Powered by Deep Web Technologies
Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > Field Offices > Welcome to the NNSA Production Office > Links Home > Field Offices > Welcome to the NNSA Production Office > Links Links NNSA HQ National Nuclear Security Administration Advanced Simulation & Computing NNSA Graduate Program NNSA Small Business Program Office of Defense Nuclear Nonproliferation Field Offices NNSA Albuquerque Complex Kansas City Field Office Livermore Field Office Los Alamos Field Office Naval Reactors Idaho Branch Office Nevada Field Office Sandia Field Office DOE Oak Ridge Sites Oak Ridge Office Oak Ridge National Laboratory UCOR Oak Ridge Institute for Science and Education Oak Ridge Site Specific Advisory Board American Museum of Science and Energy City of Oak Ridge Plants Laboratories Bechtel Nevada Bettis Laboratory Kansas City Plant Knolls Atomic Power Laboratory Lawrence Livermore National Laboratory

2

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Related Links Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Related Links Related Links NNSA Lab Directed Research and Development (LDRD) Lab Directed Research and Development Collaborations DOE Adanced Scientific Computing Research DTRA (Defense Threat Reduction Agency) NAS (National Academy of Sciences) NSF (National Science Foundation) DOD (Department of Defense) NASA Exascale Activities NNSA Exascale Environment Planning Workshop ASCR Co-Design Centers Supercomputing Top 500 List ASC at Supercomputing Conference Printer-friendly version Printer-friendly version Facebook

3

Demo Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Demo Links | National Nuclear Security Administration Demo Links | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Demo Links Home > About Us > Our Operations > Management and Budget > Human Resources > Pay-banding > Demo Links Demo Links Federal Register Notices July 31, 2008: Federal Register Notice This is a link to a PDF document.

4

EEO Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Links | National Nuclear Security Administration Links | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog EEO Links Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > EEO Links EEO Links DOE Office of Civil Rights (weblink) Department Of Justice Civil Rights Division (weblink) Department of Veterans Affairs (weblink)

5

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

6

Spatial tracker for an air-to-ground laser communication link  

E-Print Network [OSTI]

In this thesis, I designed several of the hardware components of a spatial tracker for an air-to-ground laser communication system; these include a PWM switching amplifier and the control systems for driving the primary ...

Near, William G

2012-01-01T23:59:59.000Z

7

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

About Us Our Programs Defense Programs Future Science & Technology Programs Advanced Simulation and Computing and Institutional R&D Programs Related Links Related Links...

8

V-001: Mozilla Security vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Mozilla Security vulnerabilities 1: Mozilla Security vulnerabilities V-001: Mozilla Security vulnerabilities October 12, 2012 - 6:00am Addthis PROBLEM: Mozilla Security vulnerabilities PLATFORM: Vulnerabilities are reported in Firefox and Thunderbird versions prior to 16.0.1 and SeaMonkey versions prior to 2.13.1. ABSTRACT: Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities REFERENCE LINKS: Secunia Advisory SA50932 Mozilla Security Blog Mozilla Foundation Security Advisory 2012-88 Mozilla Foundation Security Advisory 2012-89 SecurityTracker Alert ID: 1027653 SecurityTracker Alert ID: 1027652 SecurityTracker Alert ID: 1027651 CVE-2012-4190 CVE-2012-4191 CVE-2012-4192 CVE-2012-4193 IMPACT ASSESSMENT: High DISCUSSION: 1) The protected "location" object is accessible by other domain objects,

9

D0 silicon trackers  

SciTech Connect (OSTI)

The present Fermilab D0 silicon microstrip tracker, the silicon microstrip tracker which was designed to replace it, and plans for upgrading the present silicon tracker are described.

W. E. Cooper

2003-12-19T23:59:59.000Z

10

Securing linked transportation systems: economic implications and investment strategies  

E-Print Network [OSTI]

implications and investment strategies Adib Kanafani &research explores agency investment behavior in multi-agencysystems develops guidelines for investments in security. The

Kanafani, Adib; Huang, Jiangchuan

2010-01-01T23:59:59.000Z

11

Los Alamos lab director to link science education, national security in  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lab director to link science education, national security in talk Lab director to link science education, national security in talk Los Alamos lab director to link science education, national security in TEDxABQ talk McMillan will describe the events that led to his career in science and share suggestions on how non-scientists can inspire young people to STEM careers and scientific literacy. September 5, 2013 Los Alamos National Laboratory Director Charlie McMillan Los Alamos National Laboratory Director Charlie McMillan Contact Fred deSousa Communications Office (505) 665-3430 Email "Finding young people with the scientific and technical capabilities to carry on the Laboratory's national security missions will be critical, but the linkage to national security goes beyond that," McMillan said. Watch live stream at home or at Bradbury Science Museum

12

Los Alamos lab director to link science education, national security...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

education, national security in TEDxABQ talk McMillan will describe the events that led to his career in science and share suggestions on how non-scientists can inspire young...

13

RayTracker Inc | Open Energy Information  

Open Energy Info (EERE)

RayTracker Inc RayTracker Inc Jump to: navigation, search Name RayTracker Inc. Place Pasadena, California Zip 91103 Sector Solar Product California-based maker of single-axis solar tracker systems. Coordinates 29.690847°, -95.196308° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":29.690847,"lon":-95.196308,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

14

Project Opportunities Tracker | Open Energy Information  

Open Energy Info (EERE)

Project Opportunities Tracker Project Opportunities Tracker Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Project Opportunities Tracker Agency/Company /Organization: U.S. DOE Energy Efficiency and Renewable Energy Sector: Energy Focus Area: Industry Phase: Evaluate Options Topics: Implementation Resource Type: Dataset User Interface: Website Website: ecenter.ee.doe.gov/EM/tools/Pages/PortfolioToolHome.aspx Country: United States Web Application Link: ecenter.ee.doe.gov/EM/tools/Pages/PortfolioToolHome.aspx Cost: Free OpenEI Keyword(s): Industrial Northern America Language: English The Project Opportunities Tracker provides a central location for viewing, comparing and prioritizing energy-saving projects. It allows users to sort, edit, and save their recommendations from assessments and tools in one

15

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Broader source: Energy.gov (indexed) [DOE]

