Powered by Deep Web Technologies
Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Introduction SCADA Security for Managers and Operators | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector Introduction SCADA...

2

sSCADA: securing SCADA infrastructure communications  

Science Conference Proceedings (OSTI)

Distributed control systems (DCS) and supervisory control and data acquisition (SCADA) systems were developed to reduce labour costs, and to allow system-wide monitoring and remote control from a central location. Control systems ... Keywords: DCS, SCADA, authenticated broadcast channels, authenticated emergency channels, authentication, critical infrastructures, cyber attacks, data acquisition, distributed control systems, infrastructure protection, secure channels, secure communications, smart grid security, supervisory control

Yongge Wang

2011-12-01T23:59:59.000Z

3

Securing Supervisory Control and Data Acquisition (SCADA) ...  

Science Conference Proceedings (OSTI)

... Acquisition (SCADA) and Industrial Control Systems (ICS) Linkage of Security and Safety in SCADA and Industrial Control Systems ...

2013-04-09T23:59:59.000Z

4

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

5

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

6

Secure SCADA network technology and methods  

Science Conference Proceedings (OSTI)

The overall security concern facing the designers and operators of SCADA and, more generally, of industrial control systems typically originates either from malicious threat agents attempting to disrupt the control system operation, e.g. to create a ... Keywords: SCADA security, secure SCADA networks

Farkhod Alsiherov; Taihoon Kim

2010-05-01T23:59:59.000Z

7

National SCADA Test Bed Enhancing control systems security in...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Test Bed Enhancing control systems security in the energy sector National SCADA Test Bed Enhancing control systems security in the energy sector Improving the security of...

8

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

9

Research trend on secure SCADA network technology and methods  

Science Conference Proceedings (OSTI)

The overall security concern facing the designers and operators of SCADA and, more generally, of industrial control systems typically originates either from malicious threat agents attempting to disrupt the control system operation, e.g. to create a ... Keywords: SCADA security, SCADA systems, secure SCADA networks

Farkhod Alsiherov; Taihoon Kim

2010-08-01T23:59:59.000Z

10

Secure SCADA Communication ProtocolPerformance Test Results | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Communication ProtocolPerformance Test Results SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication Protocol Performance Test Results More Documents & Publications AGA-12, Part 2 Performance Test Results AGA 12, Part 2 Performance Test Plan Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device

11

sSCADA: Securing SCADA Infrastructure Communications Yongge Wang and Bei-Tseng Chu  

E-Print Network (OSTI)

useless. Thus we assume that control centers are trusted in our protocol. 4 sSCADA protocol suite The sSCADA which are not acceptable to SCADA protocols. Semantic security property [17] is used to ensure.g., at off-peak time). A simple counter synchronization protocol is proposed for the sSCADA protocol suite

12

Cyber Assessment Methods for SCADA Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

13

A testbed for secure and robust SCADA systems  

Science Conference Proceedings (OSTI)

The Supervisory Control and Data Acquisition System (SCADA) monitor and control real-time systems. SCADA systems are the backbone of the critical infrastructure, and any compromise in their security can have grave consequences. Therefore, there is a ...

Annarita Giani; Gabor Karsai; Tanya Roosta; Aakash Shah; Bruno Sinopoli; Jon Wiley

2008-07-01T23:59:59.000Z

14

Intermediate SCADA Security Training Course Slides (September 2006)  

Energy.gov (U.S. Department of Energy (DOE))

Presentation for Intermediate SCADA Security, SS-2 SANS SCADASummit, September 28-29, 2006. The class enabledattendeesto develop an understanding of toolsand methods that can be used to...

15

Hallmark Project Commercialization of the Secure SCADA Communications  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Commercialization of the Secure SCADA Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Increased connectivity and automation in the control systems that manage the nation's energy infrastructure have improved system functionality, but left systems more vulnerable to cyber attack. Intruders could severely disrupt control system operation by sending fabricated information or commands to control system devices. To ensure message integrity, supervisory control and data acquisition (SCADA) systems require a method to validate device-to-device communication and verify that information has

16

Framework for SCADA Security Policy (October 2005) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy (October 2005) Framework for SCADA Security Policy (October 2005) Framework for SCADA Security Policy (October 2005) Modern automation systems used in infrastruc-ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc-ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi-tions, responsibilities, references, revision history, enforce-ment, and exceptions for various subjects relevant for system security. It covers topics including the overall security risk management program, data security, platforms,

17

Smartgrid supervisory control and data acquisition (SCADA) system security issues and counter measures.  

E-Print Network (OSTI)

??This project discusses security issues, countermeasures and research issues in the Supervisory Control And Data Acquisition (SCADA) system. SCADA system is used in power sector (more)

Sunku Ravindranath, Raksha

2010-01-01T23:59:59.000Z

18

Cyber Assessment Methods for SCADA Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

19

Communication security for SCADA in smart grid environment  

Science Conference Proceedings (OSTI)

Supervisory Control and Data Acquisition systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Conventionally, SCADA is connected only in a limited private network ... Keywords: SCADA, crossed crypto-scheme, encryption, security issues, smart gird

Rosslin John Robles; Tai-Hoon Kim

2010-11-01T23:59:59.000Z

20

Network Traffic Analysis and SCADA Security  

E-Print Network (OSTI)

Con- trol and Data Acquisition (SCADA) protocol. However, on the other hand, in spite of a recommended, the most dominant legacy SCADA protocol used in current North American power systems [24], [34], towards

Hu, Jiankun

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Improving Security of Oil Pipeline SCADA Systems Using Service-Oriented Architectures  

Science Conference Proceedings (OSTI)

Oil pipeline Supervisory Control and Data Acquisition (SCADA) systems monitor and help control pipes transporting both crude and refined petroleum products. Typical SCADA system architectures focus on centralized data collection and control --- however, ... Keywords: SCADA, architecture, petroleum, pipeline, security, services

Nary Subramanian

2008-11-01T23:59:59.000Z

22

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems  

E-Print Network (OSTI)

the message to 1 A typical SCADA message has a length of roughly 20 bytes. However, some SCADA protocols allow-3032-2, support all standard SCADA protocols, including DNP3-Serial and Modbus/RTU, at data rates up an insecure SCADA protocol into their Secure SCADA Communications Protocol (SSCP). PNNL's technology is being

Smith, Sean W.

23

Development of the PowerCyber SCADA security testbed  

Science Conference Proceedings (OSTI)

Meeting current demands for critical infrastructure cyber security education and research will require accurate testbed development. The PowerCyber was designed to closely resemble power grid communication utilizing actual field devices and SCADA software. ...

Adam Hahn; Ben Kregel; Manimaran Govindarasu; Justin Fitzpatrick; Rafi Adnan; Siddharth Sridhar; Michael Higdon

2010-04-01T23:59:59.000Z

24

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed More Documents & Publications Security is Not an Option ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004)

25

Security aspects of SCADA and DCS environments  

Science Conference Proceedings (OSTI)

SCADA Systems can be seen as a fundamental component in Critical Infrastructures, having an impact in the overall performance of other Critical Infrastructures interconnected. Currently, these systems include in their network designs different types ...

Cristina Alcaraz; Gerardo Fernandez; Fernando Carvajal

2012-01-01T23:59:59.000Z

26

Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure  

Science Conference Proceedings (OSTI)

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. ... Keywords: Computer Science, Security

Jack Wiles

2008-07-01T23:59:59.000Z

27

21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 Steps to Improve Cyber Security of SCADA Networks 1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in cyber space today. By allowing the collection and analysis of data and control of equipment such as pumps and valves from remote locations, SCADA networks provide great efficiency and are widely used. However, they also present a security risk. 21 Steps to Improve Cyber Security of SCADA Networks

28

National SCADA Test Bed Enhancing control systems security in the energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Test Bed Enhancing control systems security in the SCADA Test Bed Enhancing control systems security in the energy sector National SCADA Test Bed Enhancing control systems security in the energy sector Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA) and distributed control systems (DCS) used to monitor and manage our energy infrastructure. Many of the systems still in use today were designed to operate in closed, proprietary networks. National SCADA Test Bed Enhancing control systems security in the energy sector More Documents & Publications NSTB Summarizes Vulnerable Areas Transmission and Distribution World March 2007: DOE Focuses on Cyber

29

Dartmouth Computer Science Technical Report TR2008-628 Key Management for Secure Power SCADA  

E-Print Network (OSTI)

encryption and authentication capabilities to the devices that control the transmission of data across grid within the power grid to collect data and transmit it back to a central unit for processing. SCADA power SCADA systems that seeks to take advantage of the full security capacity of a given network

30

October 23, 2012 11:49 World Scientific Review Volume -9in x 6in ywangsmartgrid Smart Grid, Automation, and SCADA Systems Security  

E-Print Network (OSTI)

SCADA protocols: SCADA devices are man- ufactured by different vendors with different proprietary:49 World Scientific Review Volume - 9in x 6in ywangsmartgrid SCADA Security 13 3.3. sSCADA protocol suite The sSCADA protocol suite19 is proposed to overcome the challenges that we have discussed

Wang, Yongge

31

Secure Data Transfer Guidance for Industrial Control and SCADA Systems  

SciTech Connect

This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

2011-09-01T23:59:59.000Z

32

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

33

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

34

"Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report.  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

"Supervisory Control and Data Acquisition (SCADA) Systems." The CIP "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 Featured in this month's issue of The CIP Report are Supervisory Control and Data Acquisition (SCADA) systems. SCADA systems monitor and control the processes of many of our Nation's infrastructures. The security and safety of transportation, water, communications, and many other vital parts of our everyday lives all rely on SCADA systems. In this issue we look at some of the different SCADA systems and their applications. The CIP Report More Documents & Publications The CIP Report, Vol.11, No. 2 (August 2012): Smart Grid Security Introduction SCADA Security for Managers and Operators

35

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems ?  

E-Print Network (OSTI)

We construct a bump-in-the-wire (BITW) solution that retrofits security into time-critical communications over bandwidth-limited serial links between devices in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide the necessary security within timing constraints; the previous solution that does provide the necessary security is not BITW. At a comparable hardware cost, our BITW solution provides sufficient security, and yet incurs minimal end-to-end communication latency. A microcontroller prototype of our

Patrick P. Tsang; Sean W. Smith

2007-01-01T23:59:59.000Z

36

Sustainable Security for Infrastructure SCADA Jason Stamp Phil Campbell Jennifer DePoy John Dillinger William Young  

E-Print Network (OSTI)

, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04- 941 Sustainable Security for Infrastructure SCADA Jason Stamp Phil Campbell Jennifer DePoy John of these systems, but this approach does not foster effective security because of the fluid IT environment

37

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version)  

E-Print Network (OSTI)

.1 SCADA Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3.2 A Classification of Legacy SCADA Protocols . . . . . . . . . . . . . . . . . . . . . . 7 3.3 Formalizing BITW SCADA protocols, including DNP3-Serial and Modbus/RTU, at data rates up to 115200 bps. The SEL-3021

38

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems  

E-Print Network (OSTI)

Background 6 2.1 SCADA Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6. Communication protocols used in these systems, or serial-based SCADA protocols, are very compact some background on SCADA protocols and cryp- tographic tools, and review several existing BITW

39

Cyber Security Audit and Attack Detection Toolkit: National SCADA...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and...

40

Wind Power Plant SCADA and Controls  

SciTech Connect

Modern Wind Power Plants (WPPs) contain a variety of intelligent electronic devices (IEDs), Supervisory Control and Data Acquisition (SCADA) and communication systems. This paper discusses the issues related to a typical WPP's SCADA and Control. Presentation topics are: (1) Wind Turbine Controls; (2) Wind Plant SCADA, OEM SCADA Solutions, Third-Party SCADA Solutions; (3) Wind Plant Control; and (4) Security and Reliability Compliance.

Badrzadeh, Babak [IEEE PES Wind Plant Collector System Design Working Group; Castillo, Nestor [IEEE PES Wind Plant Collector System Design Working Group; Bradt, M. [IEEE PES Wind Plant Collector System Design Working Group; Janakiraman, R. [IEEE PES Wind Plant Collector System Design Working Group; Kennedy, R. [IEEE PES Wind Plant Collector System Design Working Group; Klein, S. [IEEE PES Wind Plant Collector System Design Working Group; Smith, Travis M [ORNL; Vargas, L. [IEEE PES Wind Plant Collector System Design Working Group

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Towards Full-disclosure: Broadening Access to SCADA Data to Improve Safety, Reliability, and Security  

E-Print Network (OSTI)

and important trend toward open SCADA protocols, allowing third party tools to manipulate the data. More than

Heidemann, John

42

Microsoft Word - PNNL-17118 Secure SCADA hadley SSCP FINAL with no ouo.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 8 Secure SCADA Communication Protocol Performance Test Results M.D. Hadley K.A. Huston August 2007 Prepared for U.S. Department of Energy Office of Electricity Delivery and Energy Reliability under Contract DE-AC05-76RL01830 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Battelle Memorial Institute, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned

43

An Introduction to Computer Security: the NIST Handbook  

Science Conference Proceedings (OSTI)

An Introduction to Computer Security: the NIST Handbook Keywords: computer security, contingency planning, cryptography, guidance, information assurance, risk management, security audit, security controls, security policy

Barbara Guttman; Edward A. Roback

1995-10-01T23:59:59.000Z

44

Semantic security analysis of SCADA networks to detect malicious control commands in power grids  

Science Conference Proceedings (OSTI)

In the current generation of SCADA (Supervisory Control And Data Acquisition) systems used in power grids, a sophisticated attacker can exploit system vulnerabilities and use a legitimate maliciously crafted command to cause a wide range of system changes ... Keywords: contingency analysis, intrusion detection system, scada, semantic analysis

Hui Lin, Adam Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, Ravishankar K. Iyer

2013-11-01T23:59:59.000Z

45

Forensic analysis of SCADA systems and networks  

Science Conference Proceedings (OSTI)

Supervisory Control and Data Acquisition (SCADA) systems are commonly used to automate and control industrial processes. Modern SCADA protocols leverage TCP/IP to transport sensor data and control signals. Also, corporate IT infrastructures ... Keywords: DCSs, Modbus, SCADA, data acquisition, distributed control systems, industrial environments, inforensics, network forensics, network monitoring, process monitoring, security, supervisory control

T. Kilpatrick; J. Gonzalez; R. Chandia; M. Papa; S. Shenoi

2008-02-01T23:59:59.000Z

46

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

47

Definition: Supervisory Control and Data Acquisition (SCADA) Communications  

Open Energy Info (EERE)

and Data Acquisition (SCADA) Communications and Data Acquisition (SCADA) Communications Network Jump to: navigation, search Dictionary.png Supervisory Control and Data Acquisition (SCADA) Communications Network SCADA communication networks are used to control geographically dispersed devices. The electricity grid has employed them for 15 years; smart grid implements SCADA more extensively both in geographic density and automated control of distribution system functionality. "SCADA systems are highly distributed systems used to control geographically dispersed assets, often scattered over thousands of square kilometers, where centralized data acquisition and control are critical to system operation." NIST Guide to Supervisory and Data Acquisition - SCADA and Industrial Control Systems Security (2007).[1]

48

Sandia SCADA Program -- High Surety SCADA LDRD Final Report  

SciTech Connect

Supervisory Control and Data Acquisition (SCADA) systems are a part of the nation's critical infrastructure that is especially vulnerable to attack or disruption. Sandia National Laboratories is developing a high-security SCADA specification to increase the national security posture of the U.S. Because SCADA security is an international problem and is shaped by foreign and multinational interests, Sandia is working to develop a standards-based solution through committees such as the IEC TC 57 WG 15, the IEEE Substation Committee, and the IEEE P1547-related activity on communications and controls. The accepted standards are anticipated to take the form of a Common Criteria Protection Profile. This report provides the status of work completed and discusses several challenges ahead.

CARLSON, ROLF E.

2002-04-01T23:59:59.000Z

49

A survey SCADA of and critical infrastructure incidents  

Science Conference Proceedings (OSTI)

In this paper, we analyze several cyber-security incidents involving critical infrastructure and SCADA systems. We classify these incidents based on Source Sector, Method of Operations, Impact, and Target Sector. Using this standardized taxonomy we can ... Keywords: critical infrastructure, cyber attack, cyber security, information assurance and security, scada, security

Bill Miller; Dale Rowe

2012-10-01T23:59:59.000Z

50

Security principles and management method for secure S/W introduction  

Science Conference Proceedings (OSTI)

An existing S/W development enterprises was negligent in S/W security problem because of imminent development period, insufficient fund and ignorance of security, and weakness problem of S/W almost has solved by beta test and a patch mostly. In addition, ... Keywords: S/W, S/W introduction, secure S/W, security

Jae Hong Han; Ho Seong Kim; Wan S. Yi; Yoo Jae Won

2008-11-01T23:59:59.000Z

51

Securing SCADA communication using hybrid cryptographyNOTE FROM ACM: It has been determined that the authors of this article plagiarized the contents from a previously published paper. Therefore ACM has shut off access to this paper.  

