Powered by Deep Web Technologies
Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

National SCADA Test Bed - Enhancing control systems security...  

Broader source: Energy.gov (indexed) [DOE]

SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

2

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy Savers [EERE]

Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common...

3

sSCADA: Securing SCADA Infrastructure Communications Yongge Wang and Bei-Tseng Chu  

E-Print Network [OSTI]

sSCADA: Securing SCADA Infrastructure Communications Yongge Wang and Bei-Tseng Chu Dept. of SIS, UNC Charlotte, 9201 University City Blvd, Charlotte, NC 28223, August 5, 2004 Abstract Distributed, and wastewater industries. While control systems can be vulnerable to a variety of types of cyber attacks

4

Applying New Network Security Technologies to SCADA Systems.  

SciTech Connect (OSTI)

Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

Hurd, Steven A.; Stamp, Jason E. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Duggan, David P. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Chavez, Adrian R. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM

2006-11-01T23:59:59.000Z

5

Cyber Assessment Methods For SCADA Security  

SciTech Connect (OSTI)

The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

May Robin Permann; Kenneth Rohde

2005-06-01T23:59:59.000Z

6

Cyber Assessment Methods for SCADA Security  

SciTech Connect (OSTI)

The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

Not Available

2005-06-01T23:59:59.000Z

7

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems  

E-Print Network [OSTI]

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA) systems Supervisory Control And Data Acquisition (SCADA) systems, on which the proper operations of critical

Smith, Sean W.

8

Towards a Standard for Highly Secure SCADA Systems  

SciTech Connect (OSTI)

The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied to automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the requirements analysis for a highly secure SCADA system. The fi-arnework for the discussion consists of the identification of SCADA security investment areas coupled with the tradeoffs that will force compromises in the solution. For example, computational and bandwidth requirements of a security standard could force the replacement of entire SCADA systems. The requirements for a real-time response in a cascading electric power failure could pose limitations on authentication and encryption mechanisms. The shortest path to the development of a high securi~ SC.ADA standard will be achieved by leveraging existing standards efforts and ensuring that security is being properly addressed in those standards. The Utility Communications Architecture 2.o (UC@, for real-time utili~ decision control, represents one such standard. The development of a SCADA secwiy specification is a complex task that will benefit from a systems engineering approach.

Carlson, R.

1998-09-25T23:59:59.000Z

9

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version)  

E-Print Network [OSTI]

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version security, and yet incurs minimal end-to-end communication latency. Keywords: SCADA network security, bump links between devices in legacy Supervisory Con- trol And Data Acquisition (SCADA) systems, on which

10

PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA  

E-Print Network [OSTI]

PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA A Thesis Submitted Technical Report TR2010-665 #12;Abstract Message authentication with low latency is necessary to ensure- tication solutions by our lab and others looked at single messages and incurred no- ticeable latency

11

On Building Secure SCADA Systems using Security Eduardo B. Fernandez  

E-Print Network [OSTI]

power generation plants and oil refineries often involve components that are geographically distributed. To continuously monitor and control the different sections of the plant in order to ensure its appropriate the concepts of SCADA systems, analyze the threats and vulnerabilities of these systems, and illustrate

Wu, Jie

12

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems  

E-Print Network [OSTI]

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide minimal end-to-end communication latency. A microcontroller prototype of our solution is under development

13

SCADA  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwards SAGE Awards A(SAPC)SBC-CAT,HelpHistorical

14

Secure Data Transfer Guidance for Industrial Control and SCADA Systems  

SciTech Connect (OSTI)

This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

2011-09-01T23:59:59.000Z

15

Hallmark Project Commercialization of the Secure SCADA Communications...  

Broader source: Energy.gov (indexed) [DOE]

and data acquisition (SCADA) systems require a method to validate device-to-device communication and verify that information has come from a trusted source and not been altered in...

16

Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC  

SciTech Connect (OSTI)

Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost.

Aissa, Anis Ben [Université de Tunis El Manar, Tunisia] [Université de Tunis El Manar, Tunisia; Rabai, Latifa Ben Arfa [Université de Tunis, Tunisia] [Université de Tunis, Tunisia; Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Mili, Ali [New Jersey Insitute of Technology] [New Jersey Insitute of Technology

2014-01-01T23:59:59.000Z

17

SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Systems  

E-Print Network [OSTI]

SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA of the power network. From another perspective the authors of [7] attempted to quantify the impact of a cyber is to identify the vulnerabilities of these safety critical infrastruc- tures, determine the impact that possible

Johansson, Karl Henrik

18

Cyber Security Audit and Attack Detection Toolkit: National SCADA...  

Broader source: Energy.gov (indexed) [DOE]

project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event...

19

Lessons Learned from Cyber Security Assessments of SCADA and...  

Broader source: Energy.gov (indexed) [DOE]

of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY...

20

LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS  

SciTech Connect (OSTI)

The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

Ray Fink

2006-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Intermediate SCADA Security Training Course Slides (September 2006) |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomentheATLANTA,Fermi NationalBusinessDepartment of EnergyDr.MD, SC,Department of

22

Sandia SCADA Program -- High Surety SCADA LDRD Final Report  

SciTech Connect (OSTI)

Supervisory Control and Data Acquisition (SCADA) systems are a part of the nation's critical infrastructure that is especially vulnerable to attack or disruption. Sandia National Laboratories is developing a high-security SCADA specification to increase the national security posture of the U.S. Because SCADA security is an international problem and is shaped by foreign and multinational interests, Sandia is working to develop a standards-based solution through committees such as the IEC TC 57 WG 15, the IEEE Substation Committee, and the IEEE P1547-related activity on communications and controls. The accepted standards are anticipated to take the form of a Common Criteria Protection Profile. This report provides the status of work completed and discusses several challenges ahead.

CARLSON, ROLF E.

2002-04-01T23:59:59.000Z

23

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

Amin, Saurabh

2011-01-01T23:59:59.000Z

24

Review of Supervisory Control and Data Acquisition (SCADA) Systems  

SciTech Connect (OSTI)

A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.

Reva Nickelson; Briam Johnson; Ken Barnes

2004-01-01T23:59:59.000Z

25

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...  

Broader source: Energy.gov (indexed) [DOE]

and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber...

26

Good Practice Guide on Firewall Deployment for SCADA and Process...  

Broader source: Energy.gov (indexed) [DOE]

vital SCADA and Process Control Networks (PCNs). These systems are now under risk of attack from a variety of threats. One commonly suggested security solution is to isolate the...

27

Sustainable Security for Infrastructure SCADA Jason Stamp Phil Campbell Jennifer DePoy John Dillinger William Young  

E-Print Network [OSTI]

. PRESENT AND FUTURE SECURITY FOR AUTOMATION SYSTEMS N automation system, often referred to as a process risk. [1] An analogy can be made between security for control systems and fuel economy for vehicles of these systems, but this approach does not foster effective security because of the fluid IT environment

28

Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin  

E-Print Network [OSTI]

]: Security and Protection--physical security, unau- thorized access; J.2 [Physical Sciences and Engineer- ing]: Earth and atmospheric sciences General Terms Security Permission to make digital or hard copies of all such as waste-water treatment plants, oil and gas distribution, and process control systems. SCADA systems

29

SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013  

SciTech Connect (OSTI)

There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

Gordon Rueff; Lyle Roybal; Denis Vollmer

2013-01-01T23:59:59.000Z

30

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

J. [2004], Low-latency cryptographic protection for SCADAlatency high-integrity security retrofit for lecacy SCADA

Amin, Saurabh

2011-01-01T23:59:59.000Z

31

Real-Time SCADA Cyber Protection Using Compression Techniques  

SciTech Connect (OSTI)

The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

Lyle G. Roybal; Gordon H Rueff

2013-11-01T23:59:59.000Z

32

Framework for SCADA Security Policy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensional Electrical Resistivity Structure | Department ofFramework for

33

Stealthy Deception Attacks on Water SCADA Systems  

E-Print Network [OSTI]

Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

Hu, Fei

34

Retrofit SCADA installation combines SCADA and process control functions  

SciTech Connect (OSTI)

When Gulf States Utilities Company`s (now part of Entergy Operations, Inc.) River Bend Nuclear Plant, decided to add a closed cooling water system for the plant service water, a new SCADA system was required. Previously the normal service water system shared common cooling towers and flume with the plant`s circulating water system. Closing the system required a new cooling tower with pumps and heat exchangers to be constructed in a remote location. Existing equipment in the area was controlled via a multichannel tone SCADA system that did not have sufficient spare capacity for control of the new components. This paper will discuss how a new SCADA system was designed and installed, that also included process control. It will also address the operational experience to date.

Moffitt, T.O. [Entergy Operations, Inc., St. Francisville, LA (United States)

1995-09-01T23:59:59.000Z

35

CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection  

SciTech Connect (OSTI)

Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

Marco Carvalho; Richard Ford

2012-05-14T23:59:59.000Z

36

"Supervisory Control and Data Acquisition (SCADA) Systems." The...  

Broader source: Energy.gov (indexed) [DOE]

"Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8...

37

Detecting Integrity Attacks on SCADA Systems Rohan Chabukswar, Yilin Mo, Bruno Sinopoli  

E-Print Network [OSTI]

susceptibilities in industrial control systems. In view of the present threat of global terrorism, a power grid. To validate the results, we apply our findings to an industrial control problem concerning a chemical plant and then a simplified model of a power system. Keywords: Cyber-Physical Systems, SCADA, Secure, Control 1. INTRODUCTION

Sinopoli, Bruno

38

Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)  

SciTech Connect (OSTI)

Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

Jared Verba; Michael Milvich

2008-05-01T23:59:59.000Z

39

Cyber Assessment Methods for SCADA Security  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana. DOCUMENTS AVAILABLEReport 2009Site | DepartmentOffice ofExamination Report5

40

An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications  

SciTech Connect (OSTI)

Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in a critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.

Beaver, Justin M [ORNL] [ORNL; Borges, Raymond Charles [ORNL] [ORNL; Buckner, Mark A [ORNL] [ORNL

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Routing SCADA data through an enterprise WAN  

SciTech Connect (OSTI)

Houston Lighting and Power (HL and P) and many other large utilities have investigated substantial resources in developing integrated enterprise wide area networks (WANs). The WAN provides unprecedented opportunities for integrating information throughout the corporation, resulting in improved efficiency and reduced costs of operation. In contrast, present dedicated point-to-point SCADA data circuits from the energy management system (EMS) to remote terminal units (RTUs) are not currently integrated with the network, nor replicated in any offsite backup system. An integrated approach might integrate communications from selected RTUs over the WAN to a backup system or the EMS. Such an approach would potentially provide improved disaster recovery, more efficient use of communications, reduced maintenance costs, and improved availability of operational data. RTU data, however, is fundamentally different from most other WAN traffic in that it is critical to the moment-to-moment operation of the utility and consists of a large number of messages repeated frequently and continuously. There are valid concerns as to whether the stability, availability, and inherent latency of the WAN would be adequate to support operations of a backup or primary SCADA system. There are also concerns about the adverse effects that SCADA traffic might have on the WAN. These concerns led to the project featured in this article, which tested the operational suitability and effectiveness of routing SCADA data between selected RTUs and a central site on the WAN.

Flowers, T.; Houle, B. [Houston Lighting and Power, TX (United States)] [Houston Lighting and Power, TX (United States); Retzer, J.; Ramanathan, R. [National Systems and Research, Camas, WA (United States)] [National Systems and Research, Camas, WA (United States)

1995-07-01T23:59:59.000Z

42

Use of SCADA Data for Failure Detection in Wind Turbines  

SciTech Connect (OSTI)

This paper discusses the use of existing wind turbine SCADA data for development of fault detection and diagnostic techniques for wind turbines.

Kim, K.; Parthasarathy, G.; Uluyol, O.; Foslien, W.; Sheng, S.; Fleming, P.

2011-10-01T23:59:59.000Z

43

acquisition scada systems: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Permission from IEEE must Engineering Websites Summary: of Real-Time Locational Marginal Price to SCADA Sensor Data Corruption Dae-Hyun Choi, Student Member, IEEE acquisition...

44

Demonstration of SCADA system to Manage Oilfield Pump Off Controllers  

SciTech Connect (OSTI)

PC-based SCADA systems are today widely accepted by the oil and gas industry, thanks to the increased power and capabilities of PCs, their reduced costs, and the wider use of PCs by energy companies in office and field operations. More and more field operators are using laptops in their daily work duties. This has made the PC the choice for field SCADA systems, and for making SCADA data available throughout company operations. As PCs have become more powerful, it has allowed SCADA software developers to add more capabilities to their systems. SCADA systems have become tools that now help field operators perform their jobs more efficiently, facilitate in optimizing producing wells, provide an active interface for monitoring and controlling plants and compressors, and provide real-time and historical well data to engineers to help them develop strategies for optimizing field operations.

Newquist, Dan

2000-09-11T23:59:59.000Z

45

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

46

Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System  

SciTech Connect (OSTI)

We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

2006-01-01T23:59:59.000Z

47

Recent Experience with a Hybrid SCADA/PMU On-Line State Estimator  

SciTech Connect (OSTI)

PMU devices are expected to grow in number from a few to several hundreds in the next five years. Some relays are already global positioning system-capable and could provide the same type of data as any PMU. This introduces a new paradigm of very fast accurate synchrophasor measurements from across the grid in real-time that augment and parallel existing slower SCADA measurements. Control center applications will benefit from this PMU data; for example, use of PMU data in state estimation is expected to improve accuracy and robustness, which in turn will result in more timely and accurate N-1 security analysis, resulting in an overall improvement of grid system reliability and security. This paper describes results from a recent implementation of this technology, the benefits and future work.