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

16

V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local  

Broader source: Energy.gov (indexed) [DOE]

4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. REFERENCE LINKS: Cisco Security Notice CVE-2013-1172 Cisco Security Notice CVE-2013-1173 SecurityTracker Alert ID: 1028425 CVE-2013-1172 CVE-2013-1173 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger a heap overflow in the Cisco Host Scan component to execute arbitrary code on the target system with System privileges

17

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

18

T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections |  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Tomcat May Ignore @ServletSecurity Annotation 0: Apache Tomcat May Ignore @ServletSecurity Annotation Protections T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections March 16, 2011 - 3:05pm Addthis PROBLEM: Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by an error related to ignoring @ServletSecurity annotations. An attacker could exploit this vulnerability to bypass security restrictions and launch further attacks on the system. PLATFORM: Apache Tomcat versions 7.0.0 through 7.0.10. ABSTRACT: Apache Tomcat May Ignore @ServletSecurity Annotation Protections. A remote user may be able to bypass @ServletSecurity annotation protections. reference LINKS: Apache Tomcat Advisory: Apache Tomcat 7.0.11 CVE-2011-1088 Security Tracker Alert ID:1025215 OSVDB ID: 71027

19

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Broader source: Energy.gov (indexed) [DOE]

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

20

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control  

Broader source: Energy.gov (indexed) [DOE]

26: Cisco Adaptive Security Appliances Port Forwarder ActiveX 26: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability March 16, 2012 - 7:00am Addthis PROBLEM: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability PLATFORM: Cisco Adaptive Security Appliance (ASA) 7.x, Cisco Adaptive Security Appliance (ASA) 8.x, Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Secunia Advisory SA48422 SecurityTracker Alert ID: 1026799 CVE-2012-0358 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Sun Tracker Guillermo Manuel Cidre  

E-Print Network [OSTI]

Sun Tracker By: Guillermo Manuel Cidre Haley Acevedo Maria Garcia Lili Mora Caroline Razuk Max Liriano #12;Overview: Sun Tracker · Goal: To sense sunlight and then follow the sun's movement · Optimizes Solar power capabilities by ensuring it is always facing the sun · Components ­ 2x Photodiodes ­ 2x

Lipson, Michal

22

Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links Links Dedicated links pages are available for the following topics: Diesel Vehicles and Fuels Electric Vehicles Fuel Cell Vehicles Hybrids Plug-in Hybrids Exit Fueleconomy.gov The links below are to pages that are not part of the fueleconomy.gov Web site. We offer these external links for your convenience in accessing additional information that may be useful or interesting to you. Auto Manufacturers Acura Aston Martin Audi Bentley BMW Bugatti Buick Cadillac Chevrolet Chrysler Dodge Ferrari Fiat Ford GMC Honda Hyundai Infiniti Jaguar Jeep Kia Lamborghini Land Rover Lexus Lincoln Lotus Maserati Maybach Mazda McLaren Automotive Mercedes-Benz MINI Mitsubishi Nissan Porsche Ram Rolls Royce Roush Performance Scion smart Spyker Subaru Suzuki Toyota Volkswagen Volvo VPG Buying Guides ACEEE's Green Book Aol Autos

23

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

24

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

25

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

26

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

27

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

6: Citrix Access Gateway Unspecified Security Bypass 6: Citrix Access Gateway Unspecified Security Bypass Vulnerability V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway PLATFORM: Standard Edition 5.0.x prior to 5.0.4.223524. Versions 4.5.x and 4.6.x are not affected by this vulnerability ABSTRACT: A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA52479 Security Tracker Alert ID 1028255 com/id/1028255 CVE-2013-2263 Citrix Knowledge Center IMPACT ASSESSMENT: High DISCUSSION: The vulnerability could allow an unauthenticated user to gain access to network resources. IMPACT:

28

Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links Links Public Outreach Clint Sprott's Wonders of Physics from University of Wisconsin, Madison Clint Sprott's Physics Demo Manual Phun Physics shows from University of Virginia Physics Van from Universitiy of Illinois, Urbana-Champaign How Does A Thing Like That Work from University of Pittsburgh Physics on the Road from Purdue University The Mad Science Group University Catalogues of Demonstrations Boston Univeristy's physics demonstrations University of Victoria physics demonstrations Wesleyan University physics demonstrations University of Minnesota, The Origin of the DCS Physics Demonstrations at the University of Texas at Austin University of Maryland University of Wisconsin University of Guelph University of Oregon Brown Physics Lecture Demonstrations University of California, Berkeley

29

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1  

E-Print Network [OSTI]

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1 2012 INTERNAL USER GUIDE A Guide to the Multiple Sclerosis Society Grant Tracker Society web page: http://www.mssociety.org.uk/ #12;Multiple Sclerosis Society (Grant Tracker) Multiple

30

U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

3: Trend Micro InterScan Messaging Security Flaws Permit 3: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks September 19, 2012 - 6:00am Addthis PROBLEM: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: 7.1-Build_Win32_1394; possibly other versions ABSTRACT: A vulnerability was reported in Trend Micro InterScan Messaging Security. reference LINKS: US CERT Vulnerability Note VU#471364 SecurityTracker Alert ID: 1027544 CVE-2012-2995 CVE-2012-2996 Micro Trend IMPACT ASSESSMENT: Medium Discussion: Several scripts do not properly filter HTML code from user-supplied input

31

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

32

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links  

E-Print Network [OSTI]

, a significant part of a vehicle's manufacturing cost goes towards the implementation of electronic components on vehicles on an individual basis eliminating labor costs from the auto manufacturers as well as from costs. To upload software in vehicles, it is critically important that this be done in a secure

Mahmud, Syed Masud

33

U-003:RPM Package Manager security update | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

03:RPM Package Manager security update 03:RPM Package Manager security update U-003:RPM Package Manager security update October 4, 2011 - 1:30pm Addthis PROBLEM: A vulnerability was reported in RPM Package Manager. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 4.9.1.1 and prior versions. ABSTRACT: RPM Package Manager Header Validation Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: RPM Package Manager Advisory RHSA-2011:1349-1 SecurityTracker Alert ID: 1026134 CVE-2011-3378 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted RPM package that, when queried or installed by the target user, will trigger a buffer overflow or memory corruption error and execute arbitrary code on the target system. The code

34

AODV-based technique for quick and secure local recovery from link failures in MANETs  

Science Journals Connector (OSTI)

Wireless links in MANET may be broken frequently due to nodal mobility and power failures. Such problems make routing protocols, like AODV, inefficient and unreliable. Presently, these problems are solved using local repairing mechanisms at an intermediate ...

