National Library of Energy BETA

Sample records for introduction scada security

  1. Introduction SCADA Security for Managers and Operators | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Introduction SCADA Security for Managers and Operators Introduction SCADA Security for Managers and Operators SCADA Test Bed introduction to managers and operators in the field- To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector Introduction SCADA Security for Managers and Operators (8.15 MB) More Documents & Publications Intermediate SCADA Security Training Course Slides

  2. Hallmark Project Commercialization of the Secure SCADA Communications...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Hallmark Project Commercialization of the Secure SCADA ...

  3. Framework for SCADA Security Policy (October 2005)

    Office of Energy Efficiency and Renewable Energy (EERE)

    Modern automation systems used in infrastruc-ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate...

  4. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems ...

  5. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

  6. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  7. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector ...

  8. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of ...

  9. Secure SCADA Communication ProtocolPerformance Test Results | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication

  10. Intermediate SCADA Security Training Course Slides (September 2006) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Intermediate SCADA Security Training Course Slides (September 2006) Intermediate SCADA Security Training Course Slides (September 2006) Presentation for Intermediate SCADA Security, SS-2 SANS SCADA Summit, September 28-29, 2006. The class enabled attendees to develop an understanding of tools and methods that can be used to discover and identify system vulnerabilities (CIP-005 R3.2, CIP-005 R4, & CIP-007 R8); develop mitigation strategies for resolving these issues

  11. Cyber Assessment Methods for SCADA Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition,

  12. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Systems | Department of Energy Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common problem areas. In each vulnerability category, relative measures were assigned to the severity. Lessons Learned from Cyber Security

  13. Framework for SCADA Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Acceptable use policy Account and password policy Configuration management Security ... Accounts and Passwords The account and password policy will describe proper care of ...

  14. Hallmark Project Commercialization of the Secure SCADA Communications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol, a cryptographic security solution for device-to-device communication | Department of Energy Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Increased connectivity and automation in the control systems that manage the nation's energy

  15. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessment at National SCADA Test Bed | Department of Energy and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE)

  16. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E.; Duggan, David P.; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  17. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  18. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  19. National SCADA Test Bed - Enhancing control systems security in the energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    sector (September 2009) | Department of Energy SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA)

  20. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mitigations for Security Vulnerabilities Found in Control System Networks (425.98 KB) More Documents & Publications Cyber Assessment Methods for SCADA Security Introduction SCADA ...

  1. Recommended Practice for Securing Control System Modems | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    KB) More Documents & Publications Intermediate SCADA Security Training Course Slides (September 2006) Introduction SCADA Security for Managers and Operators Mitigations for ...

  2. 21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in

  3. Cyber Assessment Methods for SCADA Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the...

  4. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 2008 | Department of Energy Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise

  5. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify

  6. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  7. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost.

  8. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  9. INL Cyber Security Research (2008) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations Introduction SCADA Security for Managers and Operators

  10. Microsoft Word - PNNL-17118 Secure SCADA hadley SSCP FINAL with no ouo.doc

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8 Secure SCADA Communication Protocol Performance Test Results M.D. Hadley K.A. Huston August 2007 Prepared for U.S. Department of Energy Office of Electricity Delivery and Energy Reliability under Contract DE-AC05-76RL01830 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Battelle Memorial Institute, nor any of their employees, makes any warranty, express or implied,

  11. Sandia Energy - Research and Development of Next Generation Scada...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Next Generation Scada Systems Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric...

  12. SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... How to Partner Small Business Vouchers Pilot at ... Before SCADA, "you had to send people around the plants to ... operational systems in hydroelectric dams; water treatment ...

  13. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...

    Energy Savers [EERE]

    Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have ...

  14. National Supervisory Control and Data Acquisition (SCADA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... HomeStationary PowerSafety, Security & Resilience of Energy InfrastructureGrid ... (SCADA) Test Bed is a DOE Office of Electricity Delivery and Energy Reliability (OE) ...

  15. Microsoft Word - Utilities Form Consortium to Fund SCADA Testing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory ...

  16. SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  17. "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report.

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vol 7 No 8 | Department of Energy "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 Featured in this month's issue of The CIP Report are Supervisory Control and Data Acquisition (SCADA) systems. SCADA systems monitor and control the processes of many of our Nation's infrastructures. The security and safety of transportation, water, communications,

  18. SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Testbeds - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy

  19. National SCADA Test Bed Fact Sheet

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PROTECTING ENERGY INFRASTRUCTURE BY IMPROVING THE SECURITY OF CONTROL SYSTEMS Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA) and distributed control systems (DCS) used to monitor and manage our energy infrastructure. Many of the systems still in use today were designed to operate in

  20. DOE National SCADA Test Bed Program Multi-Year Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed Program Multi-Year Plan DOE National SCADA Test Bed Program Multi-Year Plan This document presents the National SCADA Test Bed Program Multi-Year Plan, a coherent strategy for improving the cyber security of control systems in the energy sector. The NSTB Program is conducted within DOE's Office of Electricity Delivery and Energy Reliability (OE), which leads national efforts to modernize the electric grid, enhance the security and reliability of the energy infrastructure,

  1. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to make decisions as well as human support to maintain the information system. In other words, they were expensive. At the same time, SCADA systems were not as expensive as...

  2. National Supervisory Control and Data Acquisition (SCADA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Supervisory Control and Data Acquisition (SCADA) - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste

  3. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  4. DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy OE National SCADA Test Bed Fiscal Year 2009 Work Plan DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan This document is designed to help guide and strengthen the DOE/OE NSTB program's research and development (R&D) of advance security tools and to heighten awareness among energy sector partners of the more than 30 NSTB projects underway in FY2009. DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan (260.95 KB) More Documents & Publications National SCADA Test

  5. National SCADA Test Bed

    Broader source: Energy.gov [DOE]

    The National SCADA Test Bed (NSTB) is a one-of-a-kind national resource that draws on the integrated expertise and capabilities of the Argonne, Idaho, Lawrence Berkeley, Los Alamos, Oak Ridge, Pacific Northwest, and Sandia National Laboratories to address the cybersecurity challenges of energy delivery systems.

  6. Real-Time SCADA Cyber Protection Using Compression Techniques

    SciTech Connect (OSTI)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

  7. Production Facility SCADA Design Report

    SciTech Connect (OSTI)

    Dale, Gregory E.; Holloway, Michael Andrew; Baily, Scott A.; Woloshun, Keith Albert; Wheat, Robert Mitchell Jr.

    2015-03-23

    The following report covers FY 14 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production facility. The goal of this effort is to provide Northstar with a baseline system design.

  8. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Documents Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control...

  9. ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) This document covers the security evaluation of the "baseline" or "as delivered" system performed in the Idaho National Engineering and Environmental Laboratory (INEEL) SCADA test bed as part of the Critical Infrastructure Test Range Development Program, which is funded by the U.S. Department of Energy; Office of

  10. A Nuclear Family: Extras - Introduction | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... A Nuclear Family: Extras - Introduction The mp4 video format is not supported by this browser. Download video Captions: On Time: 6:59 min. D. Ray Smith, Y-12 historian,...

  11. Sandia Energy - SCADA FAQs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FAQs Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control and...

  12. Introduction to SCADA Protection and Vulnerabilities (Technical...

    Office of Scientific and Technical Information (OSTI)

    large electric utility still owns power generation facilities, power transmission and ... of the system occurs at the nodes of the grid, the generation facilities, and substations. ...

