National Library of Energy BETA

Sample records for introduction scada security

  1. Introduction SCADA Security for Managers and Operators | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Publications Intermediate SCADA Security Training Course Slides (September 2006) Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Recommended...

  2. Intermediate SCADA Security Training Course Slides (September...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Documents & Publications Introduction SCADA Security for Managers and Operators Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Mitigations for...

  3. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    E-Print Network [OSTI]

    Smith, Sean W.

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang Supervisory Control And Data Acquisition (SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA) systems

  4. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  5. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

  6. Secure SCADA Communication ProtocolPerformance Test Results ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked...

  7. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Environmental Management (EM)

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  8. sSCADA: Securing SCADA Infrastructure Communications Yongge Wang and Bei-Tseng Chu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    sSCADA: Securing SCADA Infrastructure Communications Yongge Wang and Bei-Tseng Chu Dept. of SIS control systems (DCS) and supervisory control and data acquisition (SCADA) systems were developed. This paper presents a suite of security protocols optimized for SCADA/DCS systems which include: point

  9. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems

    E-Print Network [OSTI]

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide@cs.dartmouth.edu #12;Contents 1 Introduction 3 1.1 SCADA Systems

  10. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection...

  11. Sandia Energy - The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Center for SCADA Security Assets Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure...

  12. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of the systems still in use today were designed to operate in closed, proprietary networks. National SCADA Test Bed - Enhancing control systems security in the energy sector...

  13. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Assessment Methods for SCADA Security Introduction SCADA Security for Managers and Operators Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks...

  14. SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Systems

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Estimators in SCADA systems is scrutinized. Index Terms--Cyber-Security, SCADA Systems, AGC, State Estimators in our society [1]. Large power systems are nowadays very complex and tightly coupled with the SCADA

  15. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version)

    E-Print Network [OSTI]

    YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version links between devices in legacy Supervisory Con- trol And Data Acquisition (SCADA) systems, on which security, and yet incurs minimal end-to-end communication latency. Keywords: SCADA network security, bump

  16. Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA Manya the views of the sponsors #12;1 Key Management for Secure Power SCADA By: Manya Sleeper Advisor: Sean Smith power SCADA systems that seeks to take advantage of the full security capacity of a given network

  17. Sandia Energy - SCADA FAQs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security for Electric Infrastructure National Supervisory Control and Data Acquisition (SCADA) SCADA Program Overview SCADA FAQs SCADA FAQsTara Camacho-Lopez2015-06-22T22:14:43+00:...

  18. Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability, and Security

    E-Print Network [OSTI]

    Heidemann, John

    Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability is that openness and support for disclosure of future SCADA data can in improved safety, reliability, and security-network processing are needed to make greater openness and data sharing data viable. Today's SCADA systems are often

  19. A Cyber Security Study of a SCADA Energy Management System: Stealthy

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State of state estimators in supervisory control and data acquisition (SCADA) systems for energy management on a state-of-the-art SCADA EMS software for a power network example with 14 substations, 27 buses, and 40

  20. Sandia Energy - SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Testbeds Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory...

  1. Hallmark Project Commercialization of the Secure SCADA Communications...

    Broader source: Energy.gov (indexed) [DOE]

    system devices. To ensure message integrity, supervisory control and data acquisition (SCADA) systems require a method to validate device-to-device communication and verify that...

  2. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  3. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost.

  4. Sandia Energy - SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security for Electric Infrastructure National Supervisory Control and Data Acquisition (SCADA) SCADA Program Overview SCADA Program OverviewTara Camacho-Lopez2015-05-11T18:41:05+00...

  5. Sandia Energy - National SCADA Testbed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National SCADA Testbed Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  6. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  7. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5-05-11T18:41:13+00:00 SCADA Security A Brief History The use of Supervisory Control and Data Acquisition (SCADA) systems and process control systems became popular in the 1960s as...

  8. Microsoft Word - PNNL-17118 Secure SCADA hadley SSCP FINAL with no ouo.doc

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i nAand DOE SafetyofDepartment. " 21 ran Wilson Blvd.OpinionSecure SCADA

  9. Introduction SCADA Security for Managers and Operators | Department of

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public Comment InterestedEnergyDepartment ofEnergy

  10. 3194 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 59, NO. 12, DECEMBER 2014 Efficient Computations of a Security Index for False

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Control and Data Ac- quisition (SCADA) systems for electric power networks for cer- tain cyber security, SCADA systems, smart grids. I. INTRODUCTION OUR society depends heavily on the proper operation (SCADA) systems. For instance, Manuscript received February 15, 2013; revised December 4, 2013; accepted

  11. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    E-Print Network [OSTI]

    Teixeira, André; Sandberg, Henrik; Johansson, Karl H

    2010-01-01

    The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication channels. Therefore cyber security for state estimators becomes an important issue. In this paper we analyze the cyber security of state estimators in supervisory control and data acquisition (SCADA) for energy management systems (EMS) operating the power network. Current EMS state estimation algorithms have bad data detection (BDD) schemes to detect outliers in the measurement data. Such schemes are based on high measurement redundancy. Although these methods may detect a set of basic cyber attacks, they may fail in the presence of an intelligent attacker. We explore the latter by considering scenarios where stealthy de...

  12. COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS

    E-Print Network [OSTI]

    1 COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS American Wind Energy/ Abstract This paper focuses on securing wind power Supervisory Control And Data Acquisition (SCADA) systems security vulnerabilities. To address these new vulnerabilities in wind power SCADA systems, we apply

  13. Sandia Energy - Research and Development of Next Generation Scada...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research and Development of Next Generation Scada Systems Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for...

  14. Accurate Modeling of the Siemens S7 SCADA ... JDFSL V9N2 ACCURATE MODELING OF THE SIEMENS S7

    E-Print Network [OSTI]

    Wool, Avishai

    Accurate Modeling of the Siemens S7 SCADA ... JDFSL V9N2 ACCURATE MODELING OF THE SIEMENS S7 SCADA is commonly used in SCADA systems for communications between a Human Machine Interface (HMI.82% of the traffic was identified as normal. Keywords: network, intrusion-detection, SCADA, S7 1. INTRODUCTION

  15. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1-11-04T14:51:33+00:00 SCADA History The use of Supervisory Control and Data Acquisition (SCADA) systems and process control systems became popular in the 1960s as a need arose to...

  16. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...

    Office of Environmental Management (EM)

    Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security...

  17. Security Lab Series Introduction to Web Technologies

    E-Print Network [OSTI]

    Tao, Lixin

    Security Lab Series Introduction to Web Technologies Prof. Lixin Tao Pace University http...........................................................................................................................................1 1.1 Web ArchitectureScript..................................................................................16 4.6 Creating Your First JavaServer Page Web Application

  18. A Real-Time Testbed Environment for Cyber-Physical Security on the Power Grid

    E-Print Network [OSTI]

    Koutsandria, Georgia; Gentz, Reinhard; Jamei, Mahdi; Peisert, Sean; Scaglione, Anna; McParland, Chuck

    2015-01-01

    and D. Nicol. SCADA Cyber Security Testbed Development. InOperation, Control and Cyber Security. In Proc. of the Northfully simulated testbed for cyber security of SCADA systems.

  19. A Real-Time Testbed Environment for Cyber-Physical Security on the Power Grid

    E-Print Network [OSTI]

    Koutsandria, Georgia; Gentz, Reinhard; Jamei, Mahdi; Peisert, Sean; Scaglione, Anna; McParland, Chuck

    2015-01-01

    T. Overbye, and D. Nicol. SCADA Cyber Security TestbedA Testbed for Secure and Robust SCADA Systems. SIGBED Rev. ,for Analyzing Security of SCADA Control Systems (TASSCS). In

  20. Remote Structural Health Monitoring Systems for Next Generation SCADA

    E-Print Network [OSTI]

    Chou, Pai H.

    Remote Structural Health Monitoring Systems for Next Generation SCADA Sehwan Kim1 Marco Torbol2, and to validate its effectiveness with long-term field deployment results. Keywords: structural health monitoring, SCADA system, remote monitoring system 1. INTRODUCTION Structural health monitoring (SHM) is the use

  1. Chapter 5. System security and ancillary Introduction

    E-Print Network [OSTI]

    Ernst, Damien

    Chapter 5. System security and ancillary services 1 #12;Introduction Markets for electrical energy of the other. 4 #12;Describing the needs for ancillary services Needs classified according to three different. Interactions for example between balancing and network issues. Ancillary services needed for addressing every

  2. University of Warwick Information Security Policy 1. Introduction

    E-Print Network [OSTI]

    Davies, Christopher

    University of Warwick Information Security Policy 1. Introduction The University recognises's strategic objectives. Information security is important to the protection of the University's reputation implications for individuals and is subject to legal obligations. The consequences of information security

  3. Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong Ulf Lindqvist Keith Skinner

    E-Print Network [OSTI]

    Cheung, Steven

    Using Model-based Intrusion Detection for SCADA Networks Steven Cheung Bruno Dutertre Martin Fong In a model-based intrusion detection approach for protecting SCADA networks, we construct models and a prototype implementation of them for monitoring Modbus TCP networks. Keywords: SCADA security, intrusion

  4. JOB SUMMARY JOB TITLE: RESEARCH FELLOW (Multi-Agent Systems for Large-Scale Evolving SCADA (Research Fellows

    E-Print Network [OSTI]

    Liu, Weiru

    JOB SUMMARY JOB TITLE: RESEARCH FELLOW (Multi-Agent Systems for Large-Scale Evolving SCADA, the research topics include: (i) developing multi-agent system architecture for supporting SCADA systems-agent environments and integrating planning knowledge; (iii) investigating security vulnerabilities in MAS for SCADA

  5. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Broader source: Energy.gov (indexed) [DOE]

    - Best Practice DesignConfiguration Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan...

  6. Toward Survivable SCADA Jonathan Kirsch

    E-Print Network [OSTI]

    Feder, Jeffrey

    Toward Survivable SCADA Jonathan Kirsch Siemens Technology to Business Center 1995 University the first survivable SCADA system ­ one capable of providing correct behavior with minimal performance degra faced while at- tempting to integrate modern intrusion-tolerant protocols with the SCADA architecture

  7. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  8. National SCADA Test Bed | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity Energy Delivery Systems Cybersecurity National SCADA Test Bed National SCADA Test Bed Created in 2003, the National SCADA Test Bed (NSTB) is a one-of-a-kind...

  9. Data Privacy and Data Security Introduction to Data Mining

    E-Print Network [OSTI]

    Zhang, Jun

    Data Privacy and Data Security Chapter 1 Introduction to Data Mining Jun Zhang January 13, 2011 © Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 1 #12;Why Mine Data? Commercial Viewpoint ) © Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 2 Customer Relationship Management) #12;Why

  10. Real-Time SCADA Cyber Protection Using Compression Techniques

    SciTech Connect (OSTI)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

  11. Hobsons Information Security Introduction and Purpose

    E-Print Network [OSTI]

    Aickelin, Uwe

    . Among the foreseeable risks are external hacks, unauthorised access, thefts, inadvertent destruction of access by employees, students or business associates. The Data Security Coordinator, along with other

  12. Framework for SCADA Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015ExecutiveFluorescent LampFort Collins,47328 Vol. 77, No.Framework

  13. Introduction to Brookhaven National Laboratory

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool Fits the BillDepartment ofEnergy Introduction SCADA Security for Managers

  14. Stealthy Deception Attacks on Water SCADA Systems

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

  15. Dartmouth Information Security Control Objectives (Jan 2013, version 5.1 ) Introduction

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Dartmouth Information Security Control Objectives (Jan 2013, version 5.1 ) Introduction This document contains the information security control requirements for Dartmouth College. The Dartmouth Information Security Commitee (DISC) developed these controls based on industry best practice, using Dartmouth

  16. Closing the Gap on Securing Energy Sector Control Systems [Guest editors' introduction

    E-Print Network [OSTI]

    Peisert, Sean; Margulies, Jonathan

    2014-01-01

    of course Stuxnet—the state of energy security might not bein the fi eld of energy security today is the application ofENERGY CONTROL SYSTEMS SECURITY GUEST EDITORS’ INTRODUCTION

  17. On Cyber Security for Networked Control Systems Saurabh Amin

    E-Print Network [OSTI]

    random failures and secu- rity attacks. Cyber-security of Supervisory Control and Data Acquisition (SCADA, cyber-security assessment for SCADA systems is performed based on well-defined attacker and defender objectives. The mathematical model of SCADA systems considered in this work has two control levels

  18. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    SciTech Connect (OSTI)

    Marco Carvalho; Richard Ford

    2012-05-14

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

  19. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    September 2007. B. T. Richardson, J. Michalski, Security Framework for Control System Data Classification and Protection, Tech. Rep. SAND2007-3888P, Sandia National...

  20. Introduction to Renewable Energy Project Finance Structures | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool Fits the BillDepartment ofEnergy Introduction SCADA Security for

  1. "Supervisory Control and Data Acquisition (SCADA) Systems." The...

    Office of Environmental Management (EM)

    "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8...

  2. Metrics for the National SCADA Test Bed Program

    SciTech Connect (OSTI)

    Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

    2008-12-05

    The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

  3. Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy

    E-Print Network [OSTI]

    Roughan, Matthew

    and Data Acquisition (SCADA) networks that control power stations, water distribution, factory au- tomation best prac- tice specifications to real SCADA firewall configurations and evaluate their usefulness-Communication Networks]: General-- security and protection Keywords SCADA network security; Zone-Conduit model; firewall

  4. Introduction to SCADA Protection and Vulnerabilities

    SciTech Connect (OSTI)

    Ken Barnes; Briam Johnson; Reva Nickelson

    2004-03-01

    Even though deregulation has changed the landscape of the electric utility industry to some extent, a typical large electric utility still owns power generation facilities, power transmission and distribution lines, and substations. Transmission and distribution lines form the segments or spokes of a utility’s grid. Power flow may change through these lines, but control of the system occurs at the nodes of the grid, the generation facilities, and substations. This section discusses each of these node types in more detail as well as how each is controlled.

  5. A Greek (Privacy) Tragedy: The Introduction of Social Security Numbers in Greece

    E-Print Network [OSTI]

    Ioannidis, Sotiris

    A Greek (Privacy) Tragedy: The Introduction of Social Security Numbers in Greece Eleni Gessiou of AMKA in Greece in the future, along the lines of the Social Security Number in the US. 1. INTRODUCTION that is made publicly available (e.g., on the face of student ID cards at Universities [5]). Greece recently

  6. Sandia Energy - National SCADA Testbed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal Energy &Water Power&GridMonitoringNational SCADA

  7. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  8. Sandia Energy - SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering Solutions Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  9. Sandia Energy - SCADA Training Courses

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Courses Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control...

