National Library of Energy BETA

Sample records for introduction scada security

  1. Introduction SCADA Security for Managers and Operators | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Introduction SCADA Security for Managers and Operators Introduction SCADA Security for Managers and Operators SCADA Test Bed introduction to managers and operators in the field- To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector Introduction SCADA Security for Managers and Operators (8.15 MB) More Documents & Publications Intermediate SCADA Security Training Course Slides

  2. Hallmark Project Commercialization of the Secure SCADA Communications...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Hallmark Project Commercialization of the Secure SCADA ...

  3. Framework for SCADA Security Policy (October 2005)

    Office of Energy Efficiency and Renewable Energy (EERE)

    Modern automation systems used in infrastruc-ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate...

  4. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems ...

  5. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

  6. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  7. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector ...

  8. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of ...

  9. Secure SCADA Communication ProtocolPerformance Test Results | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication

  10. Intermediate SCADA Security Training Course Slides (September 2006) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Intermediate SCADA Security Training Course Slides (September 2006) Intermediate SCADA Security Training Course Slides (September 2006) Presentation for Intermediate SCADA Security, SS-2 SANS SCADA Summit, September 28-29, 2006. The class enabled attendees to develop an understanding of tools and methods that can be used to discover and identify system vulnerabilities (CIP-005 R3.2, CIP-005 R4, & CIP-007 R8); develop mitigation strategies for resolving these issues

  11. Cyber Assessment Methods for SCADA Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition,

  12. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Systems | Department of Energy Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common problem areas. In each vulnerability category, relative measures were assigned to the severity. Lessons Learned from Cyber Security

  13. Framework for SCADA Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Acceptable use policy Account and password policy Configuration management Security ... Accounts and Passwords The account and password policy will describe proper care of ...

  14. Hallmark Project Commercialization of the Secure SCADA Communications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol, a cryptographic security solution for device-to-device communication | Department of Energy Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Increased connectivity and automation in the control systems that manage the nation's energy

  15. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessment at National SCADA Test Bed | Department of Energy and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE)

  16. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E.; Duggan, David P.; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  17. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  18. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  19. National SCADA Test Bed - Enhancing control systems security in the energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    sector (September 2009) | Department of Energy SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA)

  20. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mitigations for Security Vulnerabilities Found in Control System Networks (425.98 KB) More Documents & Publications Cyber Assessment Methods for SCADA Security Introduction SCADA ...

  1. Recommended Practice for Securing Control System Modems | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    KB) More Documents & Publications Intermediate SCADA Security Training Course Slides (September 2006) Introduction SCADA Security for Managers and Operators Mitigations for ...

  2. 21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in

  3. Cyber Assessment Methods for SCADA Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the...

  4. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 2008 | Department of Energy Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise

  5. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify

  6. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  7. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost.

  8. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  9. INL Cyber Security Research (2008) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations Introduction SCADA Security for Managers and Operators

  10. Microsoft Word - PNNL-17118 Secure SCADA hadley SSCP FINAL with no ouo.doc

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8 Secure SCADA Communication Protocol Performance Test Results M.D. Hadley K.A. Huston August 2007 Prepared for U.S. Department of Energy Office of Electricity Delivery and Energy Reliability under Contract DE-AC05-76RL01830 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Battelle Memorial Institute, nor any of their employees, makes any warranty, express or implied,

  11. Sandia Energy - Research and Development of Next Generation Scada...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Next Generation Scada Systems Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric...

  12. SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... How to Partner Small Business Vouchers Pilot at ... Before SCADA, "you had to send people around the plants to ... operational systems in hydroelectric dams; water treatment ...

  13. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...

    Energy Savers [EERE]

    Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have ...

  14. National Supervisory Control and Data Acquisition (SCADA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... HomeStationary PowerSafety, Security & Resilience of Energy InfrastructureGrid ... (SCADA) Test Bed is a DOE Office of Electricity Delivery and Energy Reliability (OE) ...

  15. Microsoft Word - Utilities Form Consortium to Fund SCADA Testing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory ...

  16. SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  17. "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report.

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vol 7 No 8 | Department of Energy "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 Featured in this month's issue of The CIP Report are Supervisory Control and Data Acquisition (SCADA) systems. SCADA systems monitor and control the processes of many of our Nation's infrastructures. The security and safety of transportation, water, communications,

  18. SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Testbeds - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy

  19. National SCADA Test Bed Fact Sheet

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PROTECTING ENERGY INFRASTRUCTURE BY IMPROVING THE SECURITY OF CONTROL SYSTEMS Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA) and distributed control systems (DCS) used to monitor and manage our energy infrastructure. Many of the systems still in use today were designed to operate in

  20. DOE National SCADA Test Bed Program Multi-Year Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed Program Multi-Year Plan DOE National SCADA Test Bed Program Multi-Year Plan This document presents the National SCADA Test Bed Program Multi-Year Plan, a coherent strategy for improving the cyber security of control systems in the energy sector. The NSTB Program is conducted within DOE's Office of Electricity Delivery and Energy Reliability (OE), which leads national efforts to modernize the electric grid, enhance the security and reliability of the energy infrastructure,

  1. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to make decisions as well as human support to maintain the information system. In other words, they were expensive. At the same time, SCADA systems were not as expensive as...

  2. National Supervisory Control and Data Acquisition (SCADA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Supervisory Control and Data Acquisition (SCADA) - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste

  3. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  4. DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy OE National SCADA Test Bed Fiscal Year 2009 Work Plan DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan This document is designed to help guide and strengthen the DOE/OE NSTB program's research and development (R&D) of advance security tools and to heighten awareness among energy sector partners of the more than 30 NSTB projects underway in FY2009. DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan (260.95 KB) More Documents & Publications National SCADA Test

  5. National SCADA Test Bed

    Broader source: Energy.gov [DOE]

    The National SCADA Test Bed (NSTB) is a one-of-a-kind national resource that draws on the integrated expertise and capabilities of the Argonne, Idaho, Lawrence Berkeley, Los Alamos, Oak Ridge, Pacific Northwest, and Sandia National Laboratories to address the cybersecurity challenges of energy delivery systems.

  6. Real-Time SCADA Cyber Protection Using Compression Techniques

    SciTech Connect (OSTI)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

  7. Production Facility SCADA Design Report

    SciTech Connect (OSTI)

    Dale, Gregory E.; Holloway, Michael Andrew; Baily, Scott A.; Woloshun, Keith Albert; Wheat, Robert Mitchell Jr.

    2015-03-23

    The following report covers FY 14 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production facility. The goal of this effort is to provide Northstar with a baseline system design.

  8. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Documents Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control...

  9. ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) This document covers the security evaluation of the "baseline" or "as delivered" system performed in the Idaho National Engineering and Environmental Laboratory (INEEL) SCADA test bed as part of the Critical Infrastructure Test Range Development Program, which is funded by the U.S. Department of Energy; Office of

  10. A Nuclear Family: Extras - Introduction | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... A Nuclear Family: Extras - Introduction The mp4 video format is not supported by this browser. Download video Captions: On Time: 6:59 min. D. Ray Smith, Y-12 historian,...

  11. Sandia Energy - SCADA FAQs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FAQs Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control and...

  12. Introduction to SCADA Protection and Vulnerabilities

    SciTech Connect (OSTI)

    Ken Barnes; Briam Johnson; Reva Nickelson

    2004-03-01

    Even though deregulation has changed the landscape of the electric utility industry to some extent, a typical large electric utility still owns power generation facilities, power transmission and distribution lines, and substations. Transmission and distribution lines form the segments or spokes of a utility’s grid. Power flow may change through these lines, but control of the system occurs at the nodes of the grid, the generation facilities, and substations. This section discusses each of these node types in more detail as well as how each is controlled.

  13. Introduction to SCADA Protection and Vulnerabilities (Technical...

    Office of Scientific and Technical Information (OSTI)

    large electric utility still owns power generation facilities, power transmission and ... of the system occurs at the nodes of the grid, the generation facilities, and substations. ...

  14. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    SciTech Connect (OSTI)

    Marco Carvalho; Richard Ford

    2012-05-14

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

  15. SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  16. SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering Solutions - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  17. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  18. Good Practice Guide on Firewall Deployment for SCADA and Process...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks In recent years, ...

  19. National SCADA Test Bed Substation Automation Evaluation Report...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: National SCADA Test Bed Substation Automation Evaluation Report Citation Details In-Document Search Title: National SCADA Test Bed Substation Automation ...

  20. National SCADA Test Bed Substation Automation Evaluation Report...

    Office of Scientific and Technical Information (OSTI)

    National SCADA Test Bed Substation Automation Evaluation Report Citation Details In-Document Search Title: National SCADA Test Bed Substation Automation Evaluation Report You ...

  1. Review of Supervisory Control and Data Acquisition (SCADA) Systems...

    Office of Scientific and Technical Information (OSTI)

    Review of Supervisory Control and Data Acquisition (SCADA) Systems Citation Details In-Document Search Title: Review of Supervisory Control and Data Acquisition (SCADA) Systems ...

  2. "Supervisory Control and Data Acquisition (SCADA) Systems." The...

    Energy Savers [EERE]

    "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 ...

  3. SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program Overview - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear

  4. Metrics for the National SCADA Test Bed Program

    SciTech Connect (OSTI)

    Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

    2008-12-05

    The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

  5. The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab Photovoltaic Systems Evaluation Laboratory PV Regional ... Facility Geomechanics and Drilling Labs National ... Health Monitoring Offshore Wind High-Resolution ...

  6. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

  7. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    SciTech Connect (OSTI)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  8. Introduction

    Office of Environmental Management (EM)

    Introduction After the Office of Environmental Management (EM) completes environmental cleanup at a site which continues to have a Department of Energy (DOE) mission, EM transfers...

  9. Introduction

    National Nuclear Security Administration (NNSA)

    ... two gun turrets at either end of the facility provide extended security at the DAF. environmental testing and the other for observing operations in an adjacent assembly cell. ...

  10. National SCADA Test Bed | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Created in 2003, the National SCADA Test Bed (NSTB) is a one-of-a-kind national resource ... In December 2012, the lab successfully demonstrated QKD on the University of Illinois test ...

  11. Sandia Energy - SCADA Training Courses

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Courses Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory...

  12. Introduction

    National Nuclear Security Administration (NNSA)

    January 2011 For more information, contact: U.S. Department of Energy National Nuclear Security Administration Nevada Site Office Office of Public Affairs P.O. Box 98518 Las Vegas,...

  13. Introduction

    National Nuclear Security Administration (NNSA)

    March 2010 For more information, contact: U.S. Department of Energy National Nuclear Security Administration Nevada Site Office Office of Public Affairs P.O. Box 98518 Las Vegas,...

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nonproliferation Test and Evaluation Complex (NPTEC) is the world's largest facility for open air testing of hazardous toxic materials and biological simulants. It is located at the Nevada National Security Site on Frenchman Flat, a natural geological basin approximately 75 miles northwest of Las Vegas. The topography, wind predictability, and location provide a secure, controlled environment for small and large-scale testing, which is governed by an approved Environmental Assessment. An

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Criticality Experiments Research Center (NCERC) is located at the Nevada National Security Site (NNSS) and operated by Los Alamos National Laboratory (LANL). NCERC maintains a substantial special nuclear material (SNM) inventory and expertise to support a variety of nuclear security missions, including nuclear criticality safety research and training, nuclear emergency response, nuclear nonproliferation, and support for other Government Agencies that require hands-on access to

  16. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    December 18, 1950, President Harry S. Truman authorized the establishment of a continental testing site on a 680-square mile section of the Nellis Air Force Gunnery and Bombing Range. First known as the Nevada Proving Grounds, it officially became the Nevada Test Site in 1955, opening the door to an atomic age that not only affected national security, but national culture as well. Today it is known as the Nevada National Security Site (NNSS). Testing Captures America's Attention The Ranger test

  17. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    December 18, 1950, President Harry S. Truman authorized the establishment of a continental testing site on a 680-square mile section of the Nellis Air Force Gunnery and Bombing Range. First known as the Nevada Proving Grounds, it officially became the Nevada Test Site in 1955, opening the door to an atomic testing age that not only affected national security, but national culture as well. Today it is called the Nevada National Security Site (NNSS). The Ranger test series At the commencement of

  18. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Prehistoric cultural resources are abundant on the Nevada National Security Site (NNSS), formerly know as the Nevada Test Site (NTS), indicating Native Americans occupied the region for more than 10,000 years. Historic artifacts from the late nineteenth and early twentieth centuries are also present, reflecting use by miners, ranchers, and settlers who traveled through the area. The U.S. Department of Energy National Nuclear Security Administration Nevada Field Office (NNSA/NFO) is committed to

  19. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    To increase the domestic preparedness to combat terrorist threats, the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Offce (NNSA/NFO) provides a unique radiological/nuclear weapons of mass destruction (WMD) training center at the Nevada National Security Site (NNSS), located 65 miles northwest of Las Vegas, Nevada. At the NNSS, emergency responders are trained to take immediate, decisive actions in response to terrorist use of radiological or nuclear WMDs, such

  20. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    do Ruth, Dixie, Shasta, Butternut, Seersucker, and Mink all have in common? They were all names of nuclear tests conducted at the Nevada Test Site (NTS), now known as the Nevada National Security Site (NNSS), between 1951 and 1962. A total of 928 atmospheric and underground nuclear tests was conducted at the NTS, and each of those tests was christened with a name. Background Beginning with Trinity, the first atomic test in 1945, nuclear tests were all assigned code names as a security measure

