant was built in the early 1960s, it was a state-of-the-art facility. The plant blends propane vapor and compressed air to create a supplement to the natural gas supply during peak demand periods.

  17. Secure Control Systems for the Energy Sector

    SciTech Connect (OSTI)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31T23:59:59.000Z

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  18. A Cyber Security Study of a SCADA Energy Management System: Stealthy

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    of critical infrastructures in our society are the power, the gas and the water supply networks transmitted through unencrypted communication chan- nels, making these critical infrastructures vulnerable Estimator Andr´e Teixeira Gy¨orgy D´an Henrik Sandberg Karl H. Johansson School of Electrical

  19. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartment of Energy Cut Gas

  20. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report:40PMDepartment ofs o u t h e22U.S. Department of

  1. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof"Wave theJuly 30,Crafty Gifts forHeavy-Duty| DepartmentAirPortaledge,May

  2. 21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 RussianBy:Whether you're a16-17, 2015 | Department ofSupervisory control and data

  3. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 RussianBy:Whether you're a16-17, 2015 |7 Energy of6 FREEDOM OFAssessment at

  4. Microsoft Word - PNNL-17118 Secure SCADA hadley SSCP FINAL with no ouo.doc

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions forCheneyNovember S.Fluor-B&WOPOWER submits these38 Descriptive678

  5. National SCADA Test Bed - Enhancing control systems security in the energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_Cost Estimating35.docMusingsEnergyAdministrationOCT

  6. 21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The Future of BadTHEEnergyReliability2015 Peer Review |5Dryers;Prairie21 Steps

  7. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The Future of1 A Strategic Framework for SMRA View from the-1Assessment at

  8. National SCADA Test Bed - Enhancing control systems security in the energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked QuestionsDepartment of Energyof

  9. Opportunities for Energy Efficiency and Automated Demand Response in Industrial Refrigerated Warehouses in California

    E-Print Network [OSTI]

    Lekov, Alex

    2009-01-01T23:59:59.000Z

    Laboratories - The Center for SCADA Security. "Securing ourhttp://www.sandia.gov/scada/home.htm. Siemens. (2008). "20 Figure 4. Principal Scheme of a SCADA

  10. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01T23:59:59.000Z

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  11. SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Systems

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    . I. INTRODUCTION THE electric power transmission system is probably the most vital infrastructure] proposed a framework in order to clarify the interaction between the power system and the IT infrastructure are with the Power Systems Laboratory, Department of Electrical Engineering, Swiss Federal Institute of Technology

  12. DOE National SCADA Test Bed Program Multi-Year Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof"Wave theJulyD&DDepartmentContaminated GroundDOE National SCADA Test

  13. Abstract--By penetrating the SCADA system, an intruder may remotely operate a power system using supervisory control

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    1 Abstract-- By penetrating the SCADA system, an intruder may remotely operate a power system using vulnerability using attack trees. The attack tree formulation based on power system control networks is used to evaluate the system, scenario, and leaf vulnerabilities. The measure of vulnerabilities in the power system

  14. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  15. Control and monitoring of on-line trigger algorithms using a SCADA system

    E-Print Network [OSTI]

    van Herwijnen, E; Barczyk, A; Damodaran, B; Frank, M; Gaidioz, B; Gaspar, C; Jacobsson, R; Jost, B; Neufeld, N; Bonifazi, F; Callot, O; Lopes, H

    2006-01-01T23:59:59.000Z

    LHCb [1] has an integrated Experiment Control System (ECS) [2], based on the commercial SCADA system PVSS [3]. The novelty of this approach is that, in addition to the usual control and monitoring of experimental equipment, it provides control and monitoring for software processes, namely the on-line trigger algorithms. Algorithms based on Gaudi [4] (the LHCb software framework) compute the trigger decisions on an event filter farm of around 2000 PCs. Gaucho [5], the GAUdi Component Helping Online, was developed to allow the control and monitoring of Gaudi algorithms. Using Gaucho, algorithms can be monitored from the run control system provided by the ECS. To achieve this, Gaucho implements a hierarchical control system using Finite State Machines. In this article we describe the Gaucho architecture, the experience of monitoring a large number of software processes and some requirements for future extensions.

  16. Sandia National Laboratories: Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of SCADA and process control systems in hydroelectric dams; water treatment systems; electric power transmission, distribution, and generation; petroleum storage and...

  17. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  18. Turtles All The Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems

    E-Print Network [OSTI]

    Peisert, Sean; Talbot, Ed; Bishop, Matt

    2012-01-01T23:59:59.000Z

    are critical systems, and many operate in a SCADA fashion.Like any other SCADA system, they can be compromised at the

  19. HOSPITAL COVER INTERMEDIATE

    E-Print Network [OSTI]

    a lower premium. Plus, our unique Excess Bonus feature applies to Level 2. You can choose an excess option of: Level 1 No excess Level 2 $250 - plus our Excess Bonus feature applies Level 3 $500 Excess options Excess Bonus feature ­ available on Corporate Hospital Intermediate Level 2. It means you won

  20. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  1. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  2. The Intermediate Neutrino Program

    E-Print Network [OSTI]

    C. Adams; J. R. Alonso; A. M. Ankowski; J. A. Asaadi; J. Ashenfelter; S. N. Axani; K. Babu; C. Backhouse; H. R. Band; P. S. Barbeau; N. Barros; A. Bernstein; M. Betancourt; M. Bishai; E. Blucher; J. Bouffard; N. Bowden; S. Brice; C. Bryan; L. Camilleri; J. Cao; J. Carlson; R. E. Carr; A. Chatterjee; M. Chen; S. Chen; M. Chiu; E. D. Church; J. I. Collar; G. Collin; J. M. Conrad; M. R. Convery; R. L. Cooper; D. Cowen; H. Davoudiasl; A. De Gouvea; D. J. Dean; G. Deichert; F. Descamps; T. DeYoung; M. V. Diwan; Z. Djurcic; M. J. Dolinski; J. Dolph; B. Donnelly; D. A. Dwyer; S. Dytman; Y. Efremenko; L. L. Everett; A. Fava; E. Figueroa-Feliciano; B. Fleming; A. Friedland; B. K. Fujikawa; T. K. Gaisser; M. Galeazzi; D. C. Galehouse; A. Galindo-Uribarri; G. T. Garvey; S. Gautam; K. E. Gilje; M. Gonzalez-Garcia; M. C. Goodman; H. Gordon; E. Gramellini; M. P. Green; A. Guglielmi; R. W. Hackenburg; A. Hackenburg; F. Halzen; K. Han; S. Hans; D. Harris; K. M. Heeger; M. Herman; R. Hill; A. Holin; P. Huber; D. E. Jaffe; R. A. Johnson; J. Joshi; G. Karagiorgi; L. J. Kaufman; B. Kayser; S. H. Kettell; B. J. Kirby; J. R. Klein; Yu. G. Kolomensky; R. M. Kriske; C. E. Lane; T. J. Langford; A. Lankford; K. Lau; J. G. Learned; J. Ling; J. M. Link; D. Lissauer; L. Littenberg; B. R. Littlejohn; S. Lockwitz; M. Lokajicek; W. C. Louis; K. Luk; J. Lykken; W. J. Marciano; J. Maricic; D. M. Markoff; D. A. Martinez Caicedo; C. Mauger; K. Mavrokoridis; E. McCluskey; D. McKeen; R. McKeown; G. Mills; I. Mocioiu; B. Monreal; M. R. Mooney; J. G. Morfin; P. Mumm; J. Napolitano; R. Neilson; J. K. Nelson; M. Nessi; D. Norcini; F. Nova; D. R. Nygren; G. D. Orebi Gann; O. Palamara; Z. Parsa; R. Patterson; P. Paul; A. Pocar; X. Qian; J. L. Raaf; R. Rameika; G. Ranucci; H. Ray; D. Reyna; G. C. Rich; P. Rodrigues; E. Romero Romero; R. Rosero; S. D. Rountree; B. Rybolt; M. C. Sanchez; G. Santucci; D. Schmitz; K. Scholberg; D. Seckel; M. Shaevitz; R. Shrock; M. B. Smy; M. Soderberg; A. Sonzogni; A. B. Sousa; J. Spitz; J. M. St. John; J. Stewart; J. B. Strait; G. Sullivan; R. Svoboda; A. M. Szelc; R. Tayloe; M. A. Thomson; M. Toups; A. Vacheret; M. Vagins; R. G. Van de Water; R. B. Vogelaar; M. Weber; W. Weng; M. Wetstein; C. White; B. R. White; L. Whitehead; D. W. Whittington; M. J. Wilking; R. J. Wilson; P. Wilson; D. Winklehner; D. R. Winn; E. Worcester; L. Yang; M. Yeh; Z. W. Yokley; J. Yoo; B. Yu; J. Yu; C. Zhang