Rizy, D Tom [ORNL

2009-01-01T23:59:59.000Z

48

60 IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 1, JANUARY 2014 Survivable SCADA Via  

E-Print Network [OSTI]

60 IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 1, JANUARY 2014 Survivable SCADA Via Intrusion availability of their SCADA systems. This paper reports on our experience designing, architecting, and evaluating the first survivable SCADA system--one that is able to ensure cor- rect behavior with minimal

Amir, Yair

49

Introduction SCADA Security for Managers and Operators | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomentheATLANTA,Fermi NationalBusinessDepartment ofEnergyDepartment

50

Framework for SCADA Security Policy (October 2005) | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf Flash2006-14.pdfattachment.pdf6.pdf5.pdfFluorescentDepartment09Fourth ChapterFramework

51

Hallmark Project Commercialization of the Secure SCADA Communications  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf11-161-LNG | Department ofHTS Cable Projects HTS Cable Projects Fact sheetHVDCProtocol, a

52

Secure SCADA Communication ProtocolPerformance Test Results | Department of  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSection 999:

53

Lessons Learned from Cyber Security Assessments of SCADA and Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't Happen to HighJosephNOx TrapsLeasingLeslie09091Work

54

Cyber Assessment Methods for SCADA Security | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power Systems EngineeringDepartmentSmart GridThird QuarterintoCurrent Test Procedure|Department

55

An Evaluation of Cybersecurity Assessment Tools on a SCADA Environment  

E-Print Network [OSTI]

An Evaluation of Cybersecurity Assessment Tools on a SCADA Environment Adam Hahn Department Email: gmani@iastate.edu Abstract--Increased concerns for electric grid cybersecurity has lead commonly used for traditional information technology (IT) systems are sufficient to meet the cybersecurity

Manimaran, Govindarasu

56

Risk analysis via heterogeneous models of SCADA interconnecting Power Grids and Telco Networks  

E-Print Network [OSTI]

for an electrical power distribution grid. The modeling techniques we discuss aim at providing a probabilistic demonstrate their applicability by modeling and #12;analyzing an actual SCADA system for an electrical powerRisk analysis via heterogeneous models of SCADA interconnecting Power Grids and Telco Networks A

Tronci, Enrico

57

BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur  

E-Print Network [OSTI]

Terms-- Bloom filter, intrusion detection, smart grid SCADA IDS. 1. INTRODUCTION Supervisory controlBLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur In this paper, we propose a distributed, light-weight and fast intrusion detection approach suitable

Kundur, Deepa

58

Supervisory Control and Data Acquisition System (SCADA) Substation C3-3 Acceptance Test Procedure  

SciTech Connect (OSTI)

The purpose of this acceptance test procedure (ATP) is to demonstrate that the newly installed Supervisory Control and Data Acquisition (SCADA) computer system functions as intended by the design.

ZAKRAJSEK, M.F.

2000-10-17T23:59:59.000Z

59

IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JUNE 2010 99 Security Technology for Smart Grid Networks  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JUNE 2010 99 Security Technology for Smart Grid for a smart grid system, including public key infrastructures and trusted computing. Index Terms--Attestation, public key infrastructure (PKI), Su- pervisory Control And Data Acquisition (SCADA), security, smart grid

Hu, Fei

60

USC/ISI Technical Report ISI-TR-625, October 2006 1 Enabling Interoperability and Extensibility of Future SCADA Systems  

E-Print Network [OSTI]

well in an oilfield is only connected with a few sensors at the well it resides. The RTU usually of the current SCADA systems is their limited extensibility to new applications. In the above oilfield monitoring for Interactive Smart Oilfield Technologies (CiSoft). wants to extend its SCADA system by adding a safety alarm

Heidemann, John

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding  

SciTech Connect (OSTI)

The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

Yan, Guanhua [Los Alamos National Laboratory; Nicol, David M [UNIV OF IL; Jin, Dong [UNIV OF IL

2010-12-16T23:59:59.000Z

62

Secure Demand Shaping for Smart Grid On constructing probabilistic demand response schemes  

E-Print Network [OSTI]

Secure Demand Shaping for Smart Grid On constructing probabilistic demand response schemes. Developing novel schemes for demand response in smart electric gird is an increasingly active research area/SCADA for demand response in smart infrastructures face the following dilemma: On one hand, in order to increase

Sastry, S. Shankar

63

WIND TURBINE STRUCTURAL HEALTH MONITORING: A SHORT INVESTIGATION BASED ON SCADA DATA  

E-Print Network [OSTI]

WIND TURBINE STRUCTURAL HEALTH MONITORING: A SHORT INVESTIGATION BASED ON SCADA DATA E. Papatheou1.papatheou@sheffield.ac.uk ABSTRACT The use of offshore wind farms has been growing in recent years, as steadier and higher wind to complicate the construction of land wind farms, offshore locations, which can be found more easily near

Boyer, Edmond

64

Enabling Interoperability and Extensibility of Future SCADA Systems Wei Ye and John Heidemann  

E-Print Network [OSTI]

(RTU) that monitors and controls a production well in an oilfield is only connected with a few sensors applications. In the above oilfield monitoring example, a user in the field can only access a sensor's data. through the USC Center for Interactive Smart Oilfield Technologies (CiSoft). wants to extend its SCADA

Heidemann, John

65

Development and Demonstration of a Security Core Component  

SciTech Connect (OSTI)

In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more data about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from “normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.

Turke, Andy

2014-02-28T23:59:59.000Z

66

National SCADA Test Bed Substation Automation Evaluation Report  

SciTech Connect (OSTI)

Increased awareness of the potential for cyber attack has recently resulted in improved cyber security practices associated with the electrical power grid. However, the level of practical understanding and deployment of cyber security practices has not been evenly applied across all business sectors. Much of the focus has been centered on information technology business centers and control rooms. This report explores the current level of substation automation, communication, and cyber security protection deployed in electrical substations throughout existing utilities in the United States. This report documents the evaluation of substation automation implementation and associated vulnerabilities. This evaluation used research conducted by Newton-Evans Research Company for some of its observations and results. The Newton Evans Report aided in the determination of what is the state of substation automation in North American electric utilities. Idaho National Laboratory cyber security experts aided in the determination of what cyber vulnerabilities may pose a threat to electrical substations. This report includes cyber vulnerabilities as well as recommended mitigations. It also describes specific cyber issues found in typical substation automation configurations within the electric utility industry. The evaluation report was performed over a 5-month period starting in October 2008

Kenneth Barnes; Briam Johnson

2009-10-01T23:59:59.000Z

67

Secure Control Systems for the Energy Sector  

SciTech Connect (OSTI)

Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

Smith, Rhett; Campbell, Jack; Hadley, Mark

2012-03-31T23:59:59.000Z

68

21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustionImprovement3 Beryllium-Associated Worker2014 HouseCoveredAirDepartment ofof04of50Establish1

69

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustionImprovement3 Beryllium-Associated Worker2014DepartmentI325 8 (8-89) EFGDepartment of

70

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power Systems EngineeringDepartmentSmart GridThird QuarterintoCurrent TestMay 2008 | Department of

71

National SCADA Test Bed - Enhancing control systems security in the energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in3.pdfEnergy HealthCommentsAugust 2012NEVADAEnergyEnergyParks8sector (September

72

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe10 DOEWashington,LM-04-XXXXLocatedMakes A09

73

Microsoft Word - PNNL-17118 Secure SCADA hadley SSCP FINAL with no ouo.doc  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Careerlumens_placard-green.eps MoreWSRC-STI-2007-00250 Rev. 05 Oak Ridge Site Specific U.S.Energy678

74

Cyber Security Testing and Training Programs for Industrial Control Systems  

SciTech Connect (OSTI)

Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

Daniel Noyes

2012-03-01T23:59:59.000Z

75

Abstract--By penetrating the SCADA system, an intruder may remotely operate a power system using supervisory control  

E-Print Network [OSTI]

1 Abstract-- By penetrating the SCADA system, an intruder may remotely operate a power system using vulnerability using attack trees. The attack tree formulation based on power system control networks is used to evaluate the system, scenario, and leaf vulnerabilities. The measure of vulnerabilities in the power system

Manimaran, Govindarasu

76

An ethernet/IP security review with intrusion detection applications  

SciTech Connect (OSTI)

Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

Laughter, S. A.; Williams, R. D. [Dept. of Electrical and Computer Engineering, Univ. of Virginia, Box 400743, 351 McCormick Rd., Charlottesville, VA 22904-4743 (United States)

2006-07-01T23:59:59.000Z

77

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

78

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

79

Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

80

RENEL-Romanian SCADA/EMS and communications systems project, definitional mission. Export trade information. Volume 1  

SciTech Connect (OSTI)

The Romanian Electricity Board (RENEL), which is Romania's electric utility, requested the U.S. Trade and Development Program (TDP) to fund a feasibility study for the modernization of the energy management system (EMS) at the three levels of operations management hierarchy: national, regional and 'enterprise' (district). A Definitional Mission (DM) to Romania recommends that the TDP fund the requested feasibility study for the following reasons: Romania's EMS/SCADA and communications system needs modernization; There is a commitment within RENEL to carry out this modernization program as a matter of high priority; The procurement is financeable subject to a thorough feasibility study; and There is an opportunity for U.S. business to supply goods and services during the subsequent procurement phase.

Thayer, J.

1992-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Microsoft PowerPoint - SS1_4H_NERC_Training_09_28_06.ppt  

Broader source: Energy.gov (indexed) [DOE]

Introduction SCADA Security for Managers and Operators September 28, 29, 2006 2 SANS SCADA Security Summit II September 28, 29, 2006 Disclaimer * References made herein to any...

82

Enol Intermediates Unexpectedly Found in Flames  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4: Networking for37EnergyNuclear SecurityEnol Intermediates

83

Enol Intermediates Unexpectedly Found in Flames  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4: Networking for37EnergyNuclear SecurityEnol IntermediatesEnol

84

Enol Intermediates Unexpectedly Found in Flames  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4: Networking for37EnergyNuclear SecurityEnol IntermediatesEnolEnol

85

SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA  

E-Print Network [OSTI]

with a real-world power plant simulator. The experiment results show that SRID can detect various false data, College Station, Texas, USA 2 Department of Information Security, Shanghai University of Electric Power. Advanced false data injection attack in targeted malware intrusion is becoming an emerging severe threat

Gu, Guofei

86

The Intermediate Neutrino Program  

E-Print Network [OSTI]

The US neutrino community gathered at the Workshop on the Intermediate Neutrino Program (WINP) at Brookhaven National Laboratory February 4-6, 2015 to explore opportunities in neutrino physics over the next five to ten years. Scientists from particle, astroparticle and nuclear physics participated in the workshop. The workshop examined promising opportunities for neutrino physics in the intermediate term, including possible new small to mid-scale experiments, US contributions to large experiments, upgrades to existing experiments, R&D plans and theory. The workshop was organized into two sets of parallel working group sessions, divided by physics topics and technology. Physics working groups covered topics on Sterile Neutrinos, Neutrino Mixing, Neutrino Interactions, Neutrino Properties and Astrophysical Neutrinos. Technology sessions were organized into Theory, Short-Baseline Accelerator Neutrinos, Reactor Neutrinos, Detector R&D and Source, Cyclotron and Meson Decay at Rest sessions.This report summarizes discussion and conclusions from the workshop.

C. Adams; J. R. Alonso; A. M. Ankowski; J. A. Asaadi; J. Ashenfelter; S. N. Axani; K. Babu; C. Backhouse; H. R. Band; P. S. Barbeau; N. Barros; A. Bernstein; M. Betancourt; M. Bishai; E. Blucher; J. Bouffard; N. Bowden; S. Brice; C. Bryan; L. Camilleri; J. Cao; J. Carlson; R. E. Carr; A. Chatterjee; M. Chen; S. Chen; M. Chiu; E. D. Church; J. I. Collar; G. Collin; J. M. Conrad; M. R. Convery; R. L. Cooper; D. Cowen; H. Davoudiasl; A. De Gouvea; D. J. Dean; G. Deichert; F. Descamps; T. DeYoung; M. V. Diwan; Z. Djurcic; M. J. Dolinski; J. Dolph; B. Donnelly; D. A. Dwyer; S. Dytman; Y. Efremenko; L. L. Everett; A. Fava; E. Figueroa-Feliciano; B. Fleming; A. Friedland; B. K. Fujikawa; T. K. Gaisser; M. Galeazzi; D. C. Galehouse; A. Galindo-Uribarri; G. T. Garvey; S. Gautam; K. E. Gilje; M. Gonzalez-Garcia; M. C. Goodman; H. Gordon; E. Gramellini; M. P. Green; A. Guglielmi; R. W. Hackenburg; A. Hackenburg; F. Halzen; K. Han; S. Hans; D. Harris; K. M. Heeger; M. Herman; R. Hill; A. Holin; P. Huber; D. E. Jaffe; R. A. Johnson; J. Joshi; G. Karagiorgi; L. J. Kaufman; B. Kayser; S. H. Kettell; B. J. Kirby; J. R. Klein; Yu. G. Kolomensky; R. M. Kriske; C. E. Lane; T. J. Langford; A. Lankford; K. Lau; J. G. Learned; J. Ling; J. M. Link; D. Lissauer; L. Littenberg; B. R. Littlejohn; S. Lockwitz; M. Lokajicek; W. C. Louis; K. Luk; J. Lykken; W. J. Marciano; J. Maricic; D. M. Markoff; D. A. Martinez Caicedo; C. Mauger; K. Mavrokoridis; E. McCluskey; D. McKeen; R. McKeown; G. Mills; I. Mocioiu; B. Monreal; M. R. Mooney; J. G. Morfin; P. Mumm; J. Napolitano; R. Neilson; J. K. Nelson; M. Nessi; D. Norcini; F. Nova; D. R. Nygren; G. D. Orebi Gann; O. Palamara; Z. Parsa; R. Patterson; P. Paul; A. Pocar; X. Qian; J. L. Raaf; R. Rameika; G. Ranucci; H. Ray; D. Reyna; G. C. Rich; P. Rodrigues; E. Romero Romero; R. Rosero; S. D. Rountree; B. Rybolt; M. C. Sanchez; G. Santucci; D. Schmitz; K. Scholberg; D. Seckel; M. Shaevitz; R. Shrock; M. B. Smy; M. Soderberg; A. Sonzogni; A. B. Sousa; J. Spitz; J. M. St. John; J. Stewart; J. B. Strait; G. Sullivan; R. Svoboda; A. M. Szelc; R. Tayloe; M. A. Thomson; M. Toups; A. Vacheret; M. Vagins; R. G. Van de Water; R. B. Vogelaar; M. Weber; W. Weng; M. Wetstein; C. White; B. R. White; L. Whitehead; D. W. Whittington; M. J. Wilking; R. J. Wilson; P. Wilson; D. Winklehner; D. R. Winn; E. Worcester; L. Yang; M. Yeh; Z. W. Yokley; J. Yoo; B. Yu; J. Yu; C. Zhang

2015-04-01T23:59:59.000Z

87

The Intermediate Neutrino Program  

E-Print Network [OSTI]

The US neutrino community gathered at the Workshop on the Intermediate Neutrino Program (WINP) at Brookhaven National Laboratory February 4-6, 2015 to explore opportunities in neutrino physics over the next five to ten years. Scientists from particle, astroparticle and nuclear physics participated in the workshop. The workshop examined promising opportunities for neutrino physics in the intermediate term, including possible new small to mid-scale experiments, US contributions to large experiments, upgrades to existing experiments, R&D plans and theory. The workshop was organized into two sets of parallel working group sessions, divided by physics topics and technology. Physics working groups covered topics on Sterile Neutrinos, Neutrino Mixing, Neutrino Interactions, Neutrino Properties and Astrophysical Neutrinos. Technology sessions were organized into Theory, Short-Baseline Accelerator Neutrinos, Reactor Neutrinos, Detector R&D and Source, Cyclotron and Meson Decay at Rest sessions.This report summ...