  13. Introduction to SCADA Protection and Vulnerabilities

    SciTech Connect (OSTI)

    Ken Barnes; Briam Johnson; Reva Nickelson

    2004-03-01

    Even though deregulation has changed the landscape of the electric utility industry to some extent, a typical large electric utility still owns power generation facilities, power transmission and distribution lines, and substations. Transmission and distribution lines form the segments or spokes of a utility’s grid. Power flow may change through these lines, but control of the system occurs at the nodes of the grid, the generation facilities, and substations. This section discusses each of these node types in more detail as well as how each is controlled.

  14. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    SciTech Connect (OSTI)

    Marco Carvalho; Richard Ford

    2012-05-14

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

  15. SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  16. SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering Solutions - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  17. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  18. National SCADA Test Bed Substation Automation Evaluation Report...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: National SCADA Test Bed Substation Automation Evaluation Report Citation Details In-Document Search Title: National SCADA Test Bed Substation Automation ...

  19. National SCADA Test Bed Substation Automation Evaluation Report...

    Office of Scientific and Technical Information (OSTI)

    National SCADA Test Bed Substation Automation Evaluation Report Citation Details In-Document Search Title: National SCADA Test Bed Substation Automation Evaluation Report You ...

  20. Good Practice Guide on Firewall Deployment for SCADA and Process...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks In recent years, ...

  1. Review of Supervisory Control and Data Acquisition (SCADA) Systems...

    Office of Scientific and Technical Information (OSTI)

    Review of Supervisory Control and Data Acquisition (SCADA) Systems Citation Details In-Document Search Title: Review of Supervisory Control and Data Acquisition (SCADA) Systems ...

  2. "Supervisory Control and Data Acquisition (SCADA) Systems." The...

    Energy Savers [EERE]

    "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 ...

  3. SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program Overview - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear

  4. Metrics for the National SCADA Test Bed Program

    SciTech Connect (OSTI)

    Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

    2008-12-05

    The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

  5. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    SciTech Connect (OSTI)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  6. Introduction

    Office of Environmental Management (EM)

    Introduction After the Office of Environmental Management (EM) completes environmental cleanup at a site which continues to have a Department of Energy (DOE) mission, EM transfers...

  7. The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab Photovoltaic Systems Evaluation Laboratory PV Regional ... Facility Geomechanics and Drilling Labs National ... Health Monitoring Offshore Wind High-Resolution ...

  8. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

  9. Introduction

    National Nuclear Security Administration (NNSA)

    ... two gun turrets at either end of the facility provide extended security at the DAF. environmental testing and the other for observing operations in an adjacent assembly cell. ...

  10. National SCADA Test Bed | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Created in 2003, the National SCADA Test Bed (NSTB) is a one-of-a-kind national resource ... In December 2012, the lab successfully demonstrated QKD on the University of Illinois test ...

  11. Sandia Energy - SCADA Training Courses

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Courses Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory...

  12. Introduction

    National Nuclear Security Administration (NNSA)

    January 2011 For more information, contact: U.S. Department of Energy National Nuclear Security Administration Nevada Site Office Office of Public Affairs P.O. Box 98518 Las Vegas,...

  13. Introduction

    National Nuclear Security Administration (NNSA)

    March 2010 For more information, contact: U.S. Department of Energy National Nuclear Security Administration Nevada Site Office Office of Public Affairs P.O. Box 98518 Las Vegas,...

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nonproliferation Test and Evaluation Complex (NPTEC) is the world's largest facility for open air testing of hazardous toxic materials and biological simulants. It is located at the Nevada National Security Site on Frenchman Flat, a natural geological basin approximately 75 miles northwest of Las Vegas. The topography, wind predictability, and location provide a secure, controlled environment for small and large-scale testing, which is governed by an approved Environmental Assessment. An

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Criticality Experiments Research Center (NCERC) is located at the Nevada National Security Site (NNSS) and operated by Los Alamos National Laboratory (LANL). NCERC maintains a substantial special nuclear material (SNM) inventory and expertise to support a variety of nuclear security missions, including nuclear criticality safety research and training, nuclear emergency response, nuclear nonproliferation, and support for other Government Agencies that require hands-on access to

  16. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    December 18, 1950, President Harry S. Truman authorized the establishment of a continental testing site on a 680-square mile section of the Nellis Air Force Gunnery and Bombing Range. First known as the Nevada Proving Grounds, it officially became the Nevada Test Site in 1955, opening the door to an atomic age that not only affected national security, but national culture as well. Today it is known as the Nevada National Security Site (NNSS). Testing Captures America's Attention The Ranger test

  17. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    December 18, 1950, President Harry S. Truman authorized the establishment of a continental testing site on a 680-square mile section of the Nellis Air Force Gunnery and Bombing Range. First known as the Nevada Proving Grounds, it officially became the Nevada Test Site in 1955, opening the door to an atomic testing age that not only affected national security, but national culture as well. Today it is called the Nevada National Security Site (NNSS). The Ranger test series At the commencement of

  18. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Prehistoric cultural resources are abundant on the Nevada National Security Site (NNSS), formerly know as the Nevada Test Site (NTS), indicating Native Americans occupied the region for more than 10,000 years. Historic artifacts from the late nineteenth and early twentieth centuries are also present, reflecting use by miners, ranchers, and settlers who traveled through the area. The U.S. Department of Energy National Nuclear Security Administration Nevada Field Office (NNSA/NFO) is committed to

  19. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    To increase the domestic preparedness to combat terrorist threats, the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Offce (NNSA/NFO) provides a unique radiological/nuclear weapons of mass destruction (WMD) training center at the Nevada National Security Site (NNSS), located 65 miles northwest of Las Vegas, Nevada. At the NNSS, emergency responders are trained to take immediate, decisive actions in response to terrorist use of radiological or nuclear WMDs, such

  20. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    do Ruth, Dixie, Shasta, Butternut, Seersucker, and Mink all have in common? They were all names of nuclear tests conducted at the Nevada Test Site (NTS), now known as the Nevada National Security Site (NNSS), between 1951 and 1962. A total of 928 atmospheric and underground nuclear tests was conducted at the NTS, and each of those tests was christened with a name. Background Beginning with Trinity, the first atomic test in 1945, nuclear tests were all assigned code names as a security measure

  1. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    52 feet tall, it remains a well-known, highly visible landmark at the Nevada National Security Site (NNSS). It is the modular tower built for Icecap, a joint United Kingdom, Los Alamos National Laboratory underground nuclear test scheduled for the spring of 1993. What was scheduled to be the 929th test came to a halt when President Bush signed the Underground Nuclear Testing Moratorium on October 3, 1992. The tower still remains in Area 7 of the Nevada National Security Site. The Icecap tower

  2. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Starting in 1951, thousands of military personnel from all four U.S. military services received orders to serve with the U.S. Army's Atomic Maneuver Battalion working at Camp Desert Rock at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). A Step Back in Time It is hard to imagine that in the 1950s the Nevada National Security Site host- ed a bustling military camp full of young soldiers, marines, sailors and airmen who were to witness the heat and blast of the

  3. Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Introduction Advances in manufacturing technologies, including modular construction, improved factory and field fabrication and other innovative construction technologies, are essential to the future of nuclear energy. They are strategically important to the economics of new nuclear power plant construction in the United States and to the competitiveness of the U.S. in the nuclear energy market. In 2012, the Nuclear Energy Enabling Technologies (NEET) Program was initiated by the Department of