Science Conference Proceedings (OSTI)

NOTE FROM ACM: It has been determined that the authors of this article plagiarized the contents from a previously published paper. Therefore ACM has shut off access to this paper. For further information, contact the ACM ... Keywords: cryptography algorithms, security issues, supervisory control and data acquisition (SCADA)

AAmir Shahzad; Shahrulniza Musa

2012-02-01T23:59:59.000Z

52

Review of Supervisory Control and Data Acquisition (SCADA) Systems  

SciTech Connect

A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.

Reva Nickelson; Briam Johnson; Ken Barnes

2004-01-01T23:59:59.000Z

53

IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013 847 Cyber-Physical Security Testbeds: Architecture,  

E-Print Network (OSTI)

and secure versions of SCADA protocols. Examples of secure versions are Modbus and Inter- Control Center

Manimaran, Govindarasu

54

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber...

55

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Special Publication 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security; February ...

56

Scada Malware, a Proof of Concept  

Science Conference Proceedings (OSTI)

Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into such ... Keywords: Critical infrastructures, Malware, SCADA Systems, Security

Andrea Carcano; Igor Nai Fovino; Marcelo Masera; Alberto Trombetta

2009-08-01T23:59:59.000Z

57

National SCADA Test Bed | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sites Power Marketing Administration Other Agencies You are here Home National SCADA Test Bed National SCADA Test Bed Supervisory Control and Data Acquisition (SCADA) systems...

58

National SCADA Test Bed | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Cybersecurity » Energy Delivery Systems Cybersecurity Cybersecurity » Energy Delivery Systems Cybersecurity » National SCADA Test Bed National SCADA Test Bed Created in 2003, the National SCADA Test Bed (NSTB) is a one-of-a-kind national resource that draws on the integrated expertise and capabilities of the Argonne, Idaho, Lawrence Berkeley, Los Alamos, Oak Ridge, Pacific Northwest, and Sandia National Laboratories to address the cybersecurity challenges of energy delivery systems. Core and Frontier Research The NSTB core capabilities combine a network of the national labs' state-of-the-art operational system testing facilities with expert research, development, analysis, and training to discover and address critical security vulnerabilities and threats the energy sector faces. NSTB offers testing and research facilities, encompassing field-scale control

59

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

60

Network Security Automation Standards: TNC and SCAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 6. ...

2012-10-26T23:59:59.000Z

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Lemnos Interoperable Security Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Program More Documents & Publications SECURITY CORE FUNCTION AND DEFINITION REPORT Lemnos Interoperable Security DOE National SCADA Test Bed Program Multi-Year Plan...

62

Security Orchestration with IF-MAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 7. ...

2012-10-26T23:59:59.000Z

63

National SCADA Test Bed | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services Cybersecurity Energy Delivery Systems Cybersecurity National SCADA Test Bed National SCADA Test Bed Electricity Advisory Committee Transmission Planning...

64

Microsoft Word - Utilities Form Consortium to Fund SCADA Testing_v3.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. The utilities, located in the United States and Australia, will fund SCADA system assessments at NSTB testing facilities at Idaho National Laboratory. The consortium began taking shape last fall at an ABB User Group meeting, where ABB and some of its energy management system (EMS) customers asked other ABB system users to join in on

65

U.S. DOE/OE National SCADA Test Bed Supports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. DOE/OE National SCADA Test Bed Supports U.S. DOE/OE National SCADA Test Bed Supports U.S. DOE/OE National SCADA Test Bed Supports To help advance the U.S. Department of Energy (DOE) National SCADA Test Bed's (NSTB) efforts to enhance control system security in the energy sector, DOE's Office of Electricity Delivery and Energy Reliability (OE) recently awarded a total of nearly $8 million to fund five industry-led projects: Hallmark Project. (PDF 789 KB) Will commercialize the Secure SCADA Communications Protocol (SSCP), which marks SCADA messages with a unique identifier that must be authenticated before the function is carried out, ensuring message integrity. (Lead: Schweitzer Engineering Laboratories; Partners: Pacific Northwest National Laboratories, CenterPoint Energy) Detection and Analysis of Threats to the Energy Sector (DATES) (PDF

66

DOE National SCADA Test Bed Program Multi-Year Plan | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National SCADA Test Bed Program Multi-Year Plan National SCADA Test Bed Program Multi-Year Plan DOE National SCADA Test Bed Program Multi-Year Plan This document presents the National SCADA Test Bed Program Multi-Year Plan, a coherent strategy for improving the cyber security of control systems in the energy sector. The NSTB Program is conducted within DOE's Office of Electricity Delivery and Energy Reliability (OE), which leads national efforts to modernize the electric grid, enhance the security and reliability of the energy infrastructure, and facilitate recovery from disruptions to the energy supply. The Plan covers the planning period of fiscal year 2008 to 2013. DOE National SCADA Test Bed Program Multi-Year Plan More Documents & Publications DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan

67

SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013  

SciTech Connect

There is a significant need to protect the nations energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INLs research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate non-normal traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

Gordon Rueff; Lyle Roybal; Denis Vollmer

2013-01-01T23:59:59.000Z

68

State-based network intrusion detection systems for SCADA protocols: a proof of concept  

Science Conference Proceedings (OSTI)

We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere ... Keywords: IDS, SCADA systems, critical infrastructures, security

Andrea Carcano; Igor Nai Fovino; Marcelo Masera; Alberto Trombetta

2009-09-01T23:59:59.000Z

69

Good Practice Guide on Firewall Deployment for SCADA and Process Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Good Practice Guide on Firewall Deployment for SCADA and Process Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks In recent years, Supervisory Controls and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial information technologies for both critical and non-critical communications. While beneficial in other areas, use of these common protocols and operating systems has resulted in significantly less isolation from the outside world for vital SCADA and Process Control Networks (PCNs). These systems are now under risk of attack from a variety of threats. One commonly suggested security solution is to isolate the SCADA and PCN systems from the Internet and corporate enterprise network (EN) through the

70

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

security efforts by establishing the national SCADA test bed program INL [INL/EXT- 05-00671, Idaho National Laboratory. US-CERT [2008], Control Systems Security

Amin, Saurabh

2011-01-01T23:59:59.000Z

71

ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA/EMS System INEEL Baseline Summary Test Report (November SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) This document covers the security evaluation of the "baseline" or "as delivered" system performed in the Idaho National Engineering and Environmental Laboratory (INEEL) SCADA test bed as part of the Critical Infrastructure Test Range Development Program, which is funded by the U.S. Department of Energy; Office of Energy Assurance (DOE/OEA). This report is a nonproprietary version of the report sent to ABB that identified specific issues related to the security vulnerabilities in the ABB SCADA/EMS system. Work was performed by specialists in the fields of control system development, networking, software engineering, and cybersecurity. This

72

Introduction  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Introduction Introduction After the Office of Environmental Management (EM) completes environmental cleanup at a site which continues to have a Department of Energy (DOE) mission, EM transfers responsibility for any long-term stewardship (LTS) activities to the Landlord Program Secretarial Office (LPSO). LPSOs for current on-going mission sites include the Office of Science (SC), Office of Nuclear Energy (NE), and the National Nuclear Security Administration (NNSA). The LPSO includes the LTS as part of the site's mission. When the mission ends, the DOE Office of Legacy Management (LM) assumes responsibility for the LTS. Such sites are called closure sites. At both on-going mission sites and closure sites, if residual hazards

73

Designing Secure SCADA Systems Using Security Patterns  

Science Conference Proceedings (OSTI)

Critical infrastructure systems are those systems that support our daily lives and their protection is fundamental. The key component of a critical infrastructure system is the process control system, also known as the supervisory, control, and data ...

Eduardo B. Fernandez; Maria M. Larrondo-Petrie

2010-01-01T23:59:59.000Z

74

National SCADA Test Bed Fact Sheet  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PROTECTING ENERGY INFRASTRUCTURE BY IMPROVING THE SECURITY OF CONTROL SYSTEMS PROTECTING ENERGY INFRASTRUCTURE BY IMPROVING THE SECURITY OF CONTROL SYSTEMS Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA) and distributed control systems (DCS) used to monitor and manage our energy infrastructure. Many of the systems still in use today were designed to operate in closed, proprietary networks. Increasing use of common software and operating systems and connection to public telecommunication networks and the Internet have made systems more reliable and efficient-but also more

75

Research Challenges for the Security of Control Systems Alvaro A. Cardenas Saurabh Amin  

E-Print Network (OSTI)

analysis attacks. · Modbus security issues: A SCADA protocol of note- worthy concern is the Modbus protocol

Sastry, S. Shankar

76

Transmission and Distribution World March 2007: DOE Focuses on Cyber Security  

Energy.gov (U.S. Department of Energy (DOE))

Energy sector owners, operators and system vendors team up to boost control system security with national SCADA test bed.

77

Introduction  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Draft Report to Congress on NIST Activities in Support of the Energy Independence and Security Act (EISA) of 2007 December ??, 2008 2 Executive Summary 3 Introduction Revitalizing the electric power grid has become one of our Nation's top priorities, promising to reduce our dependence on oil and to meet the anticipated 1.1% annual increase in demand for electricity 1 . In his New Energy for America plan, President-elect Obama calls for increased investment in the next generation power grid, referred to as the Smart Grid, to help reach the ambitious goals of ensuring that renewable sources provide 10% of our electricity by 2012 and 25% by 2025; and that 1 million Plug-In Hybrid cars are on the roads by 2015. As the Nation's measurement and standards institute, NIST is making a unique contribution to

78

CyberPhysical System Security for the Electric Power Grid  

E-Print Network (OSTI)

on the vulnerabil- ity of SCADA protocols. Security venues such as DEFCON, Blackhat, and RSA have recently included implementation vulnerabilities that allow attack- ers to execute arbitrary code in specific SCADA protocols

Manimaran, Govindarasu

79

Protection of SCADA communication channels  

Science Conference Proceedings (OSTI)

The modern day e-society inherently depends on Critical Infrastructures (CI) such as power grid, communication, transportation etc. For such CIs to operate efficiently, Supervisory Control and Data Acquisition (SCADA) systems direct their control and ...

Abdelmajid Khelil; Daniel Germanus; Neeraj Suri

2012-01-01T23:59:59.000Z

80

Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security  

Science Conference Proceedings (OSTI)

SCADA (Supervisory Control and Data Acquisition), these are systems based on real-time processing, control and design for real time infrastructure such as water pumping stations, oil purification plants and rail control centers etc. In the initial structure ... Keywords: SCADA attacks, cryptography hybrid algorithm, data flow and distribution, distributed network protocole, hybrid algorithms, prevention system, secure simulation model, security issues, security services, simulation base experimentation and results, supervisory control and data acquisition (SCADA)

Shahrulniza Musa; AAmir Shahzad; Abdulaziz Aborujilah

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Introduction to SCADA Protection and Vulnerabilities  

SciTech Connect

Even though deregulation has changed the landscape of the electric utility industry to some extent, a typical large electric utility still owns power generation facilities, power transmission and distribution lines, and substations. Transmission and distribution lines form the segments or spokes of a utilitys grid. Power flow may change through these lines, but control of the system occurs at the nodes of the grid, the generation facilities, and substations. This section discusses each of these node types in more detail as well as how each is controlled.

Ken Barnes; Briam Johnson; Reva Nickelson

2004-03-01T23:59:59.000Z

82

Comments Sought on New IT Security Guides  

Science Conference Proceedings (OSTI)

... Publication (SP) 800-54, Border Gateway Protocol Security; SP 800-82, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial ...

2012-09-06T23:59:59.000Z

83

SCADA architecture with mobile remote components  

Science Conference Proceedings (OSTI)

With the advent of new technologies, the demand of connecting IT systems to the Internet is increasing. This is also the case for Control systems specifically SCADA (Supervisory Control and Data Acquisition) systems. Traditional SCADA systems are connected ... Keywords: SCADA, control systems, mobility, remote components

Tai-Hoon Kim

2010-08-01T23:59:59.000Z

84

CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection  

SciTech Connect

Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

Marco Carvalho; Richard Ford

2012-05-14T23:59:59.000Z

85

Introductions  

Content on this page requires a newer version of Adobe Flash Player. Introductions presented by Chad Riggs

86

INTRODUCTION  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INTRODUCTION INTRODUCTION SECTION 1 1-1 1.0 INTRODUCTION On December 7, 2012, Cameron LNG, LLC (Cameron LNG) filed an application with the Federal Energy Regulatory Commission (Commission or FERC) pursuant to Section 3(a) of the Natural Gas Act (NGA) and Part 153 of the Commission's regulations. Cameron LNG requests authorization to site, construct, and operate liquefaction and export facilities adjacent to

87

Metrics for the National SCADA Test Bed Program  

Science Conference Proceedings (OSTI)

The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

2008-12-05T23:59:59.000Z

88

Roadmap to Secure Control Systems in the Energy Sector 2006 ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Energy Sector More Documents & Publications Security is Not an Option DOE National SCADA Test Bed Program Multi-Year Plan Roadmap to Achieve Energy Delivery Systems...

89

Securing Wide Area Measurement Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

measurement system (WAMS) security conducted by Pacific Northwest National Laboratory (PNNL) as a project funded by the National SCADA Test Bed Program in cooperation with the...

90

Good Practice Guide on Firewall Deployment for SCADA and Process...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks In recent years,...

91

"Supervisory Control and Data Acquisition (SCADA) Systems." The...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

"Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8...

92

National SCADA Test Bed Consequence Modeling Tool | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National SCADA Test Bed Consequence Modeling Tool National SCADA Test Bed Consequence Modeling Tool This document presents a consequence modeling tool that provides, for asset...

93

Introduction  

Gasoline and Diesel Fuel Update (EIA)

9) 9) Release date: March 2009 Next release date: March 2010 Assumptions to the Annual Energy Outlook 2009 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2. Macroeconomic Activity Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3. International Energy Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 4. Residential Demand Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 5. Commercial Demand Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 6. Industrial Demand Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 7. Transportation Demand Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 8. Electricity Market Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 9. Oil and Gas Supply Module. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 10. Natural Gas Transmission and Distribution Module . . . . . . . . . . . . . . . . . . . . 123 11. Petroleum Market Module

94

Introduction  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report of the Building Energy Efficiency Subcommittee Report of the Building Energy Efficiency Subcommittee to the Secretary of Energy Advisory Board November 6, 2012 Dr. J. Michael McQuade Matthew Rogers Dr. Arthur Rosenfeld Dr. Maxine Savitz Steven Westly (Chair) 2 Table of Contents Executive Summary...................................................................................3 Primary Recommendations..........................................................................5 Introduction and Methodology.....................................................................7 Section 1: Current and planned DOE activities related to building energy efficiency......8

95

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Chronological list of developments in the use of materials...iron China 224 B.C. Colossus of Rhodes destroyed Greece 200??300 A.D. Use of mercury in gilding (amalgam gilding) Roman world 1200??1450 A.D. Introduction of cast iron (exact date and place unknown) Europe Circa 1122 A.D. Theophilus's On Divers Arts : the first

96

Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)  

SciTech Connect

Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

Jared Verba; Michael Milvich

2008-05-01T23:59:59.000Z

97

Introduction  

Gasoline and Diesel Fuel Update (EIA)

2 2 Introduction This report presents the major assumptions of the National Energy Modeling System (NEMS) used to generate the projections in the Annual Energy Outlook 2012 [1] (AEO2012), including general features of the model structure, assumptions concerning energy markets, and the key input data and parameters that are the most significant in formulating the model results. Detailed documentation of the modeling system is available in a series of documentation reports [2]. The National Energy Modeling System The projections in AEO2012 are generated using the NEMS, developed and maintained by the Office of Energy Analysis (OEA) of the U.S. Energy Information Administration (EIA). In addition to its use in developing the Annual Energy Outlook (AEO) projections, NEMS is also used to complete analytical studies for the U.S. Congress, the Executive Office

98

Introduction  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- 1 - Revision 3 Tribal Discussions on Implementation of the Section 180(c) Grant Program Annotated Outline and Appendices January 19, 2006 Preliminary Draft - For Discussion Purposes Only - 2 - Revision 3 INTRODUCTION The U.S. Department of Energy (DOE) seeks increased input from Tribal nations and tribal groups regarding the design of the Section 180(c) financial assistance program. The attached annotated outline and discussion papers serve as a communication tool to aid the discussions between DOE and Tribal nations and groups. The papers define the key issues and will be updated regularly to reflect key aspects of the discussions and the resulting changes to the Section 180(c) program. DOE staff will use the information

99

Distributed Network Protocol (DNP3) Security Interoperability Testing 2012  

Science Conference Proceedings (OSTI)

This project encourages the adoption of the Distributed Network Protocol (DNP3) Secure Authentication specification through three approaches:Supporting development and review of the specification by industry experts in supervisory control and data acquisition (SCADA) and cryptographyAligning the specification with international standards performing similar functions, so that there is a common industry-wide approach to SCADA securityDeveloping ...