Adams, C; Ankowski, A M; Asaadi, J A; Ashenfelter, J; Axani, S N; Babu, K; Backhouse, C; Band, H R; Barbeau, P S; Barros, N; Bernstein, A; Betancourt, M; Bishai, M; Blucher, E; Bouffard, J; Bowden, N; Brice, S; Bryan, C; Camilleri, L; Cao, J; Carlson, J; Carr, R E; Chatterjee, A; Chen, M; Chen, S; Chiu, M; Church, E D; Collar, J I; Collin, G; Conrad, J M; Convery, M R; Cooper, R L; Cowen, D; Davoudiasl, H; De Gouvea, A; Dean, D J; Deichert, G; Descamps, F; DeYoung, T; Diwan, M V; Djurcic, Z; Dolinski, M J; Dolph, J; Donnelly, B; Dwyer, D A; Dytman, S; Efremenko, Y; Everett, L L; Fava, A; Figueroa-Feliciano, E; Fleming, B; Friedland, A; Fujikawa, B K; Gaisser, T K; Galeazzi, M; Galehouse, D C; Galindo-Uribarri, A; Garvey, G T; Gautam, S; Gilje, K E; Gonzalez-Garcia, M; Goodman, M C; Gordon, H; Gramellini, E; Green, M P; Guglielmi, A; Hackenburg, R W; Hackenburg, A; Halzen, F; Han, K; Hans, S; Harris, D; Heeger, K M; Herman, M; Hill, R; Holin, A; Huber, P; Jaffe, D E; Johnson, R A; Joshi, J; Karagiorgi, G; Kaufman, L J; Kayser, B; Kettell, S H; Kirby, B J; Klein, J R; Kolomensky, Yu G; Kriske, R M; Lane, C E; Langford, T J; Lankford, A; Lau, K; Learned, J G; Ling, J; Link, J M; Lissauer, D; Littenberg, L; Littlejohn, B R; Lockwitz, S; Lokajicek, M; Louis, W C; Luk, K; Lykken, J; Marciano, W J; Maricic, J; Markoff, D M; Caicedo, D A Martinez; Mauger, C; Mavrokoridis, K; McCluskey, E; McKeen, D; McKeown, R; Mills, G; Mocioiu, I; Monreal, B; Mooney, M R; Morfin, J G; Mumm, P; Napolitano, J; Neilson, R; Nelson, J K; Nessi, M; Norcini, D; Nova, F; Nygren, D R; Gann, G D Orebi; Palamara, O; Parsa, Z; Patterson, R; Paul, P; Pocar, A; Qian, X; Raaf, J L; Rameika, R; Ranucci, G; Ray, H; Reyna, D; Rich, G C; Rodrigues, P; Romero, E Romero; Rosero, R; Rountree, S D; Rybolt, B; Sanchez, M C; Santucci, G; Schmitz, D; Scholberg, K; Seckel, D; Shaevitz, M; Shrock, R; Smy, M B; Soderberg, M; Sonzogni, A; Sousa, A B; Spitz, J; John, J M St; Stewart, J; Strait, J B; Sullivan, G; Svoboda, R; Szelc, A M; Tayloe, R; Thomson, M A; Toups, M; Vacheret, A; Vagins, M; Van de Water, R G; Vogelaar, R B; Weber, M; Weng, W; Wetstein, M; White, C; White, B R; Whitehead, L; Whittington, D W; Wilking, M J; Wilson, R J; Wilson, P; Winklehner, D; Winn, D R; Worcester, E; Yang, L; Yeh, M; Yokley, Z W; Yoo, J; Yu, B; Yu, J; Zhang, C

2015-01-01T23:59:59.000Z

88

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

89

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

90

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

91

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

92

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

93

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

2004-07-08T23:59:59.000Z

94

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

95

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

96

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

2011-06-20T23:59:59.000Z

97

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

98

Intermediate rank and property RD.  

E-Print Network [OSTI]

We introduce concepts of intermediate rank for countable groups that "interpolate" between consecutive values of the classical (integer-valued) rank. Various classes of groups are proved to have intermediate rank behaviors. We are especially interested in interpolation between rank 1 and rank 2. For instance, we construct groups "of rank 7/4". Our setting is essentially that of non positively curved spaces, where concepts of intermediate rank include polynomial rank, local rank, and mesoscopic rank. The resulting framework has interesting connections to operator algebras. We prove property RD in many cases where intermediate rank occurs. This gives a new family of groups satisfying the Baum-Connes conjecture. We prove that the reduced $C^*$-algebras of groups of rank 7/4 have stable rank 1.

Sylvain Barré; Mikael Pichot

99

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

100

Summary of The 3rd Control System Cyber-Security (CS)2/HEP Workshop  

E-Print Network [OSTI]

Over the last decade modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. The Stuxnet worm of 2010 against a particular Siemens PLC is a unique example for a sophisticated attack against control systems [1]. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data being ...

Lüders, S

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

2011-06-20T23:59:59.000Z

102

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

103

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

104

October 23, 2012 11:49 World Scientific Review Volume -9in x 6in ywangsmartgrid Smart Grid, Automation, and SCADA Systems Security  

E-Print Network [OSTI]

systems), the electrical power industry, the coal industry, and the renewable resources (e.g., solar at the end of 2010, there are more than 9200 electric generating plants in USA, including coal, petroleum liquids, petroleum coke, natural gas, other gases, nuclear, hy- droelectric, renewables, hydroelectric

Wang, Yongge

105

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

106

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

107

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

108

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

109

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

110

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

2011-07-21T23:59:59.000Z

111

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

112

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

113

Security guide for subcontractors  

SciTech Connect (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

114

Characterization of protein folding intermediates  

SciTech Connect (OSTI)

The three-dimensional structure of a protein is encoded in its linear sequence of amino acids. Studies of protein folding are aimed at understanding the nature of this code which translates one-dimensional information to three-dimensions. It is now well-established that protein folding intermediates exist and can be populated significantly under some conditions. A method to characterize kinetic folding intermediates is described. The method takes advantage of the decrease in exchange rates between amide protons (i.e., peptide backbone NH) and solvent water protons, when the amide proton is involved in structure. The feasibility of using amide proton exchange to pulse-label proteins during folding has been demonstrated using (/sup 3/H)-H/sub 2/O. The results with ribonuclease A (RNase A) support a framework model for folding, in which the secondary structure of a protein is formed before tertiary structure changes are complete. Extension of these studies using NMR should permit characterization of early secondary structure folding frameworks.

Kim, P.S.

1986-01-01T23:59:59.000Z

115

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

116

Global Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

117

Sandia National Laboratories: combustion intermediates  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1development Sandia, NREL Releasehy-drogen power Portable Hydrogenchemistry

118

Sandia National Laboratories: Criegee intermediates  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0EnergySandia Involves Wind-FarmCool Earth Solar

119

Security guide for subcontractors  

SciTech Connect (OSTI)

This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

Adams, R.C.

1993-06-01T23:59:59.000Z

120

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

122

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

123

Protein Vivisection Reveals Elusive Intermediates in Folding  

SciTech Connect (OSTI)

Although most folding intermediates escape detection, their characterization is crucial to the elucidation of folding mechanisms. Here, we outline a powerful strategy to populate partially unfolded intermediates: A buried aliphatic residue is substituted with a charged residue (e.g., Leu {yields} Glu{sup -}) to destabilize and unfold a specific region of the protein. We applied this strategy to ubiquitin, reversibly trapping a folding intermediate in which the {beta}5-strand is unfolded. The intermediate refolds to a native-like structure upon charge neutralization under mildly acidic conditions. Characterization of the trapped intermediate using NMR and hydrogen exchange methods identifies a second folding intermediate and reveals the order and free energies of the two major folding events on the native side of the rate-limiting step. This general strategy may be combined with other methods and have broad applications in the study of protein folding and other reactions that require trapping of high-energy states.

Zheng, Zhongzhou; Sosnick, Tobin R. (UC)

2010-05-25T23:59:59.000Z

124

Pressure swing adsorption with intermediate product recovery  

SciTech Connect (OSTI)

A pressure swing adsorption process is used to achieve intermediate product recovery by the introduction of a gas displacement step before, simultaneous with or subsequent to pressure equalization between beds of a multi-bed adsorption system. A cocurrent depressurization step is then employed to achieve intermediate product recovery. A portion of said intermediate product or of the more readily adsorbable component recovered from a bed advantageously being employed to provide displacement gas for another bed in the adsorption system.

Fuderer, A.

1985-04-23T23:59:59.000Z

125

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

126

Experiments in intermediate energy physics  

SciTech Connect (OSTI)

Research in experimental nuclear physics was done from 1979 to 2002 primarily at intermediate energy facilities that provide pion, proton, and kaon beams. Particularly successful has been the work at the Los Alamos Meson Physics Facility (LAMPF) on unraveling the neutron and proton contributions to nuclear ground state and transition densities. This work was done on a wide variety of nuclei and with great detail on the carbon, oxygen, and helium isotopes. Some of the investigations involved the use of polarized targets which allowed the extraction of information on the spin-dependent part of the triangle-nucleon interaction. At the Indiana University Cyclotron Facility (IUCF) we studied proton-induced charge exchange reactions with results of importance to astrophysics and the nuclear few-body problem. During the first few years, the analysis of heavy-ion nucleus scattering data that had been taken prior to 1979 was completed. During the last few years we created hypernuclei by use of a kaon beam at Brookhaven National Laboratory (BNL) and an electron beam at Jefferson Laboratory (JLab). The data taken at BNL for a study of the non-mesonic weak decay of the A particle in a nucleus are still under analysis by our collaborators. The work at JLab resulted in the best resolution hypernuclear spectra measured thus far with magnetic spectrometers.

Dehnhard, D.

2003-02-28T23:59:59.000Z

127

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

128

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

129

Information Security Group IY5512 Computer Security  

E-Print Network [OSTI]

for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

Mitchell, Chris

130

INFRASTRUCTURE SECURITY & ENERGY  

E-Print Network [OSTI]

price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

Schrijver, Karel

131

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

132

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

133

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

134

Security system signal supervision  

SciTech Connect (OSTI)

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

135

Lemnos interoperable security project.  

SciTech Connect (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

136

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

137

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

138

Secure Storage | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage

139

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

140

Data requirements for intermediate energy nuclear applications  

SciTech Connect (OSTI)

Several applications that include spallation neutron sources, space radiation effects, biomedical isotope production, accelerator shielding and radiation therapy make use of intermediate energy nuclear data extending to several GeV. The overlapping data needs of these applications are discussed in terms of what projectiles, targets and reactions are of interest. Included is a discussion of what is generally known about these data and what is needed to facilitate their use in intermediate energy applications. 40 refs., 2 figs., 2 tabs.

Pearlstein, S.

1990-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Securing Internet Routing Securing Internet Routing  

E-Print Network [OSTI]

Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

Goldberg, Sharon

142

Effects of Intermediate Ethanol Blends on Legacy Vehicles and...  

Energy Savers [EERE]

Effects of Intermediate Ethanol Blends on Legacy Vehicles and Small Non-Road Engines, Report 1 Updated Feb 2009 Effects of Intermediate Ethanol Blends on Legacy Vehicles and...

143

Isolation, Characterization of an Intermediate in an Oxygen Atom...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Characterization of an Intermediate in an Oxygen Atom-Transfer Reaction, and the Determination of the Bond Isolation, Characterization of an Intermediate in an Oxygen Atom-Transfer...

144

Statistically downscaling from an Earth System Model of Intermediate  

E-Print Network [OSTI]

Statistically downscaling from an Earth System Model of Intermediate Complexity to reconstruct past Earth System Models of Intermediate Complexity (EMICs) have the advantage of allowing transient

Feigon, Brooke

145

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

-- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft...

146

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

147

Control Systems Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems within the nation's critical infrastructure. The CSSP assists control systems vendors and asset ownersoperators in identifying security vulnerabilities and developing...

148

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

149

Nevada National Security Site  

Broader source: Energy.gov [DOE]

HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

150

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services… (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

151

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

152

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

153

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

154

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Reviews, etc., except those specifically reserved for the Administrator for the National Nuclear Security Administration and the Deputy Secretary. cc: Mike Hickman. NA-Stl...

155

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

156

Hazardous Material Security (Maryland)  

Broader source: Energy.gov [DOE]

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

157

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

158

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

159

Enhance your Cyber Security Knowledge  

E-Print Network [OSTI]

Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

160

Operational Security (OPSEC) Reminder | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Intermediate-energy nuclear chemistry workshop  

SciTech Connect (OSTI)

This report contains the proceedings of the LAMPF Intermediate-Energy Nuclear Chemistry Workshop held in Los Alamos, New Mexico, June 23-27, 1980. The first two days of the Workshop were devoted to invited review talks highlighting current experimental and theoretical research activities in intermediate-energy nuclear chemistry and physics. Working panels representing major topic areas carried out indepth appraisals of present research and formulated recommendations for future research directions. The major topic areas were Pion-Nucleus Reactions, Nucleon-Nucleus Reactions and Nuclei Far from Stability, Mesonic Atoms, Exotic Interactions, New Theoretical Approaches, and New Experimental Techniques and New Nuclear Chemistry Facilities.

Butler, G.W.; Giesler, G.C.; Liu, L.C.; Dropesky, B.J.; Knight, J.D.; Lucero, F.; Orth, C.J.

1981-05-01T23:59:59.000Z

162

Multifragmentation in intermediate energy heavy ion collisions  

SciTech Connect (OSTI)

The GSL/LBL plastic ball/wall detector system was used to gain insight into the fragment production mechanism in Au + Au and Au + Fe reactions. Full azimuthal coverage for light particles (p,d,t,/sup 3/He,/sup 4/He) and intermediate mass fragments (z greater than 10) is achieved in the forward hemisphere in the center of mass system. The complete measurement of light particles allowed a global analysis of the events and a search for collective effects in fragment emission by comparing to flow effects seen in the light particles. The large acceptance for intermediate mass fragments allowed a measurements of their multiplicities event-by-event.