  4. Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction Instrumentation and controls are used in commercial nuclear energy and fuel cycle systems to measure important system parameters, provide control input to components that maintain systems within desired and safe limits, and provide owners and operators with the needed awareness of plant conditions to plan and safely manage operational evolutions. In a sense, instrumentation and control (I&C) systems function as the nervous system of a nuclear power plant and other nuclear

  5. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Technical Reference on Hydrogen Compatibility of Materials Introduction Prepared by: C. San Marchi, Sandia National Laboratories, Livermore CA Editors C. San Marchi B.P. Somerday Sandia National Laboratories This report may be updated and revised periodically in response to the needs of the technical community; up-to-date versions can be requested from the editors at the address given below or downloaded at http://www.ca.sandia.gov/matlsTechRef/. The content of this report will also be

  6. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    x Introduction April 1, 2011 - March 31, 2012 Progress in research and operations at the Texas A&M Cyclotron Institute is summarized in this report for the period April, 1, 2011 through March 31, 2012. The format follows that of previous years. Sections I through IV contain reports from individual research projects. Operation and technical developments are given in Section V. Section VI lists the publications with Cyclotron Institute authors and the Appendix gives additional information

  7. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ix Introduction April 1, 2012 - March 31, 2013 Progress in research and operations at the Texas A&M Cyclotron Institute is summarized in this report for the period April, 1, 2012 through March 31, 2013. The format follows that of previous years. Sections I through III contain reports from individual research projects. Operation and technical developments are given in Section IV. Section V lists the publications with Cyclotron Institute authors and the Appendix gives additional information

  8. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    xi Introduction April 1, 2013 - March 31, 2014 Progress in research and operations at the Texas A&M Cyclotron Institute is summarized in this report for the period April, 1, 2013 through March 31, 2014. The format follows that of previous years. Sections I through III contain reports from individual research projects. Operation and technical developments are given in Section IV. Section V lists the publications with Cyclotron Institute authors and outside users and the Appendix gives

  9. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction to the Open Source PV LIB for Python Photovoltaic System Modelling Package Robert W. Andrews 1 , Joshua S. Stein 2 , Clifford Hansen 2 , and Daniel Riley 2 1 Calama Consulting, Toronto, Ontario, M5T1B3, Canada 2 Sandia National Laboratories, Albuquerque, NM, 87185, USA Abstract-The proper modeling of Photovoltaic(PV) systems is critical for their financing, design, and operation. PV LIB provides a flexible toolbox to perform advanced data analysis and research into the performance

  10. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Public Involvement Survey - 2 2012 Hanford Public Involvement Survey - 3 Introduction The Tri-Party Agreement (TPA) agencies - U.S. Department of Energy (DOE), U.S. Environmental Protection Agency, and the Washington State Department of Ecology - work together on cleanup of the Hanford Site. Hanford is a 586-square-mile site in southeastern Washington created in 1943 as part of the Manhattan Proj- ect to produce plutonium for nuclear weapons. The production mission ended in the late 1980s. More

  11. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Construction began on the Device Assembly Facility (DAF) in the mid-1980s to support underground nuclear testing. DAF was designed and built to consolidate all nuclear explosive assembly functions, to provide safe structures for high explosive and nuclear explosive assembly operations, and to provide a state-of-the-art safeguards and security environment. Now that the United States is under a continuing nuclear testing moratorium, the DAF now provides support for Stockpile Stewardship

  12. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1992, the President of the United States placed a moratorium on underground nuclear weapons testing. As a result, alternate experimental methods for certifying the nation's nuclear weapons stockpile were implemented. Among these experimental methods was the Joint Actinide Shock Physics Experimental Research (JASPER) Facility, located at the Nevada National Security Site. JASPER plays an integral role in the certification of the nation's nuclear weapons stockpile by provid- ing a method to

  13. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    U1a facility is an underground laboratory used for subcritical experiments; physics experiments that are used to obtain technical information about the U.S. nuclear weapons stockpile. These experiments support the U.S. Department of Energy, National Nuclear Security Administration's (NNSA) Stockpile Stewardship Programs, created to maintain the safety and reliability of the U.S. nuclear weapons stockpile. The U1a borehole was originally excavated in the 1960s for an underground nuclear test that

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Big Explosives Experimental Facility (BEEF) is a hydrodynamic testing facility, located at the Nevada National Security Site (NNSS), about 65 miles northwest of Las Vegas. BEEF provides data, through explosive experiments, to support the Stockpile Stewardship Program, along with a variety of new experimental programs that expand the nation's non-nuclear experiment capabilities. History When the U.S. Department of Energy's Lawrence Livermore National Laboratory (LLNL) facility in Livermore,

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    mid-1950s the United States launched a nuclear rocket program called Project Rover. The Atomic Energy Commission (AEC) and the National Aeronautics and Space Administration's (NASA) Space Nuclear Propulsion Office jointly administered the test area, later called the Nuclear Rocket Development Station (NRDS) in Area 25 of the Nevada Test Site (now known as the Nevada National Security Site (NNSS)). NRDS was a sprawling complex composed of test cells and assembly buildings. Connecting these

  16. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Between 1951 and 1992, 828 underground nuclear tests were conducted in specially drilled vertical holes, vertical shafts, and horizontal tunnels at the Nevada Test Site, now known as the Nevada National Security Site (NNSS). Most vertical shaft tests assisted in the development of new weapon systems. Horizontal tunnel tests occurred to evaluate the effects (radiation, ground shock) of various weapons on military hardware and systems. Background Between 1951 and 1963, a total of 100 atmospheric

  17. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Since the beginning of the industrial revolution the amount of carbon dioxide (CO 2 ) in the atmosphere has risen sharply and has the potential to dramatically affect global climate. It is important to determine how deserts and semiarid lands, which comprise nearly 40 percent of the Earth's land mass, will respond to the effects of this increase in CO 2 and related climate change. Collaborative ecological studies are being conducted at the Nevada National Security Site (NNSS), formerly known as

  18. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    work at the Nevada National Security Site (NNSS), formerly known as the Nevada Test Site (NTS), requires the use of underground tunnels and shafts. In order to provide the safest work environment possible for NNSS workers, Mine Rescue Teams (MRTs) are required to ensure proper rescue services in an emergency situation. Background The MRTs must comply with Mine Safety and Health Administration (MSHA) requirements and with stipulations that include a requirement for a minimum of two MRTs to be

  19. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    During the height of operations in the 1960s, the Jackass & Western Railroad, located in Area 25 of the Nevada National Security Site (NNSS), formerly know as the Nevada Test Site (NTS), was the shortest and slowest operating railroad in the United States. However, it was the railroad's important mission that made it such: the railroad trans- ported research reactors, NERVA reactors/ nuclear engines, and equipment between facilities at the NTS Nuclear Rocket Development Station (NRDS) in

  20. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nevada National Security Site (NNSS) provides a unique and indispensable extension of the national laboratories' experimental capabilities in support of the Stockpile Stewardship Program. In addition to ongoing environmental cleanup of historic nuclear research and testing areas on the NNSS, non-defense research and development activities are conducted in cooperation with universities, industries, and other federal agencies. In the beginning After the first nuclear test at the Trinity Site in

  1. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Five of the first six nuclear tests conducted by the United States occurred in the far reaches of the Pacific Ocean. Almost immediately, scientists and military planners discovered that logistics, weather, security and safety concerns required the need for a continental test site. The effort of transporting, supplying and housing a nuclear test task force in the middle of the Pacific was more than originally anticipated. In addition to the communist insurgency in Korea, the need for a