    2015-04-01T23:59:59.000Z

    The US neutrino community gathered at the Workshop on the Intermediate Neutrino Program (WINP) at Brookhaven National Laboratory February 4-6, 2015 to explore opportunities in neutrino physics over the next five to ten years. Scientists from particle, astroparticle and nuclear physics participated in the workshop. The workshop examined promising opportunities for neutrino physics in the intermediate term, including possible new small to mid-scale experiments, US contributions to large experiments, upgrades to existing experiments, R&D plans and theory. The workshop was organized into two sets of parallel working group sessions, divided by physics topics and technology. Physics working groups covered topics on Sterile Neutrinos, Neutrino Mixing, Neutrino Interactions, Neutrino Properties and Astrophysical Neutrinos. Technology sessions were organized into Theory, Short-Baseline Accelerator Neutrinos, Reactor Neutrinos, Detector R&D and Source, Cyclotron and Meson Decay at Rest sessions.This report summarizes discussion and conclusions from the workshop.

  3. The Intermediate Neutrino Program

    E-Print Network [OSTI]

    Adams, C; Ankowski, A M; Asaadi, J A; Ashenfelter, J; Axani, S N; Babu, K; Backhouse, C; Band, H R; Barbeau, P S; Barros, N; Bernstein, A; Betancourt, M; Bishai, M; Blucher, E; Bouffard, J; Bowden, N; Brice, S; Bryan, C; Camilleri, L; Cao, J; Carlson, J; Carr, R E; Chatterjee, A; Chen, M; Chen, S; Chiu, M; Church, E D; Collar, J I; Collin, G; Conrad, J M; Convery, M R; Cooper, R L; Cowen, D; Davoudiasl, H; De Gouvea, A; Dean, D J; Deichert, G; Descamps, F; DeYoung, T; Diwan, M V; Djurcic, Z; Dolinski, M J; Dolph, J; Donnelly, B; Dwyer, D A; Dytman, S; Efremenko, Y; Everett, L L; Fava, A; Figueroa-Feliciano, E; Fleming, B; Friedland, A; Fujikawa, B K; Gaisser, T K; Galeazzi, M; Galehouse, D C; Galindo-Uribarri, A; Garvey, G T; Gautam, S; Gilje, K E; Gonzalez-Garcia, M; Goodman, M C; Gordon, H; Gramellini, E; Green, M P; Guglielmi, A; Hackenburg, R W; Hackenburg, A; Halzen, F; Han, K; Hans, S; Harris, D; Heeger, K M; Herman, M; Hill, R; Holin, A; Huber, P; Jaffe, D E; Johnson, R A; Joshi, J; Karagiorgi, G; Kaufman, L J; Kayser, B; Kettell, S H; Kirby, B J; Klein, J R; Kolomensky, Yu G; Kriske, R M; Lane, C E; Langford, T J; Lankford, A; Lau, K; Learned, J G; Ling, J; Link, J M; Lissauer, D; Littenberg, L; Littlejohn, B R; Lockwitz, S; Lokajicek, M; Louis, W C; Luk, K; Lykken, J; Marciano, W J; Maricic, J; Markoff, D M; Caicedo, D A Martinez; Mauger, C; Mavrokoridis, K; McCluskey, E; McKeen, D; McKeown, R; Mills, G; Mocioiu, I; Monreal, B; Mooney, M R; Morfin, J G; Mumm, P; Napolitano, J; Neilson, R; Nelson, J K; Nessi, M; Norcini, D; Nova, F; Nygren, D R; Gann, G D Orebi; Palamara, O; Parsa, Z; Patterson, R; Paul, P; Pocar, A; Qian, X; Raaf, J L; Rameika, R; Ranucci, G; Ray, H; Reyna, D; Rich, G C; Rodrigues, P; Romero, E Romero; Rosero, R; Rountree, S D; Rybolt, B; Sanchez, M C; Santucci, G; Schmitz, D; Scholberg, K; Seckel, D; Shaevitz, M; Shrock, R; Smy, M B; Soderberg, M; Sonzogni, A; Sousa, A B; Spitz, J; John, J M St; Stewart, J; Strait, J B; Sullivan, G; Svoboda, R; Szelc, A M; Tayloe, R; Thomson, M A; Toups, M; Vacheret, A; Vagins, M; Van de Water, R G; Vogelaar, R B; Weber, M; Weng, W; Wetstein, M; White, C; White, B R; Whitehead, L; Whittington, D W; Wilking, M J; Wilson, R J; Wilson, P; Winklehner, D; Winn, D R; Worcester, E; Yang, L; Yeh, M; Yokley, Z W; Yoo, J; Yu, B; Yu, J; Zhang, C

    2015-01-01T23:59:59.000Z

    The US neutrino community gathered at the Workshop on the Intermediate Neutrino Program (WINP) at Brookhaven National Laboratory February 4-6, 2015 to explore opportunities in neutrino physics over the next five to ten years. Scientists from particle, astroparticle and nuclear physics participated in the workshop. The workshop examined promising opportunities for neutrino physics in the intermediate term, including possible new small to mid-scale experiments, US contributions to large experiments, upgrades to existing experiments, R&D plans and theory. The workshop was organized into two sets of parallel working group sessions, divided by physics topics and technology. Physics working groups covered topics on Sterile Neutrinos, Neutrino Mixing, Neutrino Interactions, Neutrino Properties and Astrophysical Neutrinos. Technology sessions were organized into Theory, Short-Baseline Accelerator Neutrinos, Reactor Neutrinos, Detector R&D and Source, Cyclotron and Meson Decay at Rest sessions.This report summ...

  4. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security, Infrastructure Security, National Supervisory Control and Data Acquisition (SCADA) Test Bed, SCADA Systems author Moses D. Scwartz, John Mudler, Jason Trent, William D....

  5. Sandia National Laboratories: Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Center for SCADA Security Assets On August 25, 2011, in Sandia established its SCADA Security Development Laboratory in 1998. Its purpose was to analyze vulnerabilities in...

  6. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    , College Station, Texas, USA 2 Department of Information Security, Shanghai University of Electric Power with a real-world power plant simulator. The experiment results show that SRID can detect various false data] worm spread across Iran nuclear infrastructure and occupied the headline of news and media, we

  7. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  8. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    Williams, “Security issues in SCADA networks,” Computers andA Cyber Security Study of a SCADA Energy Management System,”and transmitted over a SCADA network to the system operator.

  9. Sandia National Laboratories: combustion intermediates

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    intermediates Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models On March 3, 2015, in Computational Modeling & Simulation, CRF, Energy, Facilities,...

  10. Secure sequential transmission of quantum information

    E-Print Network [OSTI]

    Kabgyun Jeong; Jaewan Kim

    2015-01-19T23:59:59.000Z

    We propose a quantum communication protocol that can be used to transmit any quantum state, one party to another via several intermediate nodes, securely on quantum communication network. The scheme makes use of the sequentially chained and approximate version of private quantum channels satisfying certain commutation relation of $n$-qubit Pauli operations. In this paper, we study the sequential structure, security analysis, and efficiency of the quantum sequential transmission (QST) protocol in depth.