Sajal Sarkar; Raja Datta

2013-06-01T23:59:59.000Z

35

The Office of Health, Safety and Security link to the VPPPA  

Broader source: Energy.gov [DOE]

Need to know which sites are current DOE-VPP or OSHA VPP Sites? The link, below, will take you to a Voluntary Protection Programs Participant's Association web page where you may search for current VPP sites by state.

36

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

37

U-011: Cisco Security Response: Cisco TelePresence Video Communication  

Broader source: Energy.gov (indexed) [DOE]

1: Cisco Security Response: Cisco TelePresence Video 1: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability U-011: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability October 14, 2011 - 12:30pm Addthis PROBLEM: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability PLATFORM: Version(s): VCS prior to 7.0 ABSTRACT: A vulnerability was reported in Cisco TelePresence Video Communication Server. A remote user can conduct cross-site scripting attacks. reference LINKS: Cisco Document ID: 113264 SecurityTracker Alert ID: 1026186 CVE-2011-3294 IMPACT ASSESSMENT: Medium Discussion: A vulnerability exists in Cisco TelePresence Video Communication Server (VCS) due to improper validation of user-controlled input to the web-based

38

Climate Action Tracker | Open Energy Information  

Open Energy Info (EERE)

Tracker Tracker Jump to: navigation, search Tool Summary Name: Climate Action Tracker Agency/Company /Organization: Ecofys Sector: Climate Topics: GHG inventory, Low emission development planning Resource Type: Guide/manual Website: www.climateactiontracker.org/ Climate Action Tracker Screenshot References: Climate Action Tracker[1] "This "Climate Action Tracker" is an independent science-based assessment, which tracks the emission commitments and actions of countries. The website provides an up-to-date assessment of individual national pledges to reduce their greenhouse gas emissions. In the framework of the UNFCCC, many countries have put proposals on the table about how much they intend to reduce their greenhouse-gas emissions in both the near and the long term.

39

Website Policies / Important Links | DOE Data Explorer  

Office of Scientific and Technical Information (OSTI)

Website Policies Important Links Website Policies Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links...

40

PIA - Tour Tracker | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Tracker More Documents & Publications PIA - INL Education Programs Business Enclave Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory TRAIN-PIA.pdf...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Oil Price Trackers Inspired by Immune Memory  

E-Print Network [OSTI]

We outline initial concepts for an immune inspired algorithm to evaluate and predict oil price time series data. The proposed solution evolves a short term pool of trackers dynamically, with each member attempting to map trends and anticipate future price movements. Successful trackers feed into a long term memory pool that can generalise across repeating trend patterns. The resulting sequence of trackers, ordered in time, can be used as a forecasting tool. Examination of the pool of evolving trackers also provides valuable insight into the properties of the crude oil market.

Wilson, WIlliam; Aickelin, Uwe

2010-01-01T23:59:59.000Z

42

TacNet Tracker - Energy Innovation Portal  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Electricity Transmission Find More Like This Return to Search TacNet Tracker Handheld Tracking and Communications Device Sandia National Laboratories Contact SNL About This...

43

Energy Design Assistance Project Tracker - 2014 BTO Peer Review...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Design Assistance Project Tracker - 2014 BTO Peer Review Energy Design Assistance Project Tracker - 2014 BTO Peer Review Presenter: Larry Brackney, National Renewable Energy...

44

The CDF Central Outer Tracker  

SciTech Connect (OSTI)

We describe the CDF Central Outer Tracker (COT), an open-cell drift chamber currently being constructed for the CDF detector to run at the upgraded Fermilab Tevatron collider. This detector will provide central tracking with excellent momentum resolution in the high- density environment of a hadron collider. It will be able to resolve 132 ns beam crossings and provide tracking trigger information to the Level 1 trigger. The design is based upon the existing and successful CDF Central Tracking Chamber. The preliminary mechanical and electrical designs are presented. 5 refs., 5 figs., 1 tab.

Pitts, K.T.; CDF Collaboration

1997-01-01T23:59:59.000Z

45

NOAA's Ship Tracker | Data.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NOAA's Ship Tracker NOAA's Ship Tracker Ocean Data Tools Technical Guide Map Gallery Regional Planning Feedback Ocean You are here Data.gov » Communities » Ocean » Data NOAA's Ship Tracker Dataset Summary Description NOAA's Ship Tracker is a viewer tool developed by the NOS Special Projects Office (SPO) for the Office of Marine and Aviation Operations (NOAA OMAO) which shows information about the location, present and past, of NOAA's ships. Ship location and the conditions where the ship was located are maintained on this site for one year. The NOAA fleet ranges from large oceanographic research vessels capable of exploring the world's deepest ocean, to smaller ships responsible for charting the shallow bays and inlets of the United States. The fleet supports a wide range of marine activities including fisheries research, nautical charting, and ocean and climate studies.

46

The double-arm barn door tracker  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

How to build a double-arm barn door tracker How to build a double-arm barn door tracker | Jefferson Lab Home Page | Science Education Home Page | Construction Notes/Photos Page | Sources: Sky & Telescope April 1989 (p436 - p441) [very good] Sky & Telescope February 1988 (p213 - p214) Original concept by Dave Trott A single-arm barn door tracker, driven by a straight screw, accumulates tangent error as time passes. Most of this error can be eliminated by adding a second hinged arm to the standard arrangement. There are four types of double-arm trackers, each with a different geometry. A comparison of accumulated error (in arc seconds) and construction parameters is given below: Error Chart [Apparently Type 1 is very bad and not worth constructing?? The two Type 4 drives vary in beta. This results in shifting the region of maximum error

47

Security Cases  

Broader source: Energy.gov (indexed) [DOE]

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

48

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

49

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Broader source: Energy.gov (indexed) [DOE]

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

50

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Broader source: Energy.gov (indexed) [DOE]

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

51

Entracker: Energy Tracker for Homes Sunil Mallya  

E-Print Network [OSTI]

Entracker: Energy Tracker for Homes Sunil Mallya Department of Computer Science Brown University in homes has gained momentum in recent years due to its important implications in energy conservation track the energy consumption of individual devices. We also introduce evaluation metrics to verify

Fonseca, Rodrigo

52

A Heavy Flavor Tracker for STAR  

SciTech Connect (OSTI)

We propose to construct a Heavy Flavor Tracker (HFT) for the STAR experiment at RHIC. The HFT will bring new physics capabilities to STAR and it will significantly enhance the physics capabilities of the STAR detector at central rapidities. The HFT will ensure that STAR will be able to take heavy flavor data at all luminosities attainable throughout the proposed RHIC II era.