  2. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    For more than 50 years, the Nevada Test Site, now known at the Nevada National Security Site (NNSS), has been used as a test bed for a multitude of scientific projects, among which was the Supersonic Low-Altitude Missile (SLAM). The concept was a revolutionary new type of propulsion originated at Lawrence Radiation Laboratory, which eventually became Lawrence Livermore National Laboratory: nuclear ramjet power. Project Pluto was the code name for the project, which also referred to the weapon

  3. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Before Neil Armstrong stepped foot on the moon on July 20, 1969, Armstrong, and astronauts Dick Gordon, Buzz Aldrin, Dave Scott, and Russell "Rusty" Schweikart left their footprints on the Nevada Test Site, now known as the Nevada National Security Site (NNSS) as part of their lunar training. Training Mission Their three-day visit began on February 16, 1965. It was the first training mission by a group of astronauts from the National Aeronautics and Space Administration (NASA). Their

  4. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    earliest media reports of atmospheric nuclear testing in Nevada were based on eyewitness accounts. News reporters considered it a sign of importance when invited to watch detonations from News Nob, a large pile of volcanic tuff situated on the edge of Yucca Lake at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). Thousands of newsmen trekked to observe and write about atomic mushroom clouds billowing above the desert of Nevada in the 1950s. Their articles were eagerly

  5. Introduction

    Office of Environmental Management (EM)

    The idea to use atomic energy to propel a rocket for interplanetary travel originated in 1906 when American space pioneer Robert Goddard, a college sophomore, wrote a paper on the use of atomic energy. The concept moved from theory to reality in the mid-1950s when the United States launched a nuclear rocket program called Project Rover. A nuclear reactor and test engines were located in the southwest corner of the Nevada Test Site, now known at the Nevada National Security Site (NNSS). The

  6. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    rare occasions, vertical drill holes have been used for effects tests at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). Huron King was a Vertical Line of Site (VLOS) underground test conducted at the Nevada Test Site on June 24, 1980 by the Defense Nuclear Agency, now the Defense Threat Reduction Agency (DTRA), U.S. Department of Defense. Background DTRA, in cooperation with the U.S. Department of Energy, and its predecessor, the Atomic Energy Commission, began

  7. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mercury, Nevada, a town 65 miles northwest of Las Vegas, is the gateway to the Nevada Test Site (NTS), now known at the Nevada National Security Site (NNSS). There is no evidence as to how Mercury was named, but legend says that an unknown miner worked in the Calico Hills in the 1850s mining mercury- bearing ore. His route of travel became known as the Mercury Road, and the area surrounding it became known as Mercury. Almost one hundred years later the Atomic Energy Commission (AEC) built

  8. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The desert temperature hovered at 90 degrees Fahrenheit the morning of July 17, 1962 at the Nevada Test Site (NTS), now known at the Nevada National Security Site (NNSS). Eventually the beating sun would increase the heat to over 105 degrees later that day, but at 10:00 a.m., a crowd of 396 spectators braved the scorching temperature and relentless sun to witness the last atmospheric test ever conducted by the United States. The crowd gathered in Area 18 of the NTS, approximately two miles from

  9. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Larger than the state of Rhode Island, the Nevada National Security Site (NNSS) occupies approximately 1,375-square miles (approximately 880,000 acres) in southern Nevada, making it one of the largest restricted-access areas in the United States. The NNSS is surrounded by approximately 6,500 square miles of federal land used for the U.S. Air Force Nevada Test and Training Range, and the Desert National Wildlife Refuge. Located approximately 65 miles northwest of Las Vegas, the NNSS is vast,

  10. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Age spanned from the 1940s through the 1990s. Key occurrences during that period, including events that precipitated the era and crucial milestones along the way, are documented in this timeline. An important part of the nuclear age occurred at the Nevada Test Site (NTS), now known as the Nevada National Security Site (NNSS). Between 1951 and 1992 a total of 928 nuclear tests were conducted at the NTS, 828 of which were underground. A total of 126 nuclear tests were conducted at other

  11. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    idea to use atomic energy to propel a rocket for interplanetary travel originated in 1906 when American space pioneer Robert Goddard, a college sophomore, wrote a paper on the use of atomic energy. The concept moved from theory to reality in the mid-1950s when the United States launched a nuclear rocket program called Project Rover. A nuclear reactor and test engines were located in the southwest corner of the Nevada Test Site, now known at the Nevada National Security Site (NNSS). The Atomic

  12. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    first nationally televised nuclear shot, "Annie" was conducted on March 17, 1953. Annie was also part of a civil effects test named Operation Cue, conducted by the Federal Civil Defense Administration (FCDA). On May 5, 1955 a 29-kiloton device named Apple 2 was detonated from a 500- foot tower on Yucca Flat at the Nevada Test Site, now known at the Nevada National Security Site (NNSS), approximately 65 miles northwest of Las Vegas. It was the second nationally televised nuclear test

  13. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    527 feet, the BREN (Bare Reactor Experiment -- Nevada) Tower was the largest free- standing structure west of the Mississippi River. It was also one of the best known and most visible landmarks at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). It was taller than the Empire State Building (1,454 feet, to top of lightening rod) and almost twice as tall as the Eiffel Tower (1,063 feet, with antenna). It was constructed of 51 thirty-foot sections of high tensile steel

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    July 26, 1957, a safety experiment called Pascal-A was detonated in an underground hole at the Nevada Test Site (NTS), now known as the Nevada National Security Site (NNSS). The test, although successful, brought the issue of drilling to the forefront. The need to drill large-diameter holes at the NTS resulted from the Limited Test Ban Treaty (LTBT), signed by President John F. Kennedy in Moscow on August 5, 1963. The LTBT prohibited testing nuclear weapons in the atmosphere, underwater, and in

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    May 25, 1953, during the Operation Upshot-Knothole test series at the Nevada Test Site, now known at the Nevada National Security Site (NNSS), a milestone occurred in ordnance development. A 280-mm cannon, nicknamed Atomic Annie, fired the first and last nuclear projectile as part of the Grable test. The MK-9 artillery shell was propelled a distance of seven miles. It exploded in the air and had a yield of 15 kilotons (15,000 tons of TNT). Deployment Two 280-mm cannons were shipped by rail from

  16. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    diverse and complex mosaic of plant and animal communities are found at the Nevada National Security Site. Representative of both the Mojave and Great Basin deserts, approximately 1,500 ani- mal species, including 924 species of insects, and 750 different kinds of plants are documented at the site. The varying elevations and climatic conditions at the test site contribute to the distribution of plant and animal communities. On the south end of the site, Jackass Flats lies at a low 2,688 feet

  17. U.S. DOE/OE National SCADA Test Bed Supports | Department of...

    Energy Savers [EERE]

    U.S. DOEOE National SCADA Test Bed Supports U.S. DOEOE National SCADA Test Bed Supports To help advance the U.S. Department of Energy (DOE) National SCADA Test Bed's (NSTB) ...

  18. Visualizing Wind Farm Wake Losses using SCADA Data

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Continuous Reliability Enhancement for Wind Visualizing Wind Farm Wake Losses using SCADA ... the Department of Energy's Continuous Reliability Enhancement for Wind (CREW) project. ...

  19. Use of SCADA Data for Failure Detection in Wind Turbines

    SciTech Connect (OSTI)

    Kim, K.; Parthasarathy, G.; Uluyol, O.; Foslien, W.; Sheng, S.; Fleming, P.