  11. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  12. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  13. 17:30 Registration 18:00 Welcome address on behalf of ISACA luxembourg, Mr Vincent Villers, PwC

    E-Print Network [OSTI]

    van der Torre, Leon

    Scientist 19:15 Emerging paradigms for cyber-security: From virtualised Scada honeypots to streaming

  14. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  15. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  16. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Facilities, Infrastructure Security, National Supervisory Control and Data Acquisition (SCADA) Test Bed, SCADA Systems year 2005 author Rolf E. Carlson, Jeffery E. Dagle, Shabbir...

  17. NIST Special Publication 800-82 Revision 2 Initial Public Draft

    E-Print Network [OSTI]

    (ICS) Security Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system

  18. NIST Special Publication 800-82 Guide to Industrial Control

    E-Print Network [OSTI]

    Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control to Industrial Control Systems (ICS) Security Supervisory Control and Data Acquisition (SCADA) systems

  19. Energy-Sector Stakeholders Attend the Department of Energy's...

    Office of Environmental Management (EM)

    the National SCADA Test Bed (NSTB) partners and Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project-presented DOE-supported efforts involving secured SCADA...

  20. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  1. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  2. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  4. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  6. The metallicities of luminous, massive field galaxies at intermediate redshifts

    E-Print Network [OSTI]

    M. Mouhcine; S. P. Bamford; A. Aragon-Salamanca; O. Nakamura

    2006-03-23T23:59:59.000Z

    We derive oxygen abundances for a sample of 40 luminous (M_{B} = 0.45. Oxygen abundances, relative to hydrogen, of the interstellar emitting gas are estimated by means of the empirically calibrated strong emission line ratio technique. The derived (12+log(O/H)) values range from 8.4 to 9.0, with a median of 8.7. Twenty of these galaxies have securely measured rotation velocities, in the range 50--244 km/s. The measured emission line equivalent widths and diagnostic ratios for the intermediate redshift galaxies cover similar ranges to those observed across a large sample of local galaxies. The estimated oxygen abundances for our luminous star-forming intermediate redshift galaxies cover the same range as their local counterparts. However, at a given galaxy luminosity, many of our galaxies have significantly lower oxygen abundances, i.e., $(12+log(O/H))~8.6$, than local galaxies with similar luminosities. Interestingly, these luminous, massive, intermediate redshift, star-forming galaxies with low oxygen abundances exhibit physical conditions, i.e., emission line equivalent width and ionization state, very similar to those of local faint and metal-poor star-forming galaxies. The oxygen abundance of the interstellar gas does not seem to correlate with the maximum rotation velocity or the emission scale length of the parent galaxy. This suggests that there is a diversity in the intrinsic properties of the massive field galaxy population at intermediate redshifts (ABRIDGED).

  7. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  8. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  9. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  10. Reactive intermediates in organometallic chemistry

    SciTech Connect (OSTI)

    Stoutland, P.O.

    1987-08-01T23:59:59.000Z

    Chemical reactions, kinetics, thermodynamics, activation, and dissociation of bonds of organometallic compounds are discussed. In particular, results of thermolysis of iridium compounds and reaction intermediates are presented, as well as flash photolysis of several metal carbonyl species. 179 refs., 32 figs., 20 tabs. (CBS)

  11. Summary of The 3rd Control System Cyber-Security (CS)2/HEP Workshop

    E-Print Network [OSTI]

    Lüders, S

    2011-01-01T23:59:59.000Z

    Over the last decade modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. The Stuxnet worm of 2010 against a particular Siemens PLC is a unique example for a sophisticated attack against control systems [1]. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data being ...

  12. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  13. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  14. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  15. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  16. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  17. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  18. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  20. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  1. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  2. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  3. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home Stationary PowerResearchRiskRotorDocuments

  4. Sandia Energy - SCADA FAQs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs Home Stationary Power

  5. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs Home Stationary

  6. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs Home

  7. Sandia Energy - SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs HomeProgram Overview

  8. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  9. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  10. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

  11. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  12. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  13. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  14. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  15. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  16. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  17. Characterization of protein folding intermediates

    SciTech Connect (OSTI)

    Kim, P.S.

    1986-01-01T23:59:59.000Z

    The three-dimensional structure of a protein is encoded in its linear sequence of amino acids. Studies of protein folding are aimed at understanding the nature of this code which translates one-dimensional information to three-dimensions. It is now well-established that protein folding intermediates exist and can be populated significantly under some conditions. A method to characterize kinetic folding intermediates is described. The method takes advantage of the decrease in exchange rates between amide protons (i.e., peptide backbone NH) and solvent water protons, when the amide proton is involved in structure. The feasibility of using amide proton exchange to pulse-label proteins during folding has been demonstrated using (/sup 3/H)-H/sub 2/O. The results with ribonuclease A (RNase A) support a framework model for folding, in which the secondary structure of a protein is formed before tertiary structure changes are complete. Extension of these studies using NMR should permit characterization of early secondary structure folding frameworks.

  18. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  19. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  20. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  1. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  2. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  3. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  4. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  5. Protein Vivisection Reveals Elusive Intermediates in Folding

    SciTech Connect (OSTI)

    Zheng, Zhongzhou; Sosnick, Tobin R. (UC)

    2010-05-25T23:59:59.000Z

    Although most folding intermediates escape detection, their characterization is crucial to the elucidation of folding mechanisms. Here, we outline a powerful strategy to populate partially unfolded intermediates: A buried aliphatic residue is substituted with a charged residue (e.g., Leu {yields} Glu{sup -}) to destabilize and unfold a specific region of the protein. We applied this strategy to ubiquitin, reversibly trapping a folding intermediate in which the {beta}5-strand is unfolded. The intermediate refolds to a native-like structure upon charge neutralization under mildly acidic conditions. Characterization of the trapped intermediate using NMR and hydrogen exchange methods identifies a second folding intermediate and reveals the order and free energies of the two major folding events on the native side of the rate-limiting step. This general strategy may be combined with other methods and have broad applications in the study of protein folding and other reactions that require trapping of high-energy states.

  6. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  7. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  8. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  9. Curvaton field and intermediate inflationary universe model

    E-Print Network [OSTI]

    Sergio del Campo; Ramon Herrera

    2007-10-29T23:59:59.000Z

    The curvaton in an intermediate inflationary universe model is studied. This study has allowed us to find some interesting constraints on different parameters that appear in the model.

  10. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  11. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  12. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  13. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  14. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  15. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  16. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

  17. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  18. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  19. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  20. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  1. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  2. Training is sponsoring Excel Intermediate & Advanced Courses...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Due to a tremendous response, Training is sponsoring additional Excel Intermediate & Advanced Courses. The classes will be held on Wednesday and Thursday, May 20-21, 8 a.m.-5 p.m....

  3. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  4. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org • Energy Security & Climate Change:

  5. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  6. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  7. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  8. Towards a Secure and Efficient System for End-to-End Provenance Patrick McDaniel, Kevin Butler,

    E-Print Network [OSTI]

    Smith, Adam D.

    of sensor data as it is recorded and aggre- gated in cyber-physical systems such as the smart-grid and SCADA

  9. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  10. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  11. Effects of Intermediate Ethanol Blends on Legacy Vehicles and...

    Office of Environmental Management (EM)

    Effects of Intermediate Ethanol Blends on Legacy Vehicles and Small Non-Road Engines, Report 1 Updated Feb 2009 Effects of Intermediate Ethanol Blends on Legacy Vehicles and...

  12. Isolation, Characterization of an Intermediate in an Oxygen Atom...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Characterization of an Intermediate in an Oxygen Atom-Transfer Reaction, and the Determination of the Bond Isolation, Characterization of an Intermediate in an Oxygen Atom-Transfer...

  13. A Thermoelectric Generator with an Intermediate Heat Exchanger...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A Thermoelectric Generator with an Intermediate Heat Exchanger for Automotive Waste Heat Recovery System A Thermoelectric Generator with an Intermediate Heat Exchanger for...