  10. Cyber Assessment Methods for SCADA Security

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p aDepartmentEnergyEveryCustomer Service Handbook Marchby ISA - The

  11. Secure ICCP IntegrationConsiderations and Recommendations | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Impacts of IPv6 on Infrastructure Control Systems SECURITY CORE FUNCTION AND DEFINITION REPORT Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks...

  12. Control Systems Cyber Security: Defense in Depth Strategies ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security: Defense in Depth Strategies More Documents & Publications Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Mitigations for...

  13. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  14. Flatness-based control of an irrigation canal using SCADA

    E-Print Network [OSTI]

    Flatness-based control of an irrigation canal using SCADA Tarek Rabbani, Simon Munier, David-time irrigation operations using a supervision, control, and data acquisition (SCADA) system with automatic

  15. Remote Structural Health Monitoring Systems for Next Generation SCADA

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    Remote Structural Health Monitoring Systems for Next Generation SCADA Sehwan Kim1 Marco Torbol2 supervisory control and data acquisition (SCADA) system for civil infrastructure systems. To evaluate pipelines. The objectives of this article are to improve upon the existing SCADA by integrating the remote

  16. Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin Department of CEE UC Berkeley, CA the vulnerabilities of Supervisory Control and Data Acquisition (SCADA) systems which mon- itor and control the modern systems are mon- itored and controlled by Supervisory Control and Data Ac- quisition (SCADA) systems

  17. Manuscript title -SCADA systems: Challenges for forensic investigators Irfan Ahmed

    E-Print Network [OSTI]

    Richard III, Golden G.

    1 Manuscript title - SCADA systems: Challenges for forensic investigators Irfan Ahmed, LA 70148, United States golden@cs.uno.edu #12; 2 SCADA systems: Challenges for forensic investigators Irfan Ahmed, Sebastian Obermeier, Martin Naedele, Golden G. Richard III Abstract SCADA systems run

  18. Introduction to DMFCs - Advanced Materials and Concepts for Portable Power

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool Fits the BillDepartment ofEnergy Introduction SCADA Security for ManagersFuel

  19. Introduction to SAE Hydrogen Fueling Standardization | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool Fits the BillDepartment ofEnergy Introduction SCADA Security forSAE Hydrogen

  20. Introduction to an Energy Management System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool Fits the BillDepartment ofEnergy Introduction SCADA Security forSAE

  1. Use of SCADA Data for Failure Detection in Wind Turbines

    SciTech Connect (OSTI)

    Kim, K.; Parthasarathy, G.; Uluyol, O.; Foslien, W.; Sheng, S.; Fleming, P.

    2011-10-01

    This paper discusses the use of existing wind turbine SCADA data for development of fault detection and diagnostic techniques for wind turbines.

  2. Good Practice Guide on Firewall Deployment for SCADA and Process...

    Broader source: Energy.gov (indexed) [DOE]

    In recent years, Supervisory Controls and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial information...

  3. Good Practice Guide on Firewall Deployment for SCADA and Process...

    Broader source: Energy.gov (indexed) [DOE]

    Controls and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial information technologies for both critical...

  4. Introduction to Mortgage-Backed Securities c 2008 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 969

    E-Print Network [OSTI]

    Lyuu, Yuh-Dauh

    Introduction to Mortgage-Backed Securities c 2008 Prof. Yuh-Dauh Lyuu, National Taiwan University Taiwan University Page 971 #12;Mortgage-Backed Securities · A mortgage-backed security (MBS) is a bond backed by an undivided interest in a pool of mortgages. · MBSs traditionally enjoy high returns, wide

  5. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program Multi-Year...

  6. SCADA computer sytem controls major Saudi Aramco crude oil pipeline

    SciTech Connect (OSTI)

    Dempsey, J.; Al-Habib, R. [Saudi Aramco, Dhahran (Saudi Arabia)

    1996-12-31

    A replacement Supervisory Control and Data Acquisition (SCADA) computer system which monitors and controls two 1,100 kilometer pipelines and eleven associated pump stations is described. The SCADA system was designed to meet two objectives: (1) decentralize the overall control system and provide a distributed control system capable of regulatory control at each pump and pressure reducing station, and (2) provide system wide monitoring and supervisory control function during normal operations at the crude oil terminal. The SCADA computer system hardware (host computers and consoles), software modules, and applications are overviewed. A data flow diagram and a hardware configuration diagram are provided. 3 figs.

  7. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Attacks Against Water SCADA Systems . . . . . . . . . .2 d (bottom) [simulated results]. . Gignac SCADA supervisoryGignac canal network and SCADA system . . . . . . . . .

  8. DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan This document is designed to help guide and strengthen the DOE...

  9. Introduction

    SciTech Connect (OSTI)

    Backlund, Peter; Janetos, Anthony C.; Schimel, David; Hatfield, Jerry; Ryan, Mike; Archer, Steven; Lettenmaier, D. P.

    2008-12-01

    An introduction to the Effects of Climate Change on Agriculture, Land Resources, Water Resources, and Biodiversity Book

  10. Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

    2006-01-01

    We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

  11. Risk analysis via heterogeneous models of SCADA interconnecting Power Grids and Telco Networks

    E-Print Network [OSTI]

    Tronci, Enrico

    Risk analysis via heterogeneous models of SCADA interconnecting Power Grids and Telco Networks A and Data Acquisition (SCADA) systems has led to an improvement of Power Grid operations and functionalities power grid services are increasingly depending upon the adequate functionality of SCADA system which

  12. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA Yong Wang1 to the Supervisory Con- trol And Data Acquisition (SCADA) system. Several intrusion detection schemes have been-graph-based detection scheme to defeat false data injec- tion attacks at the SCADA system, even when injected data may

  13. BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur

    E-Print Network [OSTI]

    Kundur, Deepa

    BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur for implementation across multiple resource constrained SCADA field devices in the smart grid. The predictable and regular nature of the SCADA communication patterns is exploited to detect intrusions in the field devices

  14. An Architecture of a Multi-Agent System for SCADA -dealing with uncertainty, plans and actions

    E-Print Network [OSTI]

    Liu, Weiru

    An Architecture of a Multi-Agent System for SCADA - dealing with uncertainty, plans and actions.loughlin@ecit.qub.ac.uk Keywords: Autonomous Agents, Multi-agent Systems, Sensors, SCADA, Uncertainty, Plans, Actions, Fusion in traditional SCADA systems deployed in critical environments such as electrical power generation, transmission

  15. 60 IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 1, JANUARY 2014 Survivable SCADA Via

    E-Print Network [OSTI]

    Amir, Yair

    60 IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 1, JANUARY 2014 Survivable SCADA Via Intrusion availability of their SCADA systems. This paper reports on our experience designing, architecting, and evaluating the first survivable SCADA system--one that is able to ensure cor- rect behavior with minimal

  16. PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA

    E-Print Network [OSTI]

    by Rouslan V. Solomakhin DARTMOUTH COLLEGE Hanover, New Hampshire June 2010 Dartmouth Computer Science and by the Department of Energy under Award Number DE-OE0000097. I am grateful to Paul Myrda of Electric Power Research

  17. 21 Steps to Improve Cyber Security of SCADA Networks | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are...

  18. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Environmental Management (EM)

    vendors or asset owners and the INL. The vendors and owners provided software, hardware, training, and technical support. The INL performed the cyber assessments and reported the...

  19. Framework for SCADA Security Policy (October 2005) | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report toDepartment ofEnergy4Decathlon |Management andModern

  20. Hallmark Project Commercialization of the Secure SCADA Communications

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report11, SolarMatFermiGuido

  1. Secure SCADA Communication ProtocolPerformance Test Results | Department of

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLE DIRECTIVES Pursuant to the contract clause entitled,Energy

  2. Intermediate SCADA Security Training Course Slides (September 2006) |

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA Public Comment Interested Parties - WAPAInterimCaseDepartment

  3. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA PublicLED ADOPTION REPORTLand2 Lessons Learned01

  4. Sandia Energy - The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)GeothermalFuel Magnetization andStochasticunique wind measurements toThe

  5. Cyber Assessment Methods for SCADA Security | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-in electric vehicle (PEV)Day-June2012environment 3D31,paper describes

  6. Basic SCADA systems - from the sensors to the screen

    SciTech Connect (OSTI)

    Merlie, B.

    1995-12-01

    Supervisory Control and Data Acquisition (SCADA) Systems are specialized control systems used to monitor and control facilities which are geographically dispersed. They are commonly used in the gas, oil, electric, and water transmission and distribution industries. SCADA systems differ from other control systems in that they make extensive use of remote communications and are more tolerant to outages of the communications network than a typical control system installation in a plant environment. A basic SCADA system can be broken into five functional parts. These are: (1) Sensors and Actuators; (2) Remote Terminal Units (RTUs); (3) Communications Facilities; (4) Host Computer Systems; and (5) User Interfaces While the fundamental concepts of SCADA systems have changed little in the past 20 years, more sophisticated hardware and software has altered some of the traditional paradigms associated with these control systems. This is particularly true with respect to RTUs, host computer systems, and user interfaces. While this paper will focus on the fundamentals, it will attempt to provide the reader with current trends in the industry where applicable.

  7. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  8. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATIONIntroducing the Richard P. Feynman Center forx Introduction

  9. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATIONIntroducing the Richard P. Feynman Center forxIntroduction to

  10. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATIONIntroducing the Richard P. Feynman Center forxIntroduction

  11. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATIONIntroducing the Richard P. Feynman Center forxIntroduction

  12. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. ABB and Energy Utilities Form Consortium to Fund...

  13. Enabling Interoperability and Extensibility of Future SCADA Systems Wei Ye and John Heidemann

    E-Print Network [OSTI]

    Heidemann, John

    the sen- sor coverage. For example, in a SCADA system devel- oped for oil and gas fields, the RTUs- rent RTUs makes it hard to extend the SCADA from one application to another. This position paper argues is based on the application of oil and gas field monitoring, a collabo- rative effort between USC

  14. Intrusion Detection in SCADA Networks Rafael Ramos Regis Barbosa and Aiko Pras

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of a novel flow-based intrusion detection system. Based on the assumption that SCADA net- works are well facilities such as water distribution infrastructures, electricity generation plants and oil refineries need proposal to address the problem of intru- sion detection in SCADA networks. Based on the assumption

  15. Introduction Introduction

    E-Print Network [OSTI]

    Brass, Stefan

    : ``Introduction''. . Fry/Sibley: Evolution of data­base management systems. ACM Computing Surveys 8(1), 71. Introduction 1­1 Part 1: Introduction References: . Elmasri/Navathe:Fundamentals of Database Systems, 3rd Edition, 1999. Chapter 1, ``Databases and Database Users'' Chapter 2, ``Database System

  16. Evaluating Equipment Performance Using SCADA/PMS Data for Thermal Utility Plants - Case Studies 

    E-Print Network [OSTI]

    Deng, X.; Chen, Q.; Xu, C.

    2007-01-01

    Acquisition Plant Monitoring Systems (SCADA/PMS) or Energy Management and Control Systems (EMCS) to monitor sensors, display data, control equipment, activate alarms and log information. However, the utilization and interpretation of the logged data are often...

  17. Introduction Introduction

    E-Print Network [OSTI]

    Brass, Stefan

    .g. in the HTML specifica­ tion. Stefan Brass: Grundlagen des World Wide Web UniversitË? at Halle, 2006 5 Wide Web UniversitË? at Halle, 2006 #12; 5. Introduction to SGML and XML 5­5 SGML (2) HTML! HTML> Stefan Brass: Grundlagen des World Wide Web UniversitË? at Halle, 2006 5. Introduction

  18. Introduction Introduction

    E-Print Network [OSTI]

    Brass, Stefan

    .g. in the HTML specifica­ tion. Stefan Brass: Grundlagen des World Wide Web UniversitË? at Halle, 2011 5 Wide Web UniversitË? at Halle, 2011 #12; 5. Introduction to SGML and XML 5­5 SGML (2) HTML! HTML> Stefan Brass: Grundlagen des World Wide Web UniversitË? at Halle, 2011 5. Introduction

  19. Degree project in Communication Systems

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    ). Keyword: SCADA, PLC, SCADA security, SCADA networks, PLC security, Trusted computing, TCM, TPM, Embedded). Nyckelord:SCADA, PLC, SCADA säkerhet, SCADA-nätverk, PLC säkerhet, pålitlig datoranvändning, TCM, TPM

  20. Introduction Introduction

    E-Print Network [OSTI]

    Brass, Stefan

    Handbook. Clarendon Press, 1990. . Henning Lobin: Informationsmodellierung in XML und SGML. Springer­Verlag, 1999. . C. M. Sperberg­McQueen and Lou Burnard (Eds.): A Gentle Introduction to SGML. [http Specification. Prentice Hall, 1999. . Tim Bray, Jean Paoli, C.M. Sperberg­McQueen: Extensible Markup Language

  1. USC/ISI Technical Report ISI-TR-625, October 2006 1 Enabling Interoperability and Extensibility of Future SCADA Systems

    E-Print Network [OSTI]

    Heidemann, John

    system devel- oped for oil and gas fields, the RTUs are usually places at production wells and injection the problem without waiting. The rigid design of cur- rent RTUs makes it hard to extend the SCADA from one and extensibility of future SCADA systems. Our work is based on the application of oil and gas field monitoring

  2. Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Discrete Event Simulation of QoS of a SCADA System Interconnecting a Power Grid and a Telco Network, Telco network and Power grid act as a whole heterogeneous network. While SCADA system and Telco network can be well represented by means of discrete event simulators. To represent a Power grid a continuous

  3. IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JUNE 2010 99 Security Technology for Smart Grid Networks

    E-Print Network [OSTI]

    Hu, Fei

    IEEE TRANSACTIONS ON SMART GRID, VOL. 1, NO. 1, JUNE 2010 99 Security Technology for Smart Grid for a smart grid system, including public key infrastructures and trusted computing. Index Terms--Attestation, public key infrastructure (PKI), Su- pervisory Control And Data Acquisition (SCADA), security, smart grid

  4. Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding

    SciTech Connect (OSTI)

    Yan, Guanhua [Los Alamos National Laboratory; Nicol, David M [UNIV OF IL; Jin, Dong [UNIV OF IL

    2010-12-16

    The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

  5. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  6. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Broader source: Energy.gov (indexed) [DOE]

    and Theif Associated Mitigations (2006) More Documents & Publications Introduction SCADA Security for Managers and Operators TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND...