    2011-10-01

    This paper discusses the use of existing wind turbine SCADA data for development of fault detection and diagnostic techniques for wind turbines.

  20. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program ...

  1. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) Working to Achieve Cybersecurity in the Energy Sector Introduction SCADA ...

  2. Lemnos Interoperable Security Program (May 2008) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lemnos Interoperable Security Program (May 2008) Lemnos Interoperable Security Program (May 2008) Creating common language and metrics for describing functions of network security tools and testing for interoperability Lemnos Interoperable Security Program (May 2008) (839.28 KB) More Documents & Publications Lemnos Interoperable Security SECURITY CORE FUNCTION AND DEFINITION REPORT DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan

  3. Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  4. Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

    2006-01-01

    We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

  5. Intelligent devices simplify remote SCADA installations in substations

    SciTech Connect (OSTI)

    Kopriva, V.J.

    1994-12-31

    Utilities are increasingly relying on Supervisory Control and Data Acquisition (SCADA) Systems for the effective and economical management of electric transmission and distribution systems. Now, advances in equipment and design technologies have created opportunities for an increased level of monitoring and control at electric power substations. In the past, prohibitive factors, including complicated equipment and wiring retrofits, protocol compatibility, and hardware installation and maintenance costs have impeded electric utilities in their attempt at broad based application of SCADA systems in electric substations, particularly at distribution voltage levels. These advances in equipment technologies have provided utilities with the opportunity to install and operate SCADA systems at lower cost, while providing flexibility for system expansion over longer periods. The development of intelligent microprocessor controlled devices and integrated communications has facilitated the use of a distributed design approach to installing SCADA monitoring and control in substations. This approach offers greater hardware flexibility and reduced installation costs while increasing reliability, making the addition of monitoring and control to electric substations increasingly practical. This paper will examine current trends in the application of intelligent microprocessor controlled and electronic devices, in stand alone and distributed applications, and the simplification of techniques for installing SCADA systems in substations. It will also consider the potential advantages to be realized in cost and reliability, and examine the necessary changes in design and operation philosophies required to effectively implement the new technology.

  6. Lessons Learned from Cyber Security Assessments of SCADA and...

    Energy Savers [EERE]

    ... from binary executables or configuration files; password protection policies were weak. ... credential information, or store password hashes instead of plain text passwords H ...

  7. Strengthening Cyber Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector from cyber attack Strengthening Cyber Security (587.96 KB) More Documents & Publications Considering Cumulative Effects Under the National Environmental Policy Act (CEQ, 1997) Vision for 2025: A Framework for Change ITP Aluminum: Technical Working Group on Inert Anode Technologies

  8. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  9. Basic SCADA systems - from the sensors to the screen

    SciTech Connect (OSTI)

    Merlie, B.

    1995-12-01

    Supervisory Control and Data Acquisition (SCADA) Systems are specialized control systems used to monitor and control facilities which are geographically dispersed. They are commonly used in the gas, oil, electric, and water transmission and distribution industries. SCADA systems differ from other control systems in that they make extensive use of remote communications and are more tolerant to outages of the communications network than a typical control system installation in a plant environment. A basic SCADA system can be broken into five functional parts. These are: (1) Sensors and Actuators; (2) Remote Terminal Units (RTUs); (3) Communications Facilities; (4) Host Computer Systems; and (5) User Interfaces While the fundamental concepts of SCADA systems have changed little in the past 20 years, more sophisticated hardware and software has altered some of the traditional paradigms associated with these control systems. This is particularly true with respect to RTUs, host computer systems, and user interfaces. While this paper will focus on the fundamentals, it will attempt to provide the reader with current trends in the industry where applicable.

  10. Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks

    Office of Energy Efficiency and Renewable Energy (EERE)

    In recent years, Supervisory Controls and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial information technologies for both...

  11. Parris Island Wastewater Treatment Plant SCADA Upgrades Final Report

    SciTech Connect (OSTI)

    Meador, Richard J.; Hatley, Darrel D.

    2004-03-18

    Marine Corp Recruit Depot (MCRD), Parris Island, SC, home of the Easter Recruiting Region Marine Corp Boot Camp, found itself in a situation common to Department of Defense (DOD) facilities. It had to deal with several different types of installed energy-related control systems that could not talk to each other. This situation was being exacerbated by the installation of a new and/or unique type of control system for every new building being constructed or older facility that was being upgraded. The Wastewater Treatment Facility (WWTF) and lift station controls were badly in need of a thorough inspection and a new Supervisory Control and Data Acquisition (SCADA) system upgrade to meet environmental, safety, manpower, and maintenance concerns. A project was recently completed to implement such a wastewater treatment SCADA upgrade, which is compatible with other upgrades to the energy monitoring and control systems for Parris Island buildings and the Pacific Northwest National Laboratory (PNNL) Decision Support for Operations and Maintenance (DSOM) system installed at the Central Energy Plant (CEP). This project included design, specification, procurement, installation, and testing an upgraded SCADA alarm, process monitoring, and display system; and training WWTF operators in its operation. The ultimate goal of this and the other PNNL projects at Parris Island is to allow monitoring and control of energy and environmental components from a central location.

  12. Supervisory Control and Data Acquisition System (SCADA) Substation C3-3 Acceptance Test Procedure

    SciTech Connect (OSTI)

    ZAKRAJSEK, M.F.

    2000-10-17

    The purpose of this acceptance test procedure (ATP) is to demonstrate that the newly installed Supervisory Control and Data Acquisition (SCADA) computer system functions as intended by the design.

  13. OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts In recent years, Supervisory Control and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial Information Technologies (IT) such as Ethernet(tm), Transmission Control Protocol/Internet Protocol (TCP/IP) and Windows® for both critical and non-critical communications. This has made the interfacing

  14. Advanced Supervisory Control and Data Acquisition (SCADA) for Biochemical Process Integration Presentation for BETO 2015 Project Peer Review

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Supervisory Control and Data Acquisition (SCADA) for Biochemical Process Integration 2/26/2015 Biochemical Platform Review Jim Collett Pacific Northwest National Laboratory This presentation does not contain any proprietary, confidential, or otherwise restricted information Goal Statement * The Challenge: Hydrocarbon biofuel production will require advanced supervisory control and data acquisition (SCADA) systems for bioconversion of highly variable biomass feedstocks with high levels of

  15. Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding

    SciTech Connect (OSTI)

    Yan, Guanhua; Nicol, David M; Jin, Dong

    2010-12-16

    The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

  16. Development and Demonstration of a Security Core Component

    SciTech Connect (OSTI)

    Turke, Andy

    2014-02-28

    In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more data about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from

  17. Secure Control Systems for the Energy Sector

    SciTech Connect (OSTI)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  18. Multiple Flow Loop SCADA System Implemented on the Production Prototype Loop

    SciTech Connect (OSTI)

    Baily, Scott A.; Dalmas, Dale Allen; Wheat, Robert Mitchell; Woloshun, Keith Albert; Dale, Gregory E.

    2015-11-16

    The following report covers FY 15 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production prototype gas flow loop. The goal of this effort is to expand the existing system to include a second flow loop with a larger production-sized blower. Besides testing the larger blower, this system will demonstrate the scalability of our solution to multiple flow loops.