  1. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    52 feet tall, it remains a well-known, highly visible landmark at the Nevada National Security Site (NNSS). It is the modular tower built for Icecap, a joint United Kingdom, Los Alamos National Laboratory underground nuclear test scheduled for the spring of 1993. What was scheduled to be the 929th test came to a halt when President Bush signed the Underground Nuclear Testing Moratorium on October 3, 1992. The tower still remains in Area 7 of the Nevada National Security Site. The Icecap tower

  2. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Starting in 1951, thousands of military personnel from all four U.S. military services received orders to serve with the U.S. Army's Atomic Maneuver Battalion working at Camp Desert Rock at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). A Step Back in Time It is hard to imagine that in the 1950s the Nevada National Security Site host- ed a bustling military camp full of young soldiers, marines, sailors and airmen who were to witness the heat and blast of the

  3. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Technical Reference on Hydrogen Compatibility of Materials Introduction Prepared by: C. San Marchi, Sandia National Laboratories, Livermore CA Editors C. San Marchi B.P. Somerday Sandia National Laboratories This report may be updated and revised periodically in response to the needs of the technical community; up-to-date versions can be requested from the editors at the address given below or downloaded at http://www.ca.sandia.gov/matlsTechRef/. The content of this report will also be

  4. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    x Introduction April 1, 2011 - March 31, 2012 Progress in research and operations at the Texas A&M Cyclotron Institute is summarized in this report for the period April, 1, 2011 through March 31, 2012. The format follows that of previous years. Sections I through IV contain reports from individual research projects. Operation and technical developments are given in Section V. Section VI lists the publications with Cyclotron Institute authors and the Appendix gives additional information

  5. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ix Introduction April 1, 2012 - March 31, 2013 Progress in research and operations at the Texas A&M Cyclotron Institute is summarized in this report for the period April, 1, 2012 through March 31, 2013. The format follows that of previous years. Sections I through III contain reports from individual research projects. Operation and technical developments are given in Section IV. Section V lists the publications with Cyclotron Institute authors and the Appendix gives additional information

  6. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    xi Introduction April 1, 2013 - March 31, 2014 Progress in research and operations at the Texas A&M Cyclotron Institute is summarized in this report for the period April, 1, 2013 through March 31, 2014. The format follows that of previous years. Sections I through III contain reports from individual research projects. Operation and technical developments are given in Section IV. Section V lists the publications with Cyclotron Institute authors and outside users and the Appendix gives

  7. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction to the Open Source PV LIB for Python Photovoltaic System Modelling Package Robert W. Andrews 1 , Joshua S. Stein 2 , Clifford Hansen 2 , and Daniel Riley 2 1 Calama Consulting, Toronto, Ontario, M5T1B3, Canada 2 Sandia National Laboratories, Albuquerque, NM, 87185, USA Abstract-The proper modeling of Photovoltaic(PV) systems is critical for their financing, design, and operation. PV LIB provides a flexible toolbox to perform advanced data analysis and research into the performance

  8. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Public Involvement Survey - 2 2012 Hanford Public Involvement Survey - 3 Introduction The Tri-Party Agreement (TPA) agencies - U.S. Department of Energy (DOE), U.S. Environmental Protection Agency, and the Washington State Department of Ecology - work together on cleanup of the Hanford Site. Hanford is a 586-square-mile site in southeastern Washington created in 1943 as part of the Manhattan Proj- ect to produce plutonium for nuclear weapons. The production mission ended in the late 1980s. More

  9. Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Introduction Advances in manufacturing technologies, including modular construction, improved factory and field fabrication and other innovative construction technologies, are essential to the future of nuclear energy. They are strategically important to the economics of new nuclear power plant construction in the United States and to the competitiveness of the U.S. in the nuclear energy market. In 2012, the Nuclear Energy Enabling Technologies (NEET) Program was initiated by the Department of

  10. Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction Instrumentation and controls are used in commercial nuclear energy and fuel cycle systems to measure important system parameters, provide control input to components that maintain systems within desired and safe limits, and provide owners and operators with the needed awareness of plant conditions to plan and safely manage operational evolutions. In a sense, instrumentation and control (I&C) systems function as the nervous system of a nuclear power plant and other nuclear

  11. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Construction began on the Device Assembly Facility (DAF) in the mid-1980s to support underground nuclear testing. DAF was designed and built to consolidate all nuclear explosive assembly functions, to provide safe structures for high explosive and nuclear explosive assembly operations, and to provide a state-of-the-art safeguards and security environment. Now that the United States is under a continuing nuclear testing moratorium, the DAF now provides support for Stockpile Stewardship

  12. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1992, the President of the United States placed a moratorium on underground nuclear weapons testing. As a result, alternate experimental methods for certifying the nation's nuclear weapons stockpile were implemented. Among these experimental methods was the Joint Actinide Shock Physics Experimental Research (JASPER) Facility, located at the Nevada National Security Site. JASPER plays an integral role in the certification of the nation's nuclear weapons stockpile by provid- ing a method to

  13. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    U1a facility is an underground laboratory used for subcritical experiments; physics experiments that are used to obtain technical information about the U.S. nuclear weapons stockpile. These experiments support the U.S. Department of Energy, National Nuclear Security Administration's (NNSA) Stockpile Stewardship Programs, created to maintain the safety and reliability of the U.S. nuclear weapons stockpile. The U1a borehole was originally excavated in the 1960s for an underground nuclear test that

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Big Explosives Experimental Facility (BEEF) is a hydrodynamic testing facility, located at the Nevada National Security Site (NNSS), about 65 miles northwest of Las Vegas. BEEF provides data, through explosive experiments, to support the Stockpile Stewardship Program, along with a variety of new experimental programs that expand the nation's non-nuclear experiment capabilities. History When the U.S. Department of Energy's Lawrence Livermore National Laboratory (LLNL) facility in Livermore,

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    mid-1950s the United States launched a nuclear rocket program called Project Rover. The Atomic Energy Commission (AEC) and the National Aeronautics and Space Administration's (NASA) Space Nuclear Propulsion Office jointly administered the test area, later called the Nuclear Rocket Development Station (NRDS) in Area 25 of the Nevada Test Site (now known as the Nevada National Security Site (NNSS)). NRDS was a sprawling complex composed of test cells and assembly buildings. Connecting these

  16. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Between 1951 and 1992, 828 underground nuclear tests were conducted in specially drilled vertical holes, vertical shafts, and horizontal tunnels at the Nevada Test Site, now known as the Nevada National Security Site (NNSS). Most vertical shaft tests assisted in the development of new weapon systems. Horizontal tunnel tests occurred to evaluate the effects (radiation, ground shock) of various weapons on military hardware and systems. Background Between 1951 and 1963, a total of 100 atmospheric

  17. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Since the beginning of the industrial revolution the amount of carbon dioxide (CO 2 ) in the atmosphere has risen sharply and has the potential to dramatically affect global climate. It is important to determine how deserts and semiarid lands, which comprise nearly 40 percent of the Earth's land mass, will respond to the effects of this increase in CO 2 and related climate change. Collaborative ecological studies are being conducted at the Nevada National Security Site (NNSS), formerly known as

  18. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    work at the Nevada National Security Site (NNSS), formerly known as the Nevada Test Site (NTS), requires the use of underground tunnels and shafts. In order to provide the safest work environment possible for NNSS workers, Mine Rescue Teams (MRTs) are required to ensure proper rescue services in an emergency situation. Background The MRTs must comply with Mine Safety and Health Administration (MSHA) requirements and with stipulations that include a requirement for a minimum of two MRTs to be

  19. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    During the height of operations in the 1960s, the Jackass & Western Railroad, located in Area 25 of the Nevada National Security Site (NNSS), formerly know as the Nevada Test Site (NTS), was the shortest and slowest operating railroad in the United States. However, it was the railroad's important mission that made it such: the railroad trans- ported research reactors, NERVA reactors/ nuclear engines, and equipment between facilities at the NTS Nuclear Rocket Development Station (NRDS) in

  20. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nevada National Security Site (NNSS) provides a unique and indispensable extension of the national laboratories' experimental capabilities in support of the Stockpile Stewardship Program. In addition to ongoing environmental cleanup of historic nuclear research and testing areas on the NNSS, non-defense research and development activities are conducted in cooperation with universities, industries, and other federal agencies. In the beginning After the first nuclear test at the Trinity Site in

  1. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Five of the first six nuclear tests conducted by the United States occurred in the far reaches of the Pacific Ocean. Almost immediately, scientists and military planners discovered that logistics, weather, security and safety concerns required the need for a continental test site. The effort of transporting, supplying and housing a nuclear test task force in the middle of the Pacific was more than originally anticipated. In addition to the communist insurgency in Korea, the need for a

  2. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    For more than 50 years, the Nevada Test Site, now known at the Nevada National Security Site (NNSS), has been used as a test bed for a multitude of scientific projects, among which was the Supersonic Low-Altitude Missile (SLAM). The concept was a revolutionary new type of propulsion originated at Lawrence Radiation Laboratory, which eventually became Lawrence Livermore National Laboratory: nuclear ramjet power. Project Pluto was the code name for the project, which also referred to the weapon

  3. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Before Neil Armstrong stepped foot on the moon on July 20, 1969, Armstrong, and astronauts Dick Gordon, Buzz Aldrin, Dave Scott, and Russell "Rusty" Schweikart left their footprints on the Nevada Test Site, now known as the Nevada National Security Site (NNSS) as part of their lunar training. Training Mission Their three-day visit began on February 16, 1965. It was the first training mission by a group of astronauts from the National Aeronautics and Space Administration (NASA). Their

  4. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    earliest media reports of atmospheric nuclear testing in Nevada were based on eyewitness accounts. News reporters considered it a sign of importance when invited to watch detonations from News Nob, a large pile of volcanic tuff situated on the edge of Yucca Lake at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). Thousands of newsmen trekked to observe and write about atomic mushroom clouds billowing above the desert of Nevada in the 1950s. Their articles were eagerly

  5. Introduction

    Office of Environmental Management (EM)

    The idea to use atomic energy to propel a rocket for interplanetary travel originated in 1906 when American space pioneer Robert Goddard, a college sophomore, wrote a paper on the use of atomic energy. The concept moved from theory to reality in the mid-1950s when the United States launched a nuclear rocket program called Project Rover. A nuclear reactor and test engines were located in the southwest corner of the Nevada Test Site, now known at the Nevada National Security Site (NNSS). The

  6. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    rare occasions, vertical drill holes have been used for effects tests at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). Huron King was a Vertical Line of Site (VLOS) underground test conducted at the Nevada Test Site on June 24, 1980 by the Defense Nuclear Agency, now the Defense Threat Reduction Agency (DTRA), U.S. Department of Defense. Background DTRA, in cooperation with the U.S. Department of Energy, and its predecessor, the Atomic Energy Commission, began

  7. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mercury, Nevada, a town 65 miles northwest of Las Vegas, is the gateway to the Nevada Test Site (NTS), now known at the Nevada National Security Site (NNSS). There is no evidence as to how Mercury was named, but legend says that an unknown miner worked in the Calico Hills in the 1850s mining mercury- bearing ore. His route of travel became known as the Mercury Road, and the area surrounding it became known as Mercury. Almost one hundred years later the Atomic Energy Commission (AEC) built

  8. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The desert temperature hovered at 90 degrees Fahrenheit the morning of July 17, 1962 at the Nevada Test Site (NTS), now known at the Nevada National Security Site (NNSS). Eventually the beating sun would increase the heat to over 105 degrees later that day, but at 10:00 a.m., a crowd of 396 spectators braved the scorching temperature and relentless sun to witness the last atmospheric test ever conducted by the United States. The crowd gathered in Area 18 of the NTS, approximately two miles from

  9. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Larger than the state of Rhode Island, the Nevada National Security Site (NNSS) occupies approximately 1,375-square miles (approximately 880,000 acres) in southern Nevada, making it one of the largest restricted-access areas in the United States. The NNSS is surrounded by approximately 6,500 square miles of federal land used for the U.S. Air Force Nevada Test and Training Range, and the Desert National Wildlife Refuge. Located approximately 65 miles northwest of Las Vegas, the NNSS is vast,

  10. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Age spanned from the 1940s through the 1990s. Key occurrences during that period, including events that precipitated the era and crucial milestones along the way, are documented in this timeline. An important part of the nuclear age occurred at the Nevada Test Site (NTS), now known as the Nevada National Security Site (NNSS). Between 1951 and 1992 a total of 928 nuclear tests were conducted at the NTS, 828 of which were underground. A total of 126 nuclear tests were conducted at other

  11. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    idea to use atomic energy to propel a rocket for interplanetary travel originated in 1906 when American space pioneer Robert Goddard, a college sophomore, wrote a paper on the use of atomic energy. The concept moved from theory to reality in the mid-1950s when the United States launched a nuclear rocket program called Project Rover. A nuclear reactor and test engines were located in the southwest corner of the Nevada Test Site, now known at the Nevada National Security Site (NNSS). The Atomic

  12. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    first nationally televised nuclear shot, "Annie" was conducted on March 17, 1953. Annie was also part of a civil effects test named Operation Cue, conducted by the Federal Civil Defense Administration (FCDA). On May 5, 1955 a 29-kiloton device named Apple 2 was detonated from a 500- foot tower on Yucca Flat at the Nevada Test Site, now known at the Nevada National Security Site (NNSS), approximately 65 miles northwest of Las Vegas. It was the second nationally televised nuclear test