  7. Energy Control Centers 1.0 Introduction

    E-Print Network [OSTI]

    McCalley, James D.

    terminal unit SCADA Master Station Communicationlink Energy control center with EMS EMS alarm display EMS 1), the supervisory control and data acquisition (SCADA), and the communications interconnecting the EMS and the SCADA (which is often thought of as part of the SCADA itself). Figure 3a [1] provides a block diagram

  8. Cyber Security Analysis of State Estimators in Electric Power Systems Andre Teixeira, Saurabh Amin, Henrik Sandberg, Karl H. Johansson, and Shankar S. Sastry

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Cyber Security Analysis of State Estimators in Electric Power Systems Andr´e Teixeira, Saurabh Amin, Henrik Sandberg, Karl H. Johansson, and Shankar S. Sastry Abstract-- In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power

  9. Secure Demand Shaping for Smart Grid On constructing probabilistic demand response schemes

    E-Print Network [OSTI]

    Sastry, S. Shankar

    Secure Demand Shaping for Smart Grid On constructing probabilistic demand response schemes. Developing novel schemes for demand response in smart electric gird is an increasingly active research area/SCADA for demand response in smart infrastructures face the following dilemma: On one hand, in order to increase

  10. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY 1

    E-Print Network [OSTI]

    Security of Water SCADA Systems--Part II: Attack Detection Using Enhanced Hydrodynamic Models Saurabh Amin detection, supervisory control and data acquisition (SCADA) systems, supervisory control. I. INTRODUCTION with supervisory control and data acquisition (SCADA) systems to enable communications, sensing, and control. Real

  11. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY 1

    E-Print Network [OSTI]

    Security of Water SCADA Systems--Part I: Analysis and Experimentation of Stealthy Deception Attacks Saurabh, supervisory control and data acquisition (SCADA) systems, supervisory control. I. INTRODUCTION NETWORKED in the so-called supervisory control and data acquisition (SCADA) systems are being replaced by Internet

  12. I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N ( ) Available online at www.sciencedirect.com

    E-Print Network [OSTI]

    Locasto, Michael E.

    grid depends on embedded control systems or SCADA systems to function properly. Securing these systems presents unique challenges--in addition to the resource restrictions inherent to embedded devices, SCADA for SCADA systems. c 2012 Published by Elsevier B.V. 1. Introduction The world's critical infrastructure has

  13. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  14. Introduction and Motivation Our Contribution

    E-Print Network [OSTI]

    Mohassel, Payman

    Introduction and Motivation Our Contribution Summary Efficient Polynomial Operations in the Shared PKC 2006 1 / 19 #12;Introduction and Motivation Our Contribution Summary Outline 1 Introduction and Motivation Secure Multiparty Computation Motivation 2 Our Contribution Overview Protocols 2 / 19 #12

  15. The Drinking Water Security and Safety Amendments of 2002: Is America's Drinking Water Infrastructure Safer Four Years Later?

    E-Print Network [OSTI]

    Shermer, Steven D.

    2006-01-01

    and Data Acquisition ("SCADA") systems for managing keyprominent vulnerability. 137 "SCADA systems allow utilitywww.securityfocus.com/news/319. SCADA systems are used in

  16. National SCADA Test Bed Substation Automation Evaluation Report

    SciTech Connect (OSTI)

    Kenneth Barnes; Briam Johnson

    2009-10-01

    Increased awareness of the potential for cyber attack has recently resulted in improved cyber security practices associated with the electrical power grid. However, the level of practical understanding and deployment of cyber security practices has not been evenly applied across all business sectors. Much of the focus has been centered on information technology business centers and control rooms. This report explores the current level of substation automation, communication, and cyber security protection deployed in electrical substations throughout existing utilities in the United States. This report documents the evaluation of substation automation implementation and associated vulnerabilities. This evaluation used research conducted by Newton-Evans Research Company for some of its observations and results. The Newton Evans Report aided in the determination of what is the state of substation automation in North American electric utilities. Idaho National Laboratory cyber security experts aided in the determination of what cyber vulnerabilities may pose a threat to electrical substations. This report includes cyber vulnerabilities as well as recommended mitigations. It also describes specific cyber issues found in typical substation automation configurations within the electric utility industry. The evaluation report was performed over a 5-month period starting in October 2008

  17. Trusted Cloud: Microsoft Azure Security, Privacy,

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance April 2015 #12;Trusted Cloud................................................................. 18 #12;Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance | April, 2015 Introduction: Microsoft Azure Security, Privacy, and Compliance | April, 2015 #12;3 Contents Introduction

  18. Development and Demonstration of a Security Core Component

    SciTech Connect (OSTI)

    Turke, Andy

    2014-02-28

    In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more data about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from “normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.

  19. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURING OFFICE INDUSTRIALU.S.Leadership on Clean Energys o u t h e aLessie00 Lessons12U.S.

  20. National SCADA Test Bed - Enhancing control systems security in the energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties -Department ofDepartment ofEnergy NationalNationalonsector

  1. 21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12 Beta-3 Racetracks25 AMO PeerServices6 DOE SSL R&D2016

  2. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12 Beta-3 Racetracks25 AMOSystem forAAPG Low-TemperatureDepartment

  3. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-in electric vehicle (PEV)Day-June2012environment 3D31,paper describesMay 2008

  4. Networking and Security Research Center

    E-Print Network [OSTI]

    Smith, Adam D.

    ]. The increased network connectivity and standardization of Super- visory Control and Data Acquisition (SCADA and SCADA devices can be found through the Shodan search engine [1, 14]. An adversary with PLC access can

  5. Introduction to NISTIR 7628 Guidelines for

    E-Print Network [OSTI]

    Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security The Smart Grid................................................................................................................3 2. Cyber Security Context: Today's Grid, Tomorrow's Smart Grid...........................................................17 4.1 Research and Development Themes for Smart Grid Cyber Security

  6. Opportunities for Energy Efficiency and Automated Demand Response in Industrial Refrigerated Warehouses in California

    E-Print Network [OSTI]

    Lekov, Alex

    2009-01-01

    Laboratories - The Center for SCADA Security. "Securing ourhttp://www.sandia.gov/scada/home.htm. Siemens. (2008). "20 Figure 4. Principal Scheme of a SCADA

  7. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  8. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  9. ADA/SCADA RTU protocol based on the 3-layer UCA model

    SciTech Connect (OSTI)

    Adamo, V.P.

    1995-12-31

    This paper describes an implementation of a DA/SCADA RTU communication protocol based on the 3-layer reference model for wide area networks specified in the Utility Communications Architecture (UCA) VL1.0. This protocol is based on the following international standards: EIA-232-D, High-level Data Link Control (HDLC) [ISO/IEC 3309], and Manufacturing Message Specification (MMS) [ISO/IEC 95061]. A description of the HDLC frame structure used in this implementation is provided. This includes a description of the extended transparency option for Start/Stop transmission, commonly referred to as {open_quotes}asynchronous HDLC{close_quotes}. This option allows for the transmission of HDLC frames using inexpensive asynchronous communication hardware. The data link topology described in this paper is an unbalanced, point-to-multipoint topology consisting of one primary, or, master station, and multiple secondary, or remote, stations. The data link operates in the Normal Response Mode (NRM). In this mode a secondary station may initiate transmissions only as a result of receiving explicit permission to do so from the primary station. The application layer protocol described in this paper is an implementation of the Manufacturing Message Specification (MMS). The MMS device model, or Virtual Manufacturing Device (VMD), for a DA/SCADA Remote Terminal Unit is provided. The current VMD model provides a view of common RTU data types, plus, A/C Input (ACI) data including phasor magnitude and mean readings, harmonics, and overcurrent alarm information.

  10. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  11. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  12. Security Certification & Accreditation of Federal Information Systems A Tutorial

    E-Print Network [OSTI]

    Madisetti, Vijay K.

    Security Certification & Accreditation of Federal Information Systems A Tutorial An Introduction Madisetti, 06/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Tutorial Outline Objectives & Introduction: C&A Information Security Certification & Accreditation Foundations (as

  13. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  14. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  15. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  16. Security Design and Information Aggregation in Markets

    E-Print Network [OSTI]

    Chen, Yiling

    Security Design and Information Aggregation in Markets Yiling Chen Anthony M. Kwasnica Abstract that information aggregation ability of markets is affected by the security design. Behavior of individual Keywords: Security design; Information aggregation; Information market; Price convergence. 1 Introduction

  17. INTRODUCTION Nature's microbiome: introduction

    E-Print Network [OSTI]

    ). But outside this field, nature's microbiome--the communities of microbes colonizing host eukaryotes (LederbergINTRODUCTION Nature's microbiome: introduction JACOB A. RUSSELL,* NICOLE DUBILIER and JENNIFER A of New Mexico, Albuquerque, NM 87131, USA Keywords: metagenomics, microbiome, next generation sequencing

  18. Abstract --Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities

    E-Print Network [OSTI]

    Thompson, Mary R.

    1 Abstract -- Securing a Grid environment presents a distinctive set of challenges. This paper the security requirements of Grids more completely. Index Terms -- Grid security, authentication, authorization, trust management, secure communication, security policy I. INTRODUCTION The goal of Grid Computing

  19. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    » Cybercrime and cyberterrorism » Information technology of little use without security 3 #12;GEORGGEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2

  20. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  1. Security Cases

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Financing Tool FitsProjectDataSecretary Moniz's OpenEnergy SCADA

  2. Ris Energy Report 3 Introduction

    E-Print Network [OSTI]

    from water. Another driver of growing importance is the security of future energy supplies energy resource, and thus is a good way to diversify energy production and increase security of supply5.6 Risø Energy Report 3 Introduction "Hydrogen infrastructure" refers to the physical links

  3. Digital field-bus mode SCADA is key to offshore efficiency. [Automation of offshore gas production platforms

    SciTech Connect (OSTI)

    Cuthbert, P. )

    1994-02-01

    An all-digital SCADA network has been installed in one of the North Sea's largest natural gas fields, controlling the delivery of gas from Shell UK Exploration and Production's souther-area fields to a British Gas Terminal at Bacton, UK. The innovative use of digital technology -- based on the industry-standard HART field protocol -- to complete a digital communications link stretching from the onshore SCADA host right out to the process variable transmitters on the platforms, is playing a key role in the automation of the monitoring and control system by allowing Shell UK Expro to run the majority of the platforms unmanned. The SCADA system is part of a major refit being carried out by Shell Expro on its Leman field. The refit is part of the company's long-term strategy to extend the lifetime of this established field, which started operations in the late 1960s. In order to meet this goal, the prime requirements are to reduce operational costs and risk exposure, and the key element in this area was to reduce the need for resident staff and all of their associated support and equipment costs, through the deployment of automation. The system will achieve the project's cost-cutting aims, but also break new ground in control and monitoring technology for the gas industry, through the use of a smart transmitter scheme as a digital field communications within the wide-area network, using the protocol's all-digital capability in preference to the commonly used 4-20mA-compatible mode, will allow real-time monitoring and control, plus maintenance and diagnostics, to take place remotely. This paper describes the design of this system.

  4. Turtles All The Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems

    E-Print Network [OSTI]

    Peisert, Sean; Talbot, Ed; Bishop, Matt

    2012-01-01

    are critical systems, and many operate in a SCADA fashion.Like any other SCADA system, they can be compromised at the

  5. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  6. ABB SCADA/EMS System INEEL Baseline Summary Test Report (November...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ABB SCADAEMS System INEEL Baseline Summary Test Report (November 2004) ABB SCADAEMS System INEEL Baseline Summary Test Report (November 2004) This document covers the security...

  7. University of Aberdeen Information Security Policy

    E-Print Network [OSTI]

    Levi, Ran

    University of Aberdeen Information Security Policy December 2007 #12;1 INTRODUCTION 1.1 WHAT IS INFORMATION SECURITY AND WHY DO WE NEED TO THINK ABOUT IT? 1.1.1 Information Security is the practice of Information Security includes: Systems being unavailable Bad publicity and embarrassment Fraud

  8. A Scalable Approach for the Secure and Authorized Tracking of the Availability of Entities in Distributed Systems

    E-Print Network [OSTI]

    , security and authorization 1. Introduction Over the past decade we have witnessed the proliferation

  9. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  10. Secure Pesticide Storage: Security and Safety-promoting Features of Pesticide Storage Facilities1

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    PI32 Secure Pesticide Storage: Security and Safety-promoting Features of Pesticide Storage pesticide storage facility security and safety. Introduction In actual practice, the fundamental goal of "security" is always the same: effective safeguard. Therefore, certain features of a pesticide storage

  11. Java Programming MSc. Internet Security

    E-Print Network [OSTI]

    Hill, Gary

    Java Programming MSc. Internet Security - 1 - Table of content Introduction Appendices............................................................................. 70 #12;Java and accompanying application using Java 3D coding. The developed application, in a Java 3D environment, will form

  12. An Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction to Regional Energy Efficiency Organizations www.nwcouncil.org www.neea.org www.nwcouncil.orgrtf www.bpa.gov Northwest Power and Conservation Council Regional...

  13. Introduction computation

    E-Print Network [OSTI]

    Escardó, Martín

    Introduction to exact numerical computation Notes for a tutorial at ISSAC 2000 Mart#19; #16;n August 2000 Contents 1 Introduction 2 2 Floating-point computation 4 3 Exact numerical computation 8 4) for computing a syntactical representative of the mathematical entity denoted by a program (called the se

  14. Ris Energy Report 3 Introduction

    E-Print Network [OSTI]

    problems related to security of supply, climate change and environmental degradation, but hydrogen energy4 Risø Energy Report 3 Introduction Hydrogen used as an energy carrier may not solve all our energy in combination with fuel cells may fit well into a future energy system based on renewables. If Denmark

  15. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  16. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    Williams, “Security issues in SCADA networks,” Computers andA Cyber Security Study of a SCADA Energy Management System,”and transmitted over a SCADA network to the system operator.