  19. National SCADA Test Bed Substation Automation Evaluation Report

    SciTech Connect (OSTI)

    Kenneth Barnes; Briam Johnson

    2009-10-01

    Increased awareness of the potential for cyber attack has recently resulted in improved cyber security practices associated with the electrical power grid. However, the level of practical understanding and deployment of cyber security practices has not been evenly applied across all business sectors. Much of the focus has been centered on information technology business centers and control rooms. This report explores the current level of substation automation, communication, and cyber security protection deployed in electrical substations throughout existing utilities in the United States. This report documents the evaluation of substation automation implementation and associated vulnerabilities. This evaluation used research conducted by Newton-Evans Research Company for some of its observations and results. The Newton Evans Report aided in the determination of what is the state of substation automation in North American electric utilities. Idaho National Laboratory cyber security experts aided in the determination of what cyber vulnerabilities may pose a threat to electrical substations. This report includes cyber vulnerabilities as well as recommended mitigations. It also describes specific cyber issues found in typical substation automation configurations within the electric utility industry. The evaluation report was performed over a 5-month period starting in October 2008

  20. Fact Sheet: Cyber Security Audit and Attack Detection Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... National SCADA Test Bed Screenshot from NESSUS Vulnerability Scanner Technical Objectives ... DOE National SCADA Test Bed (NSTB) NSTB is a multi-laboratory resource that partners with ...

  1. SLURM Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    distinct products to provide both job scheduling and resource management (TorqueMOAB). ... SLURM provides equivalent or similar functionality with TorqueMoab. A brief introduction ...

  2. Attendee Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D Radiological Laboratory Utility Office Building (RLUOB) Equipment Installation (REI) Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's

  3. Chapter I: Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    30 QER Report: Energy Transmission, Storage, and Distribution Infrastructure | April 2015 Chapter I: Introduction QER Report: Energy Transmission, Storage, and Distribution Infrastructure | April 2015 2-1 Chapter II This chapter addresses a broad range of challenges to the resilience, reliability, safety, and asset security of transmission, storage, and distribution (TS&D) and shared infrastructures. The challenges vary among different types of TS&D infrastructure and among different

  4. Hierarchical EMS/SCADA system, Magyar Villamos Muevek Ttroeszt, Hungarian Electricity Board, feasibility study report. Export trade information

    SciTech Connect (OSTI)

    Not Available

    1991-10-01

    The report concludes a feasibility and requirements study for the Hungarian Eectricity Board (MVMT) to upgrade MVMT's nationwide, hierarchical Energy Management System/Supervisory Control and Data Acquisition (EMS/SCADA) system. The study has resulted in a time-phased implementation plan for the recommended cost-effective solutions, with the associated project schedules and budgetary cost estimates. Specific recommendations are presented for the following closely related implementation projects: The upgrading of an existing EMS in the National Dispatch Center (NDC) including the associated remote facilities at major substations and power plants; The modernization or replacement of the existing SCADA systems and/or implementation of new systems at the regional electric power companies; and The expansion and upgrading of the data communication network that will be required to connect and support the nationwide EMS/SCADA facilities.

  5. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  6. Introduction - JCAP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hero Image ©bobpaz.com0082.JPG Research Research Introduction Thrusts Library Resources Research Introduction Why Solar Fuels? Goals & Objectives Thrusts Thrust 1 Thrust 2 Thrust 3 Thrust 4 Library Publications Research Highlights Videos Resources User Facilities Expert Team Benchmarking Database Device Simulation Tool XPS Spectral Database JCAP seeks to discover new ways to produce hydrogen and carbon-based fuels using only sunlight, water and carbon dioxide as inputs Why Solar FuELs?

  7. Cyber Security Procurement Language for Control Systems Version 1.8 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply

  8. ADA/SCADA RTU protocol based on the 3-layer UCA model

    SciTech Connect (OSTI)

    Adamo, V.P.

    1995-12-31

    This paper describes an implementation of a DA/SCADA RTU communication protocol based on the 3-layer reference model for wide area networks specified in the Utility Communications Architecture (UCA) VL1.0. This protocol is based on the following international standards: EIA-232-D, High-level Data Link Control (HDLC) [ISO/IEC 3309], and Manufacturing Message Specification (MMS) [ISO/IEC 95061]. A description of the HDLC frame structure used in this implementation is provided. This includes a description of the extended transparency option for Start/Stop transmission, commonly referred to as {open_quotes}asynchronous HDLC{close_quotes}. This option allows for the transmission of HDLC frames using inexpensive asynchronous communication hardware. The data link topology described in this paper is an unbalanced, point-to-multipoint topology consisting of one primary, or, master station, and multiple secondary, or remote, stations. The data link operates in the Normal Response Mode (NRM). In this mode a secondary station may initiate transmissions only as a result of receiving explicit permission to do so from the primary station. The application layer protocol described in this paper is an implementation of the Manufacturing Message Specification (MMS). The MMS device model, or Virtual Manufacturing Device (VMD), for a DA/SCADA Remote Terminal Unit is provided. The current VMD model provides a view of common RTU data types, plus, A/C Input (ACI) data including phasor magnitude and mean readings, harmonics, and overcurrent alarm information.

  9. OIC Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OIC Introduction David McCall Chair - OIC Liaison Task Group Senior Strategic Planner - Intel Corporation Constrained Devices The Internet of Things 2 Data Centers Cloud Rich Devices Rich Devices / Gateways IoT Evolution 3 Cloud / Data Centres Rich Devices / Gateways Constrained Devices Time Isolated Aggregated Cloud Native IoT Standards Applications & Services Data & Control Points Comms Protocols Transports Profiles, Data & Resource Models Apps and services deliver the value of IoT

  10. Attendee Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    U N C L A S S I F I E D Deep Borehole - UFDC - 2016 - Las Vegas The Role of Zeolite Phase Transformations in Deep Borehole Seals CAPORUSCIO, F., NORSKOG, K., MANER, J. LOS ALAMOS NATIONAL LABORATORY UNIVERSITY OF OKLAHOMA Slide 1 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D Slide 2 U.S. Used Fuel Disposition Campaign Deep boreholes Program * Use mine-run, unpurified bentonite and highly saline brines * Investigate chemical

  11. Secure VM for Monitoring Industrial Process Controllers

    SciTech Connect (OSTI)

    Dasgupta, Dipankar; Ali, Mohammad Hassan; Abercrombie, Robert K; Schlicher, Bob G; Sheldon, Frederick T; Carvalho, Marco

    2011-01-01

    In this paper, we examine the biological immune system as an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process. The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its artificial counterpart. Our study focuses on building an autonomic defense system, using some immunological metaphors for information gathering, analyzing, decision making and launching threat and attack responses. In order to detection Stuxnet like malware, we propose to include a secure VM (or dedicated host) to the SCADA Network to monitor behavior and all software updates. This on-going research effort is not to mimic the nature but to explore and learn valuable lessons useful for self-adaptive cyber defense systems.

  12. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  13. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  14. Digital field-bus mode SCADA is key to offshore efficiency. [Automation of offshore gas production platforms

    SciTech Connect (OSTI)

    Cuthbert, P. )

    1994-02-01

    An all-digital SCADA network has been installed in one of the North Sea's largest natural gas fields, controlling the delivery of gas from Shell UK Exploration and Production's souther-area fields to a British Gas Terminal at Bacton, UK. The innovative use of digital technology -- based on the industry-standard HART field protocol -- to complete a digital communications link stretching from the onshore SCADA host right out to the process variable transmitters on the platforms, is playing a key role in the automation of the monitoring and control system by allowing Shell UK Expro to run the majority of the platforms unmanned. The SCADA system is part of a major refit being carried out by Shell Expro on its Leman field. The refit is part of the company's long-term strategy to extend the lifetime of this established field, which started operations in the late 1960s. In order to meet this goal, the prime requirements are to reduce operational costs and risk exposure, and the key element in this area was to reduce the need for resident staff and all of their associated support and equipment costs, through the deployment of automation. The system will achieve the project's cost-cutting aims, but also break new ground in control and monitoring technology for the gas industry, through the use of a smart transmitter scheme as a digital field communications within the wide-area network, using the protocol's all-digital capability in preference to the commonly used 4-20mA-compatible mode, will allow real-time monitoring and control, plus maintenance and diagnostics, to take place remotely. This paper describes the design of this system.