Jacak, B.V.; Britt, H.C.; Claesson, G.; Doss, K.G.R.; Ferguosn, R.; Gavron, A.I.; Gustafsson, H.A.; Gutbrod, H.; Harris, J.W.; Kampert, K.H.

1986-04-14T23:59:59.000Z

163

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.Secure Manufacturing

164

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

165

December 2003 SECURITY CONSIDERATIONS  

E-Print Network [OSTI]

December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

Perkins, Richard A.

166

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

167

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

168

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

169

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

170

SELECTING INFORMATION TECHNOLOGY SECURITY  

E-Print Network [OSTI]

be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

171

December 2007 SECURING EXTERNAL  

E-Print Network [OSTI]

devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

172

Indirection and computer security.  

SciTech Connect (OSTI)

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

173

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

174

Office of Departmental Personnel Security  

Broader source: Energy.gov [DOE]

The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

175

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

176

Headquarters Facilities Master Security Plan  

Energy Savers [EERE]

Security Briefing. Failure of any employee to complete the SF-312 results in the termination of hisher security clearance and denial of access to classified matter. The badge...

177

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

178

Smart-Grid Security Issues  

SciTech Connect (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

179

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

180

Transmission and Distribution World March 2007: DOE Focuses on...  

Broader source: Energy.gov (indexed) [DOE]

March 2007: DOE Focuses on Cyber Security Energy sector owners, operators and system vendors team up to boost control system security with national SCADA test bed. Energy Secrtor...

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurity

182

March 24, 2008 Databases: Security 1 Database Security and Authorization  

E-Print Network [OSTI]

to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

Adam, Salah

183

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-Print Network [OSTI]

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

184

AMALGAMATED SECURITY COMMUNITIES  

E-Print Network [OSTI]

This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

Harvey, Andrew Stephen

2011-08-31T23:59:59.000Z

185

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

186

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

187

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

188

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

189

Engineering secure software  

E-Print Network [OSTI]

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after...

Jetly, Prateek

2001-01-01T23:59:59.000Z

190

Phenomenology of SUSY with intermediate scale physics  

E-Print Network [OSTI]

The presence of fields at an intermediate scale between the Electroweak and the Grand Unification scale modifies the evolution of the gauge couplings and consequently the running of other parameters of the Minimal Supersymmetric Standard Model, such as gauginos and scalar masses. The net effect is a modification of the low energy spectrum which affects both the collider phenomenology and the dark matter relic density.

C. Biggio

2012-06-01T23:59:59.000Z

191

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

192

SECURING RADIO FREQUENCY IDENTIFICATION (RFID)  

E-Print Network [OSTI]

business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

193

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

194

2005: Table of EMICs (Earth System Models of Intermediate Complexity  

E-Print Network [OSTI]

apparent that Earth system modelling has to rely on a hierarchy of models in which models of intermediate

Martin Claussen

195

INTERMEDIATE RANK AND PROPERTY RD SYLVAIN BARRE AND MIKAEL PICHOT  

E-Print Network [OSTI]

INTERMEDIATE RANK AND PROPERTY RD SYLVAIN BARR´E AND MIKA¨EL PICHOT Abstract. We introduce concepts of intermediate rank for countable groups that "interpolate" between consecutive values of the classical (integer-valued) rank. Var- ious classes of groups are proved to have intermediate rank behaviors. We are especially

Barré, Sylvain

196

Global Material Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr Flickr Editor'sshortGeothermal HeatStartedGirlsMaterial Security |

197

physical security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions Program LANL TRU

198

safeguards and security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -

199

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear Science

200

Nuclear Security Enterprise | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

International Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEMInterlibrary LoanExercises |Security

202

Defense Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security | National Nuclear

203

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxfordVeteransAdministrationPhysical Security Systems |

204

Intermediate Temperature Solid Oxide Fuel Cell Development  

SciTech Connect (OSTI)

Solid oxide fuel cells (SOFCs) are high efficiency energy conversion devices. Present materials set, using yttria stabilized zirconia (YSZ) electrolyte, limit the cell operating temperatures to 800 C or higher. It has become increasingly evident however that lowering the operating temperature would provide a more expeditious route to commercialization. The advantages of intermediate temperature (600 to 800 C) operation are related to both economic and materials issues. Lower operating temperature allows the use of low cost materials for the balance of plant and limits degradation arising from materials interactions. When the SOFC operating temperature is in the range of 600 to 700 C, it is also possible to partially reform hydrocarbon fuels within the stack providing additional system cost savings by reducing the air preheat heat-exchanger and blower size. The promise of Sr and Mg doped lanthanum gallate (LSGM) electrolyte materials, based on their high ionic conductivity and oxygen transference number at the intermediate temperature is well recognized. The focus of the present project was two-fold: (a) Identify a cell fabrication technique to achieve the benefits of lanthanum gallate material, and (b) Investigate alternative cathode materials that demonstrate low cathode polarization losses at the intermediate temperature. A porous matrix supported, thin film cell configuration was fabricated. The electrode material precursor was infiltrated into the porous matrix and the counter electrode was screen printed. Both anode and cathode infiltration produced high performance cells. Comparison of the two approaches showed that an infiltrated cathode cells may have advantages in high fuel utilization operations. Two new cathode materials were evaluated. Northwestern University investigated LSGM-ceria composite cathode while Caltech evaluated Ba-Sr-Co-Fe (BSCF) based pervoskite cathode. Both cathode materials showed lower polarization losses at temperatures as low as 600 C than conventional manganite or cobaltite cathodes.

S. Elangovan; Scott Barnett; Sossina Haile

2008-06-30T23:59:59.000Z

205

Thermoelectric power generator with intermediate loop  

DOE Patents [OSTI]

A thermoelectric power generator is disclosed for use to generate electrical power from heat, typically waste heat. An intermediate heat transfer loop forms a part of the system to permit added control and adjustability in the system. This allows the thermoelectric power generator to more effectively and efficiently generate power in the face of dynamically varying temperatures and heat flux conditions, such as where the heat source is the exhaust of an automobile, or any other heat source with dynamic temperature and heat flux conditions.

Bell, Lon E; Crane, Douglas Todd

2013-05-21T23:59:59.000Z

206

Thermoelectric power generator with intermediate loop  

DOE Patents [OSTI]

A thermoelectric power generator is disclosed for use to generate electrical power from heat, typically waste heat. An intermediate heat transfer loop forms a part of the system to permit added control and adjustability in the system. This allows the thermoelectric power generator to more effectively and efficiently generate power in the face of dynamically varying temperatures and heat flux conditions, such as where the heat source is the exhaust of an automobile, or any other heat source with dynamic temperature and heat flux conditions.

Bel,; Lon E. (Altadena, CA); Crane, Douglas Todd (Pasadena, CA)

2009-10-27T23:59:59.000Z

207

Neutron scattering measurements at intermediate energies  

E-Print Network [OSTI]

The study of elastic neutron scattering at intermediate energies is essential for the understanding of the isovector term in the nucleon-nucleus interaction, as well as for the development of macroscopic and microscopic optical potentials at these energies. The techniques used for neutron scattering measurements is presented in this paper, as well as the di culties encountered. The few facilities that have been used are reviewed, and a newly installed setup for such measurements in Uppsala is described. Finally, the normalization problem is speci cally addressed. 1

N. Olsson; J. Blomgren; E. Ramstrom

208

Enol Intermediates Unexpectedly Found in Flames  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing Zirconia NanoparticlesSmartAffects the Future EnergyEnol Intermediates

209

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and

210

SecuritySmart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March 2009

211

Safety, Security & Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for

212

Weak Lensing Predictions at Intermediate Scales  

E-Print Network [OSTI]

As pointed out in previous studies, the measurement of the skewness of the convergence field $\\kappa$ will be useful in breaking the degeneracy among the cosmological parameters constrained from weak lensing observations. The combination of shot noise and finite survey volume implies that such a measurement is likely to be done in a range of intermediate scales ($0.5'$ to 20') where neither perturbation theory nor the hierarchical ansatz apply. Here we explore the behavior of the skewness of $\\kappa$ at these intermediate scales, based on results for the non-linear evolution of the mass bispectrum. We combined different ray-tracing simulations to test our predictions, and we find that our calculations describe accurately the transition from the weakly non-linear to the strongly non-linear regime. We show that the single lens-plane approximation remains accurate even in the non-linear regime, and we explicitly calculate the corrections to this approximation. We also discuss the prospects of measuring the skewn...

Van Waerbeke, L; Scoccimarro, R; Colombi, S; Bernardeau, F

2000-01-01T23:59:59.000Z

213

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

214

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

215

Security enhanced with increased vehicle inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

216

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

Amin, Saurabh

2011-01-01T23:59:59.000Z

217

On The Impact of Communication Delays on Power System Automatic Generation Control Performance  

E-Print Network [OSTI]

of the smart grid vision. Supervisory control and data acquisition (SCADA) systems, as computer network [2]. In this regard, reliable, secure, and low-latency communication network infrastructures in SCADA systems; the specifics of DNP3 for SCADA systems in electric power networks can be found in [3

Liberzon, Daniel

218

ata security feature: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

219

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

220

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Enol Intermediates Unexpectedly Found in Flames  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4: Networking for37EnergyNuclear SecurityEnol

222

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

223

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

224

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

225

September 2004 INFORMATION SECURITY  

E-Print Network [OSTI]

September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

226

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

227

Metaphors for cyber security.  

SciTech Connect (OSTI)

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

228

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

229

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

230

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

2005-08-26T23:59:59.000Z

231

A network security monitor  

SciTech Connect (OSTI)

The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

1989-11-01T23:59:59.000Z

232

ARMY Energy Security Considerations  

E-Print Network [OSTI]

ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2 Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11

233

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

234

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

235

Database Security: A Historical Perspective  

E-Print Network [OSTI]

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

Lesov, Paul

2010-01-01T23:59:59.000Z

236

System security Dr Len Hamey  

E-Print Network [OSTI]

, firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

Hamey, Len

237

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

238

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

239

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

240

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Search Via quantum walks with intermediate measurements  

E-Print Network [OSTI]

A modification of the Tulsi quantum search algorithm with intermediate measurements of the control is presented. In order to analyze the effect of measurements in quantum searches, a different choice of the angular parameter is used. The study is performed for several values of time lapses between measurements, finding close relationships between probabilities and correlations (Mutual Information and Cumulative Correlation Measure). The order of this modified algorithm is estimated, showing that for some time lapses the performance is improved, and became of order $O(N)$ (classical brute force search) when the measurement is taken in every step. The results indicate a possible way to analyze improvements to other quantum algorithms using one, or more, control qubits.

Efrain Buksman; André L. Fonseca de Oliveira; Jesús GarcÍa López de Lacalle

2014-12-23T23:59:59.000Z

242

Benchmark West Texas Intermediate crude assayed  

SciTech Connect (OSTI)

The paper gives an assay of West Texas Intermediate, one of the world's market crudes. The price of this crude, known as WTI, is followed by market analysts, investors, traders, and industry managers around the world. WTI price is used as a benchmark for pricing all other US crude oils. The 41[degree] API < 0.34 wt % sulfur crude is gathered in West Texas and moved to Cushing, Okla., for distribution. The WTI posted prices is the price paid for the crude at the wellhead in West Texas and is the true benchmark on which other US crudes are priced. The spot price is the negotiated price for short-term trades of the crude. And the New York Mercantile Exchange, or Nymex, price is a futures price for barrels delivered at Cushing.

Rhodes, A.K.

1994-08-15T23:59:59.000Z

243

Kinetic advantage of controlled intermediate nuclear fusion  

SciTech Connect (OSTI)

The dominated process of controlled fusion is to let nuclei gain enough kinetic energy to overcome Coulomb barrier. As a result, a fusion scheme can consider two factors in its design: to increase kinetic energy of nuclei and to alter the Coulomb barrier. Cold Fusion and Hot fusion are all one-factor schemes while Intermediate Fusion is a twofactors scheme. This made CINF kinetically superior. Cold Fusion reduces deuteron-deuteron distance, addressing Coulomb barrier, and Hot Fusion heat up plasma into extreme high temperature, addressing kinetic energy. Without enough kinetic energy made Cold Fusion skeptical. Extreme high temperature made Hot Fusion very difficult to engineer. Because CIFN addresses both factors, CIFN is a more promising technique to be industrialized.

Guo Xiaoming [Physics and Computer Science Department, Wilfrid Laurier University, Waterloo, Ontario, N2L 3C5 (Canada)

2012-09-26T23:59:59.000Z

244

January 2005 INTEGRATING IT SECURITY  

E-Print Network [OSTI]

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS technology (IT) security and capital planning and investment control (CPIC) processes have been performed taining appropriate security controls, both at the enterprise-wide and system level, commensurate

245

RECOMMENDED SECURITY CONTROLS FOR FEDERAL  

E-Print Network [OSTI]

May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

246

August 2003 IT SECURITY METRICS  

E-Print Network [OSTI]

, efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

247

Positioning Security from electronic warfare  

E-Print Network [OSTI]

Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

Kuhn, Markus

248

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on Żrewalls for their security, but the Żrewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

249

Intermediate Ethanol Blends Catalyst Durability Program  

SciTech Connect (OSTI)

In the summer of 2007, the U.S. Department of Energy (DOE) initiated a test program to evaluate the potential impacts of intermediate ethanol blends (also known as mid-level blends) on legacy vehicles and other engines. The purpose of the test program was to develop information important to assessing the viability of using intermediate blends as a contributor to meeting national goals for the use of renewable fuels. Through a wide range of experimental activities, DOE is evaluating the effects of E15 and E20 - gasoline blended with 15% and 20% ethanol - on tailpipe and evaporative emissions, catalyst and engine durability, vehicle driveability, engine operability, and vehicle and engine materials. This report provides the results of the catalyst durability study, a substantial part of the overall test program. Results from additional projects will be reported separately. The principal purpose of the catalyst durability study was to investigate the effects of adding up to 20% ethanol to gasoline on the durability of catalysts and other aspects of the emissions control systems of vehicles. Section 1 provides further information about the purpose and context of the study. Section 2 describes the experimental approach for the test program, including vehicle selection, aging and emissions test cycle, fuel selection, and data handling and analysis. Section 3 summarizes the effects of the ethanol blends on emissions and fuel economy of the test vehicles. Section 4 summarizes notable unscheduled maintenance and testing issues experienced during the program. The appendixes provide additional detail about the statistical models used in the analysis, detailed statistical analyses, and detailed vehicle specifications.