  13. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    527 feet, the BREN (Bare Reactor Experiment -- Nevada) Tower was the largest free- standing structure west of the Mississippi River. It was also one of the best known and most visible landmarks at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). It was taller than the Empire State Building (1,454 feet, to top of lightening rod) and almost twice as tall as the Eiffel Tower (1,063 feet, with antenna). It was constructed of 51 thirty-foot sections of high tensile steel

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    July 26, 1957, a safety experiment called Pascal-A was detonated in an underground hole at the Nevada Test Site (NTS), now known as the Nevada National Security Site (NNSS). The test, although successful, brought the issue of drilling to the forefront. The need to drill large-diameter holes at the NTS resulted from the Limited Test Ban Treaty (LTBT), signed by President John F. Kennedy in Moscow on August 5, 1963. The LTBT prohibited testing nuclear weapons in the atmosphere, underwater, and in

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    May 25, 1953, during the Operation Upshot-Knothole test series at the Nevada Test Site, now known at the Nevada National Security Site (NNSS), a milestone occurred in ordnance development. A 280-mm cannon, nicknamed Atomic Annie, fired the first and last nuclear projectile as part of the Grable test. The MK-9 artillery shell was propelled a distance of seven miles. It exploded in the air and had a yield of 15 kilotons (15,000 tons of TNT). Deployment Two 280-mm cannons were shipped by rail from

  16. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    diverse and complex mosaic of plant and animal communities are found at the Nevada National Security Site. Representative of both the Mojave and Great Basin deserts, approximately 1,500 ani- mal species, including 924 species of insects, and 750 different kinds of plants are documented at the site. The varying elevations and climatic conditions at the test site contribute to the distribution of plant and animal communities. On the south end of the site, Jackass Flats lies at a low 2,688 feet

  17. U.S. DOE/OE National SCADA Test Bed Supports | Department of...

    Energy Savers [EERE]

    U.S. DOEOE National SCADA Test Bed Supports U.S. DOEOE National SCADA Test Bed Supports To help advance the U.S. Department of Energy (DOE) National SCADA Test Bed's (NSTB) ...

  18. Use of SCADA Data for Failure Detection in Wind Turbines

    SciTech Connect (OSTI)

    Kim, K.; Parthasarathy, G.; Uluyol, O.; Foslien, W.; Sheng, S.; Fleming, P.

    2011-10-01

    This paper discusses the use of existing wind turbine SCADA data for development of fault detection and diagnostic techniques for wind turbines.

  19. Visualizing Wind Farm Wake Losses using SCADA Data

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Continuous Reliability Enhancement for Wind Visualizing Wind Farm Wake Losses using SCADA ... the Department of Energy's Continuous Reliability Enhancement for Wind (CREW) project. ...

  20. Lemnos Interoperable Security Program (May 2008) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lemnos Interoperable Security Program (May 2008) Lemnos Interoperable Security Program (May 2008) Creating common language and metrics for describing functions of network security tools and testing for interoperability Lemnos Interoperable Security Program (May 2008) (839.28 KB) More Documents & Publications Lemnos Interoperable Security SECURITY CORE FUNCTION AND DEFINITION REPORT DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan

  1. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program ...

  2. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) Working to Achieve Cybersecurity in the Energy Sector Introduction SCADA ...

  3. Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  4. Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

    2006-01-01

    We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

  5. Intelligent devices simplify remote SCADA installations in substations

    SciTech Connect (OSTI)

    Kopriva, V.J.

    1994-12-31

    Utilities are increasingly relying on Supervisory Control and Data Acquisition (SCADA) Systems for the effective and economical management of electric transmission and distribution systems. Now, advances in equipment and design technologies have created opportunities for an increased level of monitoring and control at electric power substations. In the past, prohibitive factors, including complicated equipment and wiring retrofits, protocol compatibility, and hardware installation and maintenance costs have impeded electric utilities in their attempt at broad based application of SCADA systems in electric substations, particularly at distribution voltage levels. These advances in equipment technologies have provided utilities with the opportunity to install and operate SCADA systems at lower cost, while providing flexibility for system expansion over longer periods. The development of intelligent microprocessor controlled devices and integrated communications has facilitated the use of a distributed design approach to installing SCADA monitoring and control in substations. This approach offers greater hardware flexibility and reduced installation costs while increasing reliability, making the addition of monitoring and control to electric substations increasingly practical. This paper will examine current trends in the application of intelligent microprocessor controlled and electronic devices, in stand alone and distributed applications, and the simplification of techniques for installing SCADA systems in substations. It will also consider the potential advantages to be realized in cost and reliability, and examine the necessary changes in design and operation philosophies required to effectively implement the new technology.

  6. Lessons Learned from Cyber Security Assessments of SCADA and...

    Energy Savers [EERE]

    ... from binary executables or configuration files; password protection policies were weak. ... credential information, or store password hashes instead of plain text passwords H ...

  7. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  8. Strengthening Cyber Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector from cyber attack Strengthening Cyber Security (587.96 KB) More Documents & Publications Considering Cumulative Effects Under the National Environmental Policy Act (CEQ, 1997) Vision for 2025: A Framework for Change ITP Aluminum: Technical Working Group on Inert Anode Technologies

  9. Basic SCADA systems - from the sensors to the screen

    SciTech Connect (OSTI)

    Merlie, B.

    1995-12-01

    Supervisory Control and Data Acquisition (SCADA) Systems are specialized control systems used to monitor and control facilities which are geographically dispersed. They are commonly used in the gas, oil, electric, and water transmission and distribution industries. SCADA systems differ from other control systems in that they make extensive use of remote communications and are more tolerant to outages of the communications network than a typical control system installation in a plant environment. A basic SCADA system can be broken into five functional parts. These are: (1) Sensors and Actuators; (2) Remote Terminal Units (RTUs); (3) Communications Facilities; (4) Host Computer Systems; and (5) User Interfaces While the fundamental concepts of SCADA systems have changed little in the past 20 years, more sophisticated hardware and software has altered some of the traditional paradigms associated with these control systems. This is particularly true with respect to RTUs, host computer systems, and user interfaces. While this paper will focus on the fundamentals, it will attempt to provide the reader with current trends in the industry where applicable.

  10. Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks

    Office of Energy Efficiency and Renewable Energy (EERE)

    In recent years, Supervisory Controls and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial information technologies for both...

  11. Parris Island Wastewater Treatment Plant SCADA Upgrades Final Report

    SciTech Connect (OSTI)

    Meador, Richard J.; Hatley, Darrel D.

    2004-03-18

    Marine Corp Recruit Depot (MCRD), Parris Island, SC, home of the Easter Recruiting Region Marine Corp Boot Camp, found itself in a situation common to Department of Defense (DOD) facilities. It had to deal with several different types of installed energy-related control systems that could not talk to each other. This situation was being exacerbated by the installation of a new and/or unique type of control system for every new building being constructed or older facility that was being upgraded. The Wastewater Treatment Facility (WWTF) and lift station controls were badly in need of a thorough inspection and a new Supervisory Control and Data Acquisition (SCADA) system upgrade to meet environmental, safety, manpower, and maintenance concerns. A project was recently completed to implement such a wastewater treatment SCADA upgrade, which is compatible with other upgrades to the energy monitoring and control systems for Parris Island buildings and the Pacific Northwest National Laboratory (PNNL) Decision Support for Operations and Maintenance (DSOM) system installed at the Central Energy Plant (CEP). This project included design, specification, procurement, installation, and testing an upgraded SCADA alarm, process monitoring, and display system; and training WWTF operators in its operation. The ultimate goal of this and the other PNNL projects at Parris Island is to allow monitoring and control of energy and environmental components from a central location.

  12. Supervisory Control and Data Acquisition System (SCADA) Substation C3-3 Acceptance Test Procedure

    SciTech Connect (OSTI)

    ZAKRAJSEK, M.F.

    2000-10-17

    The purpose of this acceptance test procedure (ATP) is to demonstrate that the newly installed Supervisory Control and Data Acquisition (SCADA) computer system functions as intended by the design.

  13. OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts In recent years, Supervisory Control and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial Information Technologies (IT) such as Ethernet(tm), Transmission Control Protocol/Internet Protocol (TCP/IP) and Windows® for both critical and non-critical communications. This has made the interfacing

  14. Advanced Supervisory Control and Data Acquisition (SCADA) for Biochemical Process Integration Presentation for BETO 2015 Project Peer Review

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Supervisory Control and Data Acquisition (SCADA) for Biochemical Process Integration 2/26/2015 Biochemical Platform Review Jim Collett Pacific Northwest National Laboratory This presentation does not contain any proprietary, confidential, or otherwise restricted information Goal Statement * The Challenge: Hydrocarbon biofuel production will require advanced supervisory control and data acquisition (SCADA) systems for bioconversion of highly variable biomass feedstocks with high levels of

  15. Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding

    SciTech Connect (OSTI)

    Yan, Guanhua; Nicol, David M; Jin, Dong

    2010-12-16

    The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

  16. Development and Demonstration of a Security Core Component

    SciTech Connect (OSTI)

    Turke, Andy

    2014-02-28

    In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more data about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from

  17. Secure Control Systems for the Energy Sector

    SciTech Connect (OSTI)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  18. Multiple Flow Loop SCADA System Implemented on the Production Prototype Loop

    SciTech Connect (OSTI)

    Baily, Scott A.; Dalmas, Dale Allen; Wheat, Robert Mitchell; Woloshun, Keith Albert; Dale, Gregory E.

    2015-11-16

    The following report covers FY 15 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production prototype gas flow loop. The goal of this effort is to expand the existing system to include a second flow loop with a larger production-sized blower. Besides testing the larger blower, this system will demonstrate the scalability of our solution to multiple flow loops.

  19. National SCADA Test Bed Substation Automation Evaluation Report

    SciTech Connect (OSTI)

    Kenneth Barnes; Briam Johnson

    2009-10-01

    Increased awareness of the potential for cyber attack has recently resulted in improved cyber security practices associated with the electrical power grid. However, the level of practical understanding and deployment of cyber security practices has not been evenly applied across all business sectors. Much of the focus has been centered on information technology business centers and control rooms. This report explores the current level of substation automation, communication, and cyber security protection deployed in electrical substations throughout existing utilities in the United States. This report documents the evaluation of substation automation implementation and associated vulnerabilities. This evaluation used research conducted by Newton-Evans Research Company for some of its observations and results. The Newton Evans Report aided in the determination of what is the state of substation automation in North American electric utilities. Idaho National Laboratory cyber security experts aided in the determination of what cyber vulnerabilities may pose a threat to electrical substations. This report includes cyber vulnerabilities as well as recommended mitigations. It also describes specific cyber issues found in typical substation automation configurations within the electric utility industry. The evaluation report was performed over a 5-month period starting in October 2008

  20. Fact Sheet: Cyber Security Audit and Attack Detection Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... National SCADA Test Bed Screenshot from NESSUS Vulnerability Scanner Technical Objectives ... DOE National SCADA Test Bed (NSTB) NSTB is a multi-laboratory resource that partners with ...

  1. SLURM Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    distinct products to provide both job scheduling and resource management (TorqueMOAB). ... SLURM provides equivalent or similar functionality with TorqueMoab. A brief introduction ...

  2. Attendee Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D Radiological Laboratory Utility Office Building (RLUOB) Equipment Installation (REI) Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's

  3. Chapter I: Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    30 QER Report: Energy Transmission, Storage, and Distribution Infrastructure | April 2015 Chapter I: Introduction QER Report: Energy Transmission, Storage, and Distribution Infrastructure | April 2015 2-1 Chapter II This chapter addresses a broad range of challenges to the resilience, reliability, safety, and asset security of transmission, storage, and distribution (TS&D) and shared infrastructures. The challenges vary among different types of TS&D infrastructure and among different

  4. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  5. Hierarchical EMS/SCADA system, Magyar Villamos Muevek Ttroeszt, Hungarian Electricity Board, feasibility study report. Export trade information

    SciTech Connect (OSTI)

    Not Available

    1991-10-01

    The report concludes a feasibility and requirements study for the Hungarian Eectricity Board (MVMT) to upgrade MVMT's nationwide, hierarchical Energy Management System/Supervisory Control and Data Acquisition (EMS/SCADA) system. The study has resulted in a time-phased implementation plan for the recommended cost-effective solutions, with the associated project schedules and budgetary cost estimates. Specific recommendations are presented for the following closely related implementation projects: The upgrading of an existing EMS in the National Dispatch Center (NDC) including the associated remote facilities at major substations and power plants; The modernization or replacement of the existing SCADA systems and/or implementation of new systems at the regional electric power companies; and The expansion and upgrading of the data communication network that will be required to connect and support the nationwide EMS/SCADA facilities.

  6. Introduction - JCAP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hero Image ©bobpaz.com0082.JPG Research Research Introduction Thrusts Library Resources Research Introduction Why Solar Fuels? Goals & Objectives Thrusts Thrust 1 Thrust 2 Thrust 3 Thrust 4 Library Publications Research Highlights Videos Resources User Facilities Expert Team Benchmarking Database Device Simulation Tool XPS Spectral Database JCAP seeks to discover new ways to produce hydrogen and carbon-based fuels using only sunlight, water and carbon dioxide as inputs Why Solar FuELs?