2012-12-31T23:59:59.000Z

100

Securing a Wireless Networked Control System Using Information Fusion  

Science Conference Proceedings (OSTI)

Security of a wireless sensor network practically governs its usability in several applications. Especially, in applications like Industrial control systems which use NCS and SCADA systems, the security affects the stability of the system. We propose ...

Brijesh Kashyap Chejerla, Sanjay Madria

2012-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

SCADA -- AM/FM interface: Platforms, technology  

SciTech Connect

Efficient utility operations is enhanced by close interoperation between automated mapping/facility management (AM/FM) and supervisory control and data acquisition (SCADA) systems. Important benefits of such integration are improvements in service quality and reduced maintenance costs. Development of an AM/FM -- SCADA interface to provide automatic database and display generation for SCADA through AM/FM functions is continuing by Valmet Automation. To minimize or eliminate vendor-dependence, the AM/FM-SCADA interface is compliant with the Electric Power Research Institute's (EPRI) utility communication architecture (UCA). The utility industry is changing at an unprecedented rate. To remain a leader, or even to keep pace, utilities must be flexible and innovative. Competition forces companies to become more streamlined and efficient. These forces make the requirements for automation go beyond simple SCADA. Among several developing trends in the industry is the emergence of AM/FM. Collectively, these trends indicate the need to increase efficiency in the design, operation and maintenance of the transmission and distribution system. To accomplish its mission, SCADA and AM/FM must be a highly integrated system to provide timely information to its users. Open systems, the client-server paradigm and better information integration tools facilitate meeting these needs. UCA specification provides the technological glue, to achieve application integration between heterogeneous systems.

Gilbert, R.F. (Valmet, Automation, Inc., Houston, TX (United States))

1994-05-01T23:59:59.000Z

102

TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS Introduction SCADA Security for Managers and Operators Intermediate SCADA Security Training Course Slides...

103

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

104

Scada: Supervisory Control And Data Acquisition, 4th edition  

Science Conference Proceedings (OSTI)

Supervisory control and data acquisition (SCADA) technology has evolved over the past 30 years as a method of monitoring and controlling large processes. This reference book offers overviews of SCADA's component technologies, as well as details necessary ...

Stuart A. Boyer

2009-06-01T23:59:59.000Z

105

DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ  

E-Print Network (OSTI)

-testing community. We also introduce some tools that are available for fuzzing SCADA protocols. General Network available that have been built for fuzzing non-proprietary SCADA protocols. In 2007 Ganesh Devarajan from standardized SCADA protocols such as IEC61850, MODBUS, and DNP3. 3. The LZFuzz Project 3.1 Our Approach Often

Smith, Sean W.

106

Fundamentals of SCADA and automated meter reading  

SciTech Connect

This paper discusses SCADA systems allow users to control and acquire data from remote facilities such as compressors, pressure-regulating stations, control valves and measurement stations. In general, a SCADA system performs functions in sequential control, continuous control, supervisory setpoint control and data acquisitions. AMR systems allow users to obtain up-to-date information on their gas demand. When AMR was in its infancy, equipment was designed only to read and record gas consumption values. The basic function of an early AMR system was to read gas volume at a fixed interval and record the data in its memory until it communicated with a central receiving facility.

Kwok, A. (Data Acquisition, BC Gas Inc., Burnaby, British Columbia (CA))

1992-02-01T23:59:59.000Z

107

SCADA system for monitoring water supply networks  

Science Conference Proceedings (OSTI)

Water supply represents a vital problem for people, and this imposes the need to know the information regarding consumptions, resources and production. This implies a continuous supervision of the water supply process in order to allow any problem that ... Keywords: PLCs, SCADA, analysis, control, data acquisition, data transmission, monitoring

Mircea Dobriceanu; Alexandru Bitoleanu; Mihaela Popescu; Sorin Enache; Eugen Subtirelu

2008-10-01T23:59:59.000Z

108

Routing SCADA data through an enterprise WAN  

SciTech Connect

Houston Lighting and Power (HL and P) and many other large utilities have investigated substantial resources in developing integrated enterprise wide area networks (WANs). The WAN provides unprecedented opportunities for integrating information throughout the corporation, resulting in improved efficiency and reduced costs of operation. In contrast, present dedicated point-to-point SCADA data circuits from the energy management system (EMS) to remote terminal units (RTUs) are not currently integrated with the network, nor replicated in any offsite backup system. An integrated approach might integrate communications from selected RTUs over the WAN to a backup system or the EMS. Such an approach would potentially provide improved disaster recovery, more efficient use of communications, reduced maintenance costs, and improved availability of operational data. RTU data, however, is fundamentally different from most other WAN traffic in that it is critical to the moment-to-moment operation of the utility and consists of a large number of messages repeated frequently and continuously. There are valid concerns as to whether the stability, availability, and inherent latency of the WAN would be adequate to support operations of a backup or primary SCADA system. There are also concerns about the adverse effects that SCADA traffic might have on the WAN. These concerns led to the project featured in this article, which tested the operational suitability and effectiveness of routing SCADA data between selected RTUs and a central site on the WAN.

Flowers, T.; Houle, B. [Houston Lighting and Power, TX (United States); Retzer, J.; Ramanathan, R. [National Systems and Research, Camas, WA (United States)

1995-07-01T23:59:59.000Z

109

Real-time var control by SCADA  

SciTech Connect

This paper outlines the operation and advantages of the SCADA capacitor control called CAPCON, developed by the Virginia Electric and Power Company (Virginia Power). CAPCON is used to control vars system-wide by switching substation capacitor banks based on real-time var and voltage data instead of the traditional time clock method.

Girotti, T.B.; Tweed, N.B.; Houser, N.R. (Virginia Power Co., Richmond, VA (USA))

1990-02-01T23:59:59.000Z

110

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

Although researchers have spent considerable time on smart-grid cybersecurity issues, major problems remain unsolved. This article presents a high-level review of authentication and encryption solutions for smart-grid architectures. Keywords: smart grid, computer security, security and privacy, electrical grid, authentication, encryption, SCADA

Himanshu Khurana; Mark Hadley; Ning Lu; Deborah A. Frincke

2010-01-01T23:59:59.000Z

111

Good practice guide on firewall deployment for SCADA and process control networks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FIREWALL DEPLOYMENT FOR SCADA AND FIREWALL DEPLOYMENT FOR SCADA AND PROCESS CONTROL NETWORKS GOOD PRACTICE GUIDE 15 FEBRUARY 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) - a predecessor organisation to the Centre for the Protection of National Infrastructure (CPNI). Hyperlinks in this document may refer to resources that no longer exist. Please see CPNI's website (www.cpni.gov.uk) for up-to-date information. Disclaimer Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by CPNI. The views and opinions of authors expressed within this document shall not be used for advertising or product endorsement purposes.

112

Use of SCADA Data for Failure Detection in Wind Turbines  

SciTech Connect

This paper discusses the use of existing wind turbine SCADA data for development of fault detection and diagnostic techniques for wind turbines.

Kim, K.; Parthasarathy, G.; Uluyol, O.; Foslien, W.; Sheng, S.; Fleming, P.

2011-10-01T23:59:59.000Z

113

Microsoft Word - SCADA CX.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2010 8, 2010 REPLY TO ATTN OF: Claire Bingaman KEC-4 SUBJECT: Environmental Clearance Memorandum James Hall Project Manager - TPC-TPP-4 Proposed Action: SCADA Upgrades at BPA's Hungry Horse, Bonneville, and Grand Coulee Substations Budget Information: Hungry Horse: WO# 00246171, Task 01 Bonneville: WO# 00246173, Task 01 Grand Coulee: WO# 00246244, Task 01 Categorical Exclusion Applied (from Subpart D, 10 C.F.R. Part 1021): B4.6 Additions or modifications to electric power facilities that would not affect the environment beyond the previously developed facility area.... Location: Grant County, Washington Proposed by: Bonneville Power Administration (BPA) Description of the Proposed Action: BPA proposes to install Supervisory Control and Data Acquisition (SCADA) upgrades at the

114

Weather condition double checking in internet SCADA environment  

Science Conference Proceedings (OSTI)

The function of SCADA is collecting of the information, transferring it back to the central site, carrying out any necessary analysis and control and then displaying that information on a number of operator screens. Systems automatically control the ... Keywords: API, SCADA, control systems, telecontrol

Tai-Hoon Kim

2010-08-01T23:59:59.000Z

115

Double checking weather condition in internet SCADA environment  

Science Conference Proceedings (OSTI)

The function of SCADA is collecting of the information, transferring it back to the central site, carrying out any necessary analysis and control and then displaying that information on a number of operator screens. Systems automatically control the ... Keywords: API, SCADA, control systems, teleControl

Rosslin John Robles; Tai-Hoon Kim

2010-05-01T23:59:59.000Z

116

Implementation of a fuzzy-based level control using SCADA  

Science Conference Proceedings (OSTI)

This paper presents a SCADA (supervisory control and data acquisition) control via PLC (programmable logic controller) for a fluid level control system with fuzzy controller. For this purpose, a liquid level control set and PLC have been assembled together. ... Keywords: Fuzzy logic, Level control, Programmable logic controller, SCADA

Zafer Aydogmus

2009-04-01T23:59:59.000Z

117

Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation  

E-Print Network (OSTI)

redundancy. Future work will consist of determining, for various SCADA protocols, prac- tical implementations

Sheldon, Nathan D.

118

Critical infrastructure security curriculum modules  

Science Conference Proceedings (OSTI)

Critical infrastructures have succumbed to the demands of greater connectivity. Although the scheme of connecting these critical equipment and devices to cyberspace has brought us tremendous convenience, it also enabled certain unimaginable risks and ... Keywords: SCADA, control systems, course modules, critical infrastructures, cybersecurity, programmable logic controllers, security, vulnerability

Guillermo A. Francia, III

2011-09-01T23:59:59.000Z

119

NCS security experimentation using DETER  

Science Conference Proceedings (OSTI)

Numerous efforts are underway to develop testing and experimentation tools to evaluate the performance of networked control systems (NCS) and supervisory control and data acquisition (SCADA) systems. These tools offer varying levels of fidelity and scale. ... Keywords: experimentation, network security, robust control

Alefiya Hussain; Saurabh Amin

2012-04-01T23:59:59.000Z

120

Development of extensible virtual instruments for SCADA applications  

Science Conference Proceedings (OSTI)

This paper presents an architecture and design of a solution for virtual instrumentation in SCADA systems. The aim of this approach is to propose a way to design virtual instrumentation based on software components, which ensures uniform, consistent ...

Traian Turc; Adrian Gligor; Cristian Dumitru; Alexandru Morar

2010-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Low-Latency Cryptographic Protection for SCADA Communications  

E-Print Network (OSTI)

Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors including power, gas, oil, and water. However, SCADA networks generally have little protection from the rising danger of cyber attack. A retrofit solution to protect existing SCADA communications links must assure the integrity of commands and responses that are typically transmitted over serial lines at speeds from 300 to 19200 bits per second, while introducing minimal additional latency into the real-time SCADA traffic. This paper describes the key aspects of a cryptographic protocol for retrofit SCADA link protection that leverages the Cyclic Redundancy Checks (CRC) transmitted by existing SCADA equipment to achieve strong integrity while introducing minimal latency. The protocol is based on a new position embedding encryption mode which, for a b-bit block cipher, ensures that any unauthentic message an adversary can construct (i) includes at least b randomly chosen bits, and therefore, by a new result proved for error detection by systematic shortened cyclic codes, (ii) contains a correct h-bit CRC with probability 2 ?h. The low speed of the communications channel limits the rate at which an adversary can make trials, enabling detection of potential attacks before enough trials can be made to achieve any significant likelihood of success. The protocol avoids the need for a decrypting link protection module to buffer decrypted data until an end-of-message integrity check is verified, which would otherwise add significant latency. 1

Andrew K. Wright; John A. Kinast; Joe Mccarty

2004-01-01T23:59:59.000Z

122

A taxonomy of security vulnerabilities in scada protocols  

Science Conference Proceedings (OSTI)

Modern industrial facilities, such as oil refineries, chemical factories, electric power generation plants, and manufacturing facilities are large, distributed complexes. Plant operators must continuously monitor and control many different sections of ...

Vinay Mallikarjun Igure / Ronald D. Williams

2007-01-01T23:59:59.000Z

123

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

monitor and control critical infrastructure equipment, ranging from valves in oil and gas pipelines to switches and breakers in the national electric grid. If compromised, these...

124

Hallmark Project Commercialization of the Secure SCADA Communications...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

but left systems more vulnerable to cyber attack. Intruders could severely disrupt control system operation by sending fabricated information or commands to control system...

125

Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System  

SciTech Connect

We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

2006-01-01T23:59:59.000Z

126

DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OE National SCADA Test Bed Fiscal Year 2009 Work Plan DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan This document is designed to help guide and strengthen the DOEOE...

127

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

128

Research on memory access vulnerability analysis technique in SCADA protocol implementation  

Science Conference Proceedings (OSTI)

SCADA systems play key roles in monitor and control of the critical infrastructures, the vulnerabilities existed in them may destroy the controlled critical infrastructures. This paper proposes an analysis method of memory access vulnerability in SCADA ... Keywords: SCADA protocol implementation, dynamic analysis, memory access vulnerability

Fang Lan; Wang Chunlei; He Ronghui

2010-07-01T23:59:59.000Z

129

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

130

Office of Headquarters Security Operations - Headquarters Facilities...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations HomeIntroduction Physical Security Limited Areas and Vault-Type Rooms Personnel Security Foreign Ownership, Control or Influence; Facility...

131

DOE Headquarters Security Quick Reference Book | Navigation  

NLE Websites -- All DOE Office Websites (Extended Search)

TECH. & INFO. SECURITY TEAM HOME COVER | INTRODUCTION SECURITY ACRONYMS TABLE OF CONTENTS HEADQUARTERS SECURITY OFFICER PROTECTIVE FORCE UNCLASSIFIED FOREIGN VISITS & ASSIGNMENTS...