  15. Introduction to 'Make'

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    'Make' Introduction to 'Make' Introduction The UNIX make utility facilitates the creation and maintenance of executable programs from source code. make keeps track of the commands...

  16. Security Officer

    Broader source: Energy.gov [DOE]

    This position is located in the Security and Continuity of Operations (NN) organization of the Chief Administrative Office (N), Bonneville Power Administration. The Security and Continuity of...

  17. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  18. Introduction to Neutrino Physics

    SciTech Connect (OSTI)

    Linares, Edgar Casimiro

    2009-04-30

    I present a basic introduction to the physics of the neutrino, with emphasis on experimental results and developments.

  19. NNSA/CEA Cooperation in Computer Science | National Nuclear Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computing NNSACEA Cooperation in Computer Science Introduction On March 13, 2002 Directors of the DOENational Nuclear Security Administration (NNSA) and the Commissariat ...

  20. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security Safety, Security The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our

  1. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to protect the Laboratory Vehicle Access Portal graphic The security perimeter is intended to protect the Laboratory against the possibility of terrorist attacks. At each point of the perimeter, access is controlled by vehicle access portals (VAPs) at the following locations: East Jemez Road VAPs (pdf) (shown above) West

  2. security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security NNSA Announces 2015 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) announced the recipients of the Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Joseph Houghton from the Los Alamos Field Office will receive... Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit

  3. 1. INTRODUCTION | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1. INTRODUCTION 1. INTRODUCTION 1. INTRODUCTION (3.22 MB) More Documents & Publications Tribal Comments Database OIEPP Letter on Roundtable Sessions ICEIWG Meeting Agendas and Summaries

  4. Advanced Network Toolkit for Assessments and Remote Mapping ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security Standards National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) DOEOE National SCADA Test Bed Fiscal Year 2009 Work ...

  5. Hallmark Cryptographic Serial Communication | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A cryptographic card and link module integrating the Secure SCADA Communications Protocol ... Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a ...

  6. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    1, 2011 - Page 1 National Transportation Stakeholders Forum Denver, Colorado May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2 National Transportation Stakeholders Forum (NTSF) * Introduction * NNSA Certifying Official Role * Offsite Source Recovery Project * Waste Shipments * Nuclear Materials Management Planning * Summary May 11, 2011 - Page 3 NNSA Plays a Critical Role:

  7. Secure ICCP IntegrationConsiderations and Recommendations

    Office of Energy Efficiency and Renewable Energy (EERE)

    The goal of this report is to identify the operation and implementation issues associated with the introduction of the secure form of the Inter-control Center Communications Protocol, or ICCP,...

  8. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  9. SMART GRID: an introduction. | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SMART GRID: an introduction. SMART GRID: an introduction. Our nation's electric power infrastructure that has served us so well for so long - also known as "the grid" - is rapidly running up against its limitations. Our lights may be on, but systemically, the risks associated with relying on an often overtaxed grid grow in size, scale and complexity every day. From national challenges like power system security to those global in nature such as climate change, our near-term agenda is

  10. Introduction to Vol. Two

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Information Act Investor Relations Library Privacy Publications Tribal Affairs Introduction to Volume Two, Part I (1950-1987) An error occurred. Try watching this video on...

  11. Introduction and overview

    SciTech Connect (OSTI)

    None, None

    2009-01-18

    The Renewable Energy Technology Characterizations introduction outlines describe the technical and economic status of the major emerging renewable energy options for electricity supply.

  12. National Security Complex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Complex Y-12 National Security Complex Completes W69 Dismantlement

  13. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership

  14. Securing Wide Area Measurement Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Northwest National Laboratory (PNNL) as a project funded by the National SCADA Test Bed Program in cooperation with the Department of Energy's Transmission Reliability Program. ...

  15. Automation World Features New White Paper on Wireless Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan ISA Approves Standard ...

  16. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  17. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  18. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will rovide technical assistance to the Director,...

  19. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  20. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  1. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 ...

  2. Introduction to 'Make'

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    'Make' Introduction to 'Make' Introduction The UNIX make utility facilitates the creation and maintenance of executable programs from source code. make keeps track of the commands needed to build the code and when changes are made to a source file, recompiles only the necessary files. make creates and updates programs with a minimum of effort. A small initial investment of time is needed to set up make for a given software project, but afterward, recompiling and linking is done consistently and

  3. Introduction to PGAS Languages

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PGAS Languages Introduction to PGAS Languages Introduction Partitioned Global Address Space Languages (PGAS) provide a parallel programming model based on the assumption that the global memory adress space is logically partitioned with a portion of the memory being assigned to a specific processor. Two common PGAS languages are Unified Parallel C (UPC) and Co-array Fortran (CAF). The first implementation of this tutorial is based on UPC and CAF. This tutorial assumes that you have some

  4. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    all of our reactor designs employ a concurrent engineering approach that addresses the integration of safety, operations, security, and safeguards from the conceptual design level. Capabilities include core design, thermal hydraulics, waste characterization, simulator development, and severe service and accident testing. Design assessments include: safety, security, vulnerability, siting, emergency planning, and fuel cycle impact. organization 6221 serves as a window to sister organizations

  5. Physical Security

    SciTech Connect (OSTI)

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  6. DNS as a Covert Channel Within Protected Networks | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DNS as a Covert Channel Within Protected Networks DNS as a Covert Channel Within Protected Networks This whitepaper discusses ways to detect DNS exfiltration attempts based on current known methods, and provides recommendations for mitigation of this exposure. DNS as a Covert Channel Within Protected Networks (994.64 KB) More Documents & Publications ProActive DNS Blacklisting Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Introduction SCADA Security for

  7. Radiological Security Program | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) ...

  8. Nuclear Security Enterprise | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  9. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  10. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  11. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    computer security Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved

  12. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will serve as a senior staff member of the Office...

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  14. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear Energy

  15. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision Important applications of these capabilities include performing assessment of facility vulnerabilities and resultant consequences of a range of attack scenarios related to nuclear facilities after

  16. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision the capability set needed to address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and systems engineering; and chemistry. In addition, Sandia has a tool set that enhances the ability to perform high level

  17. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  18. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  19. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Two-hundred twenty-five nonprofit organizations receive monetary donations from Los Alamos National Security, LLC September 21, 2015 Recognizing employee and retiree volunteer efforts LOS ALAMOS, N.M., Sept. 21, 2015-More than 225 nonprofit organizations received $162,650 from Los Alamos National Security, LLC, which manages Los Alamos National Laboratory. The LANS contributions are determined by the number of volunteer hours logged by Laboratory employees and retirees through an organization

  20. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  1. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  2. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  3. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  4. Energy-Sector Stakeholders Attend the Department of Energy's...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed (NSTB) partners and Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project-presented DOE-supported efforts involving secured SCADA ...

  5. NSTB Summarizes Vulnerable Areas | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NSTB Summarizes Vulnerable Areas Experts at the National SCADA Test Bed (NSTB) discovered ... Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems ...