  14. Statistically downscaling from an Earth System Model of Intermediate

    E-Print Network [OSTI]

    Feigon, Brooke

    Statistically downscaling from an Earth System Model of Intermediate Complexity to reconstruct past Earth System Models of Intermediate Complexity (EMICs) have the advantage of allowing transient

  15. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  16. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  17. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  18. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  19. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  20. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  1. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  2. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  3. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  4. Intermediate-energy nuclear chemistry workshop

    SciTech Connect (OSTI)

    Butler, G.W.; Giesler, G.C.; Liu, L.C.; Dropesky, B.J.; Knight, J.D.; Lucero, F.; Orth, C.J.

    1981-05-01T23:59:59.000Z

    This report contains the proceedings of the LAMPF Intermediate-Energy Nuclear Chemistry Workshop held in Los Alamos, New Mexico, June 23-27, 1980. The first two days of the Workshop were devoted to invited review talks highlighting current experimental and theoretical research activities in intermediate-energy nuclear chemistry and physics. Working panels representing major topic areas carried out indepth appraisals of present research and formulated recommendations for future research directions. The major topic areas were Pion-Nucleus Reactions, Nucleon-Nucleus Reactions and Nuclei Far from Stability, Mesonic Atoms, Exotic Interactions, New Theoretical Approaches, and New Experimental Techniques and New Nuclear Chemistry Facilities.

  5. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  6. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  7. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  8. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  9. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  10. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  11. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  12. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  13. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  14. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  15. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  16. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  17. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  18. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  19. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  20. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  1. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  2. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  3. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  4. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  5. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  6. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  7. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  8. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  9. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  10. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  11. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  12. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  13. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  14. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  15. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  16. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  17. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  18. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  19. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  20. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  1. Warm-Intermediate inflationary universe model

    E-Print Network [OSTI]

    Sergio del Campo; Ramon Herrera

    2009-03-24T23:59:59.000Z

    Warm inflationary universe models in the context of intermediate expansion, between power law and exponential, are studied. General conditions required for these models to be realizable are derived and discussed. This study is done in the weak and strong dissipative regimes. The inflaton potentials considered in this study are negative-power-law and powers of logarithms, respectively. The parameters of our models are constrained from the WMAP three and five year data.

  2. Intermediate Scale Accidental Axion and ALPs

    E-Print Network [OSTI]

    Alex G. Dias

    2014-09-28T23:59:59.000Z

    We discuss the problem of constructing models containing an axion and axion-like particles, motivated by astrophysical observations, with decay constants at the intermediate scale ranging from $10^9$GeV to $10^{13}$GeV. We present examples in which the axion and axion-like particles arise accidentally as pseudo Nambu-Goldstone bosons of automatic global chiral symmetries, in models having exact discrete symmetries.

  3. accident response process: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    last years there has been an increasing interest in the secu- rity of process control and SCADA systems-1-4503-0564-81103 ...10.00. General Terms Security Keywords SCADA,...

  4. Highly Mismatched Alloys for Intermediate Band Solar Cells

    E-Print Network [OSTI]

    2005-01-01T23:59:59.000Z

    for Intermediate Band Solar Cells W. Walukiewicz 1 , K. M.single-junction intermediate band solar cells. Figure 5:conversion efficiency for a solar cell fabricated from a Zn

  5. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  6. Sandia Energy - National Supervisory Control and Data Acquisition...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Supervisory Control and Data Acquisition (SCADA) Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for...

  7. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 date April 2002 Downloaded 68 times Category Cyber Security, Infrastructure Security, SCADA Systems year 2002 report-id 020877 author Arnold B. Baker, Robert J. Eagan, Patricia...

  8. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Downloaded 55 times Category Cyber Security, ECIS, Infrastructure Security, Manual, SCADA Systems year 2007 author Brian Van Leeuwen report-id SAND2007-0383P This document...

  9. Prepared Statement for Mr. Michael P. Mertz Director, NERC Regulatory...

    Broader source: Energy.gov (indexed) [DOE]

    cyber security training, with many receiving role based training such as the Control Systems Security training programs offered through the Department of Energy National SCADA...

  10. Wireless System Considerations When Implementing NERC Critical...

    Energy Savers [EERE]

    & Publications Recommended Practices Guide For Securing ZigBee Wireless Networks in Process Control System Environments Securing WLANs using 802.11i DOEOE National SCADA...

  11. Sandia Energy - SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home Stationary

  12. Sandia Energy - SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs HomeProgram Overview Home

  13. Sandia Energy - SCADA Training Courses

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home StationaryFAQs HomeProgram

  14. 2005: Table of EMICs (Earth System Models of Intermediate Complexity

    E-Print Network [OSTI]

    Martin Claussen

    apparent that Earth system modelling has to rely on a hierarchy of models in which models of intermediate

  15. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  16. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  17. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

  18. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  19. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  20. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  1. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  2. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  3. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  4. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  5. Intermediate Temperature Solid Oxide Fuel Cell Development

    SciTech Connect (OSTI)

    S. Elangovan; Scott Barnett; Sossina Haile

    2008-06-30T23:59:59.000Z

    Solid oxide fuel cells (SOFCs) are high efficiency energy conversion devices. Present materials set, using yttria stabilized zirconia (YSZ) electrolyte, limit the cell operating temperatures to 800 C or higher. It has become increasingly evident however that lowering the operating temperature would provide a more expeditious route to commercialization. The advantages of intermediate temperature (600 to 800 C) operation are related to both economic and materials issues. Lower operating temperature allows the use of low cost materials for the balance of plant and limits degradation arising from materials interactions. When the SOFC operating temperature is in the range of 600 to 700 C, it is also possible to partially reform hydrocarbon fuels within the stack providing additional system cost savings by reducing the air preheat heat-exchanger and blower size. The promise of Sr and Mg doped lanthanum gallate (LSGM) electrolyte materials, based on their high ionic conductivity and oxygen transference number at the intermediate temperature is well recognized. The focus of the present project was two-fold: (a) Identify a cell fabrication technique to achieve the benefits of lanthanum gallate material, and (b) Investigate alternative cathode materials that demonstrate low cathode polarization losses at the intermediate temperature. A porous matrix supported, thin film cell configuration was fabricated. The electrode material precursor was infiltrated into the porous matrix and the counter electrode was screen printed. Both anode and cathode infiltration produced high performance cells. Comparison of the two approaches showed that an infiltrated cathode cells may have advantages in high fuel utilization operations. Two new cathode materials were evaluated. Northwestern University investigated LSGM-ceria composite cathode while Caltech evaluated Ba-Sr-Co-Fe (BSCF) based pervoskite cathode. Both cathode materials showed lower polarization losses at temperatures as low as 600 C than conventional manganite or cobaltite cathodes.

  6. Thermoelectric power generator with intermediate loop

    DOE Patents [OSTI]

    Bell, Lon E; Crane, Douglas Todd

    2013-05-21T23:59:59.000Z

    A thermoelectric power generator is disclosed for use to generate electrical power from heat, typically waste heat. An intermediate heat transfer loop forms a part of the system to permit added control and adjustability in the system. This allows the thermoelectric power generator to more effectively and efficiently generate power in the face of dynamically varying temperatures and heat flux conditions, such as where the heat source is the exhaust of an automobile, or any other heat source with dynamic temperature and heat flux conditions.

  7. Thermoelectric power generator with intermediate loop

    DOE Patents [OSTI]

    Bel,; Lon E. (Altadena, CA); Crane, Douglas Todd (Pasadena, CA)

    2009-10-27T23:59:59.000Z

    A thermoelectric power generator is disclosed for use to generate electrical power from heat, typically waste heat. An intermediate heat transfer loop forms a part of the system to permit added control and adjustability in the system. This allows the thermoelectric power generator to more effectively and efficiently generate power in the face of dynamically varying temperatures and heat flux conditions, such as where the heat source is the exhaust of an automobile, or any other heat source with dynamic temperature and heat flux conditions.