132

Development & expansion of an industrial control system security laboratory and an international research collaboration  

Science Conference Proceedings (OSTI)

In this paper, we describe the incremental building of a unique industrial control system laboratory designed to investigate security vulnerabilities and to support development of mitigating tools and techniques. The laboratory has been built over time ... Keywords: SCADA, critical infrastructure security, industrial control systems, test bed

Rayford B. Vaughn; Thomas Morris; Elena Sitnikova

2013-01-01T23:59:59.000Z

133

Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol  

Science Conference Proceedings (OSTI)

When SCADA systems are exposed to public networks, attackers can more easily penetrate the control systems that operate electrical power grids, water plants, and other critical infrastructures. To detect such attacks, SCADA systems require an intrusion ... Keywords: Bro, DNP3, SCADA, specification-based intrusion detection system

Hui Lin; Adam Slagell; Catello Di Martino; Zbigniew Kalbarczyk; Ravishankar K. Iyer

2013-01-01T23:59:59.000Z

134

A multi-functional platform for implementing intelligent and ubiquitous functions of smart substations under SCADA  

Science Conference Proceedings (OSTI)

For more efficient and economical management of substations under SCADA (Supervisory Control and Data Acquisition) systems, the concept of a smart substation has been introduced using intelligent and ubiquitous IT (Information Technology) techniques. ... Keywords: Embedded platform, Intelligent system, SCADA system, Smart substations, Ubiquitous

Hak-Man Kim; Jong-Joo Lee; Myong-Chul Shin; Seok-Soo Kim

2009-11-01T23:59:59.000Z

135

Web based multilayered distributed SCADA/HMI system in refinery application  

Science Conference Proceedings (OSTI)

The paper describes system synthesis and architecture of a multilayered distributed SCADA/HMI system. The system is used for monitoring and control of refinery terminals for truck loading and oil products pipeline shipping. Network-centered, distributed ... Keywords: Data server, Fieldbuses, OPC protocols, Real time systems, SCADA/HMI

Adnan Salihbegovic; Vlatko Marinkovi?; Zoran Cico; Elvedin Karavdi?; Nina Delic

2009-03-01T23:59:59.000Z

136

Optimal Design of Remote Terminal Unit (RTU) for Wireless SCADA System for Energy Management  

Science Conference Proceedings (OSTI)

For energy deficit countries, the design of Supervisory Control and Data Acquisition (SCADA) based energy management systems for optimal distribution is of high interest. Such design involves development of Remote Terminal Unit (RTU) which is considered ... Keywords: Field Programmable Gate Array (FPGA), Programmable Logic Controller (PLC), Remote Terminal Unit (RTU), Supervisory Control and Data Acquisition (SCADA), Tele-Control Interface (TCI), Wireless Communication

Muhammad Aamir; Javier Poncela; Muhammad Aslam Uqaili; B. S. Chowdhry; Nishat Ahmad Khan

2013-04-01T23:59:59.000Z

137

The geological disasters defense expert system of the massive pipeline network SCADA system based on FNN  

Science Conference Proceedings (OSTI)

The SCADA system plays an important role in monitoring the long distance operation of mass pipeline network, which may experience huge damage due to landslides geological hazards. It is critical to detect the deformation and displacement of rock to forecast ... Keywords: FNN, SCADA system, TDR, expert system, geologic hazard

Xiedong Cao; Cundang Wei; Jie Li; Li Yang; Dan Zhang; Gang Tang

2012-04-01T23:59:59.000Z

138

A Research on Instability of Small Flow in SCADA and an Optimizing Design for Control  

Science Conference Proceedings (OSTI)

SCADA is a set of systems with a higher automatic level of the long-distance pipeline. When the sub-transmission stations in the state of full load, the automatic control of sub-output capacity is quite stable working at certain settings. However, partly ... Keywords: PID control, SCADA system, small flow, sub-output control

Youqiang Guo; Zijun Zhang; Xuezhu Pei

2009-07-01T23:59:59.000Z

139

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

140

Control Systems Security Standards: Accomplishments And Impacts |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts This report describes the accomplishments and impacts of the standards team towards achieving these three goals and describes the follow-on efforts that need to be made toward meeting the priority strategies defined in the DOE/DHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards: Accomplishments & Impacts More Documents & Publications A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

142

Introduction to Classification  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 3 This briefing provides an introduction to classified information. 2 Introduction to Classified Information April 2013 3 What is classification?  Classification is how we identify certain information that needs to be protected in the interest of national security.  DOE has a formal process for classifying and declassifying information, documents, and materials. 4 Restricted Data (RD) Formerly Restricted Data (FRD) What information is classified? Atomic Energy Act Implemented by 10 CFR part 1045 Executive Order 13526 Implemented by 32 CFR part 2001 National Security Information (NSI) 5 Transclassified Foreign Nuclear Information (TFNI) Authority Classified Information Category 6 Restricted Data  The Atomic Energy Act defines "Restricted

143

Increasing the resilience of critical SCADA systems using peer-to-peer overlays  

Science Conference Proceedings (OSTI)

Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are increasingly composed of standard Internet technologies and use public networks. Hence, ...

Daniel Germanus; Abdelmajid Khelil; Neeraj Suri

2010-06-01T23:59:59.000Z

144

An event buffer flooding attack in DNP3 controlled SCADA systems  

Science Conference Proceedings (OSTI)

The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized ...

Dong Jin; David M. Nicol; Guanhua Yan

2011-12-01T23:59:59.000Z

145

Supervisory Control and Data Acquisition System (SCADA) Substation C3-3 Acceptance Test Procedure  

Science Conference Proceedings (OSTI)

The purpose of this acceptance test procedure (ATP) is to demonstrate that the newly installed Supervisory Control and Data Acquisition (SCADA) computer system functions as intended by the design.

ZAKRAJSEK, M.F.

2000-10-17T23:59:59.000Z

146

Supervisory Control and Data Acquisition System (SCADA) Substation C3S4 Acceptance Test Procedure  

Science Conference Proceedings (OSTI)

The purpose of this acceptance test procedure (ATP) is to demonstrate that the newly installed Supervisory Control and Data Acquisition (SCADA) computer system functions as intended by the design.

ZAKRAJSEK, M.F.

2000-10-17T23:59:59.000Z

147

Office of Security and Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security and Emergency Management The Security and Emergency Management page is designed to give newcomers and veterans alike an introduction and refresher about our...

148

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

149

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

http:energy.govigdownloadsaudit-report-oas-m-04-04 Download Introduction SCADA Security for Managers and Operators http:energy.govoedownloads...

150

GEORG-AUGUST-UNIVERSITT Computer Security  

E-Print Network (OSTI)

GEORG-AUGUST-UNIVERSIT?T G?TTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

Grabowski, Jens

151

SECURITY TECHNIQUES Chris J Mitchell1  

E-Print Network (OSTI)

SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

Mitchell, Chris

152

Secure Control Systems for the Energy Sector  

Science Conference Proceedings (OSTI)

Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

Smith, Rhett; Campbell, Jack; Hadley, Mark

2012-03-31T23:59:59.000Z

153

Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding  

Science Conference Proceedings (OSTI)

The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

Yan, Guanhua [Los Alamos National Laboratory; Nicol, David M [UNIV OF IL; Jin, Dong [UNIV OF IL

2010-12-16T23:59:59.000Z

154

1. Introduction  

U.S. Energy Information Administration (EIA)

1. Introduction Background The principal focus of this report is to provide accurate annual estimates of U.S. proved reserves of crude oil, natural gas, and natural ...

155

Cyber Security Testing and Training Programs for Industrial Control Systems  

DOE Green Energy (OSTI)

Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

Daniel Noyes

2012-03-01T23:59:59.000Z

156

An Architecture of a Multi-Agent System for SCADA -dealing with uncertainty, plans and actions  

E-Print Network (OSTI)

that aim to achieve those goals. For example a grid connected so- lar powered house may need to take in traditional SCADA systems deployed in critical environments such as electrical power generation, transmission to deliver robust plan selection. We examine the approach in the context of a simplified power supply

Liu, Weiru

157

Microsoft Word - 4March08_SCADA_Procurement.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL is a U.S. Department of Energy National Laboratory INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance INL/EXT-06-11516 Revision 3 Cyber Security Procurement Language for Control Systems Version 1.8 Sponsor: Department of Homeland Security, National Cyber Security Division Contributors: Idaho National Laboratory, State of New York Multi-State Information Sharing Analysis Center (MSISAC), System Audit Network Security (SANS) February 2008 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the U.S. Government. Neither the U.S. Government nor any agency thereof, nor any employee, makes any warranty, expressed or implied, or assumes any legal liability or responsibility for any third party's use, or the results of such use, or any

158

Introduction There  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on Sep 14th to 16th 2010 to discuss and debate a number of aspects associated with used nuclear fuel including storage, transportation, disposal and security aspects. There was...

159

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

160

Introduction | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Introduction 2INTRODUCTION.pdf More Documents & Publications 1. INTRODUCTION SC Introduction to Risk Management Microsoft Word - Cross Reference Matrix...

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Transmission INTRODUCTION  

E-Print Network (OSTI)

Transmission INTRODUCTION An electrical power system requires constant, second by second, balancing to maintain control over the transmission system can result in failure of the entire electrical system of supply, demand, and transmission capability. Transmission system operators are primarily responsible

162

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

163

National SCADA Test Bed Substation Automation Evaluation Report  

Science Conference Proceedings (OSTI)

Increased awareness of the potential for cyber attack has recently resulted in improved cyber security practices associated with the electrical power grid. However, the level of practical understanding and deployment of cyber security practices has not been evenly applied across all business sectors. Much of the focus has been centered on information technology business centers and control rooms. This report explores the current level of substation automation, communication, and cyber security protection deployed in electrical substations throughout existing utilities in the United States. This report documents the evaluation of substation automation implementation and associated vulnerabilities. This evaluation used research conducted by Newton-Evans Research Company for some of its observations and results. The Newton Evans Report aided in the determination of what is the state of substation automation in North American electric utilities. Idaho National Laboratory cyber security experts aided in the determination of what cyber vulnerabilities may pose a threat to electrical substations. This report includes cyber vulnerabilities as well as recommended mitigations. It also describes specific cyber issues found in typical substation automation configurations within the electric utility industry. The evaluation report was performed over a 5-month period starting in October 2008

Kenneth Barnes; Briam Johnson

2009-10-01T23:59:59.000Z

164

Ris Energy Report 3 Introduction  

E-Print Network (OSTI)

4 Risø Energy Report 3 Introduction Hydrogen used as an energy carrier may not solve all our energy problems related to security of supply, climate change and environmental degradation, but hydrogen energy the production, storage, distribution, conver- sion and end-use of hydrogen in both transport and stationary

165

OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts In recent years, Supervisory Control and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial Information Technologies (IT) such as Ethernet(tm), Transmission Control Protocol/Internet Protocol (TCP/IP) and Windows® for both critical and non-critical communications. This has made the interfacing of industrial control equipment much easier, but has resulted in significantly less isolation from the outside world, resulting in the increased risk of cyber-based attacks impacting industrial production and human safety. OPC Security Whitepaper #3 Hardening Guidelines for OPC Hosts

166

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

167

Introduction A  

NLE Websites -- All DOE Office Websites (Extended Search)

Introduction Introduction A merica has the technological capacity to change its energy future. There is no reason, for example, why our nation must continue following a path of rising oil imports when billions of barrels of crude oil remain in domestic oil fields. There is no reason why we cannot continue to use our abundant supplies of high-value, low-cost coal when we have the scientific know-how to remove virtually all of its pollutants and reduce greenhouse gas emissions. There is no reason why we cannot turn increasingly to clean-burning natural gas and tap the huge supplies we know exist within our borders. We remain a nation rich in the fuels that have powered economic growth. Today 85 percent of the energy we use to heat our homes and businesses, generate our electricity, and fuel our vehicles comes from coal,

168

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

169

Attendee Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

U N C L A S S I F I E D U N C L A S S I F I E D Rajinder P. Singh, Kathryn A. Berchtold, Richard D. Noble, Douglas L. Gin, Abhoyjit Bhown and Laura Nereng Gelled Ionic Liquid-Based Membranes 2013 NETL Carbon Capture Technology Meeting Pittsburgh, 11 th July, 2013 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA NETL CCT Meeting 2013 Slide 2 Project Objectives and Goals  A carbon-capture membrane with CO 2 permeance approaching 5,000 GPU and moderate CO 2 /N 2 selectivity could significantly reduce cost of post-combustion carbon capture from flue gas  Room-temperature ionic liquids (RTILs) are attractive materials due to high permeability (>1000 barrer) and good CO 2 /N 2 permselectivity (20- 50)  To meet performance target, RTILs must be immobilized as a

170

Workshop introduction  

Science Conference Proceedings (OSTI)

The Department of Energy's National Nuclear Security Administration's Global Threat Reduction Initiative (GTRI) has three subprograms that directly reduce the nuclear/radiological threat; Convert (Highly Enriched Uranium), Protect (Facilities), and Remove (Materials). The primary mission of the Off-Site Source Recovery Project (OSRP) falls under the 'Remove' subset. The purpose of this workshop is to provide a venue for joint-technical collaboration between the OSRP and the Nuclear Radiation Safety Service (NRSS). Eisenhower's Atoms for Peace initiative and the Soviet equivalent both promoted the spread of the paradoxical (peaceful and harmful) properties of the atom. The focus of nonproliferation efforts has been rightly dedicated to fissile materials and the threat they pose. Continued emphasis on radioactive materials must also be encouraged. An unquantifiable threat still exists in the prolific quantity of sealed radioactive sources (sources) spread worldwide. It does not appear that the momentum of the evolution in the numerous beneficial applications of radioactive sources will subside in the near future. Numerous expert studies have demonstrated the potentially devastating economic and psychological impacts of terrorist use of a radiological dispersal or emitting device. The development of such a weapon, from the acquisition of the material to the technical knowledge needed to develop and use it, is straightforward. There are many documented accounts worldwide of accidental and purposeful diversions of radioactive materials from regulatory control. The burden of securing sealed sources often falls upon the source owner, who may not have a disposal pathway once the source reaches the end of its useful life. This disposal problem is exacerbated by some source owners not having the resources to safely and compliantly store them. US Nuclear Regulatory Commission (NRC) data suggests that, in the US alone, there are tens of thousands of high-activity (IAEA Category I and II) sources in thousands of devices; and there are many more tens of thousands of smaller sources scattered among thousands of other NRC licensees. As a result of the ubiquitous nature and undeterminable number of current and legacy sources, even in developed countries they can be abandoned, disposed of in a haphazard manner, lost, stolen, and/or otherwise fallout of regulatory control. Supply and demand of sources, being market based, is more or less fluid. Normative security of radioactive sources exists, but varies in each country, and is loosely implemented through non-legally binding recommendations and standards provided by International Atomic Energy Agency technical documents and cooperation and through bilateral efforts such as this workshop where we share best-practices with one another. Much of the reason for the difficulty in securing sealed sources rests in the enormous need for their beneficial applications in the medical, industrial, and agricultural sectors. Alternative technologies to replace high-risk sources continue to be explored, but very few of these alternative solutions have reached the development stage for common usage and distribution. The beneficial uses of sources must be allowed to continue; however, to minimize the potential for their misuse, current controls and regulating mechanisms must be constantly evaluated to ensure the benefits gained outweigh potential risks. From a global perspective, an evaluation and modification of requirements over the entire life cycle of sources from their manufacture to their final disposition is required. The proper removal and disposal of vulnerable disused or orphan sources is essential to maintaining a safe operating environment. One of our goals in this workshop is to share our methodologies for recovering sources and learn how they differ or are similar to the challenges faced in recovering, storing, and disposing of sources in the Republic of Georgia . The suggestions we will make are flexible in allowing for the imperfect situations and capabilities we have all encountered in sour

Streeper, Charles [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

171

GLODAP Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

Introduction Introduction Overview The GLobal Ocean Data Analysis Project (GLODAP) is a cooperative effort to coordinate global synthesis projects funded through the National Oceanic and Atmospheric Administration (NOAA), the U.S. Department of Energy (DOE), and the National Science Foundation (NSF) as part of the Joint Global Ocean Flux Study - Synthesis and Modeling Project (JGOFS-SMP). Cruises conducted as part of the World Ocean Circulation Experiment (WOCE), JGOFS, and the NOAA Ocean-Atmosphere Exchange Study (OACES) over the decade of the 1990s have created an oceanographic database of unparalleled quality and quantity. These data provide an important asset to the scientific community investigating carbon cycling in the oceans. The central objective of this project is to generate a unified data set to help determine the global distributions of both natural and anthropogenic inorganic carbon, including radiocarbon. These estimates provide an important benchmark against which future observational studies will be compared. They also provide tools for the direct evaluation of numerical ocean carbon models.

172

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

173

Microsoft PowerPoint - SS2_8H_NERC_SANS_Final.ppt  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SS-2 SANS SCADA Summit SS-2 SANS SCADA Summit September 28,29, 2006 Intermediate SCADA Security 2 SANS SCADA Security Summit II September 28, 29, 2006 Disclaimer References made herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the U.S. Government, any agency thereof, or any company affiliated with the Idaho National Laboratory. Use the described security tools & techniques at "your own risk" - i.e. carefully evaluate any tool prior to using it in a production SCADA Network. 3 SANS SCADA Security Summit II September 28, 29, 2006 Agenda * Introduction * Demonstration * "Chalk Talk" * Network Layers Review * Vulnerability Reduction Process

174

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

175

1. INTRODUCTION | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INTRODUCTION 1. INTRODUCTION 1. INTRODUCTION More Documents & Publications Introduction SC Introduction to Risk Management Microsoft Word - Cross Reference Matrix Introduction.doc...

176

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

177

Evaluating Equipment Performance Using SCADA/PMS Data for Thermal Utility Plants - Case Studies  

E-Print Network (OSTI)

The equipment in cogeneration plants and thermal energy plants such as gas tubing generators, boilers, steam turbine generators, chillers and cooling towers are often critical to satisfying building needs. Their actual energy performance is very important when implementing the continuous Commissioning (CC) process. The actual performance can be used to develop optimal operation strategies, to conduct thermo-economy analysis, to perform fault diagnostics, and so forth. Because the standard performance test such as chiller test per ARI standard and cooling tower test per CTI standard often require the equipment to be operated under specific test conditions; however, in reality the dynamics of the system load normally do not allow the equipment to be operated under such conditions. It is costly and even impossible to take such critical equipment offline for test purposes. In order to facilitate the plant processes and on-going operations, utility plants usually employ Supervisory Control and Data Acquisition Plant Monitoring Systems (SCADA/PMS) or Energy Management and Control Systems (EMCS) to monitor sensors, display data, control equipment, activate alarms and log information. However, the utilization and interpretation of the logged data are often at the minimum level especially in old systems without automatic operation and control optimization capabilities. Through three case studies, this paper presents methods for evaluating equipment performance using SCADA/PMS or EMSC data.