  6. Energy Sector Stakeholders Attend the Department of Energy¬タルs...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed (NSTB) partners and Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project- presented DOE-supported efforts involving secured SCADA ...

  7. DOE/ID-Number

    Office of Environmental Management (EM)

    in the energy sector NSTB National SCADA Test Bed Common Cyber Security Vulnerabilities ... of the National Supervisory Control and Data Acquisition (SCADA) Test Bed (NSTB) program. ...

  8. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory Commission and

  9. VOLTTRON: Introduction and History

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction and History JEREME HAACK, SRINIVAS KATIPAMULA, BRANDON CARPENTER, BORA AKYOL Pacific Northwest National Laboratory DOE Building Technologies Office: Technical Meeting on Software Framework for Transactive Energy July 23-24, 2014 July 29, 2014 1 VOLTTRON Team 2 3 Presentation Outline Background and Motivation What is VOLTTRON? Development History DOE Funded Enhancements Open Source VOLTTRON Development Timeline Challenge Approach Impact Bridging operation and planning to enable

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  11. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  14. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  15. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  16. Securing mobile code.

    SciTech Connect (OSTI)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  17. Introduction to High Performance Computing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction to High Performance Computing Introduction to High Performance Computing June 10, 2013 Photo on 7 30 12 at 7.10 AM Downloads Download File Gerber-HPC-2.pdf...

  18. Introduction to Control Part 1

    SciTech Connect (OSTI)

    Scheinker, Alexander

    2015-07-13

    Presentation that offers an introduction to Control Theory, sponsored by the Los Alamos National Laboratory, Low Level RF Control Group.

  19. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science NSS Archive National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Archive National Security Science magazine...

  20. ENERGY SUPPLY SECURITY 2014

    Broader source: Energy.gov (indexed) [DOE]

    Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries Secure Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries ...

  1. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Council Reliable, secure, sustainable carbon energy solutions for the ... new ideas for reliable, secure and sustainable carbon neutral energy solutions for the ...

  2. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  3. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  4. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the computational, physics, and engineering capability spans multiple physics phenomenologies, engineering disciplines, and brings to bear massively parallel processing computational power to solve very complex problems that result in realistic estimates of potential consequences resulting from these types of postulated accidents. the Sar that is developed must go through rigorous external review before it goes to the national Security Council for approval prior to launch. this process provides

  5. Security system

    DOE Patents [OSTI]

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  7. Security Rulemaking

    Office of Environmental Management (EM)

    Securing America's Clean Energy Future The Office of Energy Efficiency and Renewable Energy (EERE) invests in clean energy technologies that strengthen the economy, reduce dependence on foreign oil, and protect the environment. EERE leverages partnerships with the private sector, state and local governments, DOE national laboratories, and universities to transform the nation's economic engine to one powered by clean energy. EERE Programs 2011 Budget (in $ millions) EERE operates with $1.8

  8. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2014-0985P Sandia National Laboratories is introducing a binder- free pelletization process to fabricate industrially relevant pellets of porous catalysts and separations materials. This process enables the implementation of

  9. Nuclear Security Enterprise | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    Nuclear Security Enterprise The Nuclear Security Enterprise ... efficient 21stcentury NSE with less environmental impact. ... is referred to as Stockpile Stewardship and Management. ...

  10. Headquarters Security Quick Reference Book Headquarters Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Directive HSS Office of Health, Safety and Security HQ ... Regulations 707, a negative drug test result is required ... knowledgeable of security policy at HQ. Consult the HQFMSP ...

  11. Briefing, Introduction to Classified Information - June 2014...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction to Classified Information - June 2014 Briefing, Introduction to Classified Information - June 2014 June 2014 This briefing provides an introduction to classified ...

  12. Introduction to Framework | Open Energy Information

    Open Energy Info (EERE)

    Introduction to Framework (Redirected from Introduction to Methodology) Jump to: navigation, search Stage 1 LEDS Home Introduction to Framework Assess current country plans,...

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  14. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W Current work is centered on development of the Supercritical Carbon Dioxide (sCo2) Closed Brayton Cycle. Using supercritical fluids, Brayton Cycles can achieve higher energy conversion efficiencies in 1/100th of the volume and 1/10th the cost of comparable steam rankine cycles. the technology is being demonstrated in the nuclear Energy Systems laboratory/Brayton lab

  15. National Nuclear Security Administration Contractor Governance, IG-0881

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National Nuclear Security Administration Contractor Governance DOE/IG-0881 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 February 19, 2013 MEMORANDUM FOR THE ACTING ADMINISTRATOR, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "National Nuclear Security Administration Contractor Governance" INTRODUCTION Since July

  16. International Nuclear Security | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials, particularly weapons-usable nuclear material in both civilian and non-civilian use in key countries. As part of these efforts, INS works with partner countries to: Upgrade and sustain physical security and material control and accounting systems; Develop national-level nuclear security infrastructure in areas such

  17. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense nuclear security NNSA Announces 2014 Security Professional of the Year Awards WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Pamela Valdez from the Los Alamos Field Office will receive the federal award and Randy Fraser from... Michael Lempke receives NNSA's Gold Medal of Excellence DOE Undersecretary for Nuclear Security and NNSA

  18. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  19. SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... systems in hydroelectric dams; water treatment systems; electric power transmission, distribution, and generation; petroleum storage and refineries; and transportation systems. ...

  20. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... systems in hydroelectric dams; water treatment systems; electric power transmission, distribution, and generation; petroleum storage and refineries; and transportation systems. ...

  1. National SCADA Testbed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab Photovoltaic Systems Evaluation Laboratory PV Regional ... Facility Geomechanics and Drilling Labs National ... Health Monitoring Offshore Wind High-Resolution ...

  2. Introduction: Regional Dialogue Contract Templates

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction: Regional Dialogue Contract Templates October 17, 2007 1. Summary * BPA invites comments on the first draft of the Regional Dialogue Master Template by Friday,...

  3. Introduction to BPA Film Collection

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Information Act Investor Relations Library Privacy Publications Tribal Affairs Introduction to BPA Film Collection: Volume One, Disc One, 1939-1954 An error occurred. Try...

  4. NDRF Introduction & Close-Up

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Event Location Date http:www.fema.govrecoveryframework www.fema.govppd8 http:fema.ideascale.com 2 NDRF Introduction & Close-Up Deborah Ingram Assistant Administrator ...

  5. Job Types | National Nuclear Security Administration | (NNSA...

    National Nuclear Security Administration (NNSA)

    Protection * Civil * Environmental * Electrical Science ... Security * Nuclear Security * Personnel Security * Physical Security * Emergency Management * Intelligence Operations ...

  6. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as

  7. JOTG Video Introduction | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    JOTG Video Introduction JOTG Video Introduction Addthis Description Greeting: Inter-Agency Partnership, Commitment, and Service to the American workers

  8. Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  9. Introduction to Brookhaven National Laboratory

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction to Brookhaven National Laboratory Patrick Looney Department Chair Sustainable Energy Technologies (SET) Global and Regional Solutions Directorate (GARS) STEAB Meeting June 26, 2012 Introduction to BNL * Facts, figures, facilities overview * BNL energy strategy - Building Discovery to Deployment pipelines - Tools for a Smarter Grid - Distributed Generation and Renewables Integration * Meeting sustainability goals through research * Discussion 2 FY 2011 Total Lab Operating Costs: $652

  10. Security for grids

    SciTech Connect (OSTI)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.