  7. Cyber Security Procurement Language for Control Systems Version 1.8 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply

  8. ADA/SCADA RTU protocol based on the 3-layer UCA model

    SciTech Connect (OSTI)

    Adamo, V.P.

    1995-12-31

    This paper describes an implementation of a DA/SCADA RTU communication protocol based on the 3-layer reference model for wide area networks specified in the Utility Communications Architecture (UCA) VL1.0. This protocol is based on the following international standards: EIA-232-D, High-level Data Link Control (HDLC) [ISO/IEC 3309], and Manufacturing Message Specification (MMS) [ISO/IEC 95061]. A description of the HDLC frame structure used in this implementation is provided. This includes a description of the extended transparency option for Start/Stop transmission, commonly referred to as {open_quotes}asynchronous HDLC{close_quotes}. This option allows for the transmission of HDLC frames using inexpensive asynchronous communication hardware. The data link topology described in this paper is an unbalanced, point-to-multipoint topology consisting of one primary, or, master station, and multiple secondary, or remote, stations. The data link operates in the Normal Response Mode (NRM). In this mode a secondary station may initiate transmissions only as a result of receiving explicit permission to do so from the primary station. The application layer protocol described in this paper is an implementation of the Manufacturing Message Specification (MMS). The MMS device model, or Virtual Manufacturing Device (VMD), for a DA/SCADA Remote Terminal Unit is provided. The current VMD model provides a view of common RTU data types, plus, A/C Input (ACI) data including phasor magnitude and mean readings, harmonics, and overcurrent alarm information.

  9. OIC Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OIC Introduction David McCall Chair - OIC Liaison Task Group Senior Strategic Planner - Intel Corporation Constrained Devices The Internet of Things 2 Data Centers Cloud Rich Devices Rich Devices / Gateways IoT Evolution 3 Cloud / Data Centres Rich Devices / Gateways Constrained Devices Time Isolated Aggregated Cloud Native IoT Standards Applications & Services Data & Control Points Comms Protocols Transports Profiles, Data & Resource Models Apps and services deliver the value of IoT

  10. Attendee Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    U N C L A S S I F I E D Deep Borehole - UFDC - 2016 - Las Vegas The Role of Zeolite Phase Transformations in Deep Borehole Seals CAPORUSCIO, F., NORSKOG, K., MANER, J. LOS ALAMOS NATIONAL LABORATORY UNIVERSITY OF OKLAHOMA Slide 1 Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D Slide 2 U.S. Used Fuel Disposition Campaign Deep boreholes Program * Use mine-run, unpurified bentonite and highly saline brines * Investigate chemical

  11. Secure VM for Monitoring Industrial Process Controllers

    SciTech Connect (OSTI)

    Dasgupta, Dipankar; Ali, Mohammad Hassan; Abercrombie, Robert K; Schlicher, Bob G; Sheldon, Frederick T; Carvalho, Marco

    2011-01-01

    In this paper, we examine the biological immune system as an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process. The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its artificial counterpart. Our study focuses on building an autonomic defense system, using some immunological metaphors for information gathering, analyzing, decision making and launching threat and attack responses. In order to detection Stuxnet like malware, we propose to include a secure VM (or dedicated host) to the SCADA Network to monitor behavior and all software updates. This on-going research effort is not to mimic the nature but to explore and learn valuable lessons useful for self-adaptive cyber defense systems.

  12. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  13. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  14. Digital field-bus mode SCADA is key to offshore efficiency. [Automation of offshore gas production platforms

    SciTech Connect (OSTI)

    Cuthbert, P. )

    1994-02-01

    An all-digital SCADA network has been installed in one of the North Sea's largest natural gas fields, controlling the delivery of gas from Shell UK Exploration and Production's souther-area fields to a British Gas Terminal at Bacton, UK. The innovative use of digital technology -- based on the industry-standard HART field protocol -- to complete a digital communications link stretching from the onshore SCADA host right out to the process variable transmitters on the platforms, is playing a key role in the automation of the monitoring and control system by allowing Shell UK Expro to run the majority of the platforms unmanned. The SCADA system is part of a major refit being carried out by Shell Expro on its Leman field. The refit is part of the company's long-term strategy to extend the lifetime of this established field, which started operations in the late 1960s. In order to meet this goal, the prime requirements are to reduce operational costs and risk exposure, and the key element in this area was to reduce the need for resident staff and all of their associated support and equipment costs, through the deployment of automation. The system will achieve the project's cost-cutting aims, but also break new ground in control and monitoring technology for the gas industry, through the use of a smart transmitter scheme as a digital field communications within the wide-area network, using the protocol's all-digital capability in preference to the commonly used 4-20mA-compatible mode, will allow real-time monitoring and control, plus maintenance and diagnostics, to take place remotely. This paper describes the design of this system.

  15. Introduction to 'Make'

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    'Make' Introduction to 'Make' Introduction The UNIX make utility facilitates the creation and maintenance of executable programs from source code. make keeps track of the commands...

  16. Security Officer

    Broader source: Energy.gov [DOE]

    This position is located in the Security and Continuity of Operations (NN) organization of the Chief Administrative Office (N), Bonneville Power Administration. The Security and Continuity of...

  17. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  18. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security Safety, Security The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our

  19. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to protect the Laboratory Vehicle Access Portal graphic The security perimeter is intended to protect the Laboratory against the possibility of terrorist attacks. At each point of the perimeter, access is controlled by vehicle access portals (VAPs) at the following locations: East Jemez Road VAPs (pdf) (shown above) West

  20. NNSA/CEA Cooperation in Computer Science | National Nuclear Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computing NNSACEA Cooperation in Computer Science Introduction On March 13, 2002 Directors of the DOENational Nuclear Security Administration (NNSA) and the Commissariat ...

  1. Introduction to Neutrino Physics

    SciTech Connect (OSTI)

    Linares, Edgar Casimiro

    2009-04-30

    I present a basic introduction to the physics of the neutrino, with emphasis on experimental results and developments.

  2. security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security NNSA Announces 2015 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) announced the recipients of the Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Joseph Houghton from the Los Alamos Field Office will receive... Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit

  3. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    1, 2011 - Page 1 National Transportation Stakeholders Forum Denver, Colorado May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2 National Transportation Stakeholders Forum (NTSF) * Introduction * NNSA Certifying Official Role * Offsite Source Recovery Project * Waste Shipments * Nuclear Materials Management Planning * Summary May 11, 2011 - Page 3 NNSA Plays a Critical Role:

  4. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  5. Secure ICCP IntegrationConsiderations and Recommendations

    Office of Energy Efficiency and Renewable Energy (EERE)

    The goal of this report is to identify the operation and implementation issues associated with the introduction of the secure form of the Inter-control Center Communications Protocol, or ICCP,...

  6. Advanced Network Toolkit for Assessments and Remote Mapping ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security Standards National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) DOEOE National SCADA Test Bed Fiscal Year 2009 Work ...

  7. Hallmark Cryptographic Serial Communication | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A cryptographic card and link module integrating the Secure SCADA Communications Protocol ... Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a ...

  8. 1. INTRODUCTION | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1. INTRODUCTION 1. INTRODUCTION 1. INTRODUCTION (3.22 MB) More Documents & Publications Tribal Comments Database OIEPP Letter on Roundtable Sessions ICEIWG Meeting Agendas and Summaries

  9. SMART GRID: an introduction. | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SMART GRID: an introduction. SMART GRID: an introduction. Our nation's electric power infrastructure that has served us so well for so long - also known as "the grid" - is rapidly running up against its limitations. Our lights may be on, but systemically, the risks associated with relying on an often overtaxed grid grow in size, scale and complexity every day. From national challenges like power system security to those global in nature such as climate change, our near-term agenda is

  10. Introduction to Vol. Two

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Information Act Investor Relations Library Privacy Publications Tribal Affairs Introduction to Volume Two, Part I (1950-1987) An error occurred. Try watching this video on...

  11. Introduction and overview

    SciTech Connect (OSTI)

    None, None

    2009-01-18

    The Renewable Energy Technology Characterizations introduction outlines describe the technical and economic status of the major emerging renewable energy options for electricity supply.

  12. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership

  13. National Security Complex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Complex Y-12 National Security Complex Completes W69 Dismantlement

  14. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  15. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  16. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 ...

  17. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  18. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  19. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will rovide technical assistance to the Director,...

  20. Securing Wide Area Measurement Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Northwest National Laboratory (PNNL) as a project funded by the National SCADA Test Bed Program in cooperation with the Department of Energy's Transmission Reliability Program. ...

  1. Automation World Features New White Paper on Wireless Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan ISA Approves Standard ...

  2. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    all of our reactor designs employ a concurrent engineering approach that addresses the integration of safety, operations, security, and safeguards from the conceptual design level. Capabilities include core design, thermal hydraulics, waste characterization, simulator development, and severe service and accident testing. Design assessments include: safety, security, vulnerability, siting, emergency planning, and fuel cycle impact. organization 6221 serves as a window to sister organizations

  3. Physical Security

    SciTech Connect (OSTI)

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  4. Introduction to 'Make'

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    'Make' Introduction to 'Make' Introduction The UNIX make utility facilitates the creation and maintenance of executable programs from source code. make keeps track of the commands needed to build the code and when changes are made to a source file, recompiles only the necessary files. make creates and updates programs with a minimum of effort. A small initial investment of time is needed to set up make for a given software project, but afterward, recompiling and linking is done consistently and

  5. Introduction to PGAS Languages

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PGAS Languages Introduction to PGAS Languages Introduction Partitioned Global Address Space Languages (PGAS) provide a parallel programming model based on the assumption that the global memory adress space is logically partitioned with a portion of the memory being assigned to a specific processor. Two common PGAS languages are Unified Parallel C (UPC) and Co-array Fortran (CAF). The first implementation of this tutorial is based on UPC and CAF. This tutorial assumes that you have some

  6. DNS as a Covert Channel Within Protected Networks | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DNS as a Covert Channel Within Protected Networks DNS as a Covert Channel Within Protected Networks This whitepaper discusses ways to detect DNS exfiltration attempts based on current known methods, and provides recommendations for mitigation of this exposure. DNS as a Covert Channel Within Protected Networks (994.64 KB) More Documents & Publications ProActive DNS Blacklisting Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Introduction SCADA Security for

  7. Radiological Security Program | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) ...

  8. Nuclear Security Enterprise | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  9. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  10. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    computer security Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved

  11. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  12. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will serve as a senior staff member of the Office...

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  14. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  15. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear Energy

  16. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision Important applications of these capabilities include performing assessment of facility vulnerabilities and resultant consequences of a range of attack scenarios related to nuclear facilities after

  17. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision the capability set needed to address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and systems engineering; and chemistry. In addition, Sandia has a tool set that enhances the ability to perform high level

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  19. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  20. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  1. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Two-hundred twenty-five nonprofit organizations receive monetary donations from Los Alamos National Security, LLC September 21, 2015 Recognizing employee and retiree volunteer efforts LOS ALAMOS, N.M., Sept. 21, 2015-More than 225 nonprofit organizations received $162,650 from Los Alamos National Security, LLC, which manages Los Alamos National Laboratory. The LANS contributions are determined by the number of volunteer hours logged by Laboratory employees and retirees through an organization

  2. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  3. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  4. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory Commission and

  5. Energy-Sector Stakeholders Attend the Department of Energy's...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed (NSTB) partners and Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project-presented DOE-supported efforts involving secured SCADA ...

  6. NSTB Summarizes Vulnerable Areas | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NSTB Summarizes Vulnerable Areas Experts at the National SCADA Test Bed (NSTB) discovered ... Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems ...

  7. Energy Sector Stakeholders Attend the Department of Energy¬タルs...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed (NSTB) partners and Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project- presented DOE-supported efforts involving secured SCADA ...

  8. DOE/ID-Number

    Office of Environmental Management (EM)

    in the energy sector NSTB National SCADA Test Bed Common Cyber Security Vulnerabilities ... of the National Supervisory Control and Data Acquisition (SCADA) Test Bed (NSTB) program. ...

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  11. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  13. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  14. VOLTTRON: Introduction and History

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction and History JEREME HAACK, SRINIVAS KATIPAMULA, BRANDON CARPENTER, BORA AKYOL Pacific Northwest National Laboratory DOE Building Technologies Office: Technical Meeting on Software Framework for Transactive Energy July 23-24, 2014 July 29, 2014 1 VOLTTRON Team 2 3 Presentation Outline Background and Motivation What is VOLTTRON? Development History DOE Funded Enhancements Open Source VOLTTRON Development Timeline Challenge Approach Impact Bridging operation and planning to enable

  15. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  16. Securing mobile code.

    SciTech Connect (OSTI)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  17. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science NSS Archive National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Archive National Security Science magazine...

  18. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Council Reliable, secure, sustainable carbon energy solutions for the ... new ideas for reliable, secure and sustainable carbon neutral energy solutions for the ...

  19. ENERGY SUPPLY SECURITY 2014

    Broader source: Energy.gov (indexed) [DOE]

    Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries Secure Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries ...