  8. Neutron scattering measurements at intermediate energies

    E-Print Network [OSTI]

    N. Olsson; J. Blomgren; E. Ramstrom

    The study of elastic neutron scattering at intermediate energies is essential for the understanding of the isovector term in the nucleon-nucleus interaction, as well as for the development of macroscopic and microscopic optical potentials at these energies. The techniques used for neutron scattering measurements is presented in this paper, as well as the di culties encountered. The few facilities that have been used are reviewed, and a newly installed setup for such measurements in Uppsala is described. Finally, the normalization problem is speci cally addressed. 1

  9. Ligand Intermediates in Metal-Catalyzed Reactions

    SciTech Connect (OSTI)

    Gladysz, John A.

    1999-07-31T23:59:59.000Z

    The longest-running goal of this project has been the synthesis, isolation, and physical chemical characterization of homogeneous transition metal complexes containing ligand types believed to be intermediates in the metal-catalyzed conversion of CO/H{sub 2}, CO{sub 2}, CH{sub 4}, and similar raw materials to organic fuels, feedstocks, etc. In the current project period, complexes that contain unusual new types of C{sub x}(carbide) and C{sub x}O{sub y} (carbon oxide) ligands have been emphasized. A new program in homogeneous fluorous phase catalysis has been launched as described in the final report.

  10. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  11. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  12. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  13. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  14. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  15. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  16. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  17. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  18. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  19. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  20. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  1. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  2. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  3. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  4. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  5. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  6. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  7. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  8. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  9. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  10. Search Via quantum walks with intermediate measurements

    E-Print Network [OSTI]

    Efrain Buksman; André L. Fonseca de Oliveira; Jesús GarcÍa López de Lacalle

    2014-12-23T23:59:59.000Z

    A modification of the Tulsi quantum search algorithm with intermediate measurements of the control is presented. In order to analyze the effect of measurements in quantum searches, a different choice of the angular parameter is used. The study is performed for several values of time lapses between measurements, finding close relationships between probabilities and correlations (Mutual Information and Cumulative Correlation Measure). The order of this modified algorithm is estimated, showing that for some time lapses the performance is improved, and became of order $O(N)$ (classical brute force search) when the measurement is taken in every step. The results indicate a possible way to analyze improvements to other quantum algorithms using one, or more, control qubits.

  11. Kinetic advantage of controlled intermediate nuclear fusion

    SciTech Connect (OSTI)

    Guo Xiaoming [Physics and Computer Science Department, Wilfrid Laurier University, Waterloo, Ontario, N2L 3C5 (Canada)

    2012-09-26T23:59:59.000Z

    The dominated process of controlled fusion is to let nuclei gain enough kinetic energy to overcome Coulomb barrier. As a result, a fusion scheme can consider two factors in its design: to increase kinetic energy of nuclei and to alter the Coulomb barrier. Cold Fusion and Hot fusion are all one-factor schemes while Intermediate Fusion is a twofactors scheme. This made CINF kinetically superior. Cold Fusion reduces deuteron-deuteron distance, addressing Coulomb barrier, and Hot Fusion heat up plasma into extreme high temperature, addressing kinetic energy. Without enough kinetic energy made Cold Fusion skeptical. Extreme high temperature made Hot Fusion very difficult to engineer. Because CIFN addresses both factors, CIFN is a more promising technique to be industrialized.

  12. Benchmark West Texas Intermediate crude assayed

    SciTech Connect (OSTI)

    Rhodes, A.K.

    1994-08-15T23:59:59.000Z

    The paper gives an assay of West Texas Intermediate, one of the world's market crudes. The price of this crude, known as WTI, is followed by market analysts, investors, traders, and industry managers around the world. WTI price is used as a benchmark for pricing all other US crude oils. The 41[degree] API < 0.34 wt % sulfur crude is gathered in West Texas and moved to Cushing, Okla., for distribution. The WTI posted prices is the price paid for the crude at the wellhead in West Texas and is the true benchmark on which other US crudes are priced. The spot price is the negotiated price for short-term trades of the crude. And the New York Mercantile Exchange, or Nymex, price is a futures price for barrels delivered at Cushing.

  13. Intermediate Ethanol Blends Catalyst Durability Program

    SciTech Connect (OSTI)

    West, Brian H; Sluder, Scott; Knoll, Keith; Orban, John; Feng, Jingyu

    2012-02-01T23:59:59.000Z

    In the summer of 2007, the U.S. Department of Energy (DOE) initiated a test program to evaluate the potential impacts of intermediate ethanol blends (also known as mid-level blends) on legacy vehicles and other engines. The purpose of the test program was to develop information important to assessing the viability of using intermediate blends as a contributor to meeting national goals for the use of renewable fuels. Through a wide range of experimental activities, DOE is evaluating the effects of E15 and E20 - gasoline blended with 15% and 20% ethanol - on tailpipe and evaporative emissions, catalyst and engine durability, vehicle driveability, engine operability, and vehicle and engine materials. This report provides the results of the catalyst durability study, a substantial part of the overall test program. Results from additional projects will be reported separately. The principal purpose of the catalyst durability study was to investigate the effects of adding up to 20% ethanol to gasoline on the durability of catalysts and other aspects of the emissions control systems of vehicles. Section 1 provides further information about the purpose and context of the study. Section 2 describes the experimental approach for the test program, including vehicle selection, aging and emissions test cycle, fuel selection, and data handling and analysis. Section 3 summarizes the effects of the ethanol blends on emissions and fuel economy of the test vehicles. Section 4 summarizes notable unscheduled maintenance and testing issues experienced during the program. The appendixes provide additional detail about the statistical models used in the analysis, detailed statistical analyses, and detailed vehicle specifications.

  14. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  15. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  16. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  17. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  18. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  19. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  20. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  1. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  2. Intermediate Vapor Expansion Distillation and Nested Enrichment Cascade Distillation

    E-Print Network [OSTI]

    Erickson, D. C.

    INTERMEDIATE VAPOR EXPANSION DISTILLATION AND NESTED ENRICHMENT CASCADE DISTILLATION D.. C. Erickson Energy Concepts Company Annapolis, Maryland ABSTRACT Although it is known that incorporating an intermediate reboiler or reflux... condenser in a distillation ~olumn will improve column efficiency by 15 to 100%, there has been little use of this technique to date." Intermediate vapor compression heat pumping was recently introduced as one practical means of achieving this benefit...

  3. THE MAGELLANIC INTER-CLOUD PROJECT (MAGIC). I. EVIDENCE FOR INTERMEDIATE-AGE STELLAR POPULATIONS IN BETWEEN THE MAGELLANIC CLOUDS

    SciTech Connect (OSTI)

    Noeel, N. E. D.; Read, J. I. [ETH Zuerich, Institute for Astronomy, Wolfgang-Pauli-Strasse 27, CH-8093 Zuerich (Switzerland); Conn, B. C.; Rix, H.-W. [Max Planck Institut fuer Astronomie, Koenigstuhl 17, D-69117, Heidelberg (Germany); Carrera, R. [Instituto de Astrofisica de Canarias, C/Via Lactea s/n, E-38200, La Laguna, Tenerife (Spain); Dolphin, A., E-mail: noelia@phys.ethz.ch [Raytheon Company, P.O. Box 11337, Tucson, AZ 85734-1337 (United States)

    2013-05-10T23:59:59.000Z

    The origin of the gas in between the Magellanic Clouds (MCs)-known as the ''Magellanic Bridge'' (MB)-is puzzling. Numerical simulations suggest that the MB formed from tidally stripped gas and stars in a recent interaction between the MCs. However, the apparent lack of stripped intermediate- or old-age stars associated with the MB is at odds with this picture. In this paper, we present the first results from the MAGellanic Inter-Cloud program (MAGIC) aimed at probing the stellar populations in the inter-Cloud region. We present observations of the stellar populations in two large fields located in between the Large and Small Magellanic Clouds (LMC/SMC), secured using the WFI camera on the 2.2 m telescope in La Silla. Using a synthetic color-magnitude diagram technique, we present the first quantitative evidence for the presence of intermediate-age and old stars in the inter-Cloud region. The intermediate-age stars-which make up {approx}28% of all stars in the region-are not present in fields at a similar distance from the SMC in a direction pointing away from the LMC. This provides potential evidence that these intermediate-age stars could have been tidally stripped from the SMC. However, spectroscopic studies will be needed to confirm or rule out the tidal origin for the inter-Cloud gas and stars.