Deng, X.; Chen, Q.; Xu, C.

2007-01-01T23:59:59.000Z

178

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

179

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

180

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

RESPONSIBILITIES RESPONSIBILITIES FSO Overview FSO Reporting Responsibilities Questions an FSOs at a Non-Possesssing Site Could Be Asked During an Audit Non-Possessing Contractor Security Requirements Plan Training for Facility Security Officers (FSOs) PHY-210DE Facility Security Officer Overview PHY-210DB, Introduction to Facility Security Officer (Self-Study Course ) Duration: 3 days Description: This correspondence course provides an overview of the roles and responsibilities of the DOE or DOE-contractor FSO. The course emphasizes facility clearance requirements, personnel security, information security, incident reporting, and other related programs. The course references the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22-M) and a comprehensive listing of DOE orders, manuals, guides, forms, and notices.

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

National Nuclear Security Administration Overview  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2011 - 1, 2011 - Page 1 National Transportation Stakeholders Forum Denver, Colorado May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2 National Transportation Stakeholders Forum (NTSF) * Introduction * NNSA Certifying Official Role * Offsite Source Recovery Project * Waste Shipments * Nuclear Materials Management Planning * Summary May 11, 2011 - Page 3 NNSA Plays a Critical Role: Ensuring our Nation's Security * Maintaining the safety, security and effectiveness of the nuclear weapons stockpile without nuclear testing * Reducing the global danger from the proliferation of nuclear weapons and materials * Provide safe and effective nuclear propulsion for the

182

Microsoft PowerPoint - SS1_4H_NERC_Training_09_28_06.ppt  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Introduction SCADA Security Introduction SCADA Security for Managers and Operators September 28, 29, 2006 2 SANS SCADA Security Summit II September 28, 29, 2006 Disclaimer * References made herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the U.S. Government, any agency thereof, or any company affiliated with the Idaho National Laboratory. * Use the described security tools and techniques at "your own risk" - i.e. carefully evaluate any tool prior to using it in a production SCADA Network. * The demonstrations and exploits used in the workshop are NOT SCADA vendor specific. The exploits take advantage of TCP/IP network and Operating system vulnerabilities. At no

183

RFI Comments - Ciepiela  

Science Conference Proceedings (OSTI)

... API-1164 pipeline SCADA security > API-1165 - Recommended Practice for Pipeline SCADA Displays > API-1167 - Alarm Management ...

2013-04-10T23:59:59.000Z

184

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

185

SC Introduction to Risk Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OF OF SCIENCE Office of Science Risk Management November 4, 2009 Ray Won Office of Project Assessment Office of Science, U.S. Department of Energy Office of Science, U.S. Department of Energy http://www.science.doe.gov/opa/ 2 AGENDA AGENDA Wednesday, November 4, 2009, Building 2714, Oak Ridge 2:15 p.m. Introduction to SC Risk Management 2:25 p.m. Spallation Neutron Source 2:40 p.m. ORNL Risk Management Process 2:55 p.m. National Synchrotron Light Source II 3:10 p.m. Questions 3:30 p.m. End OFFICE OF SCIENCE 3 DOE Organization DOE Organization OFFICE OF SCIENCE Federal Energy Regulatory Commission Office of the Under Secretary for Nuclear Security/ Administrator for National Nuclear Security Administration Thomas P. D'Agostino Chief of Staff *The Deputy Secretary also serves as the Chief Operating Officer.

186

Introduction Windows and Precomputation  

E-Print Network (OSTI)

Introduction Windows and Precomputation Linear Combinations and Joint Expansions Endomorphisms;Introduction Windows and Precomputation Linear Combinations and Joint Expansions Endomorphisms and Complex Bases Outline 1 Introduction 2 Windows and Precomputation 3 Linear Combinations and Joint Expansions 4

187

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

188

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

189

INTRODUCTION In order to allow intelligent power control and  

E-Print Network (OSTI)

will complement and draw on the contributions of the SGIP's Smart Grid Architecture Committee (SGAC). #12;Figure 3 components. Each organization must develop a security architecture for each Smart Grid information system Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security The Smart Grid

Shen, Xuemin "Sherman"

190

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

191

Simulatable security for quantum protocols  

E-Print Network (OSTI)

The notion of simulatable security (reactive simulatability, universal composability) is a powerful tool for allowing the modular design of cryptographic protocols (composition of protocols) and showing the security of a given protocol embedded in a larger one. Recently, these methods have received much attention in the quantum cryptographic community. We give a short introduction to simulatable security in general and proceed by sketching the many different definitional choices together with their advantages and disadvantages. Based on the reactive simulatability modelling of Backes, Pfitzmann and Waidner we then develop a quantum security model. By following the BPW modelling as closely as possible, we show that composable quantum security definitions for quantum protocols can strongly profit from their classical counterparts, since most of the definitional choices in the modelling are independent of the underlying machine model. In particular, we give a proof for the simple composition theorem in our framework.

Dominique Unruh

2004-09-18T23:59:59.000Z

192

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

193

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

194

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

195

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

196

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

197

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

198

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

199

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

200

Introduction to Neutrino Physics  

SciTech Connect

I present a basic introduction to the physics of the neutrino, with emphasis on experimental results and developments.

Linares, Edgar Casimiro [Division de Ciencias e Ingenierias Campus Leon, Loma del Bosque 103 Col. Lomas del Campestre, C.P. 37150 Leon (Mexico) and Centro de Investigaciones Energeticas Medioambientales y Tecnologicas, Av. Complutense, 22, C.P. 28040, Madrid (Spain)

2009-04-30T23:59:59.000Z

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

202

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

203

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

204

Abstract--Disruption of electric power operations can be catastrophic on the national security and economy. Due to the  

E-Print Network (OSTI)

and systematic manner. SCADA protocols have advanced from point-to-point links to newer protocols of the integration issues is important when both past and future SCADA protocols are involved. Due and future SCADA protocols are involved. Table 1 is a summary of the SCADA protocol evolution from 1970s

Manimaran, Govindarasu

205

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

206

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

207

Brand Guidelines Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

Introduction The new Joint Genome Institute logo takes an evolutionary step into the future, while staying true to the strength of its past. It possesses smooth, flowing lines...

208

ACHRE Report: Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

Introduction: Contents The Atomic Century Before the Atomic Age: "Shadow Pictures," Radioisotopes, and the Beginnings of Human Radiation Experimentation The Manhattan Project: A...

209

Introduction to Integrating Renewable Energy into Federal Construction |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Introduction to Integrating Renewable Energy into Federal Introduction to Integrating Renewable Energy into Federal Construction Introduction to Integrating Renewable Energy into Federal Construction October 16, 2013 - 4:50pm Addthis The introduction to this guide outlines key topics that led to the development of the Guide to Integrating Renewable Energy into Federal Construction. It discusses: Benefits of Renewable Energy Use: Renewable energy technologies have wide ranging benefits, including economic development and job creation, national security, price stability and environmental improvement. Meeting Federal Renewable Energy Requirements: A range of legislation and executive orders have stipulated wide-ranging renewable energy requirements and goals that apply to new construction and major renovation projects.

210

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

211

Introduction The Energy . . .  

E-Print Network (OSTI)

Introduction HP Model The Energy . . . 3D Version Home Page Title Page Page 1 of 7 Go Back Full Worcester Polytechnic Institute #12;Introduction HP Model The Energy . . . 3D Version Home Page Title Page Model The Energy . . . 3D Version Home Page Title Page Page 3 of 7 Go Back Full Screen Close Quit ·First

Servatius, Brigitte

212

DATA SHARING WORKBOOK Introduction  

E-Print Network (OSTI)

DATA SHARING WORKBOOK · Introduction · Protecting the Rights and Privacy of Human Subjects · Protecting Proprietary Data · Examples of Data Sharing o Data Archives o Federated Data Systems o Data ______________________________________________________________________________ INTRODUCTION Scientists working in many different areas are already sharing their data through a variety

Bandettini, Peter A.

213

Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers  

NLE Websites -- All DOE Office Websites (Extended Search)

Performing Energy Security Assessments - Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers ii Contents EXECUTIVE SUMMARY ........................................................................................................ v 1. INTRODUCTION ............................................................................................................... 1 1.1 Facilities to be Assessed...........................................................................................................................1 2. BEGINNING THE ENERGY SECURITY ASSESSMENT PROCESS ............................... 2 2.1 Assign an Energy Security Manager .........................................................................................................2 2.2 Define the Mission of the Installation

214

Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Performing Energy Security Assessments - Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers ii Contents EXECUTIVE SUMMARY ........................................................................................................ v 1. INTRODUCTION ............................................................................................................... 1 1.1 Facilities to be Assessed...........................................................................................................................1 2. BEGINNING THE ENERGY SECURITY ASSESSMENT PROCESS ............................... 2 2.1 Assign an Energy Security Manager .........................................................................................................2 2.2 Define the Mission of the Installation

215

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

216

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

217

Office of Security and Emergency Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security and Emergency Management Office of Security and Emergency Management The Security and Emergency Management page is designed to give newcomers and veterans alike an introduction and refresher about our activities. We hope you will find it useful. Much of this page's contents are oriented to reindustrialization and other managers of new DOE projects and programs. Feel free to contact the designated key personnel for assistance. Access Authorization Branch Using established guidelines and the "whole person concept," we evaluate and adjudicate informaton about those who need clearances which is developed during background investigations. The objective is to render access determinations that are in the best interest of national security. We also provide security education and awareness information, personnel security program support, and visitor control and foreign travel support to the Oak Ridge Office, the Paducah-Portsmouth Project Office, and the Thomas Jefferson National Accerelator Facility.

218

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

219

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

220

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

222

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

223

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

224

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

225

Video Stores: Introduction  

E-Print Network (OSTI)

Journal, and a former video manager of Kim's Mediapolis inMEDIA FELDS J O U R N A L Video Stores Introduction Jeffa specific media space: the video rental store. We were

Scheible, Jeff; Neves, Joshua

2010-01-01T23:59:59.000Z

226

Evolution strategies: basic introduction  

Science Conference Proceedings (OSTI)

This tutorial gives a basic introduction to evolution strategies, a class of evolutionary algorithms. Key features such as mutation, recombination and selection operators are explained, and specifically the concept of self-adaptation of strategy parameters ... Keywords: evolution strategies

Thomas Bck

2013-07-01T23:59:59.000Z

227

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

228

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

229

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

230

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

231

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

232

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

233

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

234

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

235

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

236

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

237

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

238

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

239

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

240

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Assessing Power Substation Network Security and Survivability: A Work in Progress Report1  

E-Print Network (OSTI)

& Privacy, pages 44­51, Nov./Dec. 2008. [4] G. Devarajan. Unraveling SCADA protocols: Using Sulley fuzzer

Krings, Axel W.

242

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

243

An Introduction Common Criteria  

E-Print Network (OSTI)

E6 EAL 1 D: Minimal Protection - C1: Discretionary Security Protection B2: Structured Protection B3 Evaluation Assurance Levels Approach to Evaluation Evaluation CC Protection Profiles For further information, certification and accredi- tation. The CC structure also provides great flexibility in the specification

Zhao, Yuxiao

244

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

245

Microsoft Word - Cyber Security Strat Plan final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

R R A A T T E E G G I I C C P P L L A A N N FEBRUARY 12, 2007 CYBER SECURITY STRATEGIC PLAN VERSION 1.0 2 Table of Contents INTRODUCTION ......

246

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

247

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

248

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

249

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

250

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

251

March 16, 2010, Safety and Security Reform Roundtable - Agenda  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety and Security Reform Roundtable Safety and Security Reform Roundtable Forrestal Building, Washington, DC March 16 th , 2010 1:00 PM (EST) AGENDA * Introduction of Union Leaders Glenn Podonsky, Chief Health, Safety and Security Officer * Welcome/Introductory Remarks on Reform Goals Dan Poneman, Deputy Secretary * Reform Status and Approach - Oversight, Directives, Mission Support Glenn Podonsky, Chief Health, Safety and Security Officer * Discussion Forum - Union Feedback - Feedback on oversight reform initiatives - Priority safety issues - Experience in collaborative focus group efforts - Recommendations for a path forward * Operating Organization Perspectives 1. Tom D'Agostino Administrator, National Nuclear Security Administration 2. Steven Koonin Under Secretary for Science

252

National Nuclear Security Administration Contractor Governance, IG-0881  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Contractor Governance DOE/IG-0881 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 February 19, 2013 MEMORANDUM FOR THE ACTING ADMINISTRATOR, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "National Nuclear Security Administration Contractor Governance" INTRODUCTION Since July 2007, the Department of Energy (Department) and the National Nuclear Security Administration (NNSA) have required contractors to implement self-assessment systems to measure performance and help ensure effective and efficient mission accomplishment. Each

253

Introduction to Special Edition on University Nonproliferation Education and Training  

E-Print Network (OSTI)

Introduction to Special Edition on University Nonproliferation Education and Training PNNL-SA-50159 Nonproliferation, like many aspects of security, has not played out as many expected following the end of the cold destruction has introduced an element of uncertainty into nonproliferation that is unprecedented. Another

254

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

255

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

256

The Security Epidemic  

NLE Websites -- All DOE Office Websites (Extended Search)

5-1130 5-1130 A different version of this appeared in Security Management 50, pp. 88-94 (2006). Turnkey Turnover Solutions: Powerful Tools and Experts are Available! Eddie G. Bitzer III, M.A. and Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Los Alamos National Laboratory Introduction It's early in World War II, and the US is scrambling to put together an effective fighting force. But how to you select and place millions of former civilians into military positions that will suit their abilities and temperament? The Army turned to industrial/organizational (I/O) psychologists. To solve this problem, the I/O psychologists developed the Army General Classification Test (AGCT), which later evolved into the Armed Services Vocational Aptitude Battery (ASVAB) still used

257

Black holes 1. Introduction  

E-Print Network (OSTI)

Black holes 1. Introduction What is a black hole? Roughly it can be described as a region that nothing can escape from it. Light falling into a black hole cannot escape from it. It is called `black' because it does not reflect anything. Since nothing can escape from it, it means that a black hole

Glass, Ian S.

258

MORGAN MEYER 1. INTRODUCTION  

E-Print Network (OSTI)

MORGAN MEYER 1. INTRODUCTION Most articles on garage biology and do-it-yourself (DIY) biology-it-yourself practices (see also Shove et al., 2007: 41-68). This article presents three sites of DIY practices in DIY biology. Associations like DIYbio are today present in many countries across the globe

259

INTRODUCTION TO THE MECHANICS  

E-Print Network (OSTI)

INTRODUCTION TO THE MECHANICS OF A CONTINUOUS MEDIUM Lawrence E. Malvern Professor of Mechanics princi- ples common to all branches of solid and fluid mechanics, designed to appeal to the intuition science. The book arose from the need to provide a general preparation in contin- uum mechanics

Kaminski, Edouard

260

QUICK QUANTUM MECHANICS ---Introduction ---  

E-Print Network (OSTI)

QUICK QUANTUM MECHANICS --- Introduction --- The following notes are intended to be a supplement to your study of Liboff's ``Introductory Quantum Mechanics.'' They are not an alternative! My purpose here of Classical Mechanics After Newton found his equations of motion, physicists knew they would have to wait

Jackson, Andrew D.