  20. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  1. Security system

    DOE Patents [OSTI]

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  3. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the computational, physics, and engineering capability spans multiple physics phenomenologies, engineering disciplines, and brings to bear massively parallel processing computational power to solve very complex problems that result in realistic estimates of potential consequences resulting from these types of postulated accidents. the Sar that is developed must go through rigorous external review before it goes to the national Security Council for approval prior to launch. this process provides

  4. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2014-0985P Sandia National Laboratories is introducing a binder- free pelletization process to fabricate industrially relevant pellets of porous catalysts and separations materials. This process enables the implementation of

  5. Security Rulemaking

    Office of Environmental Management (EM)

    Securing America's Clean Energy Future The Office of Energy Efficiency and Renewable Energy (EERE) invests in clean energy technologies that strengthen the economy, reduce dependence on foreign oil, and protect the environment. EERE leverages partnerships with the private sector, state and local governments, DOE national laboratories, and universities to transform the nation's economic engine to one powered by clean energy. EERE Programs 2011 Budget (in $ millions) EERE operates with $1.8

  6. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  7. Introduction to High Performance Computing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction to High Performance Computing Introduction to High Performance Computing June 10, 2013 Photo on 7 30 12 at 7.10 AM Downloads Download File Gerber-HPC-2.pdf...

  8. Introduction to Control Part 1

    SciTech Connect (OSTI)

    Scheinker, Alexander

    2015-07-13

    Presentation that offers an introduction to Control Theory, sponsored by the Los Alamos National Laboratory, Low Level RF Control Group.

  9. Headquarters Security Quick Reference Book Headquarters Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Directive HSS Office of Health, Safety and Security HQ ... Regulations 707, a negative drug test result is required ... knowledgeable of security policy at HQ. Consult the HQFMSP ...

  10. Nuclear Security Enterprise | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    Nuclear Security Enterprise The Nuclear Security Enterprise ... efficient 21stcentury NSE with less environmental impact. ... is referred to as Stockpile Stewardship and Management. ...

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  12. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W Current work is centered on development of the Supercritical Carbon Dioxide (sCo2) Closed Brayton Cycle. Using supercritical fluids, Brayton Cycles can achieve higher energy conversion efficiencies in 1/100th of the volume and 1/10th the cost of comparable steam rankine cycles. the technology is being demonstrated in the nuclear Energy Systems laboratory/Brayton lab

  13. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense nuclear security NNSA Announces 2014 Security Professional of the Year Awards WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Pamela Valdez from the Los Alamos Field Office will receive the federal award and Randy Fraser from... Michael Lempke receives NNSA's Gold Medal of Excellence DOE Undersecretary for Nuclear Security and NNSA

  14. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  15. International Nuclear Security | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials, particularly weapons-usable nuclear material in both civilian and non-civilian use in key countries. As part of these efforts, INS works with partner countries to: Upgrade and sustain physical security and material control and accounting systems; Develop national-level nuclear security infrastructure in areas such

  16. Briefing, Introduction to Classified Information - June 2014...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction to Classified Information - June 2014 Briefing, Introduction to Classified Information - June 2014 June 2014 This briefing provides an introduction to classified ...

  17. Introduction to Framework | Open Energy Information

    Open Energy Info (EERE)

    Introduction to Framework (Redirected from Introduction to Methodology) Jump to: navigation, search Stage 1 LEDS Home Introduction to Framework Assess current country plans,...

  18. National Nuclear Security Administration Contractor Governance, IG-0881

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National Nuclear Security Administration Contractor Governance DOE/IG-0881 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 February 19, 2013 MEMORANDUM FOR THE ACTING ADMINISTRATOR, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "National Nuclear Security Administration Contractor Governance" INTRODUCTION Since July

  19. Job Types | National Nuclear Security Administration | (NNSA...

    National Nuclear Security Administration (NNSA)

    Protection * Civil * Environmental * Electrical Science ... Security * Nuclear Security * Personnel Security * Physical Security * Emergency Management * Intelligence Operations ...

  20. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as

  1. SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... systems in hydroelectric dams; water treatment systems; electric power transmission, distribution, and generation; petroleum storage and refineries; and transportation systems. ...

  2. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... systems in hydroelectric dams; water treatment systems; electric power transmission, distribution, and generation; petroleum storage and refineries; and transportation systems. ...

  3. National SCADA Testbed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab Photovoltaic Systems Evaluation Laboratory PV Regional ... Facility Geomechanics and Drilling Labs National ... Health Monitoring Offshore Wind High-Resolution ...

  4. Introduction: Regional Dialogue Contract Templates

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction: Regional Dialogue Contract Templates October 17, 2007 1. Summary * BPA invites comments on the first draft of the Regional Dialogue Master Template by Friday,...

  5. Introduction to BPA Film Collection

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Information Act Investor Relations Library Privacy Publications Tribal Affairs Introduction to BPA Film Collection: Volume One, Disc One, 1939-1954 An error occurred. Try...

  6. NDRF Introduction & Close-Up

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Event Location Date http:www.fema.govrecoveryframework www.fema.govppd8 http:fema.ideascale.com 2 NDRF Introduction & Close-Up Deborah Ingram Assistant Administrator ...

  7. Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  8. Security for grids

    SciTech Connect (OSTI)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  9. JOTG Video Introduction | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    JOTG Video Introduction JOTG Video Introduction Addthis Description Greeting: Inter-Agency Partnership, Commitment, and Service to the American workers

  10. Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  11. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    receives hisher security clearance; the Annual Security Refresher Briefing, which must be completed each year by all those who hold a security clearance; and the Security ...

  12. Introduction to Brookhaven National Laboratory

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction to Brookhaven National Laboratory Patrick Looney Department Chair Sustainable Energy Technologies (SET) Global and Regional Solutions Directorate (GARS) STEAB Meeting June 26, 2012 Introduction to BNL * Facts, figures, facilities overview * BNL energy strategy - Building Discovery to Deployment pipelines - Tools for a Smarter Grid - Distributed Generation and Renewables Integration * Meeting sustainability goals through research * Discussion 2 FY 2011 Total Lab Operating Costs: $652

  13. Radiological Security | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Nonproliferation / Global Material Security Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned radioactive sources; promoting the replacement of radioactive sources with non-isotopic technologies, where feasible; and increasing security where

  14. national security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Klotz visits Y-12 to see progress on new projects and ongoing work on NNSA's national security missions Last week, NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited the Y-12 National Security Complex to check on the status of ongoing projects like the Uranium Processing Facility as well as the site's continuing uranium operations. He also met with the Region 2 volunteers of the Radiogical... Managing the data deluge for national security analysts ALBUQUERQUE, N.M. - After a

  15. Defense Nuclear Security | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    This responsibility includes the physical, materials control and accounting, classified and sensitive information protection, personnel, technical, and cyber security programs. ...

  16. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  17. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to

  18. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  19. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear...

  20. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Office of Associate Under Secretary for Environment, Health, Safety, and Security (AU), Office of Headquarters Personnel Security Operations. A successful candidate...

  1. Information Technology Specialist (Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  2. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration Office of ...

  3. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex ...

  4. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration 1000 Independence ...

  5. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical ... The National Nuclear Security Administration (NNSA) Production Office (NPO) took into ...

  6. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  7. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    We use our nuclear materials and forensics expertise to help solve national security ... materials, security and consequence management, and manufacturing and technical ...

  8. Office of Security Assessments

    Broader source: Energy.gov [DOE]

    The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and security policies and programs throughout the Department, including...

  9. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office . Environmental Management Operations February 2015 Nevada National Security ...

  10. Fan System Assessment Tool Introduction

    Broader source: Energy.gov [DOE]

    This presentation provides an introduction to the Fan System Assessment Tool (FSAT). With FSAT, users can calculate the amount of energy used by their fan system; determine system efficiency; and quantify the savings potential of an upgraded system.

  11. Introduction to ESPC ENABLE Program

    Broader source: Energy.gov [DOE]

    Webinar provides participants with an introduction to the Energy Savings Performance Contract (ESPC) ENABLE program, an overview of the process, and next steps on how to move forward with a project...

  12. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  13. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  14. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  15. Chapter 3: Energy Security

    SciTech Connect (OSTI)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  16. Personnel Security Program | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator. Each program area is focused on specific challenges. The Office of Personnel & Facility Clearances & Classification (OPFCC) is part of the NNSA, Office of

  17. physical security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    physical security Sandia employee dubbed a master at locking down NNSA's enterprise NNSA's primary missions include keeping dangerous materials out of the wrong hands while protecting and maintaining the nation's nuclear deterrent. It's no surprise, then, that NNSA's labs and sites employ the best experts available in security. At NNSA's Sandia... DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy

  18. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Summit U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Statement on Signing of the Administrative Arrangement to the Agreement for

  19. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Secretary Moniz awards Hutcheon memorial nonproliferation fellowship to Thomas Gray

  20. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and

  1. Security Forms | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  2. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA Transfers Responsibility for Radiation Detection System to China Customs SHANGHAI, CHINA - Today, the Nuclear Security Administration's (NNSA) Principal Assistant Deputy ...

  3. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our website, please follow these instructions. More... Category: Security Emergency Vocabulary These are terms you might hear during an emergency situation. More... Category:...

  4. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA uses, for example, concrete blocks, razor-wire barriers, and steel-plated fighting positions to upgrade its physical security features. It has eliminated public access to ...

  5. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Highly Enriched Uranium Materials Facility is a massive concrete and steel structure ... HEUMF is a massive concrete and steel structure that provides maximum security for the ...

  6. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    ... non-classified portion of the review process. The Federal Project Director and appropriate DOEEM-HQ line management and security representatives must coordinate the classified ...

  7. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft ...

  8. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) National Nuclear Security Administration FY15 Year End Report Semi Annual Report FY14 Year End Report Semi Annual

  9. Security Policy, Guidance & Reports

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is responsible for the principal personnel security information processing activities of the Department and personnel security administrative review process. The Office of Headquarters Security Operations provides oversight and direction support to all Headquarters security operations to include physical protection, information security, personnel security, and guidance to the Headquarters Security Officers (HSO).

  10. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Global Material Security NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA Director of the Department of Information and International Relations Ilkhom Mirsaidov, left, with two specialized vehicles purchased by NNSA for Tajikistan. WASHINGTON - The Department of Energy's National Nuclear Security Administration (DOE/

  11. SECURITY AND CYBER REPORTS | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY AND CYBER REPORTS SECURITY AND CYBER REPORTS Office of Security Assessments Office of Security Assessments - Report Titles

  12. Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security by Website Administrator Back

  13. Introduction to computers: Reference guide

    SciTech Connect (OSTI)

    Ligon, F.V.

    1995-04-01

    The ``Introduction to Computers`` program establishes formal partnerships with local school districts and community-based organizations, introduces computer literacy to precollege students and their parents, and encourages students to pursue Scientific, Mathematical, Engineering, and Technical careers (SET). Hands-on assignments are given in each class, reinforcing the lesson taught. In addition, the program is designed to broaden the knowledge base of teachers in scientific/technical concepts, and Brookhaven National Laboratory continues to act as a liaison, offering educational outreach to diverse community organizations and groups. This manual contains the teacher`s lesson plans and the student documentation to this introduction to computer course.

  14. Renewing America's Nuclear Power Partnership for Energy Security and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Economic Growth | Department of Energy Renewing America's Nuclear Power Partnership for Energy Security and Economic Growth Renewing America's Nuclear Power Partnership for Energy Security and Economic Growth October 8, 2008 - 4:14pm Addthis Remarks as Prepared for Delivery by Secretary Bodman Thank you, Jamie, for that kind introduction. And many thanks as well to Secretary Gutierrez, Deputy Secretary Sullivan and the entire Commerce team for convening this important event. As always, it's

  15. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 24, 2014 Cultural Artifacts Cross Eras at the Nevada National Security Site It is well known that the Nevada National Security Site (NNSS) is home to many artifacts from the ...

  16. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  17. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    may not grant or renew a security clearance for a covered person who is an unlawful ... may not grant or renew a security clearance described in paragraph (3) for a covered ...

  18. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  19. Office of Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  20. Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | CNS, UT chemical...

  1. tee0074.pdf

    Office of Environmental Management (EM)

    Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Background. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 21 Steps 1. Identify all connections to SCADA networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Disconnect unnecessary

  2. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Center Energy Security Center Developing new ideas for reliable, secure, and sustainable carbon neutral energy solutions for the nation-the portal to LANL's diverse energy security research enterprise. Contact Leader Steven Buelow (505) 663 5629 Email Program Administrator Jutta Kayser (505) 663-5649 Email Research focus areas Materials and concepts for clean energy Science for renewable energy sources Superconducting cables Energy storage Fuel cells Mitigating impacts of global

  3. Security's (DHS) Domestic Nuclear

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and mobile detection systems), and the ... Homeland Security Technology Program. "With its remote location, highly ... Infrastructure Resilience Conference and Expo. ...

  4. Lab announces security changes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security assessment conducted jointly by the Department of Defense and Department of Energy. February 23, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email LOS ALAMOS, New Mexico, February 23, 2012-Los Alamos National

  5. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  6. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable ... Arctic Climate Measurements Global Climate Models Software Sustainable Subsurface ...

  7. Lemnos Interoperable Security Program

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as frewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products

  8. Introduction

    Office of Environmental Management (EM)

    on Implementation of the Section 180(c) Grant Program Annotated Outline and Appendices ... to update the Section 180(c) policy and procedures and to write a grant guidance document. ...

  9. Introduction

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-05-21

    Provides guidance for software engineering, project management, and quality assurance practices and procedures. Does not cancel other directives.

  10. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mixed-phase clouds, such as those found in the Arctic have presented quite a challenge to the modeling com- munity. Without modification, models have struggled to maintain the...