West, Brian H; Sluder, Scott; Knoll, Keith; Orban, John; Feng, Jingyu

2012-02-01T23:59:59.000Z

250

Line Management Perspective: National Nuclear Security Administration...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

251

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

252

Secretary Richardson Accepts Recommendations for Improving Security...  

National Nuclear Security Administration (NNSA)

Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

253

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

254

Your Security Policy is What??  

E-Print Network [OSTI]

policy representation (IPR) to bridge the gap between aform, called the “intermediate policy representation” (IPR).The IPR is independent of system and infrastructure

Bishop, Matt; Peisert, Sean

2006-01-01T23:59:59.000Z

255

FOILFEST :community enabled security.  

SciTech Connect (OSTI)

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

256

14.03 Intermediate Applied Microeconomics, Fall 2000  

E-Print Network [OSTI]

Presents basic theory and applications of consumer and producer behavior and welfare analysis at an intermediate level. Emphasizes applications, including the measurement of productivity, rationing, insurance markets, and ...

Autor, David H.

257

Curvaton field and the intermediate inflationary universe model  

SciTech Connect (OSTI)

The curvaton in an intermediate inflationary universe model is studied. This study has allowed us to find some interesting constraints on different parameters that appear in the model.

Campo, Sergio del; Herrera, Ramon [Instituto de Fisica, Pontificia Universidad Catolica de Valparaiso, Avenida Brasil 2950, Valparaiso (Chile)

2007-11-15T23:59:59.000Z

258

Structures of the Ribosome in Intermediate States of Ratcheting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Structures of the Ribosome in Intermediate States of Ratcheting Print Protein synthesis is conducted by the ribosome: a megadalton sized complex responsible for making proteins...

259

Conversion Technologies II: Bio-Oils, Sugar Intermediates, Precursors...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Technologies II: Bio-Oils, Sugar Intermediates, Precursors, Distributed Models, and Refinery Co-Processing July 30, 2014 Bryna Berendzen Technology Manager BETO Conversion...

260

PE06 -Beginning & Intermediate Core Training Class Syllabus  

E-Print Network [OSTI]

PE06 - Beginning & Intermediate Core Training Class Syllabus Instructor: Sandra Marbut Office attendance requirements as outlined on this syllabus 3. Pass midterm examination 4. Submit their final

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Biological Production of a Hydrocarbon Fuel IntermediatePolyhydroxybu...  

Office of Scientific and Technical Information (OSTI)

Biological Production of a Hydrocarbon Fuel Intermediate Polyhydroxybutyrate (PHB) from a Process Relevant Lignocellulosic Derived Sugar (Poster) Re-direct Destination: PHAs are...

262

Intermediates and the folding of proteins L and G  

E-Print Network [OSTI]

unifying mechanism for protein folding? [Review]. Trends incoordinate for protein folding. Journal of Chemical PhysicsIntermediates can accelerate protein folding. Proceedings of

Brown, Scott; Head-Gordon, Teresa

2008-01-01T23:59:59.000Z

263

A Review of Multidimensional, Multifluid Intermediate-scale Experiment...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

mapping for intermediate-scale experiments include photon-attenuation methods such as gamma and X-ray techniques, and photographic methods such as the light reflection, light...

264

Security seal. [Patent application  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17T23:59:59.000Z

265

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministration

266

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear Forensics Bioinformatics

267

Security Clearances; Limitations  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC. 1072.

268

Strengthening Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSiteNeutronStrategic Plan The

269

THE MAGELLANIC INTER-CLOUD PROJECT (MAGIC). I. EVIDENCE FOR INTERMEDIATE-AGE STELLAR POPULATIONS IN BETWEEN THE MAGELLANIC CLOUDS  

SciTech Connect (OSTI)

The origin of the gas in between the Magellanic Clouds (MCs)-known as the ''Magellanic Bridge'' (MB)-is puzzling. Numerical simulations suggest that the MB formed from tidally stripped gas and stars in a recent interaction between the MCs. However, the apparent lack of stripped intermediate- or old-age stars associated with the MB is at odds with this picture. In this paper, we present the first results from the MAGellanic Inter-Cloud program (MAGIC) aimed at probing the stellar populations in the inter-Cloud region. We present observations of the stellar populations in two large fields located in between the Large and Small Magellanic Clouds (LMC/SMC), secured using the WFI camera on the 2.2 m telescope in La Silla. Using a synthetic color-magnitude diagram technique, we present the first quantitative evidence for the presence of intermediate-age and old stars in the inter-Cloud region. The intermediate-age stars-which make up {approx}28% of all stars in the region-are not present in fields at a similar distance from the SMC in a direction pointing away from the LMC. This provides potential evidence that these intermediate-age stars could have been tidally stripped from the SMC. However, spectroscopic studies will be needed to confirm or rule out the tidal origin for the inter-Cloud gas and stars.

Noeel, N. E. D.; Read, J. I. [ETH Zuerich, Institute for Astronomy, Wolfgang-Pauli-Strasse 27, CH-8093 Zuerich (Switzerland); Conn, B. C.; Rix, H.-W. [Max Planck Institut fuer Astronomie, Koenigstuhl 17, D-69117, Heidelberg (Germany); Carrera, R. [Instituto de Astrofisica de Canarias, C/Via Lactea s/n, E-38200, La Laguna, Tenerife (Spain); Dolphin, A., E-mail: noelia@phys.ethz.ch [Raytheon Company, P.O. Box 11337, Tucson, AZ 85734-1337 (United States)

2013-05-10T23:59:59.000Z

270

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

271

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

272

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

Ragsdale, G.

273

Dye filled security seal  

DOE Patents [OSTI]

A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

Wilson, Dennis C. W. (Tijeras, NM)

1982-04-27T23:59:59.000Z

274

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

275

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScience National

276

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScienceScience »

277

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

278

Security | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0

279

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Ashby Photo Dr.1999alt=Search

280

Energy Security Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing Zirconia Nanoparticles asSecondCareerFebruaryEnergySecurity Overview We are

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The National

282

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The NationalWashington. DC

283

Natlonal Nuclear Security Admlnlstratlon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy2015 | JeffersonNations

284

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

285

Technology Transfer Success Stories, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

286

Climate Change and National Security  

E-Print Network [OSTI]

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

287

David Telles wins NNSA Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

288

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

289

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

290

Cyber Fit Pyramid for the home user. | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Publications Microsoft Word - Resource MaterialsOct09.doc INL Cyber Security Research (2008) "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8...

291

Hallmark Fact Sheet.cdr  

Broader source: Energy.gov (indexed) [DOE]

Cryptographic Serial Communication Hallmark Cryptographic Serial Communication A cryptographic card and link module integrating the Secure SCADA Communications Protocol to provide...

292

Reference Model for Control and Automation Systems in Electrical...  

Broader source: Energy.gov (indexed) [DOE]

Reference Model for Control and Automation Systems in Electrical Power Version 1.2 October 12, 2005 Prepared by: Sandia National Laboratories' Center for SCADA Security Jason...

293

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

1995-09-28T23:59:59.000Z

294

Security classification of information  

SciTech Connect (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

295

Electronic security device  

DOE Patents [OSTI]

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

296

Ideas for Security Assurance in Security Critical Software using Modelica  

E-Print Network [OSTI]

Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

Zhao, Yuxiao

297

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Office of Environmental Management (EM)

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

298

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Office of Environmental Management (EM)

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

299

2014 Headquarters Facilities Master Security Plan - Chapter 1...  

Office of Environmental Management (EM)

, Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

300

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Office of Environmental Management (EM)

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Office of Environmental Management (EM)

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

302

Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes  

E-Print Network [OSTI]

of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

Bishop, Matt

303

Pricing Security L. Jean Camp  

E-Print Network [OSTI]

documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

Camp, L. Jean

304

Fluid Mechanics and Homeland Security  

E-Print Network [OSTI]

Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department. 2006. 38:87­110 The Annual Review of Fluid Mechanics is online at fluid.annualreviews.org doi: 10 security involves many applications of fluid mechanics and offers many opportunities for research

Settles, Gary S.

305

Reporting Incidents Of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

306

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

307

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

308

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network [OSTI]

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

309

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

1995-09-28T23:59:59.000Z

310

Office of Headquarters Personnel Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

311

Departmental Personnel Security- Policy and Procedures  

Broader source: Energy.gov [DOE]

Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

312

14.03 Intermediate Applied Microeconomics, Fall 2004  

E-Print Network [OSTI]

This class presents microeconomic theory and applications of consumer and producer behavior and welfare analysis at an intermediate level. In addition to standard competitive models, we study deviations due to externalities, ...

Autor, David

313

THE UNIVERSITY OF CHICAGO CHARACTERIZATION OF PROTEIN FOLDING INTERMEDIATES  

E-Print Network [OSTI]

THE UNIVERSITY OF CHICAGO CHARACTERIZATION OF PROTEIN FOLDING INTERMEDIATES FOR DELINEATION ............................................................................................................ 1 1.1 Why study protein folding .............................................................................. 3 1.2.1 How fast should a protein fold ........................................................... 3

Sosnick, Tobin R.

314

Search for gravitational waves from intermediate mass binary black holes  

E-Print Network [OSTI]

We present the results of a weakly modeled burst search for gravitational waves from mergers of nonspinning intermediate mass black holes in the total mass range 100–450??M? and with the component mass ratios between 1?1 ...

Barsotti, Lisa

315

Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D  

E-Print Network [OSTI]

Slide 1 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA U N, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D Intermediate valence metals Security, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D Anderson Impurity Model (AIM

Lawrence, Jon

316

Reactions of nitrogen heterocycle-organolithium intermediates with lead halides  

E-Print Network [OSTI]

REACTIONS OF NITROGEN HETEROCYCLE- ORGANOLITHIUM INTERMEDIATES WITH LEAD HALIDES A Thesis by JERRY HEAL KINNEY Submitted to the Graduate College of Texas ALM University In partial fulfillment of the requirement for the degree ot MASTER... OF SCIENCE December 1970 Major Subject: Chemistry REACTIONS OF NITROGEN HETEROCYCLE- ORGANOLITHIUM INTERMEDIATES WITH LFAD HALIDES A Thesis JERRY NEAL KINNEY Approved as to style and content by: (Chairman of Commi ee) (Head of Department) (Member...

Kinney, Jerry Neal

1970-01-01T23:59:59.000Z

317

Independent Activity Report, Office of Secure Transportation...  

Broader source: Energy.gov (indexed) [DOE]

Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

318

Independent Oversight Evaluation, Office of Secure Transportation...  

Office of Environmental Management (EM)

Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

319

Independent Oversight Inspection, Office of Secure Transportation...  

Office of Environmental Management (EM)

Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

320

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Homeland Security and Emergency Management Coordination (HSEMC...  

National Nuclear Security Administration (NNSA)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

322

Preliminary Notice of Violation, National Security Technologies...  

Office of Environmental Management (EM)

Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

323

Safety and Security Enforcement Process Overview  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

324

Safety and Security Enforcement Coordinator Handbook  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT COORDINATOR HANDBOOK August 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy AUGUST 2012 DOE...

325

Harold Washington Social Security Administration (SSA) Center...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

326

National Securities Technologies _NSTec_ Livermore Operations...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

327

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

328

National Nuclear Security Administration Appropriation and Program...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

329

Independent Oversight Review, Nevada National Security Site,...  

Broader source: Energy.gov (indexed) [DOE]

and Special Door Interlock systems at the Nevada National Security Site (NNSS) Device Assembly Facility (DAF). The NNSS DAF is operated by National Security Technologies, LLC...

330

Automated Security Compliance Tool for the Cloud.  

E-Print Network [OSTI]

?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business… (more)

Ullah, Kazi Wali

2012-01-01T23:59:59.000Z

331

Independent Oversight Activity Report, Nevada National Security...  

Office of Environmental Management (EM)

Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

332

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

COUNTRIES More Documents & Publications 2014 Headquarters Facilities Master Security Plan - Chapter 6, Foreign Interaction PSH-12-0117 - In the matter of Personnel Security...

333

Extension of DOE Directive on Cyber Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

2003-06-04T23:59:59.000Z

334

ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...  

Broader source: Energy.gov (indexed) [DOE]

8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the...

335

Enforcement Letter, Consolidated Nuclear Security, LLC | Department...  

Energy Savers [EERE]

security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

336

Security control methods for CEDR  

SciTech Connect (OSTI)

The purpose of this document is to summarize the findings of recent studies on the security problem in statistical databases and examine their applicability to the specific needs of CEDR. The document is organized as follows: In Section 2 we describe some general control methods which are available on most commercial database software. In Section 3 we provide a classification of statistical security methods. In Section 4 we analyze the type of users of CEDR and the security control methods which may be applied to each type. In Section 5 we summarize the findings of this study and recommend possible solutions.

Rotem, D.

1990-09-01T23:59:59.000Z

337

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

338

National Security Science July 2014  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurityJuly

339

DF-479 SD-11 Directory Security: Mechanisms and Practicality  

E-Print Network [OSTI]

This document reviews security issues and identifies some of the specific measures required to achieve security.

North American Directory

340

updated 6/7/2007 Aerospace Security Certificate (21 Hours)  

E-Print Network [OSTI]

Technologies AVED 5413* Landside Security Technologies AVED 5423* Security Planning, Audits, and NIMS AVED 5433

Veiga, Pedro Manuel Barbosa

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network [OSTI]

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

342

CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS  

E-Print Network [OSTI]

Security service is currently handled through a private security guard service contract, which provides

Olsen, Stephen L.

343

E-Print Network 3.0 - advanced benzazocane intermediate Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

benzazocane intermediate Search Powered by Explorit Topic List Advanced Search Sample search results for: advanced benzazocane intermediate Page: << < 1 2 3 4 5 > >> 1 Accepted to...

344

E-Print Network 3.0 - antarctic intermediate water Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

intermediate water Search Powered by Explorit Topic List Advanced Search Sample search results for: antarctic intermediate water Page: << < 1 2 3 4 5 > >> 1 ON THE OCEANIC RESPONSE...