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Introduction to Transportation Planning  

E-Print Network (OSTI)

Introduction to Transportation Planning CMP 4710/6710 Fall 2012 3 Credit Hours Room: ARCH 229 on a Saturday night, transportation is not an objective in and of itself, but a means to carry out the functions of daily living (i.e., it's a "derived good"). As a consequence, the transportation systems we build

Tipple, Brett

262

SOLAR STILLS: INTRODUCTION  

E-Print Network (OSTI)

SOLAR STILLS: INTRODUCTION: Distillation of brackish or saline water is a good method to obtain, and are not feasible for large fresh water demands. Therefore, solar desalination is an attractive alternative because consumption. WORKING PRINCIPLE OF SOLAR DESALINATION: The solar still is an airtight basin, usually

Ramu, Palaniappan

263

Metrics White Paper Introduction  

E-Print Network (OSTI)

Metrics White Paper March 2010 Introduction Through the years, Unidata has conducted metrics, strategic partners, presentations, scientific papers, budgets, proposals, and other instances where or tools from Unidata's web site. Determining the classification of data to be captured, ad hoc committees

264

Waste Sorting Activity Introduction  

E-Print Network (OSTI)

Waste Sorting Activity Introduction: This waste sorting game was originally designed to be one have completed the waste sorting activity quickly, no team was able to complete the waste sorting task who were unfamiliar with Dalhousie's waste management system. Goals: The primary goal of the activity

Beaumont, Christopher

265

Introduction to information visualisation  

Science Conference Proceedings (OSTI)

This is a short introduction to information visualisation, which is increasingly important in many fields as information expands faster than our ability to comprehend it. Visualisation makes data easier to understand through direct sensory experience ... Keywords: HCI, human-computer interaction, information visualisation, visual analytics

Alan Dix

2012-01-01T23:59:59.000Z

266

Computer Use Regulation Introduction  

E-Print Network (OSTI)

Computer Use Regulation #12;Introduction · The following training materials will reference the contents of the Computer Use Regulations, but should not serve as a substitute for reading the actual responsibilities NCSU employees have under the regulations. · North Carolina State University's computer networks

Liu, Paul

267

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

268

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

269

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

270

Quantum Public-Key Encryption with Information Theoretic Security  

E-Print Network (OSTI)

We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

Jiangyou Pan; Li Yang

2010-06-02T23:59:59.000Z

271

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

272

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

273

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

274

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

275

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

276

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

277

Introduction to Solidia Technologies  

NLE Websites -- All DOE Office Websites (Extended Search)

Utilization of CO Utilization of CO 2 in High Performance Building and Infrastructure Products DE-FE0004222 Dr. Richard Riman Rutgers, The State University of New Jersey U.S. Department of Energy National Energy Technology Laboratory Carbon Storage R&D Project Review Meeting Developing the Technologies and Building the Infrastructure for CO2 Storage August 21-23, 2012 2 1. Quick Introduction 2. Progress on DE-FE0004222 3. Progress toward commercialization Presentation Outline 3 1. Quick Introduction 4 Solidia offers a low-cost inorganic material manufactured using a scalable and energy efficient process. Its properties can be controlled to engineer outstanding performance for a broad spectrum of building material applications. Our Technology Enables production of versatile building and construction materials

278

Introduction to PGAS Tutorial  

NLE Websites -- All DOE Office Websites (Extended Search)

PGAS Languages PGAS Languages Introduction to PGAS Languages | Tags: Programming Models Introduction Partitioned Global Address Space Languages (PGAS) provide a parallel programming model based on the assumption that the global memory adress space is logically partitioned with a portion of the memory being assigned to a specific processor. Two common PGAS languages are Unified Parallel C (UPC) and Co-array Fortran (CAF). The first implementation of this tutorial is based on UPC and CAF. This tutorial assumes that you have some familiarity with UNIX, text editors and compiling programs from source code. It contains some material from the SC11 Tutorial, Intro to PGAS (UPC and CAF) and Hybrid for Multicore Programming, by Alice Koniges (LBL-NERSC), Katherine Yelick (LBL-NERSC), Rolf Rabenseifner (HLRS), Reinhold Bader(Leibniz Supercomputer

279

Introduction to MEAG Power  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Introduction to MEAG Power Introduction to MEAG Power Southeastern Federal Power Alliance Meeting October 9, 2013 Municipal Electric Authority of Georgia ■ Joint Action Agency ─ Formed in 1975 ─ Owns and operates electric generation and transmission facilities ─ Provides bulk electric power to 48 cities and 1 county in the State of Georgia ■ All 49 Participants have reaffirmed 50-year power sales extensions ■ Take-or-pay contracts with participants are court validated contracts with a General Obligation pledge from each city ■ Generation ownership interest in 10 generating units and a transmission system ─ 2,069 MW generating capacity online ─ 500 MW Plant Vogtle Units 3 & 4 under development ■ Schedules the output from the SEPA contracts for the 49 members

280

introduction.vp  

Gasoline and Diesel Fuel Update (EIA)

10) 10) Release date:April 2010 Next release date: April 2011 Assumptions to the Annual Energy Outlook 2010 [PAGE LEFT BLANK INTENTIONALLY] 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2. Macroeconomic Activity Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3. International Energy Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 4. Residential Demand Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 5. Commercial Demand Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 6. Industrial Demand Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 7. Transportation Demand Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 8. Electricity Market Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 9. Oil and Gas Supply Module. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 10. Natural Gas Transmission and Distribution Module

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Chapter 1. Introduction  

U.S. Energy Information Administration (EIA) Indexed Site

1. Introduction 1. Introduction Chapter 1. Introduction Household Vehicles Energy Consumption 1994 reports on the results of the 1994 Residential Transportation Energy Consumption Survey (RTECS). The RTECS is a national sample survey that has been conducted every 3 years since 1985. For the 1994 survey, more than 3,000 households that own or use some 6,000 vehicles provided information to describe vehicle stock, vehicle-miles traveled, energy end-use consumption, and energy expenditures for personal vehicles. The survey results represent the characteristics of the 84.9 million households that used or had access to vehicles in 1994 nationwide. (An additional 12 million households neither owned nor had access to vehicles during the survey year.) To be included in the RTECS survey, vehicles must be either owned or used by household members on a regular basis for personal transportation, or owned by a company rather than a household, but kept at home, regularly available for the use of household members. Most vehicles included in the RTECS are classified as "light- duty vehicles" (weighing less than 8,500 pounds). However, the RTECS also includes a very small number of "other" vehicles, such as motor homes and larger trucks that are available for personal use.

282

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

283

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

284

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

285

Independent Oversight Inspection of Emergency Management at the Y-12 National Security Complex, Volume III  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex Y-12 National Security Complex November 28, 2001 Washington, DC 20585 UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED 3 INDEPENDENT OVERSIGHT INSPECTION OF EMERGENCY MANAGEMENT AT THE Y-12 NATIONAL SECURITY COMPLEX VOLUME III Table of Contents Acronyms...................................................................................................................................................... 5 1.0 Introduction ........................................................................................................................................... 7 2.0 Results ................................................................................................................................................... 9 3.0 Conclusions..........................................................................................................................................

286

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

287

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

288

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

289

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

290

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

291

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

292

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

293

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

294

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

295

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

296

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

297

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

298

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

299

Introduction to Nuclear Engineering Introduction to Nuclear Engineering  

E-Print Network (OSTI)

Cardiopulmonary Resuscitation CSA Canadian Standards Association D&D Decontamination and Decommissioning DC, dc Association NNSA National Nuclear Security Administration #12;NRTL Nationally Recognized Testing Laboratory

Corley, Bill

300

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Introduction to High Performance Computing  

NLE Websites -- All DOE Office Websites (Extended Search)

Introduction to High Performance Computing Introduction to High Performance Computing June 10, 2013 Photo on 7 30 12 at 7.10 AM Downloads Download File Gerber-HPC-2.pdf...

302

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

303

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

304

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

305

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

306

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

307

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

308

The Department's Unclassified Cyber Security Program - 2012, IG-0877  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information technology resources continues to expand, the number of cyber security threats against Federal agencies has also increased. In fact, Federal cyber security officials have warned that the number of cyber attackers has increased and that the Nation's

309

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

310

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

311

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

312

Fermilab An Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

! ! An Introduction ! Herman B. White Fermi National Accelerator Laboratory June 4, 2013 Summer Student Lecture Series Let's talk about the Universe Fermilab: A Little Past, An active Present, An Outstanding Future Particle physics on the Prairie What you will hear this Summer The Adventure Outline What is the Universe made of? What are the smallest things we can study? X Ray machine atom 1 100 1 100 1 100 1 nucleus n * p n * p Electron Quark higher beam particle energy = smaller size you can see 0.000000000000000001 m nano nano meter Everything that we can see is made of electrons, and smaller particles. ! ! Quarks Fermilab: A Great Past, An active Present, An Outstanding Future Fermi National Accelerator Laboratory advances the understanding of the fundamental nature of matter

313

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

314

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

315

Int. J. Communication Networks and Distributed Systems, Vol. 6, No. 1, 2011 59 Copyright 2011 Inderscience Enterprises Ltd.  

E-Print Network (OSTI)

have cryptographic capabilities while others not 9 accommodate to different SCADA protocols: SCADA are trusted in our protocol. 4 sSCADA protocol suite The sSCADA protocol suite is proposed to overcome transmission which are not acceptable to SCADA protocols. Semantic security property (Goldwasser and Michali

Wang, Yongge

316

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

317

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

318

Secure Symmetric Authentication for RFID Tags  

E-Print Network (OSTI)

cryptographically secure authentication. Starting with a short introduction into common RFID systems with passive tags, we present a motivation why secure authentication with standardized symmetric crypto algorithms for RFID tags is necessary for many applications. We demonstrate vulnerabilities of current RFID systems and explain how application of an authentication mechanism can solve them. Furthermore we explain how authentication protocols work and how they can be included in the RFID protocol standard ISO 18000. By presenting the interim results of ART, we will show that the proposed enhancement is feasible with current RIFD infrastructure and silicon technology used for RFID tags.

Manfred Aigner; Martin Feldhofer

2005-01-01T23:59:59.000Z

319

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

320

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

322

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

323

web identity standards introduction .............................................................................................................87  

E-Print Network (OSTI)

web identity standards sectionten 86 contents introduction............................................................................................................... 89-90 tagline and the web .................................................................................................91 tagline and the web: improper use

Mullins, Dyche

324

NETL: Gasifipedia - Introduction to Gasification  

NLE Websites -- All DOE Office Websites (Extended Search)

Gasification Introduction Gasification is a technological process that uses heat, pressure, steam, and often oxygen to convert any carbonaceous (carbon-based) raw material into...

325

An Introduction to Particulate Matter  

NLE Websites -- All DOE Office Websites (Extended Search)

for Fiscal Year 2014. Title An Introduction to Particulate Matter Publication Type Book Chapter Year of Publication 2009 Authors Prisco, Joe, Rich Hill, Pam Lembke, D. Moore,...

326

INTRODUCTION PART I 11 Introduction Part I Solid State NMR  

E-Print Network (OSTI)

10 PART I #12;INTRODUCTION ­ PART I 11 Introduction Part I ­ Solid State NMR OVERVIEW Nuclear magnetic resonance (NMR) spectroscopy can provide atomic-resolution structures of biological molecules. The exact resonance frequency depends on the chemical environment of each spins, as a result the NMR

Watts, Anthony

327

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

328

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

329

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

330

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

331

Microsoft Word - OE NSTB MYP_FINAL 052108.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Multi-Year Plan Program Multi-Year Plan DOE National SCADA Test Bed Program Multi-Year Plan i Contents 1. INTRODUCTION ......................................................................................................................1 1.1 The Control Systems Security Imperative .................................................................1 1.2 Challenges to Secure Control Systems in the Energy Sector.....................................3 1.3 Roadmap to Secure Control Systems in the Energy Sector .......................................5 1.4 Security Partners ........................................................................................................6 1.5 Federal Role ...............................................................................................................6

332

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

333

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

334

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

335

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

336

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

337

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

339

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

340

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

342

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

343

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

344

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

345

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

346

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

347

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

348

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

349

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

350

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

351

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

352

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

353

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

354

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

355

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

356

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

357

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

358

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

359

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

360

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

362

Document Number Q0029500 Introduction  

Office of Legacy Management (LM)

Introduction Introduction 1.0 Introduction This Remedial Investigation (RI) AddendumRocused Feasibility Study (FFS) report updates the 1998 final RI and presents the results of a FFS conducted for Operable Unit (OU) 111, contaminated surface water and ground water, of the Monticello Mill Tailings Site (MMTS). These documents are combined to promote better reference between the updated RI information and the remedy comparisons of the FFS. This document is prepared by the U.S. Department of Energy (DOE) Grand Junction, Colorado, to fulfill its obligations under the Comprehensive Environmental Response, compensation, and Liability Act (CERCLA) and Executive Order 12580, "Superfund Implementation." The information presented in this report will be the

363

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

364

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

365

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

366

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

367

Integrity, Reliability and Security: The Role of Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

F. Lawson F. Lawson Director, Strategic Center for Natural Gas & Oil National Energy Technology Laboratory General session Natural Gas Technologies Conference 2005 Cosponsors: NETL/Gas Technology Institute Orlando, Florida January 31, 2005 Integrity, Reliability and Security: The Role of Technology Introduction Integrity, reliability, and security encompass all the attributes we want-indeed, need-from our natural gas industry. We need integrity in physical transportation and storage systems, reliability in operating systems, and security in supplies and delivery systems. This conference is the most comprehensive forum for addressing new and evolving technologies impacting all these needs. The conference scope runs the gamut: from finding and producing to storing,

368

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

369

Quantum Espresso Quick Start Introduction  

E-Print Network (OSTI)

Quantum Espresso Quick Start Introduction Quantum Espresso (http://www.quantum properties eg., phonon dispersion, NMR shifts and band structure to name a few. Quantum Espresso is available. Matter 21, 395502 (2009). Online Guide for QE : http://www.quantum

Bjørnstad, Ottar Nordal

370

Classical Quark Models: An Introduction  

E-Print Network (OSTI)

We present an elementary introduction to some of the quark models used to understand the properties of light mesons and baryons. These lectures are intended for both theoretical and experimental graduate students beginning their study of the strong interaction.

A. W. Thomas; S. V. Wright

1998-08-04T23:59:59.000Z

371

Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Urnaium Processing Facility Project, June 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex Y-12 National Security Complex Uranium Processing Facility Project May 2011 June 2012 Office of Safety and Emergency Management Evaluations Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Independent Oversight Assessment of Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project Table of Contents 1.0 Introduction ........................................................................................................................................... 1 2.0 Scope and Methodology ....................................................................................................................... 2 3.0 Results and Conclusions ....................................................................................................................... 3

372

Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Urnaium Processing Facility Project, June 2012  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 National Security Complex Y-12 National Security Complex Uranium Processing Facility Project May 2011 June 2012 Office of Safety and Emergency Management Evaluations Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Independent Oversight Assessment of Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project Table of Contents 1.0 Introduction ........................................................................................................................................... 1 2.0 Scope and Methodology ....................................................................................................................... 2 3.0 Results and Conclusions ....................................................................................................................... 3

373

Headquarters_Security_Overview_Handbook_March_2012  

NLE Websites -- All DOE Office Websites (Extended Search)

H H H E E A A D D Q Q U U A A R R T T E E R R S S S S E E C C U U R R I I T T Y Y O O V V E E R R V V I I E E W W H H A A N N D D B B O O O O K K November 2012 UNITED STATES DEPARTMENT OF ENERGY Office of Health, Safety and Security Office of Security Operations Office of Headquarters Security Operations Phone: 301-903-9990 Fax: 301-903-4601 E-mail: HS-92Operations@hq.doe.gov 1 Table of Contents Making a Difference 2 Introduction 2 Responsibilities 2 Headquarters Protective Force (PF) 2 Headquarters Security Officers (HSOs) 2 Headquarters Security Procedures 3-5 Classified Matter Protection and Control 5-8 A Final Word 8 Emergency Telephone Numbers 9 Reminders 9 2 MAKING A DIFFERENCE

374

Introduction to NICE Cybersecurity Workforce Framework  

Science Conference Proceedings (OSTI)

... Conducting Internet searches and collecting documents ... Specialty Area: Systems Security Analysis ... Example Job Titles: Information Assurance ...

2011-10-24T23:59:59.000Z

375

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

376

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

377

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

378

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

379

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

380

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

382

Cyber Security for Power Grids Frank Mueller, Subhashish Bhattacharya, Christopher Zimmer  

E-Print Network (OSTI)

systems. 1 Introduction The power grid in the US is one-century old and aging in terms of infrastructure compromise of power systems can lead to physical outages or even dam- aged power devices. Hence, security and fault resilience of power as a utility must be a prime objective for power grids. Security compromises

Mueller, Frank

383

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

384

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

385

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

386

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

387

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

388

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

389

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

390

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

391

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

392

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

393

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

394

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

395

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

396

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

397

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

398

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

399

Secure Smart Environments: Security Requirements, Challenges and Experiences in Pervasive Computing  

E-Print Network (OSTI)

INTRODUCTION In an ideal pervasive computing environment, a large number of connected smart devices are deployed to collaboratively provision seamless services to users. Pervasive computing is enabled by various advanced technologies, particularly wireless technologies and the Internet. It has become a trend for our future lives. A pervasive computing environment can be extremely heterogeneous. We can imagine how many different devices are involved in a smart home: TVs, phones, cameras, coffee makers, or even books and bookshelves. Since these devices are smart and communicate with each other mainly via wireless links, security must be ensured. Otherwise, the smart devices deployed around us would come back to hunt us and the result would be catastrophic. In this abstract we briefly discuss some important security issues in pervasive computing. II. SECURITY CHALLENGES AND REQUIREMENTS IN PERVASIVE COMPUTING:THE BIG PICTURE Due to the very high heterogeneity and complexity of pervasi

Jun Wang; Yaling Yang; William Yurcik

2005-01-01T23:59:59.000Z

400

SCADA protocol vulnerabilities  

Science Conference Proceedings (OSTI)

The majority of network traffic in process control networks is generated by industrial communication protocols, whose implementation represents a considerable part of the code that runs in process control systems. Consequently a large number of attack ...