  4. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  5. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  6. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  7. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  8. Intermediates and the folding of proteins L and G

    E-Print Network [OSTI]

    Brown, Scott; Head-Gordon, Teresa

    2008-01-01T23:59:59.000Z

    Intermediates can accelerate protein folding. Proceedings ofunifying mechanism for protein folding? [Review]. Trends incoordinate for protein folding. Journal of Chemical Physics

  9. 14.03 Intermediate Applied Microeconomics, Fall 2000

    E-Print Network [OSTI]

    Autor, David H.

    Presents basic theory and applications of consumer and producer behavior and welfare analysis at an intermediate level. Emphasizes applications, including the measurement of productivity, rationing, insurance markets, and ...

  10. Effects of Intermediate Ethanol Blends on Legacy Vehicles and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    117 Effects of Intermediate Ethanol Blends on Legacy Vehicles and Small Non-Road Engines, Report 1 - Updated February 2009 Prepared by Keith Knoll Brian West Wendy Clark...

  11. abasic site intermediate: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the Long Wavelength Intermediate Array (LWIA): Choosing the First Four Station Sites Engineering Websites Summary: have been done on over 30 possible station sites throughout...

  12. PE06 -Beginning & Intermediate Core Training Class Syllabus

    E-Print Network [OSTI]

    PE06 - Beginning & Intermediate Core Training Class Syllabus Instructor: Sandra Marbut Office attendance requirements as outlined on this syllabus 3. Pass midterm examination 4. Submit their final

  13. alkaline intermediate level: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    intermediation. Positive scale effects may make a single monopoly intermediary optimal. Comparing can also eliminate the problems of adverse selection and inefficient...

  14. A Dianionic Phosphorane Intermediate and Transition States in...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of this debate centers around the roles of the conserved residues, structures of the transition state or states, the possibility of a stable intermediate, and the charge and...

  15. Curvaton field and the intermediate inflationary universe model

    SciTech Connect (OSTI)

    Campo, Sergio del; Herrera, Ramon [Instituto de Fisica, Pontificia Universidad Catolica de Valparaiso, Avenida Brasil 2950, Valparaiso (Chile)

    2007-11-15T23:59:59.000Z

    The curvaton in an intermediate inflationary universe model is studied. This study has allowed us to find some interesting constraints on different parameters that appear in the model.

  16. Structures of the Ribosome in Intermediate States of Ratcheting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Structures of the Ribosome in Intermediate States of Ratcheting Print Protein synthesis is conducted by the ribosome: a megadalton sized complex responsible for making proteins...

  17. Conversion Technologies II: Bio-Oils, Sugar Intermediates, Precursors...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Technologies II: Bio-Oils, Sugar Intermediates, Precursors, Distributed Models, and Refinery Co-Processing July 30, 2014 Bryna Berendzen Technology Manager BETO Conversion...

  18. Desiccation of unsaturated porous media: Intermediate-scale experiment...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Intermediate-scale experiments and numerical simulation. Abstract: Soil desiccation (drying) is recognized as a potentially robust vadose zone remediation process involving water...

  19. The low and intermediate mass dilepton and photon results

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Ruan, Lijuan

    2014-11-01T23:59:59.000Z

    I summarize and discuss some of the experimental results on the low and intermediate mass dileptons and direct photons presented at Quark Matter 2014.

  20. A Review of Multidimensional, Multifluid Intermediate-scale Experiment...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    mapping for intermediate-scale experiments include photon-attenuation methods such as gamma and X-ray techniques, and photographic methods such as the light reflection, light...

  1. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

  2. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  3. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  4. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  5. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M P U T E R S E C U R I

  6. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  7. Towards a Secure and Efficient System for End-to-End Provenance Appears in the Proceedings of the Second USENIX Workshop on Theory and Practice of Provenance (TaPP 2010)

    E-Print Network [OSTI]

    Zadok, Erez

    of sensor data as it is recorded and aggre- gated in cyber-physical systems such as the smart-grid and SCADA

  8. Towards a Secure and Efficient System for EndtoEnd Provenance Appears in the Proceedings of the Second USENIX Workshop on Theory and Practice of Provenance (TaPP 2010)

    E-Print Network [OSTI]

    Zadok, Erez

    of sensor data as it is recorded and aggre­ gated in cyber­physical systems such as the smart­grid and SCADA

  9. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  10. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  11. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  12. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  13. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  14. Corporate Security and Conflict Outcomes 

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  15. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

  16. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  17. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  18. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  19. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ………………………………... Technical Capabilities to Support PSI ………………………………… Foreign Policy and External Relations ………………………............... Republic of Bevostan ………………………………………………………….. Geography ……………………………………………………………... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  20. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  1. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  2. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  3. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  4. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  5. Foundations for Designing Secure Architectures

    E-Print Network [OSTI]

    Jurjens, Jan

    Architectures This talk: foundations for designing software architectures for secure systems, based their architectures. Will apply specialized tool-support to automatically evaluate the designs for potential security weaknesses. (Based on tutorial at WICSA 2004.) #12;Jan Jürjens, TU Munich: Foundations for Designing Secure

  6. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

  7. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  8. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  9. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  10. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  11. The decommodified security ratio

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    are currently experiencing: changing patterns of work, the phenom- enon she calls the "breakdown in the wage furthered by the work of the International Labour Office. In particular, the programme of researchThe decommodified security ratio: A tool for assessing European social protection systems Georges

  12. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  13. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy...

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  15. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  16. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    security early in the information system development life cycle (SDLC), you may be able to avoid higher, with tailoring, to any SDLC model or acquisition method the organization is using. The appendices to the guide.nist.gov/publications/nistpubs/ index.html. The System Development Life Cycle (SDLC) The system development life cycle starts

  17. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  18. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  19. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  20. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  1. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  2. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  3. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    to complexity, proprietary nature and different management teams ? Ripe for exploitation ? Intel, Microsoft, Security vendors are not focused on this technology ? Many are NOT PC?s ? Many can be infected and the devices cannot be cleaned ESL-KT-11...-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Inherent Vulnerabilities ? Two-way communications ? Distributed connectivity ? Customer usage data ? Metering devices ? Weak authentication and access control ? Lack of adequate training ? Lack...

  4. Perceptions of Security

    E-Print Network [OSTI]

    Ura, Karma

    2001-01-01T23:59:59.000Z

    followed by guerrillas, waged by the Bhutanese militia in rugged terrain. Though not written in accounts of any battles, the form of war oral sources describe suggest unconventional warfare. The natural defence position of the terrain combined with its... nor poverty in the areas adjacent to Bhutan, which are the ultimate causes of the current security problems Bhutan faces, are unfortunately on decline. Journal of Bhutan Studies 136 On the other hand, Bhutan, like several small states, has been...

  5. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring

  6. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  7. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  8. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  9. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  10. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  11. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

  12. 2014 Headquarters Facilities Master Security Plan - Chapter 3...

    Office of Environmental Management (EM)

    3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

  13. Secure Learning and Learning for Security: Research in the Intersection

    E-Print Network [OSTI]

    Rubinstein, Benjamin

    2010-01-01T23:59:59.000Z

    and Alissa Dill. 2008 CISO priorities: The right objectivesbased reactive defense. The CISO risk management problem isSecurity Officer (CISO) to manage the enterprise’s

  14. Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D

    E-Print Network [OSTI]

    Lawrence, Jon

    Slide 1 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA U N, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D Intermediate valence metals Security, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D Anderson Impurity Model (AIM

  15. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  16. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  17. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  18. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  19. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    limit economic development, impact interdependent infrastructure (such as energy and agriculture), and are a fundamental source of ... Climate Security On May 13, 2011, in...

  20. Pollux | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Pollux | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  1. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01T23:59:59.000Z

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  2. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  3. Sandia National Laboratories: Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from improved climate models to performance models for underground waste storage to 3D printing and digital rock physics. Marianne Walck (Director ... Recent Sandia Secure,...