  17. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  18. Introduction Preparation

    E-Print Network [OSTI]

    Introduction Motivation Preparation Notos' Components Results Conclusions and Future Work Building Problem Description and Motivation Preparation Notation, Passive DNS trends and Anchor Classes Notos Reputation Results Conclusions and Future Work Special thanks to: Damballa Passive DNS data, Malware and BL

  19. Security Lab Series Introduction to Cryptography

    E-Print Network [OSTI]

    Tao, Lixin

    ......................................................................................7 4.2 Symmetric Key Encryption/Decryption with GPG/Decryption .....................................................11 4.3.1 Basic Concepts of PGP (GPG) Digital Certificates and Public Key Ciphers...............11 4.3.2 A Detailed Lab Guide for GPG

  20. U.S. DOE/OE National SCADA Test Bed Supports | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Laclede GasEfficiency| DepartmentSecurity |KnowVEINNA,10.2To help advance the

  1. Watermarking Security Part One: Theory Francois Cayrea, Caroline Fontaineb, and Teddy Furona

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    's mutual information and Fisher's information matrix) can measure this leakage of information. The security atermarking, Security, Equivocation, Fisher information matrix. 1. INTRODUCTION Digital watermarking studies information security) despite its robustness. However, they only deal with dedicated attacks relevant

  2. The Handbook of Information Security 25. Routers and Switches The Handbook of Information Security

    E-Print Network [OSTI]

    Dommel, Hans-Peter

    The Handbook of Information Security 25. Routers and Switches 1 The Handbook of Information Security John Wiley & Sons Chapter 25. Routers and Switches Mar 31, 2005 - FINAL VERSION - #12;The Handbook of Information Security 25. Routers and Switches 2 OUTLINE INTRODUCTION Principles of Routing and Switching

  3. Introduction Programming

    E-Print Network [OSTI]

    De Saporta, Benoîte

    ;Optimal Portfolio Allocation 3/39 Benoîte de Saporta Introduction Motivation Framework Value Function Results Value Function An Efficient Strategy Comparison of Strategies #12;Optimal Portfolio Allocation 4 function Find an optimal strategy (if it exists) #12;Optimal Portfolio Allocation 5/39 Benoîte de Saporta

  4. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  5. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  6. On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    is supervised and controlled through Supervisory Control And Data Acquisition (SCADA) systems. Using remote terminal units (RTUs), SCADA systems measure data such as trans- mission line power flows, bus power to significant social and eco- nomical consequences such as the northeast US blackout of 2003 [3]. As the SCADA

  7. Secure Control: Towards Survivable Cyber-Physical Systems Alvaro A. Cardenas Saurabh Amin Shankar Sastry

    E-Print Network [OSTI]

    Hu, Fei

    the role of existing ones ­such as Supervisory Control and Data Acquisition (SCADA) systems. s1 s3 s2 s4 irreparable harm to the physical system being controlled and to people who depend on it. SCADA systems of the effort for protecting CPS systems (and SCADA in particular) has been done in reliability (the protection

  8. Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation

    E-Print Network [OSTI]

    Wang, Yongge

    and a set of measurements acquired through a Supervisory Control and Data Acquisition (SCADA) system) applications for the power grid. However, critical infrastructures relying on SCADA based measurements) are gradually being deployed, still the current grid largely relies on extensive SCADA measurements for several

  9. True Random Number Generators Mario Stipcevic and etin Kaya Ko

    E-Print Network [OSTI]

    , prepaid cards, wireless keys, general cybersecurity, distributed power grid security (SCADA), etc. Without

  10. OIC Introduction

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties -DepartmentAvailable forSite |n t78 I.(NationalOE'sOHA SecurityOHIOOIC

  11. NIST Special Publication 800-82 Guide to Industrial Control

    E-Print Network [OSTI]

    Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control Systems (ICS) Security Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control

  12. OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Guidelines for OPC Hosts In recent years, Supervisory Control and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on...

  13. Cyber Security Procurement Language for Control Systems Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer...

  14. An Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TAPropaneand LosAmesAmpedIntroduction to Regional

  15. Stateful UML Design with Security Constraints for Information Assurance The design of software applications using UML embodies

    E-Print Network [OSTI]

    Demurjian, Steven A.

    Stateful UML Design with Security Constraints for Information Assurance Abstract The design design state containing security constraints and insures that information assurance with respect. Keywords: RBAC, MAC, UML, access control, information assurance, secure software design. 1. Introduction

  16. Correlated Failures of Power Systems: The Analysis of the Nordic Grid

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    transmission system, such as the energy management system (EMS), are controlled by SCADA systems. SCADA systems]. These security flaws are inherited by any system which deploys SCADA, in particular power transmission systems

  17. Securing the information infrastructure for EV charging

    E-Print Network [OSTI]

    Poll, Erik

    Securing the information infrastructure for EV charging Fabian van den Broek1 , Erik Poll1 , and B for the information exchanges in the infrastructure for EV charging being tri- alled in the Netherlands, which. Key words: EV charging, congestion management, end-to-end security, smart grids 1 Introduction

  18. Abstract--With the deregulation and restructuring of utility industry, many substation automation applications are being

    E-Print Network [OSTI]

    and Data Acquisition (SCADA), substation switching, transients simulation I. INTRODUCTION ITH Control and Data Acquisition (SCADA) and Energy Management System (EMS) applications of substation

  19. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  20. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  1. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  2. Secure Cloud Manufacturing: Research Challenges and a Case Study

    E-Print Network [OSTI]

    Wang, Weichao

    Secure Cloud Manufacturing: Research Challenges and a Case Study Weichao Wang1 , Yu Wang2 , Wesley-floor will be injected into the system to assess its security. 1 Introduction With the fast development of cloud for the sustainability of US economy [14, 15]. To bridge this gap, we plan to investigate security of cloud manufacturing

  3. Ontology of Secure Service Level Agreement Chen-Yu Lee

    E-Print Network [OSTI]

    Kavi, Krishna

    : Mahadevan.Gomathisankaran@unt.edu Abstract--Maintaining security and privacy in the Cloud is a complex task these concerns relative to the assessment of security and privacy risks of the Cloud, we have developed agreement; SLA; security; SSLA; cloud computing; I. INTRODUCTION The use of Cloud computing services

  4. Global Food Security Strategic Plan 2011-2016

    E-Print Network [OSTI]

    Rambaut, Andrew

    Global Food Security Strategic Plan 2011-2016 Updated November 2013 #12;All images used summary 1 2. Introduction 2 3. Vision 2 4. Context 3 Global food security drivers and challenges 4 5. The Global Food Security programme 6 i Operating principles 6 ii Partners and affiliates 6 iii Added value

  5. Federated Grids and their Security Geoffrey Fox and Marlon Pierce

    E-Print Network [OSTI]

    Federated Grids and their Security Geoffrey Fox and Marlon Pierce Draft 0.4 Introduction We examine the consequences, requirements, and possible implementation issues needed to support security in federated grids that user identity in current Grid security implementations has two major shortcomings: it does not scale

  6. Security Challenges in the IP-based Internet of Things

    E-Print Network [OSTI]

    Security Challenges in the IP-based Internet of Things Tobias Heer , Oscar Garcia-Morchon , Ren.garcia,sye.loong.keoh,sandeep.kumar}@philips.com Abstract. A direct interpretation of the term Internet of Things refers to the use of standard Internet of standard IP security protocols. Keywords: Security, Internet of Things, IETF 1 Introduction The Internet

  7. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  8. Introduction to Phil Spector

    E-Print Network [OSTI]

    Spector, Phil

    Introduction to SQL Phil Spector Introduction to SQL Phil Spector Statistical Computing Facility University of California, Berkeley #12;Introduction to SQL #12;Introduction to SQL What is SQL? #12;Introduction to SQL What is SQL? Structured Query Language #12;Introduction to SQL What is SQL? Structured

  9. On Security Indices for State Estimators in Power Networks Henrik Sandberg, Andre Teixeira, and Karl H. Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    estimators in power networks. The focus is on applications in SCADA (Supervisory Control and Data Acquisition of such large-scale systems, SCADA (Supervisory Control and Data Acquisition) systems are used to transmit mea at all times. The technology and the use of the SCADA systems have evolved quite a lot since the 1970s

  10. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  11. Sandia Energy - National Supervisory Control and Data Acquisition...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (SCADA) Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control...

  12. October 23, 2012 11:49 World Scientific Review Volume -9in x 6in ywangsmartgrid Smart Grid, Automation, and SCADA Systems Security

    E-Print Network [OSTI]

    Wang, Yongge

    technologies that optimize the physical oper- ation of appliances and consumer devices for energy generation liquids, petroleum coke, natural gas, other gases, nuclear, hy- droelectric, renewables, hydroelectric

  13. October 23, 2012 11:49 World Scientific Review Volume -9in x 6in ywangsmartgrid Smart Grid, Automation, and SCADA Systems Security

    E-Print Network [OSTI]

    Wang, Yongge

    systems), the electrical power industry, the coal industry, and the renewable resources (e.g., solar at the end of 2010, there are more than 9200 electric generating plants in USA, including coal, petroleum liquids, petroleum coke, natural gas, other gases, nuclear, hy- droelectric, renewables, hydroelectric

  14. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  15. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  16. Summary of The 3rd Control System Cyber-Security (CS)2/HEP Workshop

    E-Print Network [OSTI]

    Lüders, S

    2011-01-01

    Over the last decade modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited, too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. The Stuxnet worm of 2010 against a particular Siemens PLC is a unique example for a sophisticated attack against control systems [1]. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data being ...

  17. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  18. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  19. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRisk andDesign ToolsDocuments

  20. Sandia Energy - SCADA FAQs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRisk andDesignFAQs Home

  1. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRisk andDesignFAQs

  2. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRisk

  3. Sandia Energy - SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRiskProgram Overview

  4. Model-based Security Analysis of the German Health Card Architecture

    E-Print Network [OSTI]

    Jurjens, Jan

    information systems, security, German Health Card. 1 #12;1 Introduction The use of health-care information information security that are particularly significant for health-care systems, due both to the inherent these risks and enable secure health-care information systems, the security analysis has to be embedded

  5. Modeling Computational Security in Long-Lived Systems, Version 2 Ran Canetti1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Modeling Computational Security in Long-Lived Systems, Version 2 Ran Canetti1,2 , Ling Cheung2 Introduction Computational security in long-lived systems: Security properties of cryptographic protocols computational power. This type of security degrades progressively over the lifetime of a protocol. However, some

  6. Modeling Computational Security in Long-Lived Systems Ran Canetti1,2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Modeling Computational Security in Long-Lived Systems Ran Canetti1,2 , Ling Cheung2 , Dilsun Kaynar Introduction Computational security in long-lived systems: Security properties of cryptographic protocols protocols, security relies on the assumption that adversarial entities have lim- ited computational power

  7. (MS WORD TEMPLATE for Submission in Fusion Engineering and Design) Security on the US Fusion Grid

    E-Print Network [OSTI]

    Thompson, Mary R.

    (MS WORD TEMPLATE for Submission in Fusion Engineering and Design) Security on the US Fusion Grid J, FusionGrid, grid computing 1. Introduction Critical to the success of any computational grid is security to improve security for the US Fusion Grid (FusionGrid) [1]. Collaboratory workers have adapted secure

  8. Fine-Grain Access Control for Securing Shared Resources in Computational Grids*

    E-Print Network [OSTI]

    Lee, Ruby B.

    Fine-Grain Access Control for Securing Shared Resources in Computational Grids* Abstract, grid environments, grid security, Unix accessmodel. providing an active enforcement of the security. Introduction Grid environments of the future will require an abil- ity to provide a secure execution

  9. GEMSS: Privacy and security for a Medical Grid Jean A.M. Herveg1

    E-Print Network [OSTI]

    Middleton, Stuart E.

    GEMSS: Privacy and security for a Medical Grid Jean A.M. Herveg1 , Federico Crazzolara2 , Stuart E the GEMSS Grid middleware. The security technology employed is based on a public key infrastructure (PKI providers are sufficiently secure. 2. Keywords Grid, Legal, Medical, Personal Data, Security 3. Introduction

  10. CYSEP --A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao

    E-Print Network [OSTI]

    Chao, Jonathan

    1 of 9 CYSEP -- A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao the architecture of a Cyber- Security Processor (CYSEP) which can serve as a key module for enhancing security-speed operation. 1 INTRODUCTION In this paper, we describe the architecture of a Cyber- Security Processor (CYSEP

  11. An Experience Report on Undergraduate Cyber-Security Education and Outreach

    E-Print Network [OSTI]

    An Experience Report on Undergraduate Cyber-Security Education and Outreach Michael E. Locasto Terms Security Keywords cyber security training, SISMAT 1. INTRODUCTION Organizations face a critical training in cyber security tools. At the same time, information secu- rity problems (e.g., recovering from

  12. Data Mining for Security Applications Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    for cyber security. These applications include but are not limited to malicious code detection by mining on intrusion detection, and cyber-security research. 1. Introduction Ensuring the integrity of computer.g., surveillance) as well as in cyber security (e.g., virus detection). The threats to national security include

  13. ANU National Security College Policy Scholarship (692/2014) 1 THE AUSTRALIAN NATIONAL UNIVERSITY

    E-Print Network [OSTI]

    Botea, Adi

    ANU National Security College Policy Scholarship (692/2014) 1 THE AUSTRALIAN NATIONAL UNIVERSITY ANU NATIONAL SECURITY POLICY SCHOLARSHIP CONDITIONS OF AWARD 1. INTRODUCTION Each year the National Security College ("the College") may award partial tuition scholarships known as the National Security

  14. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  15. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  16. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  17. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  18. Introduction Constrained distribution

    E-Print Network [OSTI]

    Nuel, Gregory

    Introduction Constrained distribution Observed pattern distribution Counting patterns-9 September 2009 G. Nuel Counting patterns in degenerated sequences #12;Introduction Constrained distribution Observed pattern distribution Outline 1 Introduction Special letters in biological sequences Counting

  19. Introduction Main Result

    E-Print Network [OSTI]

    Yan, Catherine Huafei

    Introduction Main Result Enumeration Crossings and Nestings of Two Edges in Set Partitions Yan Crossings and Nestings of Set Partitions #12;Introduction Main Result Enumeration Definition} Catherine Yan Crossings and Nestings of Set Partitions #12;Introduction Main Result Enumeration Definition

  20. Introduction to Knowledge Compilation

    E-Print Network [OSTI]