Julian L. Rrushi

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Security Applications of Formal Language Theory Dartmouth Computer Science  

E-Print Network (OSTI)

Introduction Composition is the primary engineering means of complex system construction. No matter what other engineering approaches or design patterns are applied, the economic reality is that a complex computing system Abstract We present an approach to improving the security of complex, composed systems based on formal

402

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

403

Introduction  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MELCOR-Gap Analysis MELCOR-Gap Analysis Defense Nuclear Facilities Safety Board Recommendation 2002-1 Software Quality Assurance Improvement Plan Commitment 4.2.1.3: Software Quality Assurance Improvement Plan: MELCOR Gap Analysis Final Report U.S. Department of Energy Office of Environment, Safety and Health 1000 Independence Ave., S.W. Washington, DC 20585-2040 May 2004 MELCOR Gap Analysis May 2004 Final Report INTENTIONALLY BLANK ii MELCOR Gap Analysis May 2004 Final Report FOREWORD This report documents the outcome of an evaluation of the Software Quality Assurance (SQA) attributes of the MELCOR computer code for leak path factor applications, relative to established software requirements. This evaluation, a "gap analysis," is performed to meet Commitment 4.2.1.3 of the

404

Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

Multicomponent Seismic Attributes, Multicomponent Seismic Attributes, New Rock Physics Models, and In Situ Data to Estimate Gas-Hydrate Concentrations in Deep-Water, Near-Seafloor Strata of the Gulf of Mexico REPORT DELIVERABLE: TASK 8 (Select Rock Physics Model) Reporting Period Start Date: 1 March 2006 Reporting Period End Date: 31 August 2007 Principal Investigators: Bob A. Hardage Paul E. Murray Diana C. Sava Report Date: 17 July 2007 DOE Award DE-FC26-05NT42667 Submitting Organization: Bureau of Economic Geology The University of Texas at Austin University Station, Box X Austin, TX 78713-8924 Disclaimer This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency

405

Introduction  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electric Transmission in the West Electric Transmission in the West Planning  Siting  Issues February 7, 2012 2  What does Transmission Look Like?  Why is Transmission Important?  Transmission Planning  Transmission Siting  Select Transmission Issues  References Presentation Content © 2010 ICF International. All rights reserved. What does Transmission Look Like? © 2010 ICF International. All rights reserved. WHAT DOES ELECTRIC TRANSMISSION LOOK LIKE 4  Provide affordable/reliable electricity  Implement public policies - Renewable energy (RPS, PTC, ITC) Why is Transmission Important? © 2010 ICF International. All rights reserved. Renewable Portfolio Standards WHY IS TRANSMISSION IMPORTANT 5 Transmission Planning © 2010 ICF International. All rights reserved.

406

Introduction  

Science Conference Proceedings (OSTI)

Bioinformatics and computational biology will enable breakthroughs in basic biological research and improvements in the prevention, treatment, and cure of diseases.

Craig A. Stewart

2004-11-01T23:59:59.000Z

407

Introduction  

Science Conference Proceedings (OSTI)

...1 . Of these higher-density alternatives, only depleted uranium, tungsten, and tantalum are practical for most commercial applications. Tantalum is discussed in the Section "Refractory Metals and Alloys" in this Handbook. The remainder of this section will discuss the most

408

Introduction  

Science Conference Proceedings (OSTI)

...material cost compared to aluminum and magnesium Fuel economy improvement through weight reduction...

409

Introduction  

Science Conference Proceedings (OSTI)

...and piping for storage and transportation of liquefied natural gas, superconducting systems in power transmissions,

410

INTRODUCTION  

Science Conference Proceedings (OSTI)

... meters are approved to very tight tolerances on ... Liquids and Liquefied Natural Gas, Water, Water. ... from use in applications with tighter tolerances until ...

2013-07-09T23:59:59.000Z

411

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Electrochemical series, alphabetic...Bi 2 O 4 +4H + +2 e - ?? 2BiO + +2H 2 O 1.59 BiO + +2H + +3 e - ?? Bi+H 2 O 0.32 BiOCl+2H + +3 e - ?? Bi+Cl - +H 2 O 0.1583 BiOOH+H 2 O+3 e - ?? Bi+3OH - -0.46 Br 2 (aq)+2 e - ?? 2Br - 1.087 Br 2 (l)+2 e - ?? 2Br - 1.065 HBrO+H + + e - ?? Br 2 +H 2 O 1.59 HBrO+H + +2 e - ?? Br - +H 2 O 1.33 2HBrO+2H +...

412

Introduction  

Science Conference Proceedings (OSTI)

Table 1   History of cermet product development and marketing...Ta, Ti)C-(Ni, Mo, Co) Kentanium Kennametal 1952??1954 TiC-(steel, Mo) Ferro-TiC Sintercast (Chromalloy) 1960 TiC-(Ni, Mo) ? Ford Motor Company 1970 Ti(C, N)-(Ni, Mo) Experimental alloys Technical University Vienna 1974 (Ti, Mo) (C, N)-(Ni, Mo) Spinodal Alloy Teledyne Firth Sterling 1975 TiC-TiN-WC-Mo...

413

Introduction  

Science Conference Proceedings (OSTI)

Table 1   History of cermet product development and marketing...Ta, Ti) C-(Ni, Mo, Co) Kentanium Kennametal 1952??1954 TiC-(steel, Mo) Ferro-TiC Sintercast (Chromalloy) 1960 TiC-(Ni, Mo) ? Ford Motor Company 1970 Ti(C, N)-(Ni, Mo) Experimental alloys Technical University Vienna 1974 (Ti,Mo) (C,N)-(Ni,Mo) Spinodal Alloy Teledyne Firth Sterling 1975 TiC-TiN-WC-Mo 2...

414

Introduction  

Science Conference Proceedings (OSTI)

How will we interact with our computational environments in the next 10 years? If the past is to be any indication of the future, our hands will remain restricted to a keyboard and our eyes will remain focused on a desktop display. It is true that progress ...

Christopher Jaynes; Robert Collins

2005-11-01T23:59:59.000Z

415

Introduction  

Science Conference Proceedings (OSTI)

Figure: ...Fig. 2 Offshore performance cruising monohull ( Pinta ). Courtesy of Martin Yachts, New Zealand...

416

Introduction  

Science Conference Proceedings (OSTI)

... deemed necessary to evaluate a belt profiling feature in ... a 10:1 ratio based on the size, loading and speed of ... Similar or the same type of load cell or ...

2013-07-09T23:59:59.000Z

417

Introduction  

Science Conference Proceedings (OSTI)

...James A. Rossow Wyman-Gordon Company C.P. Royer Exxon Production Research Company Mamdouh M. Salama Conoco Inc. Norman L. Samways Association of Iron and Steel Engineers Gregory D. Sander Ring Screw Works J.A. Schmidt Joseph T. Ryerson and Sons, Inc. Michael Schmidt Carpenter Technology Corporation W....

418

Introduction  

Gasoline and Diesel Fuel Update (EIA)

6 6 1 (AEO2006), including general features of the model structure, assumptions concerning energy markets, and the key input data and parameters that are most significant in formulating the model results. Detailed documentation of the modeling system is available in a series of documentation reports. 2 A synopsis of NEMS, the model components, and the interrelationships of the modules is presented in The National Energy Modeling System: An Overview 3 , which is updated once every few years. The National Energy Modeling System The projections in the AEO2006 were produced with the National Energy Modeling System. NEMS is developed and maintained by the Office of Integrated Analysis and Forecasting of the Energy Information Administration (EIA) to provide projections of domestic energy-economy markets in the long term and

419

Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

Charles Charles E. Wyman 1,2 1 Department of Chemical and Environmental Engineering and Center for Environmental Research and Technology, University of California, Riverside, USA 2 BioEnergy Science Center, Oak Ridge, USA Welcome to "Aqueous Pretreatment of Plant Biomass for Biological and Chemical Conversion to Fuels and Chemicals." This book provides insights into thermochemical preparation of cellulosic biomass such as wood, grass, and agricultural and forestry residues for aqueous conversion to fuels and chemicals as well as economic and analysis information that is broadly applicable to a wide range of aqueous biomass opera- tions. Historically, acid catalyzed hydrolysis of biomass goes back to the early nineteenth century [1], when the emphasis was on aqueous-processing of biomass in concentrated acid or dilute acid at higher tempera- ture to break down cellulose

420

INTRODUCTION  

NLE Websites -- All DOE Office Websites (Extended Search)

200 200 Risk Characterization for Ecological Risk Assessment of Contaminated Sites This document has been approved by the K-25 Site Technical Information Office for release to the public. Date: ES/ER/TM-200 Risk Characterization for Ecological Risk Assessment of Contaminated Sites G. W. Suter II Date Issued-October 1996 Prepared by the Environmental Restoration Risk Assessment Program Lockheed Martin Energy Systems, Inc. Oak Ridge, Tennessee 37831 Prepared for the U.S. Department of Energy Office of Environmental Management under budget and reporting code EW 20 LOCKHEED MARTIN ENERGY SYSTEMS, INC. managing the Environmental Management Activities at the Oak Ridge K-25 Site Paducah Gaseous Diffusion Plant Oak Ridge Y-12 Plant Portsmouth Gaseous Diffusion Plant Oak Ridge National Laboratory

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Introduction  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-- -- September 2005 1 What's Happening in EM? Ella McNeil Office of Transportation, EM-11 TEC -- September 2005 2 Cleanup and waste disposition continue. . . * Continuing progress toward site closures * Disposition of "orphan" or special waste streams are some of the remaining obstacles to closure * Working with sites to develop comprehensive lists of these streams and to identify needed treatment and disposal options * Identification of disposal facility - commercial or Federal * Ability to continue to accelerate cleanup is directly dependent on the ability to ship and dispose of waste safely TEC -- September 2005 3 Current DOE/EM Waste Management Policy * LLW and MLLW: * If practical, disposal at generation site * If on-site disposal not available, then disposal at another

422

Introduction  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EnerNOC, Inc. ("EnerNOC") is pleased to provide these comments to the Department of Energy in response to the Request for Information "Policy and Logistical Challenges to Smart Grid Implementation." EnerNOC is a leading provider of demand response and energy efficiency solutions to utilities, Independent System Operators ("ISOs") and customers in the commercial, industrial and institutional ("CI&I") sectors. EnerNOC uses near real-time data collected from

423

Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

Prospect Manager Prospect Manager ProspectManager is a perl script that utilizes Perl/Tk to allow the user to interface with the standard Prospect tools in a GUI interface. It can be found in the bin directory of the prospect installization. It can be called by the command: prospect_manager.pl You set the sequence file to work with, and the basic options, such as which database to thread aginst, the number of CPUs to use, and the type of threading to be used. There are a number of envirormental varibles that need to be set up in order for Prospect Manager to correctly find the tools that it needs. These enviromental varibles can be setup in the shell initialization script, or in the entry lines in Prospect Manager after the program has been launched. The main window The following need to be set for Prospect Manager to work correctly:

424

Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

Diffusion Driven Desalination Process Diffusion Driven Desalination Process James F. Klausner, Mohamed Darwish, and Renwei Mei University of Florida Department of Mechanical and Aerospace Engineering Gainesville, Florida 32611 Abstract An innovative diffusion driven desalination (DDD) process is presented, and its performance based on thermodynamic considerations is thoroughly explored. The desalination is driven by water vapor saturating dry air flowing through a diffusion tower. Liquid water is condensed out of the air/vapor mixture in a direct contact condenser. The desalination process is suitable for operation at low temperatures and may be driven by waste heat with low thermodynamic availability. It is demonstrated that the DDD process can yield a fresh water production efficiency of 8% with an energy consumption

425

Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

Phoenix, Arizona. The energy use was Phoenix, Arizona. The energy use was calculated for many window design variations including 5 orientations, 3 glazing areas, 5 shading types, and 20 window Key Issues Orientation: Homes with windows facing predominately north use less energy than homes facing east, south, or west. With high-performance windows and shading strategies, these differences can be considerably less. Window Area: Energy use increases with window area using windows with clear and high-solar-gain glazing. With high-performance windows, energy use may not increase at all when using a larger window area. Shading Condition: On north-facing homes, shading devices will have little impact. On south-facing homes, overhangs can be effective to block the hot summer sun. Shading devices have less impact when using high-

426

Introduction  

Office of Scientific and Technical Information (OSTI)

REALTIME MONITORING OF PIPELINES FOR REALTIME MONITORING OF PIPELINES FOR THIRD-PARTY CONTACT SEMI-ANNUAL TECHNICAL PROGRESS REPORT NO. 2 April 1, 2004-September 30, 2004 Principal Authors Gary L. Burkhardt, Staff Scientist Alfred E. Crouch, Staff Engineer Cooperative Agreement DE-FC26-03NT41878 Southwest Research Institute ® Project 14.10211 Submitting Organization Sensor Systems and NDE Technology Department Applied Physics Division Southwest Research Institute 6220 Culebra Road San Antonio, Texas 78238 Prepared for U.S. Department of Energy National Energy Technology Lab 3610 Collins Ferry Road Morgantown, West Virginia 26507-0880 October 2004 - ii - DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor

427

Introduction  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 5 1 Transportation Communications Ella McNeil Transportation Emergency Preparedness Program Office of Transportation, EM-11 Figure 1. Responders participate in a TEPP exercise. Figure 1. Responders participate in a TEPP exercise. April 2005 2 Definition of Communication * Function: noun the act or process of transmitting information (ideas, attitudes, emotions, or objective behavior) * exchange of information between individuals through a common system of signs, symbols, or behavior * personal rapport April 2005 3 Hazard Communication -- The backbone of emergency response, and response begins with identification: * Hazard markings, labels and placards are a common approach to warning the public of hazards that may be encountered. April 2005 4 Hazard Communication. . .

428

Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

Washington, DC. The energy use was Washington, DC. The energy use was calculated for many window design variations including 5 orientations, 3 glazing areas, 5 shading types, and 20 window Key Issues Orientation: Homes with windows facing predominately south use less energy than homes facing north, east, or west. With high-performance windows and shading strategies, these differences can be considerably less. Window Area: Energy use increases with window area using windows with clear glazing. With high-performance windows, energy use may not increase at all when using a larger window area. Shading Condition: On south-facing homes, overhangs can be effective to block the hot summer sun while allowing for passive solar gain in winter months. Shading devices have less impact when using high-performance windows with low-

429

Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

Use of Coal Utilization Use of Coal Utilization By-products and Technology Trends Summary The availability of affordable energy will continue to be essential to our Nation's economic strength. At present over half of the electrical energy demand in the United States is met by the combustion of coal and the reliability of low cost coal-fired power has been a significant factor in our Nation's economic growth and development. Demand for electricity is expected to increase steadily throughout the future, and coal will continue to play a significant role in meeting this demand. However, the contribution of coal to the Nation's energy mix, and the overall cost of electricity, will increasingly depend on our ability to find economical ways to reduce or eliminate any potential adverse environmental impacts associated with the disposal and utilization of coal

430

Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

Mixed-phase clouds, such as those found in the Arctic have presented quite a challenge to the modeling com- munity. Without modification, models have struggled to maintain the delicate balance between liquid and ice that must exist in order to maintain these clouds for ex- tended time periods, as they are observed in the atmo- sphere. In conjunction with the ARM Cloud Modeling

431

Introduction  

Science Conference Proceedings (OSTI)

...S. Chumbley Ames Laboratory Carl Czajkowski Brookhaven National Laboratory Daniel R. Danks Danks Tribological Services Daniel P. Dennies The Boeing Company Bill Dobson Binary Egnineering Associates,

432

Introduction  

Science Conference Proceedings (OSTI)

...furnaces derive their energy from combustion of fossil fuels or from electric power. The choice of which

433

Introduction  

Science Conference Proceedings (OSTI)

...J.D. Poindexter, Corrosion Inhibitors for Crude Oil Refineries, Corrosion: Fundamentals, Testing, and Protection, Vol 13A, ASM Handbook, ASM International, 2003, p 887??890...