345

Cryptography and Data Security  

E-Print Network [OSTI]

The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and subsequently whmh data sets an active user may read or wrote. Flow controls regulate the dissemination of values among the data sets accessible to a user. Inference controls protect statistical databases by preventing questioners from deducing confidential information by posing carefully designed sequences of statistical queries and correlating the responses. Statlstmal data banks are much less secure than most people beheve. Data encryption attempts to prevent unauthorized disclosure of confidential information in transit or m storage. This paper describes the general nature of controls of each type, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses. The paper is intended for a general audience with little background in the area.

Dorothy E. Denning; Peter; J. Denning

1982-01-01T23:59:59.000Z

346

Port security and information technology  

E-Print Network [OSTI]

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

347

Meeting Federal Energy Security Requirements  

Broader source: Energy.gov [DOE]

Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

348

Utility Security & Resiliency: Working Together  

Broader source: Energy.gov [DOE]

Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—discusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

349

Intrusion detection using secure signatures  

DOE Patents [OSTI]

A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

Nelson, Trent Darnel; Haile, Jedediah

2014-09-30T23:59:59.000Z

350

Securities trading of concepts (STOC)  

E-Print Network [OSTI]

Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a “securities trading ...

Dahan, Ely

351

Italy | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryItaly and the United States of America are pleased...

352

Belgium | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Elio Di Rupo of Belgium on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryBelgium and the United States of America are pleased...

353

Forrestal Security and Safety Procedures  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

1983-02-02T23:59:59.000Z

354

INL@Work Cyber Security  

SciTech Connect (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

355

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

356

Security Area Vouching and Piggybacking  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

2000-06-05T23:59:59.000Z

357

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z

358

Master Safeguards and Security Agreements  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

1988-02-03T23:59:59.000Z

359

Cognitive Security for Personal Devices  

E-Print Network [OSTI]

Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...

Greenstadt, Rachel

2008-03-17T23:59:59.000Z

360

Critical Infrastructure and Cyber Security  

E-Print Network [OSTI]

that employ stealth methods such as steganography, allowing botmasters to exploit public forums and search engines #1; As U.S. national elections draw near, an increase in phishing, scams and malicious code targeting candidates, campaigns, etc.... Chemical Manufacturing The Chemical Manufacturing sector combines organic and inorganic materials to make chemicals used in everyday life and that contribute to the national security, public safety, and economic security. The components...

Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Office of Headquarters Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

362

Homeland Security Issues for Facilities  

E-Print Network [OSTI]

efficiency filters typically cause greater static pressure drop. Replacing air handling units to accept higher efficiency filters can be a major undertaking and expense. Besides offering some protection from biological and radiological agents, efficient..., security, surveillance, ventilation and filtration, and maintenance and training. The remainder of this discussion will focus primarily on occupant protection through HVAC system readiness and additional security measures. The aftermath of natural...

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

363

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

364

Extracting Security Control Requirements University of Tulsa  

E-Print Network [OSTI]

-component systems or systems of systems (SoSs) are difficult to verify because the security controls must to formulate functional requirements from security controls with SoSs as the target. The process starts accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

Gamble, R. F.

365

06 DEC 2013 1 Information Security Guideline  

E-Print Network [OSTI]

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

366

April 11, 2005 --Lecture 31 Computer Security  

E-Print Network [OSTI]

Science Policy Ancillaries #12;Security Planning Team Must represent all stakeholders, typically: Hardware

Jones, Douglas W.

367

Decision Support for Choice of Security  

E-Print Network [OSTI]

Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o¤ analysis and trade-o¤ tool BBN topology. (6) Rule set for how

Langseth, Helge

368

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?  

E-Print Network [OSTI]

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

Qin, Xiao

369

Cyber Security Companies, governments, and consumers depend on secure and reliable  

E-Print Network [OSTI]

Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

Hill, Wendell T.

370

Cyber Security and Resilient Systems  

SciTech Connect (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

371

Reduction of Quantum Phase Fluctuations in Intermediate States  

E-Print Network [OSTI]

Recently we have shown that the reduction of the Carruthers-Nieto symmetric quantum phase fluctuation parameter (U) with respect to its coherent state value corresponds to an antibunched state, but the converse is not true. Consequently reduction of U is a stronger criterion of nonclassicality than the lowest order antibunching. Here we have studied the possibilities of reduction of $U$ in intermediate states by using the Barnett Pegg formalism. We have shown that the reduction of phase fluctuation parameter U can be seen in different intermediate states, such as binomial state, generalized binomial state, hypergeometric state, negative binomial state, and photon added coherent state. It is also shown that the depth of nonclassicality can be controlled by various parameters related to intermediate states. Further, we have provided specific examples of antibunched states, for which $U$ is greater than its poissonian state value.

Amit Verma; Anirban Pathak

2008-01-04T23:59:59.000Z

372

Seismic evolution of low/intermediate mass PMS stars  

E-Print Network [OSTI]

This article presents a study of the evolution of the internal structure and seismic properties expected for low/intermediate mass Pre-Main Sequence (PMS) stars. Seismic and non-seismic properties of PMS stars were analysed. This was done using 0.8 to 4.4M$_\\odot$ stellar models at stages ranging from the end of the Hayashi track up to the Zero-Age Main-Sequence (ZAMS). This research concludes that, for intermediate-mass stars (M$>$1.3M$_\\odot$), diagrams comparing the effective temperature ($T_{eff}$) against the small separation can provide an alternative to Christensen-Dalsgaard (C-D) diagrams. The impact of the metal abundance of intermediate mass stars (2.5-4.4M$_\\odot$) has over their seismic properties is also evaluated.

F. J. G. Pinheiro

2007-12-05T23:59:59.000Z

373

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY, EUROPEAN SECURITY  

E-Print Network [OSTI]

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY recent developments in European Union (EU) security policy and their implications for Germany's bilateral of a greater EU security capability has significantly affected Germany's bilateral relations with the USA

Sheldon, Nathan D.

374

International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security  

E-Print Network [OSTI]

1 TUDelft International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security Dirk Jan van den Berg President Del2 University of Technology participants, Nuclear security requires highly skilled experts. Professionals, who are familiar

Langendoen, Koen

375

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumber ofES&HGlobal Security

376

Tag: global security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurityglobal security

377

Office of Secure Transportation | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002 Wholesale PowerSecurity Office of Oil,ArgonneServices

378

IBM Global Services A Strategic Approach to Protecting  

E-Print Network [OSTI]

IBM Global Services July 2007 A Strategic Approach to Protecting SCADA and Process Control Systems 2007 IBM Internet Security Systems, Inc. #12;A Strategic Approach to Protecting SCADA and Process Control Systems Page No.2 Abstract This document provides an overview of the security weaknesses present

379

Gravimetric study of adsorbed intermediates in methanation of carbon monoxide  

SciTech Connect (OSTI)

The purpose of this study is to more fully elucidate the adsorbed intermediates and mechanism involved in catalytic methanation of CO on a typical nickel methanation catalyst. Rates of adsorption and desorption of surface species and of gasification of carbon were measured gravimetrically to determine their kinetics and possible roles in methanation. 19 refs.

Gardner, D.C.; Bartholomew, C.H.

1981-08-01T23:59:59.000Z

380

Intermediate Band Properties of Femtosecond-Laser Hyperdoped Silicon  

E-Print Network [OSTI]

. The high concentration of dopants forms an intermediate band (IB), instead of discrete energy levels exhibits broad-band light absorption to wavelengths deep below the corresponding bandgap energy of silicon) using secondary ion mass spectrometry. By varying the pressure of SF6, we find that the surface adsorbed

Mazur, Eric

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

INTRODUCTION Neural intermediate filaments (NIF) containing one or more of  

E-Print Network [OSTI]

INTRODUCTION Neural intermediate filaments (NIF) containing one or more of five different types, NIF possess common structural features, including a conserved alpha-helical central rod domain of NIF in the presence of NF-L (Zackroff et al., 1982; Hisanaga and Hirokawa, 1988; Balin and Lee, 1991

Goldman, Robert D.

382

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

383

Visual analysis of code security  

SciTech Connect (OSTI)

To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated software security analysis tools. These tools analyze software for weaknesses and vulnerabilities, but the individual tools catch different vulnerabilities and produce voluminous data with many false positives. This paper describes a system that brings together the results of disparate software analysis tools into a visual environment to support the triage and exploration of code vulnerabilities. Our system allows software developers to explore vulnerability results to uncover hidden trends, triage the most important code weaknesses, and show who is responsible for introducing software vulnerabilities. By correlating and normalizing multiple software analysis tools' data, the overall vulnerability detection coverage of software is increased. A visual overview and powerful interaction allows the user to focus attention on the most pressing vulnerabilities within huge volumes of data, and streamlines the secure software development workflow through integration with development tools.

Goodall, John R [ORNL] [ORNL; Radwan, Hassan [Applied Visions, Inc.] [Applied Visions, Inc.; Halseth, Lenny [Applied Visions, Inc.] [Applied Visions, Inc.

2010-01-01T23:59:59.000Z

384

Homeland Security and Defense Applications  

SciTech Connect (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2014-11-06T23:59:59.000Z

385

Homeland Security and Defense Applications  

ScienceCinema (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2015-01-09T23:59:59.000Z

386

Security-by-design handbook.  

SciTech Connect (OSTI)

This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

2013-01-01T23:59:59.000Z

387

Climate Change and National Security  

SciTech Connect (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

Malone, Elizabeth L.

2013-02-01T23:59:59.000Z

388

Integrated safeguards and security management plan  

SciTech Connect (OSTI)

Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

Bowen, Sue, editor

2001-04-16T23:59:59.000Z

389

Status of the National Security Workforce  

SciTech Connect (OSTI)

This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

None

2008-03-31T23:59:59.000Z

390

Highly Mismatched Alloys for Intermediate Band Solar Cells  

SciTech Connect (OSTI)

It has long been recognized that the introduction of a narrow band of states in a semiconductor band gap could be used to achieve improved power conversion efficiency in semiconductor-based solar cells. The intermediate band would serve as a ''stepping stone'' for photons of different energy to excite electrons from the valence to the conduction band. An important advantage of this design is that it requires formation of only a single p-n junction, which is a crucial simplification in comparison to multijunction solar cells. A detailed balance analysis predicts a limiting efficiency of more than 50% for an optimized, single intermediate band solar cell. This is higher than the efficiency of an optimized two junction solar cell. Using ion beam implantation and pulsed laser melting we have synthesized Zn{sub 1-y}Mn{sub y}O{sub x}Te{sub 1-x} alloys with x<0.03. These highly mismatched alloys have a unique electronic structure with a narrow oxygen-derived intermediate band. The width and the location of the band is described by the Band Anticrossing model and can be varied by controlling the oxygen content. This provides a unique opportunity to optimize the absorption of solar photons for best solar cell performance. We have carried out systematic studies of the effects of the intermediate band on the optical and electrical properties of Zn{sub 1-y}Mn{sub y}O{sub x}Te{sub 1-x} alloys. We observe an extension of the photovoltaic response towards lower photon energies, which is a clear indication of optical transitions from the valence to the intermediate band.

Walukiewicz, W.; Yu, K.M.; Wu, J.; Ager III, J.W.; Shan, W.; Scrapulla, M.A.; Dubon, O.D.; Becla, P.

2005-03-21T23:59:59.000Z

391

safeguards | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -| National Nuclear Security

392

Nuclear Safeguards and Security Challenge:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the ContributionsArms Control R&D ConsortiumNuclearSafeguards and Security Challenge:

393

Security Cases | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security

394

Security_Walls_VPP_Award  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March

395

Sandia National Laboratories: Climate Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0Energy AdvancedEnergyEnergyMapping WaterMonitoringClimate Security

396

assa security center: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cures All Dumb Ideas in Computer Security 919 Jul 2011 12 147 Annual Security Report October 2013 Materials Science Websites Summary: of Security Field Operations,...

397

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Office of Environmental Management (EM)

INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

398

2014 Headquarters Facilities Master Security Plan - Chapter 11...  

Office of Environmental Management (EM)

1, Incidents of Security Concern 2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern October 2014 2014 Headquarters Facilities Master...

399

2014 Headquarters Facilities Master Security Plan - Chapter 17...  

Office of Environmental Management (EM)

7, Headquarters Security Officer Program 2014 Headquarters Facilities Master Security Plan - Chapter 17, Headquarters Security Officer Program June 2014 2014 Headquarters...

400

Energy and Security in Northeast Asia: Proposals for Nuclear Cooperation  

E-Print Network [OSTI]

The bilateral nuclear and security agreement between theThe bilateral nuclear and security agreement between thein East Asia's security, nuclear energy, and environment. It

Kaneko, Kumao; Suzuki, Atsuyuki; Choi, Jor-Shan; Fei, Edward

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

all-weather security surveillance: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

402

Introduction to SCADA Protection and Vulnerabilities  

SciTech Connect (OSTI)

Even though deregulation has changed the landscape of the electric utility industry to some extent, a typical large electric utility still owns power generation facilities, power transmission and distribution lines, and substations. Transmission and distribution lines form the segments or spokes of a utility’s grid. Power flow may change through these lines, but control of the system occurs at the nodes of the grid, the generation facilities, and substations. This section discusses each of these node types in more detail as well as how each is controlled.

Ken Barnes; Briam Johnson; Reva Nickelson

2004-03-01T23:59:59.000Z

403

National SCADA Test Bed | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

be run locally to provide hardware supply chain assurances, to large-scale high-performance computing services that can statistically analyze systems of systems to identify...

404

National SCADA Test Bed Fact Sheet  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAXBalanced Scorecard Federal2 to:DieselEnergyHydrogen Storage1, 2011PROTECTING ENERGY

405

National SCADA Test Bed | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen OwnedofDepartment ofJaredOak Ridge’s EMGeothermal energy inCreated in 2003,

406

Embedded Controllers Control. Connectivity. Security.  

E-Print Network [OSTI]

Application Summary MCF5282 HVAC and Security Control Panel Application Summary MCF5307 Music Media Player controllers to help get their products to market quickly and cost-effectively. Aggressive price of continuous innovative technology--provides customers with the opportunity to build market share

Grantner, Janos L.

407

International Aviation Security Technology Symposium  

E-Print Network [OSTI]

Laboratory, US Dept. of Homeland Security, William J. Hughes Technical Center; Atlantic City, NJ, USA-wave Mach number as a function of distance from the explosion center. These data then yield a peak. Characterization of an explosive requires understanding of the energy released during detonation. Typically TNT

Settles, Gary S.