  11. Introduction

    Energy Savers [EERE]

    VP, Product Strategy Cree Yan Rodriguez VP, Product and Technology Acuity Brands Lighting Ed Clark Sustainable Strategist ZGF Architects Chris Bailey Dir. of Bus. Develop. & Prod....

  12. Introduction

    Office of Scientific and Technical Information (OSTI)

    W. Blanch 1 1 Department of Chemical Engineering, University of California, Berkeley, ... in the design and optimization of a variety of processes affected by interprotein binding. ...

  13. Introduction

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-28

    The objective of this Guide is to improve the quality of cost estimates and further strengthen the DOE program/project management system. This Guide strives to achieve this goal by providing uniform cost estimating methods as well as consistent estimate terminology. No cancellation.

  14. Introduction

    National Nuclear Security Administration (NNSA)

    U1a Complex is an underground laboratory used for subcritical experiments; physics experiments that obtain technical information about the U.S. nuclear weapons stockpile. These ...

  15. Introduction

    Office of Scientific and Technical Information (OSTI)

    DE-FC26-03NT41878 Southwest Research Institute Project 14.10211 Submitting Organization Sensor Systems and NDE Technology Department Applied Physics Division Southwest ...

  16. INTRODUCTION

    Office of Scientific and Technical Information (OSTI)

    ... 23, 2005. Green areas of leaves retain the capacity for substantial CO 2 uptake, while senescent areas have totally lost capacity for any photosynthesis. SURFACE ENERGY ...

  17. Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... & Mechanical (A&M) University to develop an advanced surface plasma nitriding technique. ... (Right) FY 2015 17 Advanced Surface Plasma Nitriding for Development of Corrosion ...

  18. Introduction

    Office of Environmental Management (EM)

    Advances in manufacturing technologies, including modular construction, improved factory and field fabrication and other innovative construction technologies, are essential to the future of nuclear energy. They are strategically important to the economics of new nuclear power plant construction in the United States and to the competitiveness of the U.S.in the nuclear energy market. In 2012, the Nuclear Energy Enabling Technologies (NEET) Program was initiated by the Department of Energy's

  19. Introduction

    Office of Environmental Management (EM)

    Nuclear energy systems employ instrumentation and controls to measure important system parameters, provide control input to components that maintain systems within desired and safe limits, and provide owners and operators with the needed awareness of plant conditions to plan and safely manage operational evolutions. In a sense, instrumentation and control (I&C) systems function as the nervous system of a nuclear power plant and other nuclear system applications. They monitor all aspects of

  20. INTRODUCTION

    National Nuclear Security Administration (NNSA)

    ... Groundwater is approximately 236 m (774 ft) below the land surface. The climate is arid ... the transition times are on the order of thousands of years spanning changes in climate. ...

  1. Introduction

    Office of Environmental Management (EM)

    Department of Energy Introducing the Department of Energy Quadrennial Technology Review Introducing the Department of Energy Quadrennial Technology Review April 7, 2011 - 4:33pm Addthis Former Under Secretary Koonin Former Under Secretary Koonin Director - NYU's Center for Urban Science & Progress and Former Under Secretary for Science Recently, Secretary Chu asked me to kick off a new process at the Department of Energy: a Quadrennial Technology Review (DOE-QTR). The goal of the DOE-QTR

  2. Introduction

    Broader source: Energy.gov (indexed) [DOE]

    Building Energy Efficiency Subcommittee to the Secretary of Energy Advisory Board November 6, 2012 Dr. J. Michael McQuade Matthew Rogers Dr. Arthur Rosenfeld Dr. Maxine Savitz...

  3. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Workforce Survey Report For Savannah River Site Community Reuse Organization June 8, 2009 Booz | Allen | Hamilton SRSCRO Nuclear Workforce Survey Report T A B L E O F C O N T E N T S 1. Background And Objectives Of The Nuclear Workforce Survey 3 Background 3 Survey Objectives 4 2. Scope Of The Survey 5 Participating Companies 5 Nuclear Workers Demand Beyond The SRSCRO Region 6 Key Job Classifications 7 3. Survey Results 8 Growth In Total Staffing Levels 8 Estimated New Hires 2010 - 2020

  4. INTRODUCTION

    Office of Scientific and Technical Information (OSTI)

    REGULATION OF CARBON SEQUESTRATION AND WATER USE IN A OZARK FOREST: PROPOSING A NEW ... period was the data streams of CO 2 and water vapor fluxes and numerous meteorological ...

  5. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1999 Prepared by: Michael G. Finn Science and Engineering Education Program Oak Ridge Institute for Science and Education December 2001 All opinions expressed in this paper are the author's and do not necessarily reflect policies and views of the U.S. Department of Energy or the Oak Ridge Institute for Science and Education. This document was prepared for the Division of Science Resources Studies of the National Science Foundation by the Oak Ridge Institute for Science and Education (ORISE)

  6. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to TotalView Debugger Why a Debugger? * Developers need a way to understand the runtime behavior of their programs - When writing new code, porting code, adding features, scaling, tuning or optimizing - When troubleshooting bugs, code correctness, and memory analysis * The solution Rogue Wave has to this is TotalView - TotalView is a source code debugger for Linux, Unix and Mac which gives users visibility into and control over runtime execution - TotalView is especially compelling for users

  7. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    When the Nevada Test Site was established in 1951, it provided a proving ground for a burgeoning U.S. nuclear weapons program. One hundred atmospheric nuclear tests occurred at the test site between 1951 and 1962. When the U.S. entered into an atmospheric testing moratorium, all testing moved underground. In 1992, the president instituted a moratorium on nuclear testing. In order to certify the safety and reliability of the nation's nuclear stockpile, developing improved computer models and

  8. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Looking for historical information about the nuclear testing program? You can find records and information about the U.S. Department of Energy's (DOE) nuclear testing program at the Nuclear Testing Archive (NTA), located on East Flamingo Road in Las Vegas, Nevada. The facility, located adjacent to the Desert Research Institute and the University of Nevada Las Vegas, houses more than 375,000 documents in a 9,000-square-foot space equipped with special features for preserving the documents. The

  9. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Radiation is energy in the form of waves or particles. Although radiation is around us every day, you cannot see, hear, or smell it. Radiation is detected by measuring the activity of the energy released as it decays. It comes from natural and man-made sources as unstable atoms decay to form more stable atoms. Different Types of Radiation Alpha particles travel only a few inches in the air and lose energy almost as soon as they encounter an obstacle such as a sheet of paper or the outer layer of

  10. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    days of large, heavy, fission bombs, the possibility of dangerous nuclear accidents were minimized by assembling the bomb in the final moments before actual use. Modern nuclear weapons adopted 'sealed pit' designs in which all parts of the fission bomb were placed in their final configuration during assembly. This evolution created more compact, lightweight, and low maintenance nuclear weapons, but these weapons could not accommodate separate handling of internal components before actual use,

  11. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    test base was established in the summer of 1946 on the shores of Salton Sea, California where Sandia Laboratory could conduct ballistic tests and monitor the operation of fuzing and firing systems. This area, then known as Sandy Beach, had been utilized by the Manhattan Project for ballistic and fuzing and firing testing of the first atomic weapons. Background The Salton Sea Test Base provided satisfactory range facilities for several years. However, by the mid-1950's, the atmosphere became

  12. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    plant and animal life. The climate is arid, with an annual rainfall of six inches in the lower elevations, an ideal setting for the ignition of wildland fires. Wildland fires are not the only risks at the NNSS. Offices, facilities, and projects at the site are subject to a diverse range of operational risks and hazards that include the potential for significant emergencies. Background To mitigate these risks and provide protection for the surrounding public, personnel, and property at the NTS,

  13. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    They are some of the most famous and eerie images to emerge from the Cold War: atmospheric nuclear tests captured one millisecond after detonation. Using a rapatronic camera developed by Harold Edgerton of Edgerton, Germeshausen & Grier Inc. (EG&G), a company specializing in electronic technology, the rapatronic camera was capable of photographing still images at the rate of 1/1,000,000 of a second. Background Dr. Harold Edgerton, a pioneer in strobe photography, developed the concept

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Sensing Laboratory (RSL) is a center for creating advanced technologies that provides a broad range of scientific, technological, and operational disciplines with core competencies in emergency response operations and support, remote sensing, and applied science and technologies in support of counterterrorism and radiological incident response. Background The Atomic Energy Commission originally established the "Aerial Measurements Operations" at Nellis Air Force Base in Las

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    an unassuming building located on Wonderland Avenue, five minutes from the famous Sunset Strip in Los Angeles, California, a secret film studio produced as many films as those of the major Hollywood studios, yet most of those films were unseen by the public. The mission of Lookout Mountain Air Force Station was to provide in-service production of classified motion picture and still photographs to the U.S. Department of Defense and the Atomic Energy Commission - later the U.S. Department of

  16. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    pre-dawn hours of January 24, 1978, a Canadian Mounted Police corporal located in Hay River, in the Canadian Northwest Territories, reported a meteor sighting. One hundred and twenty-fve miles north, in Yellowknife, a night janitor reported mysterious lights streaking across the darkened sky. What these eye-witnesses actually saw was the re-entry of the Soviet satellite Cosmos 954 into Earth's atmosphere. Background Cosmos 954 launched into orbit on September 18, 1977. The satellite was designed

  17. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    U.S. Department of Energy (DOE) Offce of Science sponsors a range of science education initiatives through its Workforce Development for Teachers and Scientists program. Included within this program is the Science Bowl, a nationwide academic science competition established in 1991. Background National and Regional DOE Science Bowl competitions test students' knowledge in all areas of science and math. High school students are quizzed in a fast paced question-and-answer format similar to

  18. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    plant and animal life. The climate is arid, with an annual rainfall of six inches in the lower elevations, an ideal setting for the ignition of wildland fres. Background The NNSS Fire & Rescue (F&R) was established on October 9, 1951. Today, the F&R service provides fre suppression, emergency medical, hazardous materials (HAZMAT) mitigation, technical rescue response, incident command functions and fre prevention activities to the site on a 24-hour basis. Prevention Several

  19. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    What happens when you combine an accidental conventional explosion with the possibility of radiological contamination? You get a gigantic health and safety hazard. That health and safety hazard motivated the Sandia Corporation, now Sandia National Laboratories, to create a specialized structure in 1957 known as the Gravel Gertie, designed to prevent the release of radioactive particles into the atmosphere. The assembly cells, which have 12-inch thick concrete walls, are called Gravel Gerties

  20. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sedan Crater was formed on July 6, 1962, when the U.S. Atomic Energy Commission, predecessor of the U.S. Department of Energy, conducted an excavation experiment using a 104-kiloton thermonuclear device. The test, detonated 635 feet underground, helped develop technology for earth moving projects. The awe-inspiring explosion displaced about 12 million tons of earth, creating a crater 1,280 feet in diameter and 320 feet deep. The force of the detonation released seismic energy equivalent to an

  1. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Peter Skene Ogden, an Englishman on a Hudson Bay Company trapping expedition down the Humboldt River, was the first white man to enter northern Nevada. It was 1826, and Nevada was the last state to be explored by the white man. Until that time, Nevada had been inhabited by Paleo-Indians and migrants. During the same year, the famous trapper-explorer Jebediah Smith crossed the southern tip of the state on his way to California. The Old Spanish Trail, Nevada's oldest, was first traveled by

  2. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    June 6, 1958, the United States Atomic Energy Commission, now the U.S. Department of Energy (DOE), announced the Plowshare Program, named for the biblical injunction to ensure peace by "beating swords into plowshares." The program was designed as a research and development activity to explore the technical and economic feasibility of using nuclear explosives for industrial applications. President Dwight D. Eisenhower introduced the concept in his "Atoms for Peace" speech

  3. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Following the Trinity test and the bombings of Hiroshima and Nagasaki, military officials still knew very little about the effects, especially on naval targets, of nuclear weapons. Accordingly, the Joint Chiefs of Staff requested and received Presidential approval to conduct a test series during summer 1946. The test series, named Crossroads, was conducted at Bikini atoll in the Marshall Islands, which was far from population centers in the middle of the Pacific. Pacific testing offered ample

  4. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    November 1981, the last cattle roundup took place at the U.S. Department of Energy's (DOE) experimental farm, managed for DOE by the U.S. Environmental Protection Agency (EPA). Operations at this unique, 30-acre experimental farm in Area 15 started in 1964 when the EPA was contracted to conduct research to determine if radioactive materials (radionuclides) found in the environment were being transported to humans. At the time, a major concern was the transport of radioiodine through the

  5. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Peacekeeper (MX) is a four-stage intercontinental ballistic missile capable of carrying up to ten independently-targetable reentry vehicles with greater accuracy than any other ballistic missile. Its design combines advanced technology in fuels, guidance, nozzle design, and motor construction with protection against the hostile nuclear environment associated with land- based systems. Several Air Force Peacekeeper research and testing experiments took place from 1978 through 1982 in Area 25 of

  6. Introduction

    Office of Environmental Management (EM)

    ... Several DOE-NE irradiation programs are already requesting HT MPFDs to be included in their irradiation tests. The Accident Tolerant Fuels (ATF) irradiation test program will ...

  7. Introduction

    Office of Environmental Management (EM)

    ... Accident Tolerant Fuel, Small Modular Reactor, and Light Water Reactor Sustainability programs; as well as industry efforts to develop and test advanced fuels, and ...