434

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Melt loss and themal efficiency of electric and gas reverberatory furnaces...than the listed

435

Introduction  

Science Conference Proceedings (OSTI)

...M. Baker New Age Industries, Inc. Charles E. Bates Southern Research Institute Bruce A. Becherer Teledyne Vasco Corporation Tom Bell University of Birmingham Eugene L. Bird Martin Marietta Energy Systems, Inc. Bruce L. Bramfitt Bethlehem Steel Corporation Robert L. Brennan E.F. Houghton & Company...

436

Introduction  

Science Conference Proceedings (OSTI)

...parameter In natural logarithm (base e ) LNG liquefied natural gas log common logarithm (base 10) LPG liquefied petroleum gas LSI large-scale integrated (circuit) LT long transverse (direction) LTE local thermodynamic equilibrium LTS low-temperature sensitization LVDT linear variable...

437

Introduction  

Science Conference Proceedings (OSTI)

...parameter ln natural logarithm (base e ) LNG liquefied natural gas log common logarithm (base 10) LPCVD low pressure chemical vapor deposition LT long transverse (direction) m meter M f temperature at which martensite formation

438

INTRODUCTION  

NLE Websites -- All DOE Office Websites (Extended Search)

animal species is one of the most complicated and interesting biological phenomena, and fish migration is no exception. Fish migration may vary significantly, depending on the...

439

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Commonly used cobalt alloys and their biomedical applications...rod, wire Wrought CoCrMo alloy 3, wrought CoCrMo gas atomized and

440

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Thermophysical property data required for metal casting...?Heat capacity Conductivity Latent heat of fusion Liquidus and solidus Effective design for: Riser ?Chill ?Insulation Solidification direction Solidification shrinkage Porosity Hot

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Thermophysical property data required for metal casting...?Heat capacity Conductivity Latent heat of fusion Liquidus and solidus Effective design for: Riser Chill Insulation Solidification direction Solidification shrinkage Porosity Hot spots Mold core chill Mass transfer (fluid flow) Temperature dependent Viscosity Surface tension Density Effective...

442

Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

membranes 4. Pressure swing absorption of CO 2 for post low- temperature shift reactor gas using membrane contactors containing ionic liquids, dendrimers etc. 5. Other...

443

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Major applications of metal powders...brass Cutting tools Tungsten, cobalt Filters (liquids, gases) Bronze, nickel, stainless steel, superalloys, titanium Flame cutting and scarfing Iron, aluminum Fluids for magnetic clutches Stainless steel (magnetic) Friction material Copper, tin, zinc, iron, lead, graphite Gas engine exhaust...

444

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Major markets for metal castings...castings Motor vehicles Farm equipment Engines Refrigeration and heating Construction machinery Valves Soil pipe Pumps and compressors Pressure pipe Other major markets include machine tools, mechanical power transmission

445

Introduction  

Science Conference Proceedings (OSTI)

...that may result in deterioration are: Energy (solar radiation, heat and temperature variation, nuclear

446

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Nitric acid nomenclature...42° baumé 67% (American Chemical Society, ACS, grade) Chemically pure (CP) or reagent grade 43° baumé 70.3% Strong or concentrated acid 95??99% White fuming nitric acid (WFNA) 95??99%<0.5% NO x Red fuming nitric acid (RFNA) 95??99%+NO x 6??30% Inhibited RFNA 98% plus 15% H 2 SO 4 Source: Ref 1...

447

Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

Optical Engineering Press, Bellingham, WA. 2001 R.A. Thomas, The thermography monitoring handbook. Coxmoor Publishing, Oxford, UK. 1999. G.C. Holst, Common sense approach to...

448

Introduction  

Science Conference Proceedings (OSTI)

...otherwise inaccessible areas Image sensors for remote sensing or for the development of permanent

449

Introduction  

Science Conference Proceedings (OSTI)

...structures High-power search radar aerials Overhead walkways Railroad overhead line support columns Electrification masts Tower cranes Traffic island posts Street and bridge railings On a smaller scale, aluminum-zinc TSCs have been successfully used

450

Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

78589929394 5 I 4 41 6S 79 87 92 g; 97 99 99 93 6 I 4 41 ttl 00 00 93 97 99 100 100 100 100 100 100 100 100 99 99 99 7 I 4 lJ.1 (Xl 00 Ell g;...

451

Introduction  

Science Conference Proceedings (OSTI)

... The submitter believes that test weight tolerances are too tight for field operation ... new technology, if you plot the dielectric constant of wet sand as a ...

2013-07-09T23:59:59.000Z

452

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Thermal conductivity of selected metals and alloys...of selected metals and alloys Metal or alloy Thermal conductivity near room

453

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Density of metals and alloys...Table 1 Density of metals and alloys Metal or alloy UNS number Density g/cm 3 lb/in. 3 Aluminum and aluminum

454

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Density of metals and alloys...Table 1 Density of metals and alloys Metal or alloy Density g/cm 3 lb/in. 3 Aluminum and aluminum

455

Introduction  

Science Conference Proceedings (OSTI)

...Zn (Zinc) Binary Alloy Phase Diagrams, Alloy Phase Diagrams, Vol 3, ASM Handbook, ASM International,

456

Introduction  

Science Conference Proceedings (OSTI)

...U (Uranium) Binary Alloy Phase Diagrams, Alloy Phase Diagrams, Vol 3, ASM Handbook, ASM International,

457

Introduction  

Science Conference Proceedings (OSTI)

..., ASM International, 2006, p 499??500ASM Handbook, Vol 13C, Corrosion: Environments and IndustriesCorrosion and Erosion of Ash-Handling

458

Introduction  

Science Conference Proceedings (OSTI)

...is limited by the refractory walls. However, the energy efficiency of the crucible furnace can be low (7 to 19%), with over 60% of the heat loss attributed to radiation (Ref 1). Without proper care, the life of the crucible furnace may be short. Temperature control may also be difficult....

459

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Functional requirements in design...analysis Failure mode and effect analysis (FMEA) Safety analysis Design process/configuration Probabilistic or deterministic statistical approach Stress or load considerations Restrictions on size, weight, or volume Service hazards, such as cyclic loading or aggressive environment Failure anticipation...

460

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Base, supplementary, and derived SI units...steradian sr Magnetic flux density tesla T Molar energy joule per mole J/mol Molar entropy joule per mole kelvin J/mol · K Derived units Molar heat capacity joule per mole kelvin J/mol · K Absorbed does gray Gy Moment of force newton meter N · m Acceleration meter per second squared m/s 2 Permeability...

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Electronic structure methods (density functional theory, quantum chemistry)...electronic

462

Introduction  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MACCS2 (radiological dispersionconsequence analysis), and MELCOR (leak path factor analysis), were designated by DOE for the toolbox (DOEEH, 2003). It is found that this...

463

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Fundamental physical constants...? 5.670400 (40) ? 10 -8 W m -2 K -4 Standard gravity (gravitational acceleration) g 9.80665 (exact) m · s -2 Energy equivalent, thermochemical calorie cal 4.184 (exact) J Absolute temperature T 0 °C 273.150 ± 0.010 K (a) The number in parenthesis is the estimated one-standard-deviation uncertainty in...

464

Introduction  

Science Conference Proceedings (OSTI)

...used for domestic or industrial applications Nuclear and fossil fuel power plant components (both rotating

465

Introduction  

Science Conference Proceedings (OSTI)

...rate DBTT ductile-brittle transition temperature dc direct current diam diameter DIC differential interference contrast dm decimeter DPH diamond pyramid hardness (Vickers hardness) DT dynamic tear (test) DWTT drop-weight tear test e natural log base, 2.71828; electron E energy; modulus of...

466

Introduction  

Science Conference Proceedings (OSTI)

...Documents, U.S. Government Printing Office, Washington, DC 20402-9325 Metric Editorial Guide, 4th ed. (revised), 1985,

467

Introduction  

Science Conference Proceedings (OSTI)

...Documents, U.S. Government Printing Office, Washington, DC 20402-9325 Metric Editorial Guide, 5th ed. (revised), 1993,

468

Introduction  

Science Conference Proceedings (OSTI)

...NIOSH Manual of Analytical Methods, 2nd ed., Parts I to VII, U.S. Department of Health, Education and

469

Introduction  

Science Conference Proceedings (OSTI)

...Corrosion form and mechanism Atmospheric corrosion, underdeposit attack Material Coated carbon steel Product form Oil storage tank...

470

Introduction  

Science Conference Proceedings (OSTI)

...temperature LDPE low-density polyethylene LEED low-energy electron diffraction ln natural logarithm (base e ) log common logarithm (base 10) LPCVD low-pressure chemical vapor deposition LSI large-scale integrated (circuit) LT long transverse (direction) m meter m constant shear, or frictional...

471

Introduction  

Science Conference Proceedings (OSTI)

...oils Nonengine lubricants are subcategorized as: Transmission fluids (automatic, manual, and power) Power steering fluids Shock absorber fluids Gear oils (automotive and industrial) Hydraulic fluids (tractor and industrial) Metalworking fluids Miscellaneous industrial oils Greases...

472

Introduction  

E-Print Network (OSTI)

to Nepal, the disciplines are not; for close to three decadGs Nepal was a happy hunting ground for scores of foreign anthropologists and the occasional sociologist. Their numbers and activities have continued to increase at an exponential rate. Every now...

Fisher, James F

1987-01-01T23:59:59.000Z

473

Introduction  

Science Conference Proceedings (OSTI)

...Mines Bruce Sutherland Westaim Corporation Rajiv Tandon Phillips Origen Powder Metallurgy Pierre Taubenblat Promet Associates Mark Thomason Sinterite Furnace Division Gasbarre Products Inc. Juan Trasorras Federal Mogul Yves Trudel Quebec Metal Powders Limited John Tundermann Inco Alloys International...

474

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Direct rapid tooling techniques...systems DTM Helisys Stratatys Z Corp. Machine price ([dollar]) 100,000 300,000 120,000 75,000 60,000 Max. part size (in.) 20?20?24 15?17?18 32?22?20 24?24?24 8?10?8 Software Maestro/JR Proprietary LOMSlice Quickslice Model File formats STL STL STL STL STL, SLC Layer thickness (mm) 0.15 0.0762??0.508...

475

Introduction  

Annual Energy Outlook 2012 (EIA)

represented. Natural gas resources are divided into known producing plays, known developing plays, and undiscovered plays in high-permeability carbonate and sandstone,...

476

Introduction  

Science Conference Proceedings (OSTI)

...A general survey of a fatigue prediction scenario is given in Fig. 1. It illustrates that design includes

477

Introduction  

Science Conference Proceedings (OSTI)

...Application Percentage Industrial equipment Chemical and power engineering 34 Food and beverage industry 18 Transportation 9 Architecture 5 Consumer goods Domestic appliances, household utensils 28 Small electrical and electronic appliances 6...

478

Introduction  

Science Conference Proceedings (OSTI)

...of applications for automobiles, machinery, appliances, aircraft, consumer items, electrical instruments, and other manufactured products. The parts produced by powder metallurgy (P/M) methods can also be unique and innovative. As a small sample of various applications, this appendix illustrates some...

479

Introduction  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

environmental cleanup at a site which continues to have a Department of Energy (DOE) mission, EM transfers responsibility for any long-term stewardship (LTS) activities to...

480

INTRODUCTION  

Science Conference Proceedings (OSTI)

... The 12 test rocks consisted of a sample from a fully crushed granite material taken from a commercial quarry that was prepared in sizes ranging ...

2007-01-08T23:59:59.000Z

Note: This page contains sample records for the topic "introduction scada security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Introduction  

Science Conference Proceedings (OSTI)

... ASF (MS container for wma, and wmv), 14. DVR-MS (MS container based upon ASF), 15. RMVB RealNetworks, 16. RM (Realmedia), 17. ...

2012-08-24T23:59:59.000Z

482

Introduction  

Science Conference Proceedings (OSTI)

...cm centimeter cal calorie d day eV electron volt F farad ft foot g gram G gauss Gy gray GHz gigahertz h hour Hz hertz in. inch J joule K Kelvin kbar kilobar keV kiloelectron volt kg kilogram kHz kilohertz kPa kilopascal ksi kips (1000 lb) per square inch kV kilovolt kW kilowatt L liter lb pound m...

483

Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

of the projects awarded in each of the five categories is found in Section II of this report. Hydrogen-from-Coal Projects Awarded by the Office of Fossil Energy In FY 2005 the...

484

Introduction  

Science Conference Proceedings (OSTI)

...Examples include automotive radiators, solar heating panels, communications cable, and electrical connectors.

485

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Engineering problems addressed by the finite element method...Flow velocity Boundary flow Corrosion Anode consumption rate Electropotential Crack propagation Strain energy release rate Stress Acoustic noise Sound pressure level Velocity...

486

INTRODUCTION  

NLE Websites -- All DOE Office Websites (Extended Search)

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 5. Life history parameters used to estimate PRGs for wildlife . . . . . . . . . . . . . . . . ....

487

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Engineering methods for surface hardening of steels...Boriding Titanium-carbon diffusion Toyota diffusion process Selective hardening methods: Flame hardening Induction hardening Laser hardening Electron beam hardening Ion implantation Selective carburizing and nitriding Use of arc lamps...

488

Introduction  

Science Conference Proceedings (OSTI)

Table 1   Application of anodic oxide films on aluminum...Corrosion resistance Aircraft, vehicle, boat, train, architecture,

489

Introduction  

Science Conference Proceedings (OSTI)

Table 5   Friction coefficient data for miscellaneous materials...? 30 Hickory wood, waxed Snow UnSp ? 0.14 35 Ice Bronze UnSp ? 0.02 35 Ebonite UnSp ? 0.02 35 Ice UnSp 0.05??0.15 ? 35 Ice UnSp ? 0.02 35 Ice FOF >0.01 >0.01 32 Leather Metal (clean) UnSp 0.6 ? 30 Metal Glass (clean) UnSp 0.5??0.7 ? 30 Mica (cleaved) Mica (cleaved) UnSp 1.0 ? 30 Mica (contaminated)...

490

Introduction  

NLE Websites -- All DOE Office Websites (Extended Search)

removable ore bodies for in-situ leaching, creation of underground zones of fractured oil shale for in-situ retorting, and formation of underground natural gas and petroleum...

491

INTRODUCTION  

NLE Websites -- All DOE Office Websites (Extended Search)

Hot Exhaust Cooled Exhaust Water Recovery Oxygen Reformate Stream Steam Reformer SOFC Condenser CATHODE ANODE CO2 Scrubber Heat to Reformer Cathode Cooler Scrubber Cooler Oxygen...

492

Introduction  

Science Conference Proceedings (OSTI)

... from a manufacturer of automobile wiper blades that had a ... be the length of the blade itself; the ... system and time for manufacturing and distribution. ...

2012-10-30T23:59:59.000Z

493

Introduction  

Science Conference Proceedings (OSTI)

..."Nonferrous Metals??A Variety of Possibilities Dictionary of Metals (2012) including a Metals History Timeline...

494

Introduction  

Science Conference Proceedings (OSTI)

... Hanak's multiple-sample concept. ' Today the sample ... Table 1. Multi- dimensional Parameter Space for ... see Figure 1) consisting of PS blended ...

2003-03-14T23:59:59.000Z

495

Introduction  

Science Conference Proceedings (OSTI)

...Th (Thorium) Binary Alloy Phase Diagrams, Alloy Phase Diagrams, Vol 3, ASM Handbook, ASM International,

496

Introduction  

Science Conference Proceedings (OSTI)

...T.C. Fowler, Value Analysis in Materials Selection and Design, Materials Selection and Design, Vol 20, ASM Handbook,

497

Introduction  

Science Conference Proceedings (OSTI)

...Group Joseph Foster Texas A&M University Kenneth Fowler Panametrics, Inc. E.M. Franklin Argonne National

498

Introduction  

Science Conference Proceedings (OSTI)

...e ) ln linear-elastic fracture mechanics LEFM light-emitting diode LED length-to-diameter ratio L / D life cycle analysis (or assessment) LCA pound-force lbf pound lb length L liter; longitudinal direction; liquid L mean free path; length l kilowatt kW kilovolt kV kips (1000 lb) per square inch ksi kilopascal kPa...

499

Introduction  

Science Conference Proceedings (OSTI)

...e ) ln linear-elastic fracture mechanics LEFM light-emitting diode LED length-to-diameter ratio L/D life cycle analysis (or assessment) LCA pound-force lbf pound lb length L liter; longitudinal direction; liquid L mean free path; length l kilowatt kW kilovolt kV kips (1000 lb) per square inch ksi kilopascal kPa...

500

INTRODUCTION  

Science Conference Proceedings (OSTI)

... members and relevant TCs, in particular TC 2, TC 9, TC 9/SC 3 and ... requested that the 14 th Conference consider this opinion in the budget for the ...

2013-07-08T23:59:59.000Z