    Huang, Jinbo

    Introduction to Knowledge Compilation Jinbo Huang NICTA and Australian National University (based in part on Adnan Darwiche's tutorial) Jinbo Huang Introduction to Knowledge Compilation #12;Propositional Huang Introduction to Knowledge Compilation #12;Truth of Sentences Burglary Earthquake Alarm 1

  1. Brody Dylan Introduction

    E-Print Network [OSTI]

    Johnson, Brody Dylan

    Physics of Bowling Brody Dylan Johnson Introduction Bowling Strikes Underlying Physics Mathematical Dylan Johnson Introduction Bowling Strikes Underlying Physics Mathematical Model Human Experiment Outline 1 Introduction 2 Bowling Strikes 3 Underlying Physics 4 Mathematical Model 5 Human Experiment

  2. A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    become prevalent in various fields. Manufacturing, supply chain management and inventory control are some--Authentication, error correcting coding, lightweight, privacy, RFID, security ! 1 INTRODUCTION RFID technology has

  3. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  4. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  5. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  6. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  7. CH7 Windows Introduction

    E-Print Network [OSTI]

    Collette. Sébastien

    Macintosh #12;11 Windows NT 4 Server · Account lockout security ­ Protection contre les attaques sur les (DFS) Server ­ Index Server 11 Windows NT 4 Server · Account lockout security ­ Protection contre les

  8. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  13. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  14. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  15. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  16. An Introduction to R 1 Introduction 1

    E-Print Network [OSTI]

    Jordan, Jonathan

    · a language for expressing statistical models and tools for using linear and non-linear statistical models on the campus network On University Managed Desktop machines R is available under the Statistics applicationsAn Introduction to R Contents 1 Introduction 1 1.1 What is R

  17. Introduction Systems Engineering Fundamentals ENGINEERING

    E-Print Network [OSTI]

    Rhoads, James

    Introduction Systems Engineering Fundamentals i SYSTEMS ENGINEERING FUNDAMENTALS January 2001;Systems Engineering Fundamentals Introduction ii #12;Introduction Systems Engineering Fundamentals iii ............................................................................................................................................. iv PART 1. INTRODUCTION Chapter 1. Introduction to Systems Engineering Management

  18. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  19. Modeling Computational Security in LongLived Systems # ## Ran Canetti 1,2 , Ling Cheung 2 , Dilsun Kaynar 3 ,

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Modeling Computational Security in Long­Lived Systems # ## Ran Canetti 1,2 , Ling Cheung 2 , Dilsun Introduction Computational security in long­lived systems: Security properties of cryptographic protocols computational power. This type of security degrades progressively over the lifetime of a protocol. However, some

  20. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2nd Cloud Computing and Security

    E-Print Network [OSTI]

    Tappert, Charles

    . With these new services come challenges and concerns of privacy and security. How safe and secure are cloud and service models, review security concerns impacting cloud computing, and ways to mitigate these concerns. Keywords -- Cloud, Deployment Models, SaaS, PaaS, IaaS, Security, Services, Applications. I. Introduction

  1. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  3. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  4. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  5. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  6. Introduction Actual Industrial Problems

    E-Print Network [OSTI]

    Nigam, Nilima

    Introduction Actual Industrial Problems What's needed? Is there really interesting mathematics in Industry? Can mathematicians contribute to society, and do we want to...? Nilima Nigam Department Mathematics in Industry #12;Introduction Actual Industrial Problems What's needed? Some controversial

  7. Model-based Security Risk Analysis for Networked Embedded Systems

    E-Print Network [OSTI]

    . The Security-Enhanced Embedded system Development (SEED) process has proposed a set of tools that a bridge are illustrated in a smart metering infrastructure scenario. 1 Introduction Meeting the security needs. The forthcoming vehicular networks and smart grid infrastructures are examples of such a technological development

  8. Security Risk Management using Internal Controls Simon Foley,

    E-Print Network [OSTI]

    Foley, Simon

    . In this paper we consider how Enterprise Risk Manage- ment (ERM) might be used to manage security risk. Copyright 2009 ACM 978-1-60558-787-5/09/11 ...$10.00. introduction to ERM frameworks such as COSO [2 be considered as an early example of using Internal Controls for security--compares with a modern ERM framework

  9. Ins$tute(of(Networking(and(( Security(Research

    E-Print Network [OSTI]

    Jaeger, Trent

    I N S R Ins$tute(of(Networking(and(( Security(Research Technical)Report NAS-TR-0168-2014 Cloud-XXXXX-XX-X/XX/XX ...$15.00. Keywords cloud computing, security, trust 1. INTRODUCTION One problem facing cloud computingArmor : Protecting Cloud Instances by Validating Client Commands Yuqiong Sun, Giuseppe Petracca, Hayawardh

  10. Secure Embedded Platform for Networked Automotive M. Gomathisankaran

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    Secure Embedded Platform for Networked Automotive Systems M. Gomathisankaran Dept. of Computer University of North Texas 1 Introduction Modern automotive systems contain numerous electronic sensors automotive systems, is a challenge for our generation. Our focus in this position paper is on the security

  11. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  12. Introduction AI/Regression

    E-Print Network [OSTI]

    Lega, Joceline

    Introduction AI/Regression Technology/Search Simple Equations, Deep Understanding How Topics and Alison Cornell Simple Equations, Deep Meaning #12;Introduction AI/Regression Technology/Search Who are we helps out) Qiyam Tung and Alison Cornell Simple Equations, Deep Meaning #12;Introduction AI/Regression

  13. Introduction to Information Theory

    E-Print Network [OSTI]

    Belohlavek, Radim

    Introduction to Information Theory and Its Applications Radim Belohl´avek Dept. Computer Science providing introduction to Information Theory. Radim Belohl´avek, Introduction to Information Theory and Its Applications 1 #12;Information Theory: What and Why · information: one of key terms in our society

  14. Programmation Web Introduction

    E-Print Network [OSTI]

    Belaïd, Abdel

    1 Programmation Web Introduction #12;2 Introduction 10 séances ­ 1 h cours + 1h TD Notes 2 absences non justifiées) ­ Note finale : (2DS+TP)/3 ~TD #12;3 Objectif Créer une application Web;5 Introduction C'est quoi une application web ? ­ Une application dont l'infrastructure d'exécution est

  15. Introduction Big Radio Data

    E-Print Network [OSTI]

    Prodiæ, Aleksandar

    Introduction VLBI Pulsars Summary Big Radio Data Ue-Li Pen CITA, UofT, CIFAR July 3, 2014U. Pen Big Radio Data #12;Introduction VLBI Pulsars Summary Overview History VLBI Processing Future U. Pen Big signal processing U. Pen Big Radio Data #12;Introduction VLBI Pulsars Summary VLBI Current experiments

  16. Introduction to Bayesian Inference

    E-Print Network [OSTI]

    Penny, Will

    Introduction to Bayesian Inference Will Penny Bayes rule Medical Decision Making Sensitivity Joint References Introduction to Bayesian Inference Will Penny Short Course on Bayesian Inference, Virginia Tech, 24th January 2012 #12;Introduction to Bayesian Inference Will Penny Bayes rule Medical Decision

  17. Introduction Minimal Fusion Systems

    E-Print Network [OSTI]

    Thévenaz, Jacques

    Introduction Minimal Fusion Systems Maximal Parabolics Results Minimal Fusion Systems Ellen Henke University of Birmingham Ellen Henke Minimal Fusion Systems #12;Introduction Minimal Fusion Systems Maximal Parabolics Results Contents 1 Introduction 2 Minimal Fusion Systems 3 Maximal Parabolics 4 Results Ellen

  18. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  19. DOE and Industry Showcase New Control Systems Security Technologies...

    Office of Environmental Management (EM)

    efforts. Industry leaders worked closely with national laboratories in the National SCADA Test Bed and other private-sector partners to develop, test, and gather end-user input...

  20. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  1. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  2. Int. J. Communication Networks and Distributed Systems, Vol. 6, No. 1, 2011 59 Copyright 2011 Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    Wang, Yongge

    Inderscience Enterprises Ltd. sSCADA: securing SCADA infrastructure communications Yongge Wang Department@uncc.edu Abstract: Distributed control systems (DCS) and supervisory control and data acquisition (SCADA) systems the control systems. American Gas Association (AGA), IEC TC57 WG15, IEEE, NIST and National SCADA Test Bed

  3. Security and Privacy Protection in Wireless

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    31 Security and Privacy Protection in Wireless Sensor Networks 31.1 Introduction 31.2 Unique applications of wireless sensor networks (WSNs). The list of potential applications that require protection Mechanisms WSNs share several important properties with traditional wireless networks, most notably

  4. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  5. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  6. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  7. Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds Piotr. The proposed cloud-based re-encryption model is secure, efficient, and highly scalable in a cloud computing the performance of the model. Keywords-Distributed systems, mobile computing, security. I. INTRODUCTION Cloud

  8. Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage Jia Xu National Authentication, Proof of Retrievability, Secure Cloud Stor- age, Secure Delegation of Auditing 1. INTRODUCTION University of Singapore xujia@comp.nus.edu.sg ABSTRACT In cloud storage service, users upload their data

  9. Security-Aware Resource Allocation in Clouds Saeed Al-Haj, Ehab Al-Shaer

    E-Print Network [OSTI]

    Wang, Yongge

    Security-Aware Resource Allocation in Clouds Saeed Al-Haj, Ehab Al-Shaer Department of Software enforcement of defense-in-depth for cloud VMs by determining (1) the grouping of VMs into security groups in reducing risk and improving manageability of security configurations for the cloud VMs. I. INTRODUCTION

  10. Security and Privacy Issues of Fog Computing: Shanhe Yi, Zhengrui Qin, and Qun Li

    E-Print Network [OSTI]

    Li, Qun

    in a brief manner. Keywords: Fog computing, cloud/mobile computing, security, privacy 1 Introduction-trivial extension of cloud, some security and privacy issues in the context of cloud computing [35], can be foreseenT), and originated from cloud computing, security and privacy issues of cloud are inherited in fog computing. While

  11. Negotiation of Multilateral Security Decisions for Grid Computing Li Zhou Clifford Neuman

    E-Print Network [OSTI]

    Hwang, Kai

    Negotiation of Multilateral Security Decisions for Grid Computing Li Zhou Clifford Neuman Architecture that facilitates the collaboration in making security decisions for grid services. In particular security decisions according to the level of trust among grid service providers. 1. Introduction The grid

  12. Capturing and Documentation of Decisions in Security Requirements Engineering through Heuristics

    E-Print Network [OSTI]

    Paech, Barbara

    Introduction Security of software systems is critical to business be- cause detected security flaws tool for project and system knowledge in soft- ware development. Knowledge is modeled through EMF HeRA to detect security-related requirements through heuristics successfully. To doc- ument decisions

  13. CSCE-313 Introduction to Computer Systems Introduction CSCE 313 Introduction to

    E-Print Network [OSTI]

    Gu, Guofei

    CSCE-313 Introduction to Computer Systems Introduction 1 CSCE 313 Introduction to Computer Systems System #12;CSCE-313 Introduction to Computer Systems Introduction 2 Introduction to OSs · What of an Operating System Four Components of a Computer System #12;CSCE-313 Introduction to Computer Systems

  14. Detection and Identification of Data Attacks in Power System Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    the attacked transmission lines. I. INTRODUCTION A. SCADA System and State Estimation A modern society relies is supervised and control through the Supervisory Control And Data Acquisition (SCADA) systems. SCADA systems on State Estimation SCADA systems measure data through remote terminal units (RTUs) all over the grid

  15. The VIKING Project: An Initiative on Resilient Control of Power Networks

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    . INTRODUCTION AND MOTIVATION Supervisory control and data acquisition (SCADA) net- works contain computers on SCADA networks for power systems. SCADA systems are continuously becoming more advanced and com- plex complexity of the systems is not the most challenging trend today. Instead, it is the fact that SCADA systems

  16. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  17. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  18. Introduction Synaptic transmission

    E-Print Network [OSTI]

    Stoltz, Brian M.

    Introduction ·Synaptic transmission throughout the nervous system is predominantly chemical ·At Channels #12;Neuroreceptors & Synaptic Transmission Synapse Neurotransmitter Receptor/Ion Channel Ion Flow

  19. QCD Evolution Workshop: Introduction

    E-Print Network [OSTI]

    Alexei Prokudin

    2012-10-15

    The introduction talk given at the beginning of QCD Evolution workshop held in Thomas Jefferson National Accelerator Facility (Jefferson Lab) on May 14 -17, 2012.

  20. Introduction and overview

    SciTech Connect (OSTI)

    None, None

    2009-01-18

    The Renewable Energy Technology Characterizations introduction outlines describe the technical and economic status of the major emerging renewable energy options for electricity supply.

  1. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  2. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  3. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  4. Introduction to Internetworking Introduction to Internetworking

    E-Print Network [OSTI]

    n Tuesday . 7:00 Introduction to Internetworking elliot . 8:10 The Internet Protocol (IP) ­ elliot:00 Hardware elliot . 8:00 Internet Engineering jhawk . 9:00 Technical Internet Tools ­ elliot . 9:30 IP to Internetworking A Model n ISO­OSI Networking Model n History n The Model . Application Layer . Presentation Layer

  5. Towards a Secure and Efficient System for End-to-End Provenance Patrick McDaniel, Kevin Butler,

    E-Print Network [OSTI]

    Smith, Adam D.

    of sensor data as it is recorded and aggre- gated in cyber-physical systems such as the smart-grid and SCADA

  6. INTRODUCTION APPLIED GEOPHYSICS

    E-Print Network [OSTI]

    Merriam, James

    GEOL 384.3 INTRODUCTION TO APPLIED GEOPHYSICS OUTLINE INTRODUCTION TO APPLIED GEOPHYSICS GEOL 384 unknowns; the ones we don't know we don't know. And if one looks throughout the history of geophysics he didn't really say geophysics. He said, " ... our country and other free countries ...". But I am

  7. Introduction Usual credo. . .

    E-Print Network [OSTI]

    Fernandes, Rui Loja

    Introduction Usual credo. . . Need for a new credo Symmetry groupoids Other groupoids Home Page. Math. Soc. 43 (1996). http://www.math.ist.utl.pt/rfern/ #12;Introduction Usual credo. . . Need for a new credo Symmetry groupoids Other groupoids Home Page Title Page Page 2 of 28 Go Back Full Screen

  8. Grains, Water Introduction

    E-Print Network [OSTI]

    Wirosoetisno, Djoko

    Grains, Water & Wet Sand Onno Bokhove Introduction Dry Granular Chute Flows: Cantilever Water Waves: Bores Near the Shore Surf Induced Sand Dynamics Discussion Dry Granular Flows, Water Waves & Surf, Water & Wet Sand Onno Bokhove Introduction Dry Granular Chute Flows: Cantilever Water Waves: Bores Near

  9. Operating Systems Introduction

    E-Print Network [OSTI]

    Bogliolo, Alessandro

    by the environment" 4 Introduction (2) ¿ Examples of real-time systems: ¿ plant control ¿ control of production systems ¿ space missions ¿ household appliances ¿ virtual / augmented reality #12;3 5 Introduction (3 of application: ¿ Automotive: · power-train control, air-bag control, steer by wire, brake by wire ¿ Aircraft

  10. 7. IT and society David Keil Introduction to Information Technology 7/13 David M. Keil, Framingham State University

    E-Print Network [OSTI]

    Keil, David M.