Xu, Z.; Chen, Y.; Kleinfelder, S.; Koohi, A.; Li, S.; Huang, H.; Tai, A.; Kushpil, V.; Sumbera, M.; Colledani, C.; Dulinski, W.; Himmi,A.; Hu, C.; Shabetai, A.; Szelezniak, M.; Valin, I.; Winter, M.; Surrow,B.; Van Nieuwenhuizen, G.; Bieser, F.; Gareus, R.; Greiner, L.; Lesser,F.; Matis, H.S.; Oldenburg, M.; Ritter, H.G.; Pierpoint, L.; Retiere, F.; Rose, A.; Schweda, K.; Sichtermann, E.; Thomas, J.H.; Wieman, H.; Yamamoto, E.; Kotov, I.

2005-03-14T23:59:59.000Z

53

E-Print Network 3.0 - atlas semiconductor tracker Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Powered by Explorit Topic List Advanced Search Sample search results for: atlas semiconductor tracker Page: << < 1 2 3 4 5 > >> 1 ATLAS Tracker Upgrade: Silicon Strip...

54

The CHORUS scintillating fiber tracker and its monitoring systems  

E-Print Network [OSTI]

A scintillating fiber tracker system consisting of more than one million fibers has been successfully constructed and made operational for the CERN WA95/CHORUS experiment. The design and construction of the tracker system as well as its opto-electronic readout are described. The performance of the detector with high energy muons is presented.

Annis, P; Brooijmans, G; Brunner, J; Dupraz, J P; Dupont, J; Fabre, Jean-Paul; Favart, D; Flegel, Wilfried; Frekers, D; Grgoire, G; Gruw, M; Hrin, J; Hpfner, K; Kobayashi, M; Konijn, J; Kozaki, T; Lamonte, P; Lematre, V; Lendermann, P; Macina, Daniela; Meijer-Drees, R; Michel, L; Mommaert, C; Nakamura, K; Nakamura, M; Nakano, T; Nappey, P; Niwa, K; Niu, E; Panman, J; Pintus, R; Riccardi, F; Reynaud, S; Rondeshagen, D; Sato, O; Stefanini, G; Van Beek, G; Van der Donckt, M; Vilain, P; Weinheimer, C; Wilquet, G; Winter, Klaus; Wong, H T

1998-01-01T23:59:59.000Z

55

Cecilia Gerber, Fermilab The D0 Silicon Microstrip Tracker  

E-Print Network [OSTI]

1 Cecilia Gerber, Fermilab The D0 Silicon Microstrip Tracker Cecilia Gerber - Fermilab Outline · Conclusions and Outlook #12;2 Cecilia Gerber, Fermilab · Run II will start March 1st 2001 · Center forward preshower #12;3 Cecilia Gerber, Fermilab D0 Silicon Microstrip Tracker Barrel H-disk F

Gerber, Cecilia E.

56

Office of Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

57

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

58

A Heavy Flavor Tracker for STAR  

SciTech Connect (OSTI)

The STAR Collaboration proposes to construct a state-of-the-art microvertex detector,the Heavy Flavor Tracker (HFT), utilizing active pixel sensors and silicon strip technology. The HFT will significantly extend the physics reach of the STAR experiment for precision measurement of the yields and spectra of particles containing heavy quarks. This will be accomplished through topological identification of D mesons by reconstruction of their displaced decay vertices with a precision of approximately 50 mu m in p+p, d+A, and A+A collisions. The HFT consists of 4 layers of silicon detectors grouped into two sub-systems with different technologies, guaranteeing increasing resolution when tracking from the TPC and the Silicon Strip Detector (SSD) towards the vertex of the collision. The Intermediate Silicon Tracker (IST), consisting of two layers of single-sided strips, is located inside the SSD. Two layers of Silicon Pixel Detector (PIXEL) are inside the IST. The PIXEL detectors have the resolution necessary for a precision measurement of the displaced vertex. The PIXEL detector will use CMOS Active Pixel Sensors (APS), an innovative technology never used before in a collider experiment. The APSsensors are only 50 mu m thick and at a distance of only 2.5 cm from the interaction point. This opens up a new realm of possibilities for physics measurements. In particular, a thin detector (0.28percent radiation length per layer) in STAR makes it possible to do the direct topological reconstruction of open charm hadrons down to very low pT by the identification of the charged daughters of the hadronic decay.

Chasman, C.; Beavis, D.; Debbe, R.; Lee, J.H.; Levine, M.J.; Videbaek, F.; Xu, Z.; Kleinfelder, S.; Li, S.; Cendejas, R.; Huang, H.; Sakai, S.; Whitten, C.; Joseph, J.; Keane, D.; Margetis, S.; Rykov, V.; Zhang, W.M.; Bystersky, M.; Kapitan, J.; Kushpil, V.; Sumbera, M.; Baudot, J.; Hu-Guo, C.; Shabetai, A.; Szelezniak, M.; Winter, M.; Kelsey, J.; Milner, R.; Plesko, M.; Redwine, R.; Simon, F.; Surrow, B.; Van Nieuwenhuizen, G.; Anderssen, E.; Dong, X.; Greiner, L.; Matis, H.S.; Morgan, S.; Ritter, H.G.; Rose, A.; Sichtermann, E.; Singh, R.P.; Stezelberger, T.; Sun, X.; Thomas, J.H.; Tram, V.; Vu, C.; Wieman, H.H.; Xu, N.; Hirsch, A.; Srivastava, B.; Wang, F.; Xie, W.; Bichsel, H.