  4. Sandia National Laboratories: Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    States. I&C systems monitor the safe, reliable and secure generation and delivery of electricity and could have potential cyber vulnerabilities. At Sandia National Laboratories,...

  5. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  6. National Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

  7. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  8. 14.03 Intermediate Applied Microeconomics, Fall 2004

    E-Print Network [OSTI]

    Autor, David

    This class presents microeconomic theory and applications of consumer and producer behavior and welfare analysis at an intermediate level. In addition to standard competitive models, we study deviations due to externalities, ...

  9. Structural Characterization of an Equilibrium Unfolding Intermediate in Cytochrome c

    E-Print Network [OSTI]

    Roder, Heinrich

    form found under acidic high-salt conditions, as well as a kinetic intermediate populated at a late native and unfolded states (the so-called molten-globule state) of

  10. Intermediate connector for stacked organic light emitting devices

    DOE Patents [OSTI]

    D'Andrade, Brian

    2013-02-12T23:59:59.000Z

    A device is provided, having an anode, a cathode, and an intermediate connector disposed between the anode and the cathode. A first organic layer including an emissive sublayer is disposed between the anode and the intermediate connector, and a second including an emissive sublayer is disposed between the intermediate connector and the cathode. The intermediate connector includes a first metal having a work function lower than 4.0 eV and a second metal having a work function lower than 5.0 eV. The work function of the first metal is at least 0.5 eV less than the work function of the second metal. The first metal is in contact with a sublayer of the second organic layer that includes a material well adapted to receive holes from a low work function metal.

  11. THE UNIVERSITY OF CHICAGO CHARACTERIZATION OF PROTEIN FOLDING INTERMEDIATES

    E-Print Network [OSTI]

    Sosnick, Tobin R.

    THE UNIVERSITY OF CHICAGO CHARACTERIZATION OF PROTEIN FOLDING INTERMEDIATES FOR DELINEATION ............................................................................................................ 1 1.1 Why study protein folding .............................................................................. 3 1.2.1 How fast should a protein fold ........................................................... 3

  12. Process and Intermediate Calculations User AccessInputs Outputs

    E-Print Network [OSTI]

    Process and Intermediate Calculations User AccessInputs Outputs Fire Behavior & Probability STARFire System Flow Valuation Processing Temporal Schedules Smoke · Zones · Zone impact · Emissions Fire and compare Valuation (Structured Elicit Process) 1) Value Layers: · Point (housing, cultural trees, etc

  13. Reactions of nitrogen heterocycle-organolithium intermediates with lead halides

    E-Print Network [OSTI]

    Kinney, Jerry Neal

    1970-01-01T23:59:59.000Z

    REACTIONS OF NITROGEN HETEROCYCLE- ORGANOLITHIUM INTERMEDIATES WITH LEAD HALIDES A Thesis by JERRY HEAL KINNEY Submitted to the Graduate College of Texas ALM University In partial fulfillment of the requirement for the degree ot MASTER...) (Mem er) December 1970 ABSTRACT Reactions of Nitrogen Heterocycle-Organollthium intermediates With Lead Halides. (December l970) Jerry Neal Kinney, B. S. , Texas AE, M University Directed by: Dr. Choo-Seng Giam Reactions of nitrogen heterocycle...

  14. McMaster Security Services Annual Report 2009 1 Security Services

    E-Print Network [OSTI]

    Thompson, Michael

    McMaster Security Services ­ Annual Report 2009 1 McMaster Security Services Annual Report 2009 #12;McMaster Security Services ­ Annual Report 2009 2 Mission Statement Developing a safe and secure to the Security Services Department. Methods and approaches to assist in achieving a safe and secure environment

  15. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24T23:59:59.000Z

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  16. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgendaSecurityAbout Us

  17. National Security Initiatives | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota1Resource forNational Cyber Security

  18. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8, 2000Consumption Survey (CBECS)Laboratory to HighlightSecurity Overview

  19. Securing Control Systems Modems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSectionSecuring

  20. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22, 2014SEC.

  1. Homeland Security Programs | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh School football Highdefault Sign In About |PagesHomeland Security

  2. Ideas for Security Assurance in Security Critical Software using Modelica

    E-Print Network [OSTI]

    Zhao, Yuxiao

    Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

  3. --No Title--

    Office of Environmental Management (EM)

    Delivery and Energy Reliability Visualization & Controls Program Peer Review Control Systems Security Project Summaries National SCADA Test Bed NSTB Enhancing control...

  4. Microsoft Word - 0500808_110205 2-6-07 rev.doc

    Office of Environmental Management (EM)

    National SCADA Test Bed A Summary of Control System Security Standards Activities in the Energy Sector U.S. Department of Energy Office of Electricity Delivery and Energy...

  5. Reference Model for Control and Automation Systems in Electrical...

    Broader source: Energy.gov (indexed) [DOE]

    Reference Model for Control and Automation Systems in Electrical Power Version 1.2 October 12, 2005 Prepared by: Sandia National Laboratories' Center for SCADA Security Jason...

  6. Sandia Energy - National Supervisory Control and Data Acquisition...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Supervisory Control and Data Acquisition (SCADA) Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control and Data...

  7. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Fact Sheet, Infrastructure Security, National Supervisory Control and Data Acquisition (SCADA) Test Bed, Photovoltaic, Solar Energy Tags sand2010-3643 year 2011 report-id...

  8. Sandia Energy - EC Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    35 times Category Energy Security, National Supervisory Control and Data Acquisition (SCADA) Test Bed, Presentation, Renewable Energy, Wind Energy, Workshop Tags sand2011-6520c...

  9. Sandia Energy - Standards and Industry Outreach/Partnerships

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security for Electric Infrastructure National Supervisory Control and Data Acquisition (SCADA) Standards and Industry OutreachPartnerships Standards and Industry Outreach...

  10. Microsoft PowerPoint - SS1_4H_NERC_Training_09_28_06.ppt

    Office of Environmental Management (EM)

    Capability 7 SANS SCADA Security Summit II September 28, 29, 2006 Control Systems Multiple Vendor participation Fully functional SCADAEMS systems Fully functional DCS...

  11. Transmission and Distribution World March 2007: DOE Focuses on...

    Broader source: Energy.gov (indexed) [DOE]

    Energy sector owners, operators and system vendors team up to boost control system security with national SCADA test bed. Energy Secrtor Owners, operators and system vendors team...

  12. Hallmark Fact Sheet.cdr

    Broader source: Energy.gov (indexed) [DOE]

    Cryptographic Serial Communication Hallmark Cryptographic Serial Communication A cryptographic card and link module integrating the Secure SCADA Communications Protocol to provide...

  13. Annual Security Report October 1, 2013

    E-Print Network [OSTI]

    Yates, Andrew

    ® Annual Security Report October 1, 2013 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................4 MESSAGE FROM THE EINSTEIN SECURITY DEPARTMENT

  14. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  15. A Survey on Cloud Provider Security

    E-Print Network [OSTI]

    A Survey on Cloud Provider Security Measures Alex Pucher, Stratos Dimopoulos Abstract Cloud take advantage of this model already, but security and privacy concerns limit the further adoption agencies and start offering security certifications and separate tightly controlled "government" cloud

  16. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses (not Reactors appropriations including the National Nuclear Security Administration field offices. This account

  17. Annual Security Report October 1, 2012

    E-Print Network [OSTI]

    Yates, Andrew

    ® Annual Security Report October 1, 2012 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................3 MESSAGE FROM THE SECURITY DEPARTMENT

  18. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses, and Naval Reactors appropriations including the National Nuclear Security Administration (NNSA) field of

  19. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision technology needs of the University. The Information Technology Security Office has created this Incident, affiliates, or students. Audience This document is primarily for University departmental information security

  20. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    June 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute the security of their information tech nology (IT) systems. Whether they get this assistance from internal

  1. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Computer Security Division Information Technology Laboratory National Institute of Standards

  2. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  3. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  4. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01T23:59:59.000Z

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  6. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01T23:59:59.000Z

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  7. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17T23:59:59.000Z

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  8. Issues in Security Service Discovery and Routing

    SciTech Connect (OSTI)

    Sholander, P.; Tarman, T.