    7. IT and society David Keil Introduction to Information Technology 7/13 David M. Keil, Framingham State University CSCI 120 Introduction to Information Technology 7. IT and society David Keil Introduction to Information Technology 7/13 1 1. The information society 2. Privacy and security 3. Freedom

  11. Asbestos, Environment, Fire, Health, Safety, and Security Policy 1. INTRODUCTION

    E-Print Network [OSTI]

    Chen, Xinzhong

    be grounds for dismissal since such failure conflicts directly with the policies set forth in this document to prevent and control the impact of accidents and incidents involving students, staff, faculty failure to discharge conscientiously these responsibilities by either supervisors or other employees may

  12. A Nuclear Family: Extras - Introduction | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve Lithium-Ion Batteries PrintA New Solar IrradianceNobelA Race ......

  13. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2012; 00:111

    E-Print Network [OSTI]

    Leung, Victor C.M.

    @ece.ubc.ca Received . . . 1. INTRODUCTION Improvements in power generation, transmission, distribu- tion) management scheme aimed at securing the group communications, for instance, from the utility to appliances and consumption as well as service delivery, operation and market management of the grid are the main bene- fits

  14. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  15. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  16. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  17. Introduction to Network Science 1 Introduction to Network Science

    E-Print Network [OSTI]

    Safro, Ilya

    Introduction to Network Science 1 Introduction to Network Science Instructor: Ilya Safro, 228 McAdams Hall Course: Introduction to Network Science, CP SC 481/681/881 Time: 9:30-10:45 TTh Place: 211 Daniel A 80 B 60 C 0 F #12;Introduction to Network Science 2 Recommended Books (optional) #12;Introduction

  18. Sensitivities 1.0 Introduction

    E-Print Network [OSTI]

    McCalley, James D.

    . SecurityLimit Violation 6 Emergency Action Could include demand-side management, re- dispatch, voltage

  19. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  20. Introduction to Transportation Planning

    E-Print Network [OSTI]

    Tipple, Brett

    Introduction to Transportation Planning CMP 4710/6710 Fall 2012 3 Credit Hours Room: ARCH 229 of City & Metropolitan Planning; Associate Dean, College of Architecture + Planning; former associate, social equity, fiscal health, and public health. Unfortunately, most transportation planning processes

  1. Introduction to Software Engineering

    E-Print Network [OSTI]

    Syllabus Background References Homework Videos Project Introduction to Software Engineering AERSP Exam Conclusions Appendix Links Hits Software Engineering: AERSP 440 http Confidence Aerospace Software (2006) IEEE Computer Society SE Portal Software Engineering: AERSP 440 http

  2. Introduction Semantic Web

    E-Print Network [OSTI]

    Nejdl, Wolfgang

    Introduction Semantic Web Ontologies Linked Data Information Sources Information Extraction Web Application Use Cases Knowledge Bases Entity Linking Entity Retrieval Linked Data Quality Conclusions Papers for Presentations Resources Semantic Web: Extracting and Mining Structured Data from

  3. Introduction to B Physics

    E-Print Network [OSTI]

    Matthias Neubert

    2000-01-31

    These lectures provide an introduction to various topics in heavy-flavor physics. We review the theory and phenomenology of heavy-quark symmetry, exclusive weak decays of $B$ mesons, inclusive decay rates, and some rare $B$ decays.

  4. Introduction Business Administration

    E-Print Network [OSTI]

    Banbara, Mutsunori

    26 Introduction Guide Entrance Life Career Inquiries Business Administration The predecessor of the School of BusinessAdministration, Kobe University, wasfoundedin1902as. The School of Business Administration, Kobe University has developed into a leading institution of business

  5. Introduction The Algorithm

    E-Print Network [OSTI]

    Nagurney, Anna

    Transformation, Appears in Transportation Research D 11, 171-190. Dmytro Matsypura Electric Power Supply Chain Markets Transmission Service Providers Power SupplIntroduction The Model The Algorithm Modeling of Electric Power Supply Chain Networks with Fuel

  6. Introduction Health Sciences

    E-Print Network [OSTI]

    Banbara, Mutsunori

    32 Introduction Guide Entrance Life Career Inquiries Health Sciences Health Problems population, changing lifestyle habit, and the coming of globalization age. The role health sciences play, the former Department of Health Sciences of the Graduate School of Medicine, was reorganized

  7. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  8. Introduction Transport in disordered graphene

    E-Print Network [OSTI]

    Fominov, Yakov

    Introduction Transport in disordered graphene Summary Ballistic transport in disordered graphene P, Gornyi, Mirlin Ballistic transport in disordered graphene #12;Introduction Transport in disordered graphene Summary Outline 1 Introduction Model Experimental motivation Transport in clean graphene 2

  9. Introduction Algebraic Reconstruction Methods (ARM's)

    E-Print Network [OSTI]

    Vuik, Kees

    Introduction Algebraic Reconstruction Methods (ARM's) Discrete Tomography Research Goals Robust #12;Introduction Algebraic Reconstruction Methods (ARM's) Discrete Tomography Research Goals Layout 1 Introduction 2 Algebraic Reconstruction Methods (ARM's) Model Description ART, SIRT and SART ARM Experiments 3

  10. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  11. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  12. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  13. Secure Computation of Top-K Eigenvectors for Shared Matrices in the Cloud James Powers, Keke Chen

    E-Print Network [OSTI]

    Secure Computation of Top-K Eigenvectors for Shared Matrices in the Cloud James Powers, Keke Chen perturbation technique. We carefully analyze its security under a cloud-specific threat model. Our experimental. Keywords-cloud computing, big matrix, power iteration, MapReduce, security, performance I. INTRODUCTION

  14. Tagged-MapReduce: A General Framework for Secure Computing with Mixed-Sensitivity Data on Hybrid Clouds

    E-Print Network [OSTI]

    Chang, Ee-Chien

    -MapReduce, a general extension to MapReduce that supports secure computing with mixed-sensitivity data on hybrid clouds. Keywords-Data security; MapReduce; hybrid clouds; infor- mation leakage I. INTRODUCTION Cloud computing development [1]. However, hybrid cloud computing needs to address the security and privacy issues with public

  15. Introduction to Network Analysis 1 Introduction to Network Analysis

    E-Print Network [OSTI]

    Safro, Ilya

    Networks from networksandservers.blogspot.com #12;Introduction to Network Analysis 7 Natural gas major

  16. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  17. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  18. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  19. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  20. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  1. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  2. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  3. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  4. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  5. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  6. Attacks Against Process Control Systems: Risk Assessment, Detection, and Response

    E-Print Network [OSTI]

    Hu, Fei

    In the last years there has been an increasing interest in the secu- rity of process control and SCADA systems-1-4503-0564-8/11/03 ...$10.00. General Terms Security Keywords SCADA, security, IDS, control systems, critical infrastructure are also called Process Control Systems (PCS), Supervi- sory Control and Data Aquisition (SCADA) systems

  7. Policy Name: Information Security Policy Originating/Responsible Departments: Computing and Communication Services (CCS)

    E-Print Network [OSTI]

    Carleton University

    Policy Name: Information Security Policy Originating/Responsible Departments: Computing: Chief Information Officer (CIO) Corporate Archivist and Assistant Privacy Officer Introduction Records in all formats contain information that is vital to ongoing operations - for insuring accountability

  8. Safecomp99, 27-29 Sept 1999, Toulouse, France The Integration of Safety and Security Requirements

    E-Print Network [OSTI]

    Moffett, Jonathan

    , there is growing interest in the degree to which techniques from one domain complement or conflict with those from and provides pointers for the future. 2 Survey of Safety and Security Risk Analysis Techniques 2.1 Introduction

  9. Sandia Energy - SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRisk andDesign

  10. Sandia Energy - SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRiskProgram Overview Home

  11. Sandia Energy - SCADA Training Courses

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRiskProgram OverviewTraining

  12. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRiskProgram

  13. Deep Lambertian Networks Introduction

    E-Print Network [OSTI]

    Toronto, University of

    Deep Lambertian Networks Introduction Learns distributions over 3D object shapes from sets of 2D-shot recognition possible Uses multiplicative interactions to approximate the Lambertian reflectance model Deep 30 50 Experiments Deep Lambertian Networks Inference Samples from albedo DBN Face Relighting Simple

  14. Introduction to Computational Science

    E-Print Network [OSTI]

    Introduction to Computational Science (and why you should learn it!) Lyle N. Long Distinguished Professor of Aerospace Engineering and Mathematics Director, Graduate Minor Program in Computational Science #12;Outline · A little about me · What is computational science · Why study computational science

  15. Power Series Introduction

    E-Print Network [OSTI]

    Vickers, James

    Power Series 16.4 Introduction In this section we consider power series. These are examples of infinite series where each term contains a variable, x, raised to a positive integer power. We use the ratio test to obtain the radius of convergence R, of the power series and state the important result

  16. Laser Pointer Safety INTRODUCTION

    E-Print Network [OSTI]

    Laser Pointer Safety INTRODUCTION The use of laser diode pointers that operate in the visible to the retractable, metal pointer, the laser pointer beam will produce a small dot of light on whatever object at which it is aimed. It can draw an audience¹s attention to a particular key point in a slide show. Laser

  17. Oceanography June 200444 INTRODUCTION

    E-Print Network [OSTI]

    Boss, Emmanuel S.

    Oceanography June 200444 INTRODUCTION In recent years commercial sensors for in situ determinations T I C S A N D DY N A M I C S Oceanography June 200444This article has been published in Oceanography, Volume 17, Number 2, a quarterly journal of The Oceanography Society. Copyright 2003 by The Oceanography

  18. Introduction Optimal Control Problem

    E-Print Network [OSTI]

    Grigorieva, Ellina V.

    and Computational Simulations Ellina Grigorieva and Evgenii Khailov Optimal control of a waste water cleaning plant Khailov Optimal control of a waste water cleaning plant #12;Introduction Model Optimal Control Problem applications will be discussed. Ellina Grigorieva and Evgenii Khailov Optimal control of a waste water cleaning

  19. Generating Functions Introduction

    E-Print Network [OSTI]

    Gould, Ron

    CHAPTER 10 Ordinary Generating Functions Introduction We'll begin this chapter by introducing the notion of ordinary generating functions and discussing the basic techniques for manipulating them must master these basic ideas before reading further. In Section 2, we apply generating functions

  20. Fish Biology Introduction

    E-Print Network [OSTI]

    Jochem, Frank J.

    Lab 10: Fish Biology Introduction The effective management of fish populations requires knowledge of the growth rate of the fish. This requires determination of the age of fish to develop a relationship between the size and age of fish. For an inventory, this information provides insights to evaluate the potential

  1. Introduction iroffer bot behaviour

    E-Print Network [OSTI]

    Fu, Xiaoming

    Outline Introduction iroffer bot behaviour Imlementation Results IRC-Client IRC Group: Arne Bochem, Benjamin Maas, David Weiss July 6, 2007 IRC Group: Arne Bochem, Benjamin Maas, David Weiss IRC-Client #12 Imlementation 4 Results Regions Operating Systems IRC Group: Arne Bochem, Benjamin Maas, David Weiss IRC

  2. OIL & GAS INSTITUTE Introduction

    E-Print Network [OSTI]

    Strathclyde, University of

    OIL & GAS INSTITUTE CONTENTS Introduction Asset Integrity Underpinning Capabilities 2 4 4 6 8 9 10 COMPETITIVENESS UNIVERSITY of STRATHCLYDE OIL & GAS INSTITUTE OIL & GAS EXPERTISE AND PARTNERSHIPS #12;1 The launch of the Strathclyde Oil & Gas Institute represents an important step forward for the University

  3. MODEL CONSERVATION STANDARD INTRODUCTION

    E-Print Network [OSTI]

    financial assistance from the Bonneville Power Administration and the region's utilities. In addition of the plan by the Administrator, are directly attributable to such measure or resource. [Northwest Power ActMODEL CONSERVATION STANDARD INTRODUCTION As directed by the Northwest Power Act, the Council has

  4. Earth Structure Introduction

    E-Print Network [OSTI]

    Earth Structure Introduction Earth Structure (2nd Edition), 2004 W.W. Norton & Co, New York Slide show by Ben van der Pluijm © WW Norton, unless noted otherwise #12;© EarthStructure (2nd ed) 210/4/2010 Aerial views #12;© EarthStructure (2nd ed) 310/4/2010 http://www.globalchange.umich.edu/Ben/ES/ #12

  5. Risk Management Strategy Introduction

    E-Print Network [OSTI]

    Edinburgh, University of

    Risk Management Strategy Introduction 1. The risk of adverse consequences is inherent in all activity. Dynamic enterprise will inevitably create new risks. Risk management is about ensuring that all significant relevant risks are understood and prioritised as part of normal management

  6. Microbial Metabolism Course Introduction

    E-Print Network [OSTI]

    Huang, Ching-Tsan

    .S. Department of Energy Genome Programs http://genomics.energy.gov. #12;19 From MB to MB, MP to ME Microbial1 Microbial Metabolism Course Introduction Ching-Tsan Huang () Office: Agronomy Building, Room 111 of Building No.3 every Tuesday between 10:20 am and 12:10 pm. The course covers 16 topics of microbial

  7. ELECTRONIC CHARTS INTRODUCTION

    E-Print Network [OSTI]

    New Hampshire, University of

    199 CHAPTER 14 ELECTRONIC CHARTS INTRODUCTION 1400. The Importance of Electronic Charts Since. Electronic charts automate the process of integrating real-time positions with the chart display and allow is expected to take and plot a fix every three minutes. An electronic chart system can do it once per second

  8. Introduction web smantique

    E-Print Network [OSTI]

    Gagnon, Michel

    Introduction au web sémantique Michel Gagnon École polytechnique de montréal #12;Plan de la présentation Définition et description générale Les différentes couches du web sémantique Exemples d'application Conclusion #12; Définition et description générale Les différentes couches du web sémantique Exemples d

  9. Project Description 1 Introduction

    E-Print Network [OSTI]

    VanDeGrift, Tammy

    Project Description 1 Introduction This project will investigate "commonsense computing": what, and 3. Apply our findings to changes in classroom pedagogy in ways that can be rigorously evalu- ated. 1 0736572 #12;In the exploratory part of this project, which we are proposing here, we will concentrate

  10. Demand Response Assessment INTRODUCTION

    E-Print Network [OSTI]

    Demand Response Assessment INTRODUCTION This appendix provides more detail on some of the topics raised in Chapter 4, "Demand Response" of the body of the Plan. These topics include 1. The features, advantages and disadvantages of the main options for stimulating demand response (price mechanisms

  11. INTRODUCTION TO THE MECHANICS

    E-Print Network [OSTI]

    Kaminski, Edouard

    INTRODUCTION TO THE MECHANICS OF A CONTINUOUS MEDIUM Lawrence E. Malvern Professor of Mechanics princi- ples common to all branches of solid and fluid mechanics, designed to appeal to the intuition science. The book arose from the need to provide a general preparation in contin- uum mechanics

  12. QUICK QUANTUM MECHANICS ---Introduction ---

    E-Print Network [OSTI]

    Jackson, Andrew D.