2008-02-25T23:59:59.000Z

59

The MROI fringe tracker: laboratory tracking with ICONN  

E-Print Network [OSTI]

. A., ICONN - The Infrared Coherencing Nearest Neighbor Tracker, Journal Astronomical Instrumentation 02(02), 1340006 (2013). 3. Armstrong, J. T., Mozurkewich, D., Pauls, T. A., and Hajian, A. R., Bootstrapping the NPOI: keeping long baselines...

McCracken, T. M.; Jurgenson, C. A.; Young, J. S.; Seneta, E. B.; Buscher, D. F.; Haniff, C. A.; Creech-Eakman, M. J.; Santoro, F. G.; Shtromberg, A. V.; Schmidt, L. M.; Rochelle, S.

2014-07-24T23:59:59.000Z

60

Designing star trackers to meet micro-satellite requirements  

E-Print Network [OSTI]

Star trackers provide numerous advantages over other attitude sensors because of their ability to provide full, three-axis orientation information with high accuracy and flexibility to operate independently from other ...

Huffman, Kara M. (Kara Marie)

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Energy Design Assistance Project Tracker- 2014 BTO Peer Review  

Broader source: Energy.gov [DOE]

Presenter: Larry Brackney, National Renewable Energy Laboratory The Energy Design Assistance Program Tracker (EDAPT) tracks and manages projects, performs automated quality checks of energy model designs, and generates project documentation and reports for commercial buildings.

62

Message Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

63

Office of Security Assistance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

64

Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

65

E-Print Network 3.0 - atlas silicon tracker Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

system, based on double-sided silicon strip dectectors... of the pion tracker for HADES The pion tracker is a new detector component for the High Acceptance Di... . Silicon...

66

K.K. Gan ATLAS Tracker Upgrade Workshop 1 Progress Report on Joint ATLAS/CMS  

E-Print Network [OSTI]

K.K. Gan ATLAS Tracker Upgrade Workshop 1 Progress Report on Joint ATLAS/CMS SLHC Opto ATLAS Tracker Upgrade Workshop 2 Outline Introduction Subgroups activities Summary #12;K.K. Gan ATLAS System #12;K.K. Gan ATLAS Tracker Upgrade Workshop 4 Group A: Lesson Learned and to be Learned from LHC

Gan, K. K.

67

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross...  

Broader source: Energy.gov (indexed) [DOE]

four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024...

68

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

69

Operation and performance of the ATLAS semiconductor tracker  

E-Print Network [OSTI]

The semiconductor tracker is a silicon microstrip detector forming part of the inner tracking system of the ATLAS experiment at the LHC. The operation and performance of the semiconductor tracker during the first years of LHC running are described. More than 99% of the detector modules were operational during this period, with an average intrinsic hit efficiency of (99.74 +/- 0.04)%. The evolution of the noise occupancy is discussed, and measurements of the Lorentz angle, delta-ray production and energy loss presented. The alignment of the detector is found to be stable at the few-micron level over long periods of time. Radiation damage measurements, which include the evolution of detector leakage currents, are found to be consistent with predictions and are used in the verification of radiation background simulations.