    1999-04-07T23:59:59.000Z

    The Security Specification, Version 1.0 allows security services to be provided by many devices in a network. It correctly presumes that if a virtual circuit needs these security services, then network topology and device policy will act to ensure that the appropriate security services are applied to the virtual circuit. This contribution moves that the Security Service Discovery and Routing function be included in the Security Version 2.0 work scope.

  9. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  10. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  11. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03T23:59:59.000Z

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  12. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Energy Savers [EERE]

    CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

  13. Harold Washington Social Security Administration (SSA) Center...

    Office of Environmental Management (EM)

    Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

  14. Climate VISION: Security and Privacy Notices

    Office of Scientific and Technical Information (OSTI)

    SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs...

  15. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04T23:59:59.000Z

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  16. Enforcement Letter, Consolidated Nuclear Security, LLC | Department...

    Energy Savers [EERE]

    security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

  17. Independent Oversight Evaluation, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

  18. Independent Oversight Inspection, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

  19. Security & Defense Licenses Available | Tech Transfer | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

  20. Quantum Enabled Security (QES) for Optical Communications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Los Alamos National Laboratory has developed Quantum Enabled...

  1. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

  2. Safety and Security Enforcement Process Overview

    Broader source: Energy.gov (indexed) [DOE]

    SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

  3. Developing Secure Power Systems Professional Competence: Alignment...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (JulyAugust 2013) Developing Secure Power Systems...

  4. Independent Oversight Activity Report, Nevada National Security...

    Office of Environmental Management (EM)

    Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

  5. Independent Activity Report, Nevada National Security Site -...

    Energy Savers [EERE]

    Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit HIAR NNSS-2012-12-03 This Independent Activity Report documents an...

  6. CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS

    E-Print Network [OSTI]

    Olsen, Stephen L.

    Security service is currently handled through a private security guard service contract, which provides

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  8. Multipartite secure state distribution

    SciTech Connect (OSTI)

    Duer, W.; Briegel, H.-J. [Institut fuer Theoretische Physik, Universitaet Innsbruck, Technikerstrasse 25, A-6020 Innsbruck (Austria); Institut fuer Quantenoptik und Quanteninformation der Oesterreichischen, Akademie der Wissenschaften, Innsbruck (Austria); Calsamiglia, J. [Institut fuer Theoretische Physik, Universitaet Innsbruck, Technikerstrasse 25, A-6020 Innsbruck (Austria)

    2005-04-01T23:59:59.000Z

    We introduce the distribution of a secret multipartite entangled state in a real-world scenario as a quantum primitive. We show that in the presence of noisy quantum channels (and noisy control operations), any state chosen from the set of two-colorable graph states (Calderbank-Shor-Steane codewords) can be created with high fidelity while it remains unknown to all parties. This is accomplished by either blind multipartite entanglement purification, which we introduce in this paper, or by multipartite entanglement purification of enlarged states, which offers advantages over an alternative scheme based on standard channel purification and teleportation. The parties are thus provided with a secret resource of their choice for distributed secure applications.

  9. McMASTER SECURITY SERVICES ANNUAL REPORT 2007

    E-Print Network [OSTI]

    Thompson, Michael

    McMASTER SECURITY SERVICES ANNUAL REPORT 2007 #12;#12;Table of Contents MCMASTER SECURITY SERVICES .................................................................................................................................6 MCMASTER SECURITY SERVICES ­ WHO WE .......................................................................................................................29 #12;#12;5 MCMASTER SECURITY SERVICES MISSION STATEMENT Developing a safe and secure environment

  10. Software Security Rules, SDLC Perspective

    E-Print Network [OSTI]

    Banerjee, C

    2009-01-01T23:59:59.000Z

    Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email and Egreetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of peoples trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, right from the beginning. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are el...

  11. Reduction of Quantum Phase Fluctuations in Intermediate States

    E-Print Network [OSTI]

    Amit Verma; Anirban Pathak

    2008-01-04T23:59:59.000Z

    Recently we have shown that the reduction of the Carruthers-Nieto symmetric quantum phase fluctuation parameter (U) with respect to its coherent state value corresponds to an antibunched state, but the converse is not true. Consequently reduction of U is a stronger criterion of nonclassicality than the lowest order antibunching. Here we have studied the possibilities of reduction of $U$ in intermediate states by using the Barnett Pegg formalism. We have shown that the reduction of phase fluctuation parameter U can be seen in different intermediate states, such as binomial state, generalized binomial state, hypergeometric state, negative binomial state, and photon added coherent state. It is also shown that the depth of nonclassicality can be controlled by various parameters related to intermediate states. Further, we have provided specific examples of antibunched states, for which $U$ is greater than its poissonian state value.

  12. Seismic evolution of low/intermediate mass PMS stars

    E-Print Network [OSTI]

    F. J. G. Pinheiro

    2007-12-05T23:59:59.000Z

    This article presents a study of the evolution of the internal structure and seismic properties expected for low/intermediate mass Pre-Main Sequence (PMS) stars. Seismic and non-seismic properties of PMS stars were analysed. This was done using 0.8 to 4.4M$_\\odot$ stellar models at stages ranging from the end of the Hayashi track up to the Zero-Age Main-Sequence (ZAMS). This research concludes that, for intermediate-mass stars (M$>$1.3M$_\\odot$), diagrams comparing the effective temperature ($T_{eff}$) against the small separation can provide an alternative to Christensen-Dalsgaard (C-D) diagrams. The impact of the metal abundance of intermediate mass stars (2.5-4.4M$_\\odot$) has over their seismic properties is also evaluated.

  13. WEP SecurityWEP Security David ArmstrongDavid Armstrong

    E-Print Network [OSTI]

    ""inin house.house."" 802.11802.11 nn 802.11a802.11a ­­ no securityno security nn 802.11b802.11b ­­ WEP

  14. AP1000 Design for Security

    SciTech Connect (OSTI)

    Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

    2006-07-01T23:59:59.000Z

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

  15. The Secure Hash Payment System

    E-Print Network [OSTI]

    Thompson, Timothy J

    2001-01-01T23:59:59.000Z

    OF FIGURES FIGURE Page 1 SET overview 32 2 SET messages 34 3 SET and SSL overview 36 4 Overview of SHPS 48 5 An example E C M L document 56 6 An example E C C document 57 7 An example CurrencyUpdate document 65 8 An example PurchaseRequest document... information. Netscape's Secure Socket Layer (SSL) provides the secure link between the consumer and merchant. While this approach has been successful due to the availability of SSL in most web browsers, the approach does not provide the level of security...

  16. Entropic security in Quantum Cryptography

    E-Print Network [OSTI]

    Simon Pierre Desrosiers

    2007-11-16T23:59:59.000Z

    We present two new definitions of security for quantum ciphers which are inspired by the definition of entropic security and entropic indistinguishability defined by Dodis and Smith. We prove the equivalence of these two new definitions. We also propose a generalization of a cipher described by Dodis and Smith and show that it can actually encrypt n qubits using less than n bits of key under reasonable conditions and yet be secure in an information theoretic setting. This cipher also totally closes the gap between the key requirement of quantum ciphers and classical ciphers.

  17. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group The principles · The eight principles are: 1. Economy of mechanism 2. FailIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group Objectives

  18. Decision Support for Choice of Security

    E-Print Network [OSTI]

    Langseth, Helge

    Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o¤ analysis and trade-o¤ tool BBN topology. (6) Rule set for how

  19. Security Event and Log Management Service

    E-Print Network [OSTI]

    Security Event and Log Management Service: Comprehensive, Cost-effective Approach to Enhance Network Security and Security Data Management IBM Global Technology Services December 2007 #12;Executive Summary The economics of network security have changed. The high cost and complexity inherent in the use

  20. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act of 2002 3 Security Management and Assistance Group (SMA) 4 FISMA Implementation Project 4 Publications