    QUICK QUANTUM MECHANICS --- Introduction --- The following notes are intended to be a supplement to your study of Liboff's ``Introductory Quantum Mechanics.'' They are not an alternative! My purpose here of Classical Mechanics After Newton found his equations of motion, physicists knew they would have to wait

  13. Introduction to Quantum Mechanics

    E-Print Network [OSTI]

    Eduardo J. S. Villaseñor

    2008-04-23

    The purpose of this contribution is to give a very brief introduction to Quantum Mechanics for an audience of mathematicians. I will follow Segal's approach to Quantum Mechanics paying special attention to algebraic issues. The usual representation of Quantum Mechanics on Hilbert spaces is also discussed.

  14. CONTENTS PAGE INTRODUCTION

    E-Print Network [OSTI]

    Aslaksen, Helmer

    THE APPLICATIONS AND VALIDITY OF BODE'S LAW CAN WE EXPLAIN BODE'S LAW USING GRAVITY? 8 Law of Gravitation 8 Centre#12;#12;CONTENTS CONTENTS PAGE INTRODUCTION WHO, HOW AND WHEN IS THE BODE'S LAW DISCOVERED? 1 THE BODE'S LAW HOW THE BODE'S LAW SATISFIED URANUS 3 HOW THE BODE'S LAW LED TO THE DISCOVERY OF CERES

  15. Inf-2101 -Algoritmer Introduction

    E-Print Network [OSTI]

    Bongo, Lars Ailo

    Inf-2101 - Algoritmer Introduction John Markus Bjørndalen 2010-08-16 Some foils are adapted from the book and the book's homepage. John Markus Bjørndalen () Inf-2101 - Algoritmer 2010-08-16 1 / 22 #12 Markus Bjørndalen () Inf-2101 - Algoritmer 2010-08-16 2 / 22 #12;Why do we study graphs? Routing (ex: GPS

  16. Introduction to Android Programming

    E-Print Network [OSTI]

    Ooi, Wei Tsang

    Introduction to Android Programming Rajiv Ratn Shah (rajiv@comp.nus.edu.sg) August, 27 CS5248 Fall by a sample app, "Hello, CS5248" ­ Create an Android Project ­ Building and Running ­ Debugging · General, HTTP Post, MP4Parser · Sample Application http://developer.android.com/guide/index.html #12;Application

  17. INTRODUCTION TO REAL ANALYSIS

    E-Print Network [OSTI]

    Prigozhin, Leonid

    reserved Library of Congress Cataloging-in-Publication Data Trench, William F. Introduction to real of Functions of One Variable 30 2.1 Functions and Limits 30 2.2 Continuity 53 2.3 Differentiable Functions of Functions of One Variable 113 3.1 Definition of the Integral 113 3.2 Existence of the Integral 128 3

  18. Table of Contents Introduction

    E-Print Network [OSTI]

    Nagy, Eric Sándor

    include nitrogen oxides (NOx = NO + NO2 ), nitric acid (HNO3 ), nitrous oxide (N2 O, a greenhouse gas.TheHaber-BoschprocessalsosuppliesNH3 for industrial processes. Anthropogenic sources of nitrogen are twice as large as natural terDRAFT - 1 #12;2 - DRAFT Table of Contents Introduction What is Reactive Nitrogen and Why

  19. Subject Matters Introduction

    E-Print Network [OSTI]

    Subject Matters Introduction The AS and A Level subject choices you make when in Year 11 (or assessing applicants at the University of Cambridge, we consider not only the individual A Level subjects taken but also the combination of these. We generally prefer applicants to have taken certain subjects

  20. 8 Management Plan Introduction

    E-Print Network [OSTI]

    312 8 Management Plan Introduction The management plan integrates the vision for the Lower Mid and populations which form the bulk of the management plan is derived from that input. The scope of the management and inventory are designed and may be used to guide restoration and management actions by many parties under

  1. 6 Management Plan Introduction

    E-Print Network [OSTI]

    147 6 Management Plan Introduction The management plan integrates the vision for the White Salmon for restoration of fish and wildlife habitat and populations which form the bulk of the management plan is derived from that input. The scope of the management plan is somewhat narrower than the scope of the assessment

  2. Scan Software 1 Introduction

    E-Print Network [OSTI]

    Alford, Simon

    Scan Software 1 Introduction Scan is a graphical user interface designed to control a confocal microscope BIORAD MRC- 600. The software can acquire simultaneously two channels, scanning an area of 0. In addition, the software can control the stage position and amplifiers setup. The software runs on the Matlab

  3. Introduction to Linear Relaxations

    E-Print Network [OSTI]

    Introduction to Linear Relaxations by R. Baker Kearfott Department of Mathematics University relaxations; . discuss validation of linear relaxations. Intro. Linear Relaxations December, 2003 Taylor, . . . , m 2 , where # : R n # R and c i , g i : R n # R are guaranteed to be within one of the x # that has

  4. Fuel Price Forecasts INTRODUCTION

    E-Print Network [OSTI]

    Fuel Price Forecasts INTRODUCTION Fuel prices affect electricity planning in two primary ways and water heating, and other end-uses as well. Fuel prices also influence electricity supply and price turbines. This second effect is the primary use of the fuel price forecast for the Council's Fifth Power

  5. VIRTUAL REALITYVIRTUAL REALITY Introduction

    E-Print Network [OSTI]

    Petriu, Emil M.

    Animation Script Sensor Data Fusion & Interpretation Avatar (of a human or of a real object) VIRTUAL SCENE;HUMAN PERCEPTION OF REALITY REAL WORLD / ENVIRONMENT HUMAN (sentient living animal able of sensible Is Virtual Reality? -A Web-Based Introduction, by Jerry Isdale #12;Virtual Environments allow humans

  6. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  7. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  8. Potential uses of a wireless network in physical security systems.

    SciTech Connect (OSTI)

    Witzke, Edward L.

    2010-07-01

    Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing physical security is first given. Next, numerous applications of a wireless network are brought forth. The technical issues that arise when using a wireless network to support these applications are then discussed. Finally, a summary is presented.

  9. This paper appeared in Proc. IEEE/ACM 6th Int'l Symp. Cluster Computing and the Grid (CCGrid), 2nd Int'l Workshop on Cluster Security, May 2006.

    E-Print Network [OSTI]

    Qin, Xiao

    for data grids are inadequate to meet the security needs of data- intensive applications. To remedy improves security and performance over two existing scheduling algorithms. 1. Introduction A grid on security for applications running on grids [4][5][10]. Our proposed scheduling scheme for security

  10. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01

    and S. S. Sastry, “Cyber-security Analysis of StateK. H. Johansson, “A Cyber Security Study of a SCADA Energy

  11. Investigating Energy and Security Trade-offs in the Classroom With the Atom LEAP Testbed

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Investigating Energy and Security Trade-offs in the Classroom With the Atom LEAP Testbed Peter A. H seminar investi- gating potential trade-offs between security and energy consumption. Twenty tool for energy research and education. 1 Introduction Mobile and embedded devices face difficult trade

  12. Secure Pesticide Storage: Workspace Features of a Pesticide Storage Facility 1

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    PI31 Secure Pesticide Storage: Workspace Features of a Pesticide Storage Facility 1 Thomas W. Dean2. Larry Arrington, Dean This document identifies and discusses three key features of a pesticide storage. Introduction Secure storage of pesticide involves more than just protecting your pesticide products from

  13. Modeling and Simulation of Hazardous Material Releases for Homeland Security Applications

    E-Print Network [OSTI]

    Magee, Joseph W.

    i Modeling and Simulation of Hazardous Material Releases for Homeland Security Applications DRAFT in the breakout track on Hazardous Material Release at the workshop on Homeland Security Modeling & Simulation...........................................................................................................................................................1 2. Introduction to Hazardous Material Releases (HMR) and Associated DHS Guidance

  14. The Security of all RSA and Discrete Log Bits JOHAN HASTAD

    E-Print Network [OSTI]

    Håstad, Johan

    and Phrases: Cryptography, complexity, RSA-encryption, bit-security, discrete logarithms 1. INTRODUCTION What applying a natural one-way function. In fact, any deterministic, public-key crypto system must leak some of Technology, SE-100 44 Stockholm, Sweden. Mats N¨aslund. Communicatons Security Lab, Ericsson Research, SE-164

  15. March 23, 1999 Copyright 1999 Baptist Health Systems of SF 1 Security Requirements in

    E-Print Network [OSTI]

    March 23, 1999 Copyright © 1999 Baptist Health Systems of SF 1 Security Requirements in Healthcare;March 23, 1999 Copyright © 1999 Baptist Health Systems of SF 2 Introduction · OMG -- forum for software are standardized · This presentation objective ­ What US healthcare wants from security vendors #12;March 23, 1999

  16. Watchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    Watchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety Santosh) to become the root cause of exploitable security vulnerabilities. This paper proposes Watchdog, a hardware full hardware-enforced memory safety at low overheads. 1. Introduction Languages such as C and C

  17. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  18. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  19. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  20. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  1. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  2. 3D Computer Vision and Video Computing IntroductionIntroduction

    E-Print Network [OSTI]

    Zhu, Zhigang

    /Analysis/Interpretation Interpretation is an Artificial Intelligence Problem Sources of Knowledge in Vision Levels of Abstraction1 3D Computer Vision and Video Computing IntroductionIntroduction CSc I6716 Spring 2012 3D Computer Vision Introduction Instructor: Zhigang Zhu City College of New York zzhu@ccny.cuny.edu 3D Computer

  3. 3D Computer Vision and Video Computing IntroductionIntroduction

    E-Print Network [OSTI]

    Zhu, Zhigang

    /Analysis/Interpretation Interpretation is an Artificial Intelligence Problem Sources of Knowledge in Vision Levels of Abstraction1 3D Computer Vision and Video Computing IntroductionIntroduction CSc I6716 Spring 2011 3D Computer Vision Introduction Instructor: Zhigang Zhu City College of New York zzhu@ccny.cuny.edu 3D Computer

  4. 3D Computer Vision and Video Computing IntroductionIntroduction

    E-Print Network [OSTI]

    Zhu, Zhigang

    /Analysis/Interpretation Interpretation is an Artificial Intelligence Problem Sources of Knowledge in Vision Levels of Abstraction1 3D Computer Vision and Video Computing IntroductionIntroduction CSc I6716 Spring 2013 3D Computer Vision Introduction Instructor: Zhigang Zhu City College of New York zzhu@ccny.cuny.edu 3D Computer

  5. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  6. Provable Security of On-Demand Distance Vector Routing

    E-Print Network [OSTI]

    Levente, Buttyán

    the route discovery process primarily, and thus, we are not concerned with them in the rest of the paper. R is secure in our model. 1 Introduction Routing is a fundamental networking function, which makes it an ideal discovery part of the routing protocol only. In other words, we are not concerned with the problem

  7. Provably Secure and Practical Onion Routing Michael Backes

    E-Print Network [OSTI]

    Goldberg, Ian

    Saarbr¨ucken, Germany mohammadi@cs.uni-saarland.de Abstract--The onion routing network Tor is undoubtedly. INTRODUCTION Over the last few years the onion routing (OR) network Tor [28] has emerged as a successfulProvably Secure and Practical Onion Routing Michael Backes Saarland University and MPI-SWS Saarbr

  8. Secure Authentication and Session State Management for Web Services

    E-Print Network [OSTI]

    Young, R. Michael

    Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young #12;Lehman 1 1. Introduction Web services protocol. In a web service, the server invokes a function based on the message sent from the client

  9. Data Integrity Limitations in Highly Secure Systems Cynthia E. Irvine

    E-Print Network [OSTI]

    Irvine, Cynthia E.

    or destruction." [14] A person who has integrity is identified as being one who acts based on a setData Integrity Limitations in Highly Secure Systems Cynthia E. Irvine Department of Computer that is higher in integrity than the integrity level of the COTS components. 1 Introduction Data integrity

  10. East Asian Security Workshop May 8 9, 2014

    E-Print Network [OSTI]

    Banbara, Mutsunori

    of policy communities and area experts. On the other hand, political scientist have not produced in international security such as deterrence and alliance politics in the context of contemporary East Asia. We Introduction of Participants Session 1: Network Approach to Nuclear Issues 10:30am-11:30am Jong Hee Park

  11. CONSTRUCTING SECURE CONTENT-DEPENDENT WATERMARKING SCHEME USING HOMOMORPHIC ENCRYPTION

    E-Print Network [OSTI]

    Sun, Qibin

    CONSTRUCTING SECURE CONTENT-DEPENDENT WATERMARKING SCHEME USING HOMOMORPHIC ENCRYPTION Zhi Li.a-star.edu.sg ABSTRACT Content-dependent watermarking (CDWM) has been pro- posed as a solution to overcome the potential and cryptography. 1. INTRODUCTION Consider a simplified model of Spread-Spectrum (SS) water- marking. Let x