Aad, Georges; Abdallah, Jalal; Abdel Khalek, Samah; Abdinov, Ovsat; Aben, Rosemarie; Abi, Babak; Abolins, Maris; AbouZeid, Ossama; Abramowicz, Halina; Abreu, Henso; Abreu, Ricardo; Abulaiti, Yiming; Acharya, Bobby Samir; Adamczyk, Leszek; Adams, David; Adelman, Jahred; Adomeit, Stefanie; Adye, Tim; Agatonovic-Jovin, Tatjana; Aguilar-Saavedra, Juan Antonio; Agustoni, Marco; Ahlen, Steven; Ahmad, Ashfaq; Ahmadov, Faig; Aielli, Giulio; kesson, Torsten Paul Ake; Akimoto, Ginga; Akimov, Andrei; Alberghi, Gian Luigi; Albert, Justin; Albrand, Solveig; Alconada Verzini, Maria Josefina; Aleksa, Martin; Aleksandrov, Igor; Alexa, Calin; Alexander, Gideon; Alexandre, Gauthier; Alexopoulos, Theodoros; Alhroob, Muhammad; Alimonti, Gianluca; Alio, Lion; Alison, John; Allbrooke, Benedict; Allison, Lee John; Allport, Phillip; Allwood-Spiers, Sarah; Almond, John; Aloisio, Alberto; Alonso, Alejandro; Alonso, Francisco; Alpigiani, Cristiano; Altheimer, Andrew David; Alvarez Gonzalez, Barbara; Alviggi, Mariagrazia; Amako, Katsuya; Amaral Coutinho, Yara; Amelung, Christoph; Amidei, Dante; Amor Dos Santos, Susana Patricia; Amorim, Antonio; Amoroso, Simone; Amram, Nir; Amundsen, Glenn; Anastopoulos, Christos; Ancu, Lucian Stefan; Andari, Nansi; Andeen, Timothy; Anders, Christoph Falk; Anders, Gabriel; Anderson, Kelby; Andreazza, Attilio; Andrei, George Victor; Anduaga, Xabier; Angelidakis, Stylianos; Angelozzi, Ivan; Anger, Philipp; Angerami, Aaron; Anghinolfi, Francis; Anisenkov, Alexey; Anjos, Nuno; Annovi, Alberto; Antonaki, Ariadni; Antonelli, Mario; Antonov, Alexey; Antos, Jaroslav; Anulli, Fabio; Aoki, Masato; Aperio Bella, Ludovica; Apolle, Rudi; Arabidze, Giorgi; Aracena, Ignacio; Arai, Yasuo; Araque, Juan Pedro; Arce, Ayana; Arguin, Jean-Francois; Argyropoulos, Spyridon; Arik, Metin; Armbruster, Aaron James; Arnaez, Olivier; Arnal, Vanessa; Arnold, Hannah; Arslan, Ozan; Artamonov, Andrei; Artoni, Giacomo; Asai, Shoji; Asbah, Nedaa; Ashkenazi, Adi; Ask, Stefan; sman, Barbro; Asquith, Lily; Assamagan, Ketevi; Astalos, Robert; Atkinson, Markus; Atlay, Naim Bora; Auerbach, Benjamin; Augsten, Kamil; Aurousseau, Mathieu; Avolio, Giuseppe; Azuelos, Georges; Azuma, Yuya; Baak, Max; Bacci, Cesare; Bachacou, Henri; Bachas, Konstantinos; Backes, Moritz; Backhaus, Malte; Backus Mayes, John; Badescu, Elisabeta; Bagiacchi, Paolo; Bagnaia, Paolo; Bai, Yu; Bain, Travis; Baines, John; Baker, Oliver Keith; Baker, Sarah; Balek, Petr; Balli, Fabrice; Banas, Elzbieta; Banerjee, Swagato; Banfi, Danilo; Bangert, Andrea Michelle; Bannoura, Arwa A E; Bansal, Vikas; Bansil, Hardeep Singh; Barak, Liron; Baranov, Sergei; Barberio, Elisabetta Luigia; Barberis, Dario; Barbero, Marlon; Barillari, Teresa; Barisonzi, Marcello; Barklow, Timothy; Barlow, Nick; Barnett, Bruce; Barnett, Michael; Barnovska, Zuzana; Baroncelli, Antonio; Barone, Gaetano; Barr, Alan; Barreiro, Fernando; Barreiro Guimares da Costa, Joo; Bartoldus, Rainer; Barton, Adam Edward; Bartos, Pavol; Bartsch, Valeria; Bassalat, Ahmed; Basye, Austin; Bates, Richard; Batkova, Lucia; Batley, Richard; Battistin, Michele; Bauer, Florian; Bawa, Harinder Singh; Beau, Tristan; Beauchemin, Pierre-Hugues; Beccherle, Roberto; Bechtle, Philip; Beck, Hans Peter; Becker, Anne Kathrin; Becker, Sebastian; Beckingham, Matthew; Becot, Cyril; Beddall, Andrew; Beddall, Ayda; Bedikian, Sourpouhi; Bednyakov, Vadim; Bee, Christopher; Beemster, Lars; Beermann, Thomas; Begel, Michael; Behr, Katharina; Belanger-Champagne, Camille; Bell, Paul; Bell, William; Bella, Gideon; Bellagamba, Lorenzo; Bellerive, Alain; Bellomo, Massimiliano; Belloni, Alberto; Belotskiy, Konstantin; Beltramello, Olga; Benary, Odette; Benchekroun, Driss; Bendtz, Katarina; Benekos, Nektarios; Benhammou, Yan; Benhar Noccioli, Eleonora; Benitez Garcia, Jorge-Armando; Benjamin, Douglas; Bensinger, James; Benslama, Kamal; Bentvelsen, Stan; Berge, David; Bergeaas Kuutmann, Elin; Berger, Nicolas; Berghaus, Frank; Berglund, Elina; Beringer, Jrg; Bernabu, Jos; Bernard, Clare; Bernat, Pauline; Bernius, Catrin; Bernlochner, Florian Urs; Berry, Tracey; Berta, Peter; Bertella, Claudia; Bertolucci, Federico; Besana, Maria Ilaria; Besjes, Geert-Jan; Bessidskaia, Olga; Besson, Nathalie; Betancourt, Christopher; Bethke, Siegfried; Bhimji, Wahid; Bianchi, Riccardo-Maria; Bianchini, Louis; Bianco, Michele; Biebel, Otmar; Bieniek, Stephen Paul; Bierwagen, Katharina; Biesiada, Jed; Biglietti, Michela; Bilbao De Mendizabal, Javier; Bilokon, Halina; Bindi, Marcello; Binet, Sebastien; Bingul, Ahmet; Bini, Cesare; Black, Curtis; Black, James; Black, Kevin

2014-01-01T23:59:59.000Z

70

Operation and performance of the ATLAS semiconductor tracker  

E-Print Network [OSTI]

The semiconductor tracker is a silicon microstrip detector forming part of the inner tracking system of the ATLAS experiment at the LHC. The operation and performance of the semiconductor tracker during the first years of LHC running are described. More than 99% of the detector modules were operational during this period, with an average intrinsic hit efficiency of (99.74 +/- 0.04)%. The evolution of the noise occupancy is discussed, and measurements of the Lorentz angle, delta-ray production and energy loss presented. The alignment of the detector is found to be stable at the few-micron level over long periods of time. Radiation damage measurements, which include the evolution of detector leakage currents, are found to be consistent with predictions and are used in the verification of radiation background simulations.

ATLAS Collaboration

2014-04-29T23:59:59.000Z

71

The silicon microstrip sensors of the ATLAS semiconductor tracker  

SciTech Connect (OSTI)

This paper describes the AC-coupled, single-sided, p-in-n silicon microstrip sensors used in the Semiconductor Tracker (SCT) of the ATLAS experiment at the CERN Large Hadron Collider (LHC). The sensor requirements, specifications and designs are discussed, together with the qualification and quality assurance procedures adopted for their production. The measured sensor performance is presented, both initially and after irradiation to the fluence anticipated after 10 years of LHC operation. The sensors are now successfully assembled within the detecting modules of the SCT, and the SCT tracker is completed and integrated within the ATLAS Inner Detector. Hamamatsu Photonics Ltd. supplied 92.2percent of the 15,392 installed sensors, with the remainder supplied by CiS.

ATLAS SCT Collaboration; Spieler, Helmuth G.