408

Cloud Security by Max Garvey  

E-Print Network [OSTI]

Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service Network access Resource pooling Elasticity of Resources Measured Service #12;Cloud Types/Variants Iaa Cloud Public Cloud Hybrid Cloud combination. Private cloud with overflow going to public cloud. #12

Tolmach, Andrew

409

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

410

Secure Symmetrical Multilevel Diversity Coding  

E-Print Network [OSTI]

Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

Li, Shuo

2012-07-16T23:59:59.000Z

411

Security & Sustainability College of Charleston  

E-Print Network [OSTI]

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10@cofc.edu Office: 284 King Street, #206 (Office of Sustainability) Office Hours: by appt or virtual apt Instructor is that if sustained well-being and prosperity of human and ecological systems is the goal of sustainability

Young, Paul Thomas

412

Corporate Security and Conflict Outcomes  

E-Print Network [OSTI]

..................................................................................................... 75 Competition in Security Contracting and Conflict Outcomes .................................. 80 Research Design ....................................................................................................... 88 Dependent Variable... ................................... 16 Table 2 Contracted Service Total by Corporate Structure ............................................... 42 Table 3 The Effects of Public and Individual Firms Operating in Iraq (Part A) .............. 54 Table 4 The Effects of Public...

Tkach, Benjamin K

2013-10-21T23:59:59.000Z

413

KNOWLEDGE: Building, Securing, Sharing & Applying  

E-Print Network [OSTI]

is to educate and provide powerful analytical tools for information sharing, collaboration & decision support against threats to cyber infrastructure and data Data management in emergency situations Risk analysis for challenging problems in data analysis that address present and emerging homeland security threats Our Mission

414

An Operations Research approach to aviation security  

E-Print Network [OSTI]

Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore ...

Martonosi, Susan Elizabeth

2005-01-01T23:59:59.000Z

415

Statistical analysis of correlated fossil fuel securities  

E-Print Network [OSTI]

Forecasting the future prices or returns of a security is extraordinarily difficult if not impossible. However, statistical analysis of a basket of highly correlated securities offering a cross-sectional representation of ...

Li, Derek Z

2011-01-01T23:59:59.000Z

416

Safeguards and Security Program, acronyms and abbereviations...  

Office of Environmental Management (EM)

Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 August 26, 2005 Canceled Safeguards and Security...

417

Site Tour Security Plan.pdf  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for Site Tours Regarding Request for Proposal No. DE-SOL-0001458 Page 1 of 6 SECURITY PLAN The Pantex Plant (Pantex), Y-12 National Security Complex (Y-12), and the Tritium...

418

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses

419

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses (not

420

Improving tamper detection for hazardous waste security  

SciTech Connect (OSTI)

After September 11, waste managers are increasingly expected to provide improved levels of security for the hazardous materials in their charge. Many low-level wastes that previously had minimal or no security must now be well protected, while high-level wastes require even greater levels of security than previously employed. This demand for improved security comes, in many cases, without waste managers being provided the necessary additional funding, personnel, or security expertise. Contributing to the problem is the fact that--at least in our experience--waste managers often fail to appreciate certain types of security vulnerabilities. They frequently overlook or underestimate the security risks associated with disgruntled or compromised insiders, or the potential legal and political liabilities associated with nonexistent or ineffective security. Also frequently overlooked are potential threats from waste management critics who could resort to sabotage, vandalism, or civil disobedience for purposes of discrediting a waste management program.

Johnston, R. G. (Roger G.); Garcia, A. R. E. (Anthony R. E.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Martinez, R. K. (Ronald K.); Martinez, D. D. (Debbie D.); Lopez, L. N. (Leon N.)

2002-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Building an Information Technology Security Awareness  

E-Print Network [OSTI]

Building an Information Technology Security Awareness and Training Program Mark Wilson and Joan Hash C O M P U T E R S E C U R I T Y NIST Special Publication 800-50 Computer Security Division

422

Security Equipment and Systems Certification Program (SESCP)  

SciTech Connect (OSTI)

Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

Steele, B.J. [Sandia National Labs., Albuquerque, NM (United States); Papier, I.I. [Underwriters Labs., Inc., Northbrook, IL (United States)

1996-06-20T23:59:59.000Z

423

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network [OSTI]

the Report 01 Keylogging, by the numbers 02 Securing the Secure Shell ­ Advanced user authentication and key Page 1 #12;Keylogging, by the numbers Introduction During the course of malware analysis, especially

424

Physical Security System Sensitivity to DBT Perturbations  

E-Print Network [OSTI]

, multiple scenarios are assessed that test different sets of adversary capabilities to better uncover and understand any security system vulnerabilities that may exist. We believe the benefit of identifying these site-specific security vulnerabilities...

Conchewski, Curtis

2012-10-19T23:59:59.000Z

425

Delegating Network Security with More Information  

E-Print Network [OSTI]

Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

Naous, Jad

426

New Solicitations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Stewardship Science Academic Alliances New Solicitations New Solicitations The National Nuclear Security Administration's Office of Research, Development, Test, and Evaluation...

427

Preproposal Conference & Site Tour | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Preproposal Conference & Site Tour | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

428

Spring 2013 Computer Security Midterm 1  

E-Print Network [OSTI]

the site's security officers have set a policy that all access between machines must use two separate forms

Paxson, Vern

429

Track 6: Integrating Safety Into Security Operations  

Broader source: Energy.gov [DOE]

ISM Workshop Presentations Knoxville Convention Center, Knoxville, TN August 2009 Track 6: Integrating Safety Into Security Operations

430

Infrastructure & Sustainability | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

& Sustainability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

431

Energy Security: Microgrid Planning and Design (Presentation)  

SciTech Connect (OSTI)

Energy Security: Microgrid Planning and Design presentation to be given at the 2012 WREF in Denver, CO.

Giraldez, J.

2012-05-01T23:59:59.000Z

432

Security and United States Immigration Policy  

E-Print Network [OSTI]

National Security Council memorandum as created to “encourage defection of all USSR nationals and ‘key’ personnel from the satellite

Totten, Robbie James

2012-01-01T23:59:59.000Z

433

Mobile RFID Security Issues -ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Security  

E-Print Network [OSTI]

Mobile RFID Security Issues - ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Engineers Mobile RFID Security Issues Divyan M. Konidala, Kwangjo Kim Cryptology and Information Security #12;Mobile RFID Security Issues - ICU 2 RFID Technology (1/2) Radio Frequency Identification (RFID

Kim, Kwangjo

434

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using a Graphical  

E-Print Network [OSTI]

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using of California, Davis {hoagland,pandey,levitt}@cs.ucdavis.edu Technical Report CSE-98-3 A security policy states for organizations to declare their security policies, even informal state- ments would be better than the current

California at Davis, University of

435

National Security Issues at Department of Homeland Security and Department of Wednesday, November 18th  

E-Print Network [OSTI]

Transformational & Applied Research Directorate U.S. Department of Homeland Security Domestic Nuclear Detection Directorate at the Department of Homeland Security's Domestic Nuclear Detection Office. In this role, heSeminar: National Security Issues at Department of Homeland Security and Department of Energy

Farritor, Shane

436

Continental energy security: Energy security in the North American context1  

E-Print Network [OSTI]

, commissioned reports, and signed legislation in an effort to stem crude oil imports and improve energy securityERG/201101 Continental energy security: Energy security in the North American context1 Larry Hughes, Canada 24 January 2011 1 A textbox for the Global Energy Assessment's Knowledge Module 5: Energy Security

Hughes, Larry

437

Securing Distributed Storage: Challenges, Techniques, and Systems  

E-Print Network [OSTI]

important security issues related to storage and present a comprehensive survey of the security services, present a critical review of the existing solutions, compare them, and highlight potential research issues time, recent trends in data outsourcing have raised many new privacy issues making security a crucial

Kim, Dae-Shik

438

GEORG-AUGUST-UNIVERSITT Computer Security  

E-Print Network [OSTI]

systems 2 #12;GEORG-AUGUST-UNIVERSIT�T G�TTINGEN Why Security? » Computer systems are ubiquitous in our daily life » Computers store and process our data » Computers access and control our resources » More: intelligent security systems » Machine learning and arti cial intelligence for security 4 T-800 HAL 9000WOPR

Grabowski, Jens

439

Systems Security at Chemical and Biochemical Engineering  

E-Print Network [OSTI]

and Biochemical Engineering. The Systems Administrator for Chemical and Biochemical Engineering regularly reviews network security.However, maintaining systems security is a group effort and a never-ending task. Here Administrator regarding security bugs that may affect your personal computer. If a patch is available, download

440

Human Resources Security Access Matrix Function Training  

E-Print Network [OSTI]

June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

Wu, Shin-Tson

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Optimal Security Liquidation Algorithms Sergiy Butenko  

E-Print Network [OSTI]

using a set of historical sample-paths of prices. 1. Introduction Consider the following decision making positions for several securities. Historical sequences of prices of these securities (after opening. The algorithms provide path-dependent strategies which sell some fractions of security depending upon price

Uryasev, Stanislav

442

Oak Ridge National Laboratory National Security Programs  

E-Print Network [OSTI]

Oak Ridge National Laboratory National Security Programs Dr. Michael A. Kuliasha, Chief Scientist National Security Technologies Oak Ridge National Laboratory #12;2 OAK RIDGE NATIONAL LABORATORY U. S Security Challenges #12;3 OAK RIDGE NATIONAL LABORATORY U. S. DEPARTMENT OF ENERGY How Will Our Enemies

443

Department of Energy Cyber Security Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

444

Cloud Security: Issues and Concerns Pierangela Samarati*  

E-Print Network [OSTI]

1 Cloud Security: Issues and Concerns Authors Pierangela Samarati* UniversitĂ  degli Studi di Milano, Italy sabrina.decapitani@unimi.it Keywords cloud security confidentiality integrity availability secure data storage and processing Summary The cloud has emerged as a successful computing paradigm

Samarati, Pierangela

445

Third Annual Cyber Security and Information  

E-Print Network [OSTI]

Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

Krings, Axel W.

446

Department of Energy Cyber Security Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

447

Cyber Security in Smart Grid Substations  

E-Print Network [OSTI]

Cyber Security in Smart Grid Substations Thijs Baars Lucas van den Bemd Michail Theuns Robin van.089 3508 TB Utrecht The Netherlands #12;CYBER SECURITY IN SMART GRID SUBSTATIONS Thijs Baars T.Brinkkemper@uu.nl Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands

Utrecht, Universiteit

448

Business-driven security White paper  

E-Print Network [OSTI]

March 2008 Business-driven security White paper Take a holistic approach to business-driven security. #12;Take a holistic approach to business-driven security. 2 Overview Today's corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates

449

Energy Security in Nova Scotia Larry Hughes  

E-Print Network [OSTI]

to maintain energy security #12;Mr. Harper and his energy superpower · "...an ocean of oil soaked sand liesERG/200706 Energy Security in Nova Scotia Larry Hughes Energy Research Group Electrical to Café Canada, Mahone Bay 30 November 2007 #12;Energy security in Nova Scotia Larry Hughes, PhD Energy

Hughes, Larry

450

Electronic DOE Information Security System (eDISS) PIA, Office...  

Office of Environmental Management (EM)

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

451

Exact theory of intermediate phases in two dimensions  

SciTech Connect (OSTI)

We show how field theory yields the exact description of intermediate phases in the scaling limit of two-dimensional statistical systems at a first order phase transition point. The ability of a third phase to form an intermediate wetting layer or only isolated bubbles is explicitly related to the spectrum of excitations of the field theory. The order parameter profiles are determined and interface properties such as passage probabilities and internal structure are deduced from them. The theory is illustrated through the application to the q-state Potts model and the Ashkin–Teller model. The latter is shown to provide the first exact solution of a bulk wetting transition. -- Highlights: •Phase separation with appearance of a third phase is studied exactly. •Interfacial properties are derived from field theory. •Exact solution of bulk wetting transition is provided.

Delfino, Gesualdo, E-mail: delfino@sissa.it; Squarcini, Alessio, E-mail: alessio.squarcini@sissa.it

2014-03-15T23:59:59.000Z

452

Intermediate-band Photometry of Type Ia Supernovae  

E-Print Network [OSTI]

We present optical light curves of five Type Ia supernovae (2002er, 2002fk, 2003cg, 2003du, 2003fk). The photometric observations were performed in a set of intermediate-band filters. SNe 2002er, 2003du appear to be normal SN Ia events with similar light curve shapes, while SN 2003kf shows the behavior of a brighter SN Ia with slower decline rate after maximum. The light curves of SN 2003cg is unusual; they show a fast rise and dramatic decline near maximum and do not display secondary peak at longer wavelengths during 15-30 days after maximum light. This suggests that SN 2003cg is likely to be an intrinsically subluminous, 91bg-like SN Ia. Exploration of SN Ia feature lines through intermediate-band photometry is briefly discussed.

Wang, X; Zhang, T; Li, Z; Wang, Xiaofeng; Zhou, Xu; Zhang, Tianmeng; Li, Zongwei

2004-01-01T23:59:59.000Z

453

Isotope analysis in central heavy ion collisions at intermediate energies  

E-Print Network [OSTI]

Symmetry energy is a key quantity in the study of the equation of state of asymmetric nuclear matter. Heavy ion collisions at low and intermediate energies, performed at Laboratori Nazionali di Legnaro and Laboratori Nazionali del Sud, can be used to extract information on the symmetry energy coefficient Csym, which is currently poorly known but relevant both for astrophysics and for structure of exotic nuclei.

NUCL-EX Collaboration; :; E. Geraci; U. Abbondanno; L. Bardelli; S. Barlini; M. Bini; M. Bruno; F. Cannata; G. Casini; M. Chiari; M. D'Agostino; J. DeSanctis; A. Giussani; F. Gramegna; V. L. Kravchuk; A. L. Lanchais; P. Marini; A. Moroni; A. Nannini; A. Olmi; A. Ordine; G. Pasquali; S. Piantelli; G. Poggi; G. Vannini

2006-09-29T23:59:59.000Z

454

League City Intermediate School - A Study in Energy Efficient Design  

E-Print Network [OSTI]

,000 square foot League City Intermediate School. The project cost was $8,080,000, or $52.75 per square foot. Due to the architectural firm's careful planning and use of a computer analysis to evaluate potential energy usage, the budget... requirements. The heating, ventilation .. . . 3st for the project was per square foot. 3 of lighting that con- most visible. Natural practicable and is pro- s and insulated skylights. rce center. located at the , permit borrowed light to windows...