  12. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  13. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  14. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  15. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  16. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  17. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  18. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  19. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  20. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  1. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  2. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  3. Introduction Basics of gravity theory

    E-Print Network [OSTI]

    Visser, Matt

    Introduction Basics of gravity theory Actions and Field Equations Phenomenology Discussion;Introduction Basics of gravity theory Actions and Field Equations Phenomenology Discussion and Conclusions Victoria U of Wellington - Feb 2nd 2009 #12;Introduction Basics of gravity theory Actions and Field

  4. Bridging the Missing Link of Cloud Data Storage Security in AWS Dept. of Electrical & Computer Engineering, SUNY -Binghamton, Binghamton, NY 13902

    E-Print Network [OSTI]

    Chen, Yu

    1 Bridging the Missing Link of Cloud Data Storage Security in AWS Jun Feng, Yu Chen*, Pu Liu Storage, Information Security. 1. Introduction Cloud Computing has gained great attention from both is the security of data storage in the cloud. As shown in Figure 1, cloud computing services can fundamentally

  5. DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani Miguel Correia Bruno Quaresma Fernando Andre Paulo Sousa

    E-Print Network [OSTI]

    Correia, Miguel

    DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani Miguel Correia Bruno of critical data that could be moved to the cloud. However, the reliability and security of data stored, Security Keywords Cloud computing, Cloud storage, Byzantine quorum systems 1. Introduction The increasing

  6. Advanced Security Infrastructures for Grid Education Prof R.O. Sinnott, A.J. Stell, Dr J.P. Watt, Prof D.W. Chadwick,

    E-Print Network [OSTI]

    Kent, University of

    Advanced Security Infrastructures for Grid Education Prof R.O. Sinnott, A.J. Stell, Dr J.P. Watt domain. Keywords: Grid, education, Security, PERMIS, Shibboleth. 1. Introduction As Grid technology addressing these challenges. This is one of the first full Grid computing courses available today. Security

  7. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 3rd A Frame Problem Approach for Adaptive Cyber Security Design

    E-Print Network [OSTI]

    Tappert, Charles

    Problem Approach for Adaptive Cyber Security Design R. Shaikh, T. Bryla, and S. Ahmed Pace University in the context of network security counteraction against cyber-attacks. A simple simulator is designed extensions of this work. Key words: Frame Problem; Cyber-security Introduction With the growing popularity

  8. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  9. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  10. An Introduction to Webs

    E-Print Network [OSTI]

    White, C D

    2015-01-01

    Webs are sets of Feynman diagrams that contribute to the exponents of scattering amplitudes, in the kinematic limit in which emitted radiation is soft. As such, they have a number of phenomenological and formal applications, and offer tantalising glimpses into the all-order structure of perturbative quantum field theory. This article is based on a series of lectures given to graduate students, and aims to provide a pedagogical introduction to webs. Topics covered include exponentiation in (non-)abelian gauge theories, the web mixing matrix formalism for non-abelian gauge theories, and recent progress on the calculation of web diagrams. Problems are included throughout the text, to aid understanding.

  11. An Introduction to Webs

    E-Print Network [OSTI]

    C. D. White

    2015-07-08

    Webs are sets of Feynman diagrams that contribute to the exponents of scattering amplitudes, in the kinematic limit in which emitted radiation is soft. As such, they have a number of phenomenological and formal applications, and offer tantalising glimpses into the all-order structure of perturbative quantum field theory. This article is based on a series of lectures given to graduate students, and aims to provide a pedagogical introduction to webs. Topics covered include exponentiation in (non-)abelian gauge theories, the web mixing matrix formalism for non-abelian gauge theories, and recent progress on the calculation of web diagrams. Problems are included throughout the text, to aid understanding.

  12. Introduction to Holographic Superconductors

    E-Print Network [OSTI]

    Gary T. Horowitz

    2010-02-17

    These lectures give an introduction to the theory of holographic superconductors. These are superconductors that have a dual gravitational description using gauge/gravity duality. After introducing a suitable gravitational theory, we discuss its properties in various regimes: the probe limit, the effects of backreaction, the zero temperature limit, and the addition of magnetic fields. Using the gauge/gravity dictionary, these properties reproduce many of the standard features of superconductors. Some familiarity with gauge/gravity duality is assumed. A list of open problems is included at the end.

  13. Introduction to PGAS Languages

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenryInhibitingInteractivePGAS and Hybrid Intro toIntroductionHPC

  14. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  15. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  16. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  17. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  18. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  19. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  20. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  1. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  2. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  3. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  4. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  6. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  7. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  8. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  9. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  10. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  11. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  12. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  13. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  14. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  15. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  16. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  17. Introduction to Cryptology Signature schemas

    E-Print Network [OSTI]

    Babinkostova, Liljana

    . Network Security - measures to protect data during their transmission. Internet Security - measures A brief history of Cryptography #12;A brief history of Cryptography During World War II, two notable and A Signature Scheme based on discrete Logarithms , IEEE, 1985 A brief history of Cryptography #12;A brief

  18. Introduction to Cryptology Signature schemas

    E-Print Network [OSTI]

    Babinkostova, Liljana

    . Network Security - measures to protect data during their transmission. Internet Security - measures A brief history of Cryptography #12;A brief history of Cryptography During World War II, two notable and A Signature Scheme based on discrete Logarithms , IEEE, 1985 A brief history of Cryptography #12;Definition

  19. Introduction to lattice QCD

    SciTech Connect (OSTI)

    Gupta, R.

    1998-12-31

    The goal of the lectures on lattice QCD (LQCD) is to provide an overview of both the technical issues and the progress made so far in obtaining phenomenologically useful numbers. The lectures consist of three parts. The author`s charter is to provide an introduction to LQCD and outline the scope of LQCD calculations. In the second set of lectures, Guido Martinelli will discuss the progress they have made so far in obtaining results, and their impact on Standard Model phenomenology. Finally, Martin Luescher will discuss the topical subjects of chiral symmetry, improved formulation of lattice QCD, and the impact these improvements will have on the quality of results expected from the next generation of simulations.

  20. Towards a Secure and Efficient System for End-to-End Provenance Appears in the Proceedings of the Second USENIX Workshop on Theory and Practice of Provenance (TaPP 2010)

    E-Print Network [OSTI]

    Zadok, Erez

    of sensor data as it is recorded and aggre- gated in cyber-physical systems such as the smart-grid and SCADA

  1. Towards a Secure and Efficient System for EndtoEnd Provenance Appears in the Proceedings of the Second USENIX Workshop on Theory and Practice of Provenance (TaPP 2010)

    E-Print Network [OSTI]

    Zadok, Erez

    of sensor data as it is recorded and aggre­ gated in cyber­physical systems such as the smart­grid and SCADA

  2. Resilient Detection in the Presence of Integrity Attacks Yilin Mo, Jo~ao Hespanha, Bruno Sinopoli

    E-Print Network [OSTI]

    Hespanha, João Pedro

    measurements. Supervisory Control And Data Acquisition (SCADA) systems, for example, run a wide range of safety the economy, the environment, and may even lead to the loss of human life. The first-ever SCADA system malware (called Stuxnet) was found in July 2010 and rose significant concern about SCADA system security [1], [2

  3. Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware

    E-Print Network [OSTI]

    Miller, Barton P.

    systems, i.e. SCADA systems. The use of automated tools for vulnerability assessment is quite attractive in most existing Grid and Cloud projects, and even in "Supervisory Control and Data Acquisition (SCADA]. Nowadays security is one of the most desirable features of the computational Grid, Cloud, and SCADA systems

  4. This is the author version published as: This is the accepted version of this article. To be published as

    E-Print Network [OSTI]

    Boyd, Colin

    attacks against a secure key management scheme in wireless sensor networks for PCS/SCADA. In: The 24th Management Scheme in Wireless Sensor Networks for PCS/SCADA Hani Alzaid and DongGook Park and Juan Gonz and Data Acquisition (SCADA) systems. The scheme, however, is still vulnerable to an attack called

  5. QUT Digital Repository: http://eprints.qut.edu.au/

    E-Print Network [OSTI]

    Boyd, Colin

    in wireless sensor networks for PCS/SCADA. In: Proceedings of the 1st International ICST Conference on Sensor Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA Hani Alzaid 1 , Dong. Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently

  6. This is the author's version of a work that was submitted/accepted for pub-lication in the following source

    E-Print Network [OSTI]

    Boyd, Colin

    Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity systems from mali- cious attacks. We review the constraints and require- ments for SCADA security and electricity distribution. SCADA systems, which once used proprietary com- munication mechanisms

  7. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  8. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  9. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  10. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  11. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  12. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  13. Building America Webinar: Introduction - Who's Successfully Doing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction - Who's Successfully Doing Deep Energy Retrofits? Building America Webinar: Introduction - Who's Successfully Doing Deep Energy Retrofits? This presentation provides...

  14. Introduction to Microelectromechanical Systems (MEMS) failure...

    Office of Scientific and Technical Information (OSTI)

    Conference: Introduction to Microelectromechanical Systems (MEMS) failure analysis. Citation Details In-Document Search Title: Introduction to Microelectromechanical Systems (MEMS)...

  15. Introduction to exact numerical computation

    E-Print Network [OSTI]

    Escardó, Martín

    Introduction to exact numerical computation Notes 2 Floating-point computation 4 3 Exact numerical (called the operational semantics) for computing a syntactical representative of the mathematical entity

  16. Introduction -CBE 30361: Science of

    E-Print Network [OSTI]

    Mukasyan, Alexander

    materials properly · realize new design opportunities with materials #12;Introduction -2 Required text VMSE · Comprised of 8 interactive modules · Atomic/molecular stuctures - 3D perspectives (better

  17. web identity standards introduction .............................................................................................................87

    E-Print Network [OSTI]

    Mullins, Dyche

    web identity standards sectionten 86 contents introduction............................................................................................................... 89-90 tagline and the web .................................................................................................91 tagline and the web: improper use

  18. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  19. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  20. Atmospheric,OceanicandSpaceSciences IntroductIon

    E-Print Network [OSTI]

    Eustice, Ryan

    Atmospheric,OceanicandSpaceSciences #12;IntroductIon A Rich History in Science Driven Engineering, through research sponsored by NASA, NSF, DoD, DoE and other governmental agencies. This research has than individual components. The proud history of the disciplines has yielded a department honored

  1. Introduction To GIS Course Syllabus Introduction to GIS NRC585

    E-Print Network [OSTI]

    Bradley, Bethany

    - 1 ­ Introduction To GIS Course Syllabus Introduction to GIS ­ NRC585 Lecture: Thurs. 1:00 - 2: by appointment Email: bbradley@eco.umass.edu Email: tcross@eco.umass.edu Website: http://people.umass.edu/bethanyb/gis.html Course Objective: To provide an understanding of the basic concepts and uses of GIS technology

  2. Introduction to Artificial Intelligence An Introduction to Data Mining

    E-Print Network [OSTI]

    Qu, Rong

    Introduction to Artificial Intelligence G51IAI An Introduction to Data Mining #12; Introduce a range of data mining techniques used in AI systems including : · Neural networks · Decision trees · ... Present some real life data mining applications. 2 Learning Objectives Dr Rong Qu G51IAI ­ Data Mining #12

  3. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  4. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  6. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  7. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  8. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  9. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  10. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  11. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  12. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  13. The Regional Incidence of a National Greenhouse Gas Emission Limit: Title VII of the American Clean Energy and Security Act

    E-Print Network [OSTI]

    Wing, Ian Sue

    the macroeconomic costs of greenhouse gas emission reductions under Title VII of the American Clean Energy Clean Energy and Security Act Ian Sue Wing* Dept. of Geography & Environment, Boston University. Introduction Title VII of the American Clean Energy and Security Act of 2009 (H.R. 2454) has the distinction

  14. Teaching with Moodle: an Introduction

    E-Print Network [OSTI]

    Ricci, Laura

    1 Teaching with Moodle: an Introduction Laura Ricci Università degli Studi di Pisa Teaching degli Studi di Pisa Università degli Studi di Pisa Dipartimento di Informatica #12;2 Teaching with Moodle: an Introduction Laura Ricci Università degli Studi di Pisa ACKNOLEDGEMENTS Ringrazio il personale

  15. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack, SCADA. 1. Introduction Today's electric power substations are becoming more automated and connected

  16. CAN(PLAN)+: Extending the Operational Semantics of the BDI Architecture to deal with Uncertain Information

    E-Print Network [OSTI]

    Liu, Weiru

    to model complex Supervisory Control And Data Acquisi- tion (SCADA) systems pervaded by uncertainty- propriate form of lookahead planning. 1 INTRODUCTION SCADA (Supervisory Control And Data Acquisition [Ingrand et al., 1992, Rao, 1996, Dastani, 2008] and have been used to some extent to model SCADA systems

  17. Incorporating PGMs into a BDI Architecture Yingke Chen1

    E-Print Network [OSTI]

    Liu, Weiru

    is motivated by the need to address the scalability and noisy sensing issues in SCADA (Supervisory Control effectiveness. 1 Introduction SCADA (Supervisory Control And Data Acquisition) systems have proved amounts of sensory data, especially in emergency situations. Current SCADA systems lack autonomous

  18. FORMAL MODELING AND ANALYSIS OF THE MODBUS PROTOCOL

    E-Print Network [OSTI]

    Dutertre, Bruno

    is a communication protocol widely used in SCADA systems and dis- tributed control applications. We present formal for systematic and extensive testing of Modbus devices. Keywords: SCADA Protocol, Modbus, Test-case Generation, Formal Methods 1. Introduction A distributed digital control system--sometimes called a SCADA system

  19. INTRODUCTION The power industry is at the dawn of a new era

    E-Print Network [OSTI]

    Shihada, Basem

    clean and flexible power grid. NEW NETWORK REQUIREMENTS Integration of renewable energy sources, transmission, and distribution of power are reliably and securely provided, while the installed infrastructureINTRODUCTION The power industry is at the dawn of a new era of transformation, triggered

  20. INTRODuCTION PrOtectiNg Lives ANd LiveLihOOds

    E-Print Network [OSTI]

    i-3 INTRODuCTION NOAA: PrOtectiNg Lives ANd LiveLihOOds NOAA provides weather, water, and climate safe, efficient, and secure transportation on U.S. waterways. The U.S. Marine Transporta- tion System Management Act, National Estuarine Research Reserves, and National Marine Sanctuaries. NOAA also supports