2007-04-13T23:59:59.000Z

72

Clementine Star Tracker Stellar Compass: Final report part 1  

SciTech Connect (OSTI)

The Clementine mission provided the first ever complete, systematic surface mapping of the moon from the ultra-violet to the near-infrared regions. More than 1.7 million images of the moon, earth and space were returned from this mission. Two star stracker stellar compasses (star tracker camera + stellar compass software) were included on the spacecraft, serving a primary function of providing angle updates to the guidance and navigation system. These cameras served a secondary function by providing a wide field of view imaging capability for lunar horizon glow and other dark-side imaging data. This 290 g camera using a 576 x 384 focal plane array and a 17 mm entrance pupil, detected and centroided stars as dim and dimmer than 4.5 m{sub v}, providing rms pointing accuracy of better than 100 {mu}rad pitch and yaw and 450 {mu}rad roll. A description of this light-weight, low power star tracker camera along with a summary of lessons learned is presented. Design goals and preliminary on-orbit performance estimates are addressed in terms of meeting the mission`s primary objective for flight qualifying the sensors for future Department of Defense flights. Documentation generated during the design, analysis, build, test and characterization of the star tracker cameras are presented. Collectively, this documentation represents a small library of information for this camera, and may be used as a framework for producing copy units by commercial enterprises, and therefore satisfies a Department of Defense and Department of Energy goal to transfer technology to industry. However, the considerable knowledge gained from the experience of the individuals involved in the system trades, design, analysis, production, testing and characterization of the star tracker stellar compass is not contained in this documentation.

Priest, R.E.; Kordas, J.F.; Lewis, I.T. [and others

1995-07-01T23:59:59.000Z

73

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

74

Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

75

V-186: Drupal Login Security Module Security Bypass and Denial of Service  

Broader source: Energy.gov (indexed) [DOE]

6: Drupal Login Security Module Security Bypass and Denial of 6: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June 26, 2013 - 1:28am Addthis PROBLEM: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability PLATFORM: Login Security 6.x-1.x versions prior to 6.x-1.2. Login Security 7.x-1.x versions prior to 7.x-1.2. ABSTRACT: A security issue and a vulnerability have been reported in the Login Security module for Drupal REFERENCE LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2013-053 Secunia Advisory SA53717 CVE-2013-2197 CVE-2013-2198 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The security issue is caused due to an unspecified error and can be exploited to bypass the module features. Successful exploitation requires the "soft blocking" feature to be

76

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

77

Energy Citations Database (ECD) - Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take you to non-federal websites. Their policies may differ from this site....

78

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

5: ModSecurity Multipart Message Parsing Security Bypass 5: ModSecurity Multipart Message Parsing Security Bypass Vulnerability V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability October 18, 2012 - 6:00am Addthis PROBLEM: ModSecurity Multipart Message Parsing Security Bypass Vulnerability PLATFORM: Modsecurity Versions prior to 2.70 ABSTRACT: SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions REFERENCE LINKS: SEC Consult Secunia Advisory SA49853 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when parsing multipart requests and can be exploited to bypass certain filtering rules. IMPACT: Remote Security Bypass SOLUTION: Update to version 2.70. Addthis Related Articles V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities

79

Price Trackers Inspired by Immune Memory William O. Wilson*, Phil Birkin* and Uwe Aickelin*  

E-Print Network [OSTI]

Price Trackers Inspired by Immune Memory William O. Wilson*, Phil Birkin* and Uwe Aickelin* wow. In this paper we outline initial concepts for an immune in- spired algorithm to evaluate price time series data and mutation, with each member attempting to map to trends in price movements. Successful trackers feed

Aickelin, Uwe

80

Silicon photomultiplier choice for the scintillating fibre tracker in second generation proton computed tomography scanner  

SciTech Connect (OSTI)

Scintillating fibers are capable of charged particle tracking with high position resolution, as demonstrated by the central fiber tracker of the D0 experiment. The charged particles will deposit less energy in the polystyrene scintillating fibers as opposed to a typical silicon tracker of the same thickness, while SiPM's are highly efficient at detecting photons created by the passage of the charged particle through the fibers. The current prototype of the Proton Computed Tomography (pCT) tracker uses groups of three 0.5 mm green polystyrene based scintillating fibers connected to a single SiPM, while first generation prototype tracker used Silicon strip detectors. The results of R&D for the Scintillating Fiber Tracker (SFT) as part of the pCT detector are outlined, and the premise for the selection of SiPM is discussed.

Gearhart, A.; Johnson, E.; Medvedev, V.; /Northern Illinois U.; Ronzhin, A.; /Fermilab; Rykalin, V.; /Northern Illinois U.; Rubinov, P.; /Fermilab; Sleptcov, V.; /Unlisted, RU

2012-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

82

BSL-3 Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Biosafety Committee (IBC) Homepage National Institutes of Health U.S. DOE NEPA web U.S. Department of Energy National Institute of Allergy and Infectious Diseases Centers...

83

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity...

84

Resources & Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Western Interconnection Synchrophasor Project Resources & Links Demand Response Energy Efficiency Emerging Technologies Smart grid fact sheet Department of...

85

The Tevatron tune tracker pll - theory, implementation and measurements  

SciTech Connect (OSTI)

The Tevatron tune tracker is based on the idea that the transverse phase response of the beam can be measured quickly and accurately enough to allow us to track the betatron tune with a phase locked loop (PLL). The goal of this paper is to show the progress of the PLL project at Fermilab. We will divide this paper into three parts: theory, implementation and measurements. In the theory section, we will use a simple linear model to show that our design will track the betatron tune under conditions that occur in the Tevatron. In the implementation section we will break down and examine each part of the PLL and in some cases calculate the actual PLL parameters used in our system from beam measurements. And finally in the measurements section we will show the results of the PLL performance.

Tan, Cheng-Yang; /Fermilab

2004-12-01T23:59:59.000Z

86

Updated 1-12 Link H. Spann  

E-Print Network [OSTI]

Updated 1-12 Link H. Spann Director, Technology Security & Cooperative Programs Navy International of Navy (DoN) foreign disclosure policy to include technology, data, and hardware transfers and Do Technology Transfer and Security Assistance Review Board (TTSARB) disclosure decisions to establish Do

87

Cyber Security | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

88

E-Print Network 3.0 - ams-02 silicon tracker Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AND DARK MATTER SEARCH WITH AMS-02 Istituto Nazionale di Fisica Nucleare Summary: and dark energy. AMS-02 is shown in figure 2. It consists of a silicon tracker installed...

89

Signal Peak-Tracker based on the Teager-Kaiser Energy (TKE) Operator  

E-Print Network [OSTI]

Described is a modification of the TKE operator from its usual `energy form'. The resulting `peak-tracker' (or peak-detector) is especially useful in studies that involve the frequency domain.