  8. Introduction

    Energy Savers [EERE]

    ... IN 47906 Funding: 800,000 (10012014 - 09302017) Description of Project: The Fukushima nuclear accident of 2011 has highlighted the importance of designing safety-related ...

  9. Introduction

    Office of Scientific and Technical Information (OSTI)

    ... measurements on buried pipe at a test site as well as on an operating pipeline. .........1 2 PCAD model of SwRI test pipe: (a) normal pipe condition; (b) with ...

  10. Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... 2019 - to less than 5 per gallon algal biofuel by 2019. - STATUS: Awards anticipated ... at Increasing Scale * Fuel Testing and Engine Development for High Octane Fuels * 2015 ...

  11. Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Exposure Social *Energy Reliability (Diversification) *Energy Independence *Quality of Life *Community and Stakeholder Participation Environment *Climate Change *Mitigation ...

  12. Introduction

    SciTech Connect (OSTI)

    1993-01-01

    This section of the report describes the history of the tribology program of the Office of Transportation Materials (OTM) in the Office of Transportation Technologies (OTT). The mission of the Office of Transportation Technology is discussed. OTT`s research objectives focus on (1) automobiles and light-duty trucks and vans and (2) heavy duty trucks and buses. Even small gains in efficiency can produce large paybacks for the tax dollar. The mission of the Office of Transportation Materials is also described. Its research objective is to enable the development and engineering of energy-efficient transportation systems that will make possible the transition of the U.S. transportation sector from dependence on petroleum to alternative fuels and electricity. The mission of the Tibology Program is to provide the base technology to enable savings in annual U.S. energy consumption through tribological advances in the transportation sector. Current task areas are in the fields of advanced lubrication, engineered tribological interfaces, advanced tribomaterials and components, and project management.

  13. Introduction

    National Nuclear Security Administration (NNSA)

    in Livermore, California, was no longer permitted to perform large high explosive experiments at the facility due to community encroachment, a new site had to be identified. ...

  14. Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Electric Transmission in the West Planning  Siting  Issues February 7, 2012 2  What does Transmission Look Like?  Why is Transmission Important?  Transmission Planning  Transmission Siting  Select Transmission Issues  References Presentation Content © 2010 ICF International. All rights reserved. What does Transmission Look Like? © 2010 ICF International. All rights reserved. WHAT DOES ELECTRIC TRANSMISSION LOOK LIKE 4  Provide affordable/reliable electricity 

  15. Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EnerNOC, Inc. ("EnerNOC") is pleased to provide these comments to the Department of Energy in response to the Request for Information "Policy and Logistical Challenges to Smart Grid Implementation." EnerNOC is a leading provider of demand response and energy efficiency solutions to utilities, Independent System Operators ("ISOs") and customers in the commercial, industrial and institutional ("CI&I") sectors. EnerNOC uses near real-time data collected

  16. Security of databases

    SciTech Connect (OSTI)

    Yeh, Y.S.

    1985-01-01

    In this thesis, the security of databases using cryptographic methods is considered. An algebra for encrypted relational databases is considered and examined. Other database cryptosystems are presented, namely multilevel secure databases including three different approaches; multikey multilevel, cumulative key multilevel, and permutational multilevel secure databases. Finally, entity-relationship encryption is examined.

  17. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  18. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone ...

  19. Securing collaborative environments

    SciTech Connect (OSTI)

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  20. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safeguards and security ProForce marks 65 years protecting Sandia resources, facilities, people Current and former members of the Lab's Protective Force gathered to reflect on and recognize the contributions ProForce has made to securing Sandia National Laboratory's resources, facilities, and people. Over the past 65 years, the force has changed in size and structure but its mission has... Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction

  1. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Resilient Electric Infrastructures Military...

  2. Introduction to Airborne Tritium Tritides

    Office of Environmental Management (EM)

    1 Introduction Advances in manufacturing technologies, including modular construction, improved factory and field fabrication and other innovative construction technologies, are essential to the future of nuclear energy. They are strategically important to the economics of new nuclear power plant construction in the United States and to the competitiveness of the U.S. in the nuclear energy market. In 2012, the Nuclear Energy Enabling Technologies (NEET) Program was initiated by the Department of

  3. An introduction to coastal geomorphology

    SciTech Connect (OSTI)

    Pethick, J.S.

    1984-01-01

    This book is an introduction to wave and tidally dominated coastal forms, including beaches, cliffs, dunes, estuaries, mudflats and marshlands. The book emphasises the physical mechanisms by which this variety of landforms is produced and maintained. It introduces the energy outputs - waves, currents, tides - into the coastal 'machine', examines the way in which this energy is converted into water and sediment movement, and leads to an account of coastal landform development.

  4. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  5. Alarm Response Training | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Alarm Response Training Alarm Response Training The mp4 video format is not supported by this browser. Download video Captions: On Time: 4:04 min. View an introduction to our Alarm Response Training, which prepares and trains personnel responding to civilian nuclear and radiological security alarms

  6. Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber security activities are managed by the Cyber Support Division (IM-622) within the Office of Chief Information Officer (IM-1). This chapter only covers the requirement for each HQ program element to appoint an Information Systems Security Officer (ISSO) to act as the point of contact between the

  7. National Security, Weapons Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security, Weapons Science National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. CoMuEx» Explosives Center» Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at Los Alamos National Laboratory is part of the DOE's stockpile stewardship

  8. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass

  9. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  10. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eleven nonprofit organizations receive community giving grants from Los Alamos National Security, LLC December 15, 2009 Los Alamos, New Mexico, December 15, 2009- Eleven local nonprofit organizations with projects supported by Los Alamos National Laboratory employee volunteers received $75,000 in Community Giving grants from Los Alamos National Security, LLC, the company that manages the Lab for the National Nuclear Security Administration. The organizations are located in Los Alamos, Española,

  11. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    House); * TA-00, Bldg. 760 (Legal Counsel); and * TA-3, Bldg. 1411 (Occupational Medicine). All other buildings in non-secure areas must be individually accounted for in...

  12. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  13. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration Savannah River Site 1 NNSA Budget ( Millions) By Program Office FY 2015 Enacted FY 2016 Enacted FY 2017 President Request Delta FY Request Weapon ...

  14. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  15. Supervisory Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the LFO subject matter expert on assigned safeguards and security functional and topical areas.

  16. National Security Education Center

    SciTech Connect (OSTI)

    Hurd, Alan J.

    2015-04-22

    Information about the National Security Education Center is given. Information about the Center’s history and current practices, including its facilities and its practicality are outlined.

  17. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  18. Nuclear Security Summit

    National Nuclear Security Administration (NNSA)

    Joint Research Centre and the United States Department of Energy's National Nuclear Security Administration regarding the reduction of excess nuclear material http:...

  19. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness Read More NSC leader recognized as community role model Read More Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  20. Office of Radiological Security

    National Nuclear Security Administration (NNSA)

    of physical security of radiological materials;

  21. Provision of mobile and man-portable radiation detection equipment;
  22. Regional cooperation on safeguards...

  1. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    ... and Beyond - National Security - Non-Proliferation - Environmental Management Defense ... explosive devices and to detect the proliferation of weapons of mass destruction. * ...

  2. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas...

  3. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  4. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for ...

  5. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental management and science play out. He talked about the importance of the ...

  6. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  7. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  8. Introduction to OpenCL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    OpenCL Introduction to OpenCL OpenCL at NERSC OpenCL is an open standard for programming heterogeneous computers composed of CPUs, GPUs and other processors. OpenCL consists of a framework to define the platform as a host (typically a CPU) and one or more compute devices (e.g. a GPU) plus a C-based programming language for writing programs for the compute devices. Using OpenCL, a programmer can write parallel programs that use all the resources of the heterogeneous computer. We give an example

  9. Introduction to Renewable Energy Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to Renewable Energy Technology A YEAR-LONG SCIENCE & TECHNOLOGY COURSE by Matthew A. Brown Lakewood High School Lakewood, CO Lakewood High School Red Rocks Community College Smart Energy Living Alliance Metro Denver WIRED Initiative Introduction Page i-i Revision date: 6/1/08 This curriculum is a partnership between: Lakewood High School Matthew Brown, maabrown@jeffco.k12.co.us Suzanne McClung, smcclung@jeffco.k12.co.us 9700 W. 8th Ave., Lakewood, CO 80215 303.982.7096

  10. Procurement Division Introduction | Princeton Plasma Physics...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organization Business Operations Procurement Division Procurement Division Introduction Travel and Conference Services Careers Human Resources Directory Environment,...

  11. Office of Global Material Security | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Global Material Security NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  12. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2016-02-10

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property and facilities, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1A.

  13. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  14. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  15. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  16. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNLs defense in depth approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability and your last line of defense.

  17. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  18. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  19. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  20. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security policy Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency

  1. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency and

  2. safety and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety and security NNSA chief visits New Mexico laboratories NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited NNSA's New Mexico laboratories last week. At Sandia National Laboratories (SNL) and Los Alamos National Laboratory (LANL), Klotz addressed the workforces of both labs on how the FY17 budget request supports NNSA's missions, and he got a first-

  3. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect (OSTI)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  4. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  5. Indirection and computer security.

    SciTech Connect (OSTI)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  6. Intelligent mobile security systems

    SciTech Connect (OSTI)

    Allen, M.S. )

    1991-01-01

    This paper reports that mobile security systems are becoming increasingly important to military (Army, Air Force) and non-military (Drug Enforcement Agency, Border Patrol) organizations as the level and sophistication of terrorist activity increases. Frequently, organizations are required to deploy at remote sites on little notice. To ensure protection of life and equipment, security systems are sometimes required. Often, the personnel deployed on these missions are not adequately trained in the selection, installation, and operation of today's complex security equipment. The Intelligent Mobile Security System (IMSS) concept, as being developed by Sandia National Laboratories (SNL), allows untrained, non-technical personnel to configure, deploy, operate, and troubleshoot temporary/mobile physical security system. The IMSS may be used at nuclear facilities.

  7. Securing energy assets and infrastructure 2007

    SciTech Connect (OSTI)

    2006-06-15

    This report describes in detail the energy industry's challenges and solutions for protecting critical assets including oil and gas infrastructure, transmission grids, power plants, storage, pipelines, and all aspects of strategic industry assets. It includes a special section on cyber-terrorism and protecting control systems. Contents: Section I - Introduction; U.S Energy Trends; Vulnerabilities; Protection Measures. Section II - Sector-wise Vulnerabilities Assessments and Security Measures: Coal, Oil and Petroleum, Natural Gas, Electric Power, Cybersecurity and Control Systems, Key Recommendations; Section III - Critical Infrastructure Protection Efforts: Government Initiatives, Agencies, and Checklists.

  8. Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  9. Information Security: Coordination of Federal Cyber Security Research and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Development | Department of Energy Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to

  10. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  11. Tag: Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  12. Office of Radiological Security | National Nuclear Security Administra...

    National Nuclear Security Administration (NNSA)

    Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home Office of Radiological Security Office of Radiological Security NNSA Provides Tajikistan...

  13. Office of Radiological Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of Radiological ... Office of Radiological Security Read more about Y-12's contributions of the Global Threat Reduction Initiative to secure the world's most vulnerable...

  14. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability March 31, ...

  15. National Security Technology Center | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to NSTC. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  16. Frequent-Interval Seismic CPTu | Department of Energy

    Office of Environmental Management (EM)

    Framework for SCADA Security Policy (October 2005) Framework for SCADA Security Policy (October 2005) Modern automation systems used in infrastruc-ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc-ture and enforcement hierarchy. The security policy

  17. Fuel Cell Technologies Program Multi-Year Research, Development and Demonstration (MYRDD) Plan - Section 1.0: Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction Multi-Year Research, Development and Demonstration Plan Page 1 - 1 Multi-Year Research, Development and Demonstration Plan Page 1 - 1 1.0 Introduction The U. S. Department of Energy's (DOE's or the Department's) hydrogen and fuel cell efforts are part of a broad portfolio of activities to build a competitive and sustainable clean energy economy to secure the nation's energy future. Reducing greenhouse gas emissions 80 percent by 2050 1 and eliminating dependence on imported fuel

  18. hrp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hrp Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator.

  19. Office of Departmental Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  20. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  1. Security Review Processing Form | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Processing Form Security Review Processing Form Security Review Process - Please review carefully. Security Acknowledge Form - Complete and return immediately. ...

  2. Voluntary Protection Program Onsite Review, National Security...

    Broader source: Energy.gov (indexed) [DOE]

    Recertification of National Security Technologies, LLCNevada National Security Site as a ... of National Security Technologies, LLCNevada National Security Site during the period ...

  3. PIA - Richland Personal Security Clearance Record | Department...

    Energy Savers [EERE]

    Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance ...

  4. Security and Cyber Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security and Cyber Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal ...

  5. Microsoft Word - Cross Reference Matrix Introduction.doc | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cross Reference Matrix Introduction.doc Microsoft Word - Cross Reference Matrix Introduction.doc PDF icon Microsoft Word - Cross Reference Matrix Introduction.doc More Documents & ...

  6. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land -

  7. PRIVACY/SECURITY NOTICE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system

  8. Microsoft Word - BPD Security - PM

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Performance Database Security (Updated 2015-02) The Department of Energy (DOE) ... controls to ensure the security of data stored in the Building Performance Database (BPD). ...

  9. cygnus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and operated with National Securities Technologies and Los Alamos National Laboratory (LANL) at the Nevada National Security Site (NNSS), has fired its 3,000th shot. Originally...