Longserre, J. T.; Ahrens, L.

1984-01-01T23:59:59.000Z

455

Intermediates and the folding of proteins L and G  

SciTech Connect (OSTI)

We use a minimalist protein model, in combination with a sequence design strategy, to determine differences in primary structure for proteins L and G that are responsible for the two proteins folding through distinctly different folding mechanisms. We find that the folding of proteins L and G are consistent with a nucleation-condensation mechanism, each of which is described as helix-assisted {beta}-1 and {beta}-2 hairpin formation, respectively. We determine that the model for protein G exhibits an early intermediate that precedes the rate-limiting barrier of folding and which draws together misaligned secondary structure elements that are stabilized by hydrophobic core contacts involving the third {beta}-strand, and presages the later transition state in which the correct strand alignment of these same secondary structure elements is restored. Finally the validity of the targeted intermediate ensemble for protein G was analyzed by fitting the kinetic data to a two-step first order reversible reaction, proving that protein G folding involves an on-pathway early intermediate, and should be populated and therefore observable by experiment.

Brown, Scott; Head-Gordon, Teresa

2003-07-01T23:59:59.000Z

456

Facility Security Checklist U.S. Department of Transportation  

E-Print Network [OSTI]

was the last time security logs and/or incident reports were reviewed? 25. Is there a current security plan

Goodman, Robert M.

457

NISTIR 6462 CSPP -Guidance for COTS Security Protection Profiles  

E-Print Network [OSTI]

..................................................................................................................................................4 2.2 OPERATIONAL ENVIRONMENT ............................................................................................................................... 25 4.3 JOINT TOE/ENVIRONMENT SECURITY OBJECTIVES...................................................................................................................5 3. SECURITY ENVIRONMENT

458

2012 Annual Planning Summary for National Nuclear Security Administrat...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration 2012 Annual Planning Summary for National Nuclear Security Administration The ongoing and projected Environmental Assessments and...

459

Reliable Process for Security Policy Deployment  

E-Print Network [OSTI]

We focus in this paper on the problem of configuring and managing network security devices, such as Firewalls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is free of ambiguities, redundancies or unnecessary details. Second, we deploy such an abstract policy through a set of automatic compilations into the security devices of the system. This proposed deployment process not only simplifies the security administrator's job, but also guarantees a resulting configuration free of anomalies and/or inconsistencies.

Preda, Stere; Cuppens, Frederic; Garcia-Alfaro, Joaquin; Toutain, Laurent

2009-01-01T23:59:59.000Z

460

Analysis of the HVAC System at the Willow Branch Intermediate School  

E-Print Network [OSTI]

This report presents an analysis of the HVAC system at the Willow Branch Intermediate School for the MEEN 685 class project. The school is located at College Station, Texas. A portion of the school belonged to Oakwood Intermediate School which...

Wei, G.

1997-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Visualizing Cyber Security: Usable Workspaces  

SciTech Connect (OSTI)

An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

2009-10-11T23:59:59.000Z

462

Simulated Interdiction: Proliferation Security Initiative  

E-Print Network [OSTI]

Parthia to curtail its nuclear weapons development programs. However, Bearia has often disagreed sharply with the U.S. and other international partners on specific steps to persuade Parthia to halt uranium enrichment. 17 For Simulation Use Only...For Simulation Use Only i For Simulation Use Only i George Bush School of Government and Public Service Nuclear Engineering Department Nuclear Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated...

2009-01-01T23:59:59.000Z

463

research | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective

464

Nonproliferation | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNationalNewportBig Eddy

465

Security Council Approval of Kofi  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC.509

466

Safety and Security Policy Jobs  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial CarbonArticlesHuman Resources

467

About SRNL - Directorates - National Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)Productssondeadjustsondeadjust DocumentationARMStreamsUSBudgetEnterpriseFermilabNational Security

468

Microgrid cyber security reference architecture.  

SciTech Connect (OSTI)

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

469

Extender for securing a closure  

DOE Patents [OSTI]

An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.

Thomas, II, Patrick A.

2012-10-02T23:59:59.000Z

470

1Earth System Models of Intermediate Complexity: Closing the Gap in the Spectrum of Climate System  

E-Print Network [OSTI]

system models of intermediate complexity (EMICs) is discussed. It be-comes apparent that there exists a

Martin Claussen; Michel Crucifix; Thierry Fichefet; Andrey Ganopolski; Huges Goosse; Vladimir Petoukhov; Thomas Stocker; Peter Stone; Zhaoming Wang; Andrew Weaver; Susanne L. Weber

471

arvutimnguritus world cyber: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cyber-insurer, thereby making 74 SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Systems Fission and Nuclear Technologies Websites...

472

alleged russian cyber: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cyber-insurer, thereby making 69 SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Systems Fission and Nuclear Technologies Websites...

473

Physical Organic Chemistry of Reactive Intermediates | The Ames Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006Photovoltaic Theory and Modeling Los Alamos

474

Structures of the Ribosome in Intermediate States of Ratcheting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystalline Gallium Oxide Thin Films. |Structures of the Ribosome

475

Structures of the Ribosome in Intermediate States of Ratcheting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystalline Gallium Oxide Thin Films. |Structures of the

476

Well Logging Security Initiatives | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched FerromagnetismWaste and Materials Disposition3February 2015ProgramMyWelcomeWelding

477

Y-12 National Security Complex | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched FerromagnetismWaste and MaterialsWenjun1ofRadiative HeatingInnovation

478

Senator Blunt visits National Security Campus | National Nuclear Security  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclearhas 'Natitude'Security AdministrationNuclearFY13Under

479

Dedication of NNSA's National Security Campus | National Nuclear Security  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartmentStewardshipAdministration| NationalNuclear SecurityDash for

480

Security and Training | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassiveSubmitted forHighlights Nuclear PhysicsDoDepartmentSecurity and Training

Note: This page contains sample records for the topic "intermediate scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

National Security Technology Center | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNationalLos AlamosGlobal

482

Digital intermediate frequency QAM modulator using parallel processing  

DOE Patents [OSTI]

The digital Intermediate Frequency (IF) modulator applies to various modulation types and offers a simple and low cost method to implement a high-speed digital IF modulator using field programmable gate arrays (FPGAs). The architecture eliminates multipliers and sequential processing by storing the pre-computed modulated cosine and sine carriers in ROM look-up-tables (LUTs). The high-speed input data stream is parallel processed using the corresponding LUTs, which reduces the main processing speed, allowing the use of low cost FPGAs.

Pao, Hsueh-Yuan (Livermore, CA); Tran, Binh-Nien (San Ramon, CA)

2008-05-27T23:59:59.000Z

483

File:Intermediate wind factsheet.pdf | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublicIDAPowerPlantSitingConstruction.pdf JumpApschem.pdf Jumptight-gas.pdfFut gaspHIak.pdfwy.pdfIntermediate wind

484

EVALUATION OF TRANSPORTATION OPTIONS FOR INTERMEDIATE NON DESTRUCTIVE EXAMINATIONS  

SciTech Connect (OSTI)

Idaho National Laboratory (INL) shipments of irradiated experiments from the Advanced Test Reactor (ATR) to the Hot Fuels Examination Facility (HFEF) have historically been accomplished using the General Electric Model 2000 (GE 2000) Type B shipping container. Battelle Energy Alliance (BEA) concerns regarding the future availability and leasing and handling costs associated with the GE 2000 cask have warranted an evaluation of alternative shipping options. One or more of these shipping options may be utilized to perform non destructive examinations (NDE) such as neutron radiography and precision gamma scans of irradiated experiments at HFEF and then return the experiments to ATR for further irradiation, hereafter referred to as “intermediate NDE.”

Case, Susan; Hoggard, Gary

2014-07-01T23:59:59.000Z

485

IT Security Plan for Flight Simulation Program  

E-Print Network [OSTI]

Information security is one of the most important aspects of technology, we cannot protect the best interests of our organizations' assets (be that personnel, data, or other resources), without ensuring that these assetsare protected to the best of their ability. Within the Defense Department, this is vital to the security of not just those assets but also the national security of the United States. Compromise insecurity could lead severe consequences. However, technology changes so rapidly that change has to be made to reflect these changes with security in mind. This article outlines a growing technological change (virtualization and cloud computing), and how to properly address IT security concerns within an operating environment. By leveraging a series of encrypted physical and virtual systems, andnetwork isolation measures, this paper delivered a secured high performance computing environment that efficiently utilized computing resources, reduced overall computer processing costs, and ensures confidentia...

Hood, David; 10.5121/ijcsea.2011.1510

2011-01-01T23:59:59.000Z

486

Control Systems Cyber Security Standards Support Activities  

SciTech Connect (OSTI)

The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

Robert Evans

2009-01-01T23:59:59.000Z

487

Student Experiential Opportunities in National Security Careers  

SciTech Connect (OSTI)

This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

None

2007-12-31T23:59:59.000Z

488

Safeguards and security issues during facility transition  

SciTech Connect (OSTI)

The transition of Department of Energy (DOE) production facilities to those destined for decontamination and decommissioning (D and D) must consider traditional safeguards and security requirements governing nuclear materials. Current DOE safeguards and security policy establishes specific requirements for the removal of facilities and waste from safeguards. However, the current physical security policy does not differentiate the protection of waste from usable materials. Other transition issues include: access of uncleared individuals, positioning security zones, nuclear material holdup, accounting for difficult-to-measure materials, inventory difference and resolution, and radiological/toxicological sabotage. Safeguards and security goals for facility transitioning must provide a workable, efficient and cost-effective system for accounting and protecting nuclear material. In depth protection strategies utilizing combinations of safeguards and security systems should be developed to meet these goals.

Smith, M.R. [USDOE Office of Safeguards and Security, Washington, DC (United States); Zack, N.R. [Los Alamos National Lab., NM (United States). Safeguards Systems Group

1993-12-31T23:59:59.000Z

489

Next Generation National Security Leaders  

SciTech Connect (OSTI)

It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had “right-sized” the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community – or it may lie in more effectively using our existing resources and training programs.

Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

2012-07-19T23:59:59.000Z

490

The 1994 intermediate reline of H-3 furnace  

SciTech Connect (OSTI)

LTV Steel`s Indiana Harbor Works H-3 Blast Furnace was rebuilt in 1988 to provide reliable operations at high production rates without damage to the shell for an overall campaign. This Rebuild included: (1) complete bosh and partial stack shell replacement; (2) a spray cooled carbon bosh; (3) a row of staves at the mantle and six rows of stack staves, all stack staves had noses (ledges at the top of the stave) with the exception of row 5; (4) silicon carbide filled semi graphite brick for the bosh, silicon carbide brick from the mantle area and to the top of stave row No. 1, super duty brick in front of the remaining staves and phosphate bonded high alumina brick in the upper stack; (5) movable throat armor; (6) upgraded instrumentation to follow furnace operation and lining wear occurring in the furnace. No work was done to the hearth walls and bottom, since these had been replaced in 1982 with a first generation graphite cooled design and has experienced 7.7 million NTHM. The furnace was blown in November 18, 1988 and operated through September 3, 1994, at which time it was blown down for its first intermediate repair after 7.85 million NTHM. This paper summarizes the operation of the furnace and then discusses the major aspects of the 1994 intermediate repair.

James, J.D.; Nanavati, K.S.; Spirko, E.J.; Wakelin, D.H.

1995-12-01T23:59:59.000Z

491

Tidal Capture of Stars by Intermediate-Mass Black Holes  

E-Print Network [OSTI]

Recent X-ray observations and theoretical modelling have made it plausible that some ultraluminous X-ray sources (ULX) are powered by intermediate-mass black holes (IMBHs). N-body simulations have also shown that runaway merging of stars in dense star clusters is a way to form IMBHs. In the present paper we have performed N-body simulations of young clusters such as MGG-11 of M82 in which IMBHs form through runaway merging. We took into account the effect of tidal heating of stars by the IMBH to study the tidal capture and disruption of stars by IMBHs. Our results show that the IMBHs have a high chance of capturing stars through tidal heating within a few core relaxation times and we find that 1/3 of all runs contain a ULX within the age limits of MGG-11, a result consistent with the fact that a ULX is found in this galaxy. Our results strengthen the case for some ULX being powered by intermediate-mass black holes.

H. Baumgardt; C. Hopman; S. Portegies Zwart; J. Makino

2005-11-27T23:59:59.000Z

492

Peptide concentration alters intermediate species in amyloid ? fibrillation kinetics  

SciTech Connect (OSTI)

Highlights: ? A?(1–40) aggregation in vitro has been monitored at different concentrations. ? A?(1–40) fibrillation does not always follow conventional kinetic mechanisms. ? We demonstrate non-linear features in the kinetics of A?(1–40) fibril formation. ? At high A?(1–40) concentrations secondary processes dictate fibrillation speed. ? Intermediate species may play significant roles on final amyloid fibril development. -- Abstract: The kinetic mechanism of amyloid aggregation remains to be fully understood. Investigations into the species present in the different kinetic phases can assist our comprehension of amyloid diseases and further our understanding of the mechanism behind amyloid ? (A?) (1–40) peptide aggregation. Thioflavin T (ThT) fluorescence and transmission electron microscopy (TEM) have been used in combination to monitor A?(1–40) aggregation in vitro at both normal and higher than standard concentrations. The observed fibrillation behaviour deviates, in several respects, from standard concepts of the nucleation–polymerisation models and shows such features as concentration-dependent non-linear effects in the assembly mechanism. A?(1–40) fibrillation kinetics do not always follow conventional kinetic mechanisms and, specifically at high concentrations, intermediate structures become populated and secondary processes may further modify the fibrillation mechanism.

Garvey, M., E-mail: megan.garvey@molbiotech.rwth-aachen.de [Max-Planck Research Unit for Enzymology of Protein Folding, Weinbergweg 22, 06120 Halle (Saale) (Germany); Morgado, I., E-mail: immorgado@ualg.pt [Max-Planck Research Unit for Enzymology of Protein Folding, Weinbergweg 22, 06120 Halle (Saale) (Germany)

2013-04-12T23:59:59.000Z

493

ACME | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICEACME | National Nuclear Security

494

pnnl | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions ProgramA R

495

policy | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions ProgramA R1 Apolicy |

496

rap | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions3Images. . .3 A5

497

robots | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrectiveResearchrfryRIGNaval

498

rsl | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium - RPSEA Publicationsrshoukrsl

499

sandia | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -| National

500

science | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -| NationalGhost7