Randall D. Peters

2010-10-25T23:59:59.000Z

90

Evaluation of a heliostat tracker for linear Fresnel lens photovoltaic concentrators  

SciTech Connect (OSTI)

This report presents the results of an evaluation of a heliostat tracking structure used as a two-axis tracking platform for ENTECH's linear focus Fresnel lens photovoltaic collectors. The study included the installation and operation of a heliostat tracker populated with 30 modules (1 operational and 29 non-operational) on a 32-ft x 32-ft platform. Details of the array installation, collector mounting, and array tracking accuracy are provided. Test results demonstrate that the heliostat tracker meets the performance requirements imposed by the collector. The evaluation includes a comparison of the heliostat tracker approach with the current tracker approach (a roll/tilt array). Results of the comparison do not identify a clearly superior option.

Not Available

1986-12-01T23:59:59.000Z

91

The electromagnetic calorimeter for the solenoidal tracker at RHIC. A Conceptual Design Report  

SciTech Connect (OSTI)

This report discusses the following on the electromagnetic calorimeter for the solenoidal tracker at RHIC: conceptual design; the physics of electromagnetic calorimetry in STAR; trigger capability; integration into STAR; and cost, schedule, manpower, and funding.

Beddo, M.E.; Bielick, E.; Dawson, J.W. [Argonne National Lab., IL (United States)] [and others; The STAR EMC Collaboration

1993-09-22T23:59:59.000Z

92

Safety, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

93

Lab announces security changes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

94

AFRD - Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links Links Home Organization Diversity Research Highlights Safety Links Intramural Links Accelerators are built, operated, and used by a large and diverse worldwide community. These links will take you to pages elsewhere that are related to AFRD’ work. The U.S. Department of Energy, Office of Science, is the principal supporter of our activities (and many other R&D endeavors). For information on the Joint Accelerator Conferences go to JACoW. The International Committee for Future Accelerators and the American Physical Society’ Division of Physics of Beams are among the organizations that advance, encourage, and communicate accelerator and beam science. The Laboratory's 50th Anniversary magazine gives an overview of the early and middle history of LBNL. Two of its authors later published the

95

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

96

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

nonpartisan organization with a mission to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological, and chemical weapons and to...

97

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

98

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

99

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

100

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

102

Setup of precise camera based solar tracker systems and greenhouse gas measurements using a modified portable spectrometer.  

E-Print Network [OSTI]

??Methods for correcting errors in solar absorption FTIR spectroscopy using the Sun as the light source were developed. A novel camera-based solar tracker is presented, (more)

Gisi, Michael

2012-01-01T23:59:59.000Z

103

Energy Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

104

Diesel Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links Links Exit Fueleconomy.gov The links below are to pages that are not part of the fueleconomy.gov Web site. We offer these external links for your convenience in accessing additional information that may be useful or interesting to you. Diesel Vehicles and Manufacturers Audi A3 (TDI models) A6 (TDI models) A7 (TDI models) A8 L (TDI model) Q5 (TDI models) Q7 (TDI models) BMW 328d Sedan 328d xDrive Sedan 328d xDrive Sports Wagon 535d Sedan 535d xDrive Sedan Chevrolet Cruze Turbo Diesel Jeep Grand Cherokee EcoDiesel Mercedes-Benz E250 BlueTEC GL350 BlueTEC GLK250 BlueTEC ML350 BlueTEC Porsche Cayenne Diesel Volkswagen Beetle (TDI models) Beetle Convertible (TDI models) Golf (TDI models) Jetta (TDI models) Jetta Sportwagen (TDI models) Passat (TDI models) Touareg (TDI models) Diesel-Related Information

105

Silicon Sensors for Trackers at High-Luminosity Environment  

E-Print Network [OSTI]

The planned upgrade of the LHC accelerator at CERN, namely the high luminosity (HL) phase of the LHC (HL-LHC foreseen for 2023), will result in a more intense radiation environment than the present tracking system was designed for. The required upgrade of the all-silicon central trackers at the ALICE, ATLAS, CMS and LHCb experiments will include higher granularity and radiation hard sensors. The radiation hardness of the new sensors must be roughly an order of magnitude higher than the one of LHC detectors. To address this, a massive R&D program is underway within the CERN RD50 collaboration "Development of Radiation Hard Semiconductor Devices for Very High Luminosity Colliders" to develop silicon sensors with sufficient radiation tolerance. Research topics include the improvement of the intrinsic radiation tolerance of the sensor material and novel detector designs with benefits like reduced trapping probability (thinned and 3D sensors), maximized sensitive area (active edge sensors) and enhanced charge carrier generation (sensors with intrinsic gain). A review of the recent results from both measurements and TCAD simulations of several detector technologies and silicon materials at radiation levels expected for HL-LHC will be presented.

Timo Peltola

2014-11-26T23:59:59.000Z

106

Conceptual design report for the Solenoidal Tracker at RHIC  

SciTech Connect (OSTI)

The Solenoidal Tracker At RHIC (STAR) will search for signatures of quark-gluon plasma (QGP) formation and investigate the behavior of strongly interacting matter at high energy density. The emphasis win be the correlation of many observables on an event-by-event basis. In the absence of definitive signatures for the QGP, it is imperative that such correlations be used to identify special events and possible signatures. This requires a flexible detection system that can simultaneously measure many experimental observables. The physics goals dictate the design of star and it's experiment. To meet the design criteria, tracking, momentum analysis, and particle identification of most of the charged particles at midrapidity are necessary. The tracking must operate in conditions at higher than the expected maximum charged particle multiplicities for central Au + Au collisions. Particle identification of pions/kaons for p < 0.7 GeV/c and kaons/protons for p < 1 GeV/c, as well as measurement of decay particles and reconstruction of secondary vertices will be possible. A two-track resolution of 2 cm at 2 m radial distance from, the interaction is expected. Momentum resolution of {Delta}p/p {approximately} 0.02 at p = 0.1 GeV/c is required to accomplish the physics, and,{Delta}p/p of several percent at p = 10 GeV/c is sufficient to accurately measure the rapidly failing spectra at high Pt and particles from mini-jets and jets.

Not Available

1992-06-15T23:59:59.000Z

107

Conceptual design report for the