  10. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    7 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and...

  11. SSIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  12. DNS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  13. contractor | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  14. NMSSUP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  15. Los Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    applying science and technology to homeland security challenges, and safety and security. ... through the Board of Governors, and functional managers of the parent organization ...

  16. Security Cases | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    raised concerns about the individual's eligibility to maintain a security clearance. ... and (l), the individual's security clearance was suspended, and he requested a hearing. ...

  17. Chapter_3_Personnel_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ...

  18. About SRNL - Directorates - National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Innovation Global Security SRNL Home ...

  19. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2015) Special Message from the Corporate Investigations Office REPORTING PERSONNEL SECURITY CONCERNS If you report an incident of security concern involving yourself or a...

  20. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  1. Cognitive Computing for Security.

    SciTech Connect (OSTI)

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley; Marinella, Matthew; Evans, Brian Robert; Warrender, Christina E.; Mickel, Patrick

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  2. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  3. national security campus

    National Nuclear Security Administration (NNSA)

    1%2A en National Security Campus http:nnsa.energy.govaboutusourlocationsnsc

    Page...

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, supersedes DOE O 470.4B.

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  6. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

    Page...

  7. Requirements for security signalling

    SciTech Connect (OSTI)

    Pierson, L.G.; Tarman, T.D.

    1995-02-05

    There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

  8. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  9. Nevada National Security Site

    Office of Energy Efficiency and Renewable Energy (EERE)

    HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

  10. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5...

  11. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security, LLC during a recognition event beginning at 9:30 a.m. Thursday, June 28, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  12. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  13. Safety and Security Officer

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-07-20

    Designated as the DOE official responsible for enforcement of 10 CFR 824 pertaining to the assessment of civil penalties for classified information security violations, and the management and administration of agency occupational safety and health program pursuant to EO 12196

  14. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  15. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  16. Infrastructure Security Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Summary Energy, Climate, and Infrastructure Executive Summary / 3 Message from the VP Rick Stulen, Vice President Energy, Climate, & Infrastructure Security SMU Access to reliable, affordable, and sustainable sources of energy is essential for all modern economies. Since the late 1950s, we Americans have not been energy self-sufficient. Our addiction to foreign oil and fossil fuels puts our economy, our environment, and ultimately our national security at risk. Furthermore, there

  17. Alamos National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    companies get boost from Los Alamos National Security November 19, 2012 Venture Acceleration Fund awards help region's businesses grow LOS ALAMOS, New Mexico, November 19, 2012- Two local biotech start ups, a water and power company and a hardware inventor are the latest recipients of $165,000 in Venture Acceleration Fund (VAF) awards from Los Alamos National Security, LLC. Mustomo, Inc., IX Power, Synfolia, and Tape-Ease will receive funding to take their products and services to the next

  18. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    200 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 7, 2010 Employee volunteer efforts to be recognized LOS ALAMOS, New Mexico, June 7, 2010-Nonprofit organizations are receiving more than $117,000 from Los Alamos National Security, LLC during a recognition event beginning at 9 a.m. Wednesday at Fuller Lodge in downtown Los Alamos. The monetary donations are being made to the nonprofits as a result of the volunteer efforts of Los Alamos National

  19. Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8, 2006, the National Nuclear Security Administration (NNSA) announced the selection of National Security Technologies, LLC (NSTec) to manage and operate the Nevada Test Site (NTS) for the NNSA Nevada Site Office. The contract, valued at approxi- mately $500 million annually, is for five years. There are poten- tially five additional perform- ance-based award-term years available under this contract. NSTec is made up of Northrop Grumman, AECOM, CH2M Hill, and Nuclear Fuel Services. Dr. James E.

  20. Secure Sensor Platform

    Energy Science and Technology Software Center (OSTI)

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  1. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  2. Visualization & Controls Program Peer Review | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    This need is being addressed by SCADA Energy Management System (EMS) Cyber Security Assessments conducted at the National SCADA Test Bed (NSTB) facility at INL and at on-site field ...

  3. Transmission and Distribution World March 2007: DOE Focuses on...

    Energy Savers [EERE]

    with national SCADA test bed. Energy Secrtor Owners, operators and system vendors team up to boost control system security with national SCADA test bed (570.08 KB) More ...

  4. An Introduction to SAE Hydrogen Fueling Standardization

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction to SAE Hydrogen Fueling Standardization Will James U.S. Department of Energy Fuel Cell Technologies Office 2 | Fuel Cell Technologies Office eere.energy.gov 2 Question and Answer * Please type your question into the question box hydrogenandfuelcells.energy.gov SAE INTERNATIONAL U.S. DOE WEBINAR: An Introduction to SAE Hydrogen Fueling Standardization SAE INTERNATIONAL PARTICIPANTS AND AGENDA 4 DOE WEBINAR: An Introduction to SAE Hydrogen Fueling Standardization *Will James -

  5. Well Logging Security Initiatives | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide

  6. Introduction to Vol Two Part Two

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Information Act Investor Relations Library Privacy Publications Tribal Affairs Introduction to Volume Two, Part II (1950-1987) An error occurred. Try watching this video on...

  7. Types of Lighting in Commercial Buildings - Introduction

    U.S. Energy Information Administration (EIA) Indexed Site

    Introduction Lighting is a major consumer of electricity in commercial buildings and a target for energy savings through use of energy-efficient light sources along with other...

  8. Trends in Commercial Buildings--Introduction

    U.S. Energy Information Administration (EIA) Indexed Site

    series of surveys in each sector reveals the trends in energy use for the sector. Introduction The Commercial Buildings Energy Consumption Survey (CBECS) collects data from a...

  9. Introduction to Chemistry and Material Sciences Applications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Intro Chem and MatSci Apps Introduction to Chemistry and Material Sciences Applications June 26, 2012 Last edited: 2016-04-29 11:34:4

  10. Introduction to SAE Hydrogen Fueling Standardization Webinar...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction to SAE Hydrogen Fueling Standardization Webinar: Q&A September 11, 2014 ... Vehicle hydrogen storage undergoes multiple crash and fire testing, which is much more ...

  11. Tribal Nations & the United States: An Introduction

    Broader source: Energy.gov [DOE]

    NCAI's Tribal Nations & the United States: An Introduction report provides a basic overview of the history and underlying principles of tribal governance.

  12. Building America Webinar: Introduction - Who's Successfully Doing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    More Documents & Publications Building America Webinar on May 21, 2014: Introduction Building America Webinar: Retrofitting Central Space Conditioning Strategies for Multifamily ...

  13. 2013 SSL Market Introduction Workshop Presentations Posted

    Broader source: Energy.gov [DOE]

    DOE has posted the presentations and materials from the eighth annual Solid-State Lighting Market Introduction Workshop, held November 12-14 in Portland, OR.

  14. Introduction to Chemistry and Material Sciences Applications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Intro Chem and MatSci Apps Introduction to Chemistry and Material Sciences Applications June 26, 2012 Last edited: 2016-04-29 11:34:4

  15. Introduction to applications and industries for Microelectromechanical...

    Office of Scientific and Technical Information (OSTI)

    Introduction to applications and industries for Microelectromechanical Systems (MEMS). ... Sponsoring Org: USDOE Country of Publication: United States Language: English Subject: 42 ...

  16. Introduction to SAE Hydrogen Fueling Standardization

    Broader source: Energy.gov [DOE]

    Download presentation slides and questions and answers from the DOE Fuel Cell Technologies Office webinar, Introduction to SAE Hydrogen Fueling Standardization, held on September 11, 2014.

  17. Introduction to Bayesian methods in macromolecular crystallography...

    Office of Scientific and Technical Information (OSTI)

    Results Journal Article: Introduction to Bayesian methods in macromolecular crystallography Citation Details ... Publication Date: 2011-07-14 OSTI Identifier: 1082292 Report ...

  18. An introduction to computer viruses

    SciTech Connect (OSTI)

    Brown, D.R.

    1992-03-01

    This report on computer viruses is based upon a thesis written for the Master of Science degree in Computer Science from the University of Tennessee in December 1989 by David R. Brown. This thesis is entitled An Analysis of Computer Virus Construction, Proliferation, and Control and is available through the University of Tennessee Library. This paper contains an overview of the computer virus arena that can help the reader to evaluate the threat that computer viruses pose. The extent of this threat can only be determined by evaluating many different factors. These factors include the relative ease with which a computer virus can be written, the motivation involved in writing a computer virus, the damage and overhead incurred by infected systems, and the legal implications of computer viruses, among others. Based upon the research, the development of a computer virus seems to require more persistence than technical expertise. This is a frightening proclamation to the computing community. The education of computer professionals to the dangers that viruses pose to the welfare of the computing industry as a whole is stressed as a means of inhibiting the current proliferation of computer virus programs. Recommendations are made to assist computer users in preventing infection by computer viruses. These recommendations support solid general computer security practices as a means of combating computer viruses.

  19. Nevada National Security Site | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nevada National Security Site The Nevada National Security Site (NNSS) safely conducts high-hazard operations, testing, and training in support of NNSA, the U.S. Department of Defense, and other agencies. NNSS is run by National Security Technologies, LLC. Visit our website NNSS NNSS Related News NNSA Statement Regarding Nevada National Security Site Management & Operating Contract NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T NNSA

  20. Office of Secure Transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | (NNSA) Office of Secure Transportation The Office of Secure Transportation (OST) is managed by the National Nuclear Security Administration within the U. S. Department of Energy. OST is responsible for the safe and secure transport in the contiguous United States of government-owned special nuclear materials. These classified shipments can contain nuclear weapons or components, enriched uranium, or plutonium. The cargo is transported in highly modified secure tractor-trailers and escorted

  1. nevada national security site | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nevada national security site NNSA Statement Regarding Nevada National Security Site Management & Operating Contract WASHINGTON - On August 26, 2016, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) awarded the contract for the management and operation of the Nevada National Security Site (NNSS) to Nevada Site Science Support and Technologies Corporation (NVS3T). The... NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T

  2. Department of Homeland Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Department of Homeland Security NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On

  3. Broader National Security Missions | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Broader National Security ... Broader National Security Missions Learn more For 70 years, the Y-12 National Security Complex has transformed in response to changing national security priorities and assigned missions, evolving technological opportunities, and growing concerns regarding health and public safety. As the global security situation has changed, the site has adapted - beginning as a uranium enrichment facility, transforming to a weapons manufacturing facility, and accepting new

  4. Security and Training | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and infrastructure. As a globally recognized leader in safeguards and security, Y-12 provides immediate and deployable solutions to mitigate these risks. We provide security solutions to other federal customers, other countries, commercial entities, universities and medical institutions, among others, and provide

  5. Hawaii | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Hawaii NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  6. NRC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NRC NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  7. containers | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    containers NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  8. material | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    material NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  9. Security News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security News Security News January 14, 2016 A Centerra Protective Force employee uses a mirror to check the undercarriage of a transport trailer before it enters a Savannah River Site Limited Area. EM Headquarters Office Ensures Safeguards, Security, Emergency Preparedness WASHINGTON, D.C. - The Office of Safeguards, Security and Emergency Preparedness has a unique function supporting the EM mission

  10. BPD Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security BPD Security Information related to the Building Performance Database (BPD) security and software controls. Building Performance Database (BPD) Security (140.29 KB) More Documents & Publications Buildings Performance Database - 2013 BTO Peer Review BPD Webinar: Analyze Building Energy Data, Understand Market Trends, Inform Decisions Buildings Performance Database (BPD) - 2014

  11. Headquarters Security Quick Reference Book

    Office of Energy Efficiency and Renewable Energy (EERE)

    This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

  12. Security Review Process | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Process Security Review Process Security Review Process (107.09 KB) More Documents & Publications Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Headquarters Facilities Master Security Plan - Chapter 1, Physical Security PSH-14-0092 - In the Matter of Personnel Security

  13. Safety and Security Enforcement Coordinator Handbook

    Broader source: Energy.gov (indexed) [DOE]

    & III-4) ......9 * Classified Information Security Noncompliance ... * Additional Guidance Unique to Classified Information Security Enforcement ...

  14. DOE Focus Areas and Panel Introduction

    Energy Savers [EERE]

    other benefits Big Data, Analytics Safety and Security Service-based business models Revenue streams Productivity Health and Human factors Resource, Process Optimization 11...

  15. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  16. Biological and Chemical Security

    SciTech Connect (OSTI)

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  17. Computer Security Risk Assessment

    Energy Science and Technology Software Center (OSTI)

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore » deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.« less

  18. Procurement Division Introduction | Princeton Plasma Physics Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Procurement Division Procurement Division Introduction Travel and Conference Services Careers/ Human Resources Directory Diversity and Inclusion Environment, Safety & Health Furth Plasma Physics Library Lab Leadership Organization Chart Technology Transfer Contact Us Business Operations Procurement Division Procurement Division Introduction Travel and Conference Services Careers/ Human Resources Directory Diversity and Inclusion Environment, Safety & Health Furth Plasma Physics Library

  19. Chapter_14_Cyber_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters

  20. IT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    IT NNSA Demonstrates its Commitment to Small Business The National Nuclear Security Administration (NNSA) recently selected three small businesses for its new Information Technology (IT) Infrastructure and Cyber Security Support Blanket Purchase Agreement. The contract covers a wide spectrum of IT and Cyber Security support for NNSA's Office of... Information Security Information security deals with requirements for the protection and control of information and matter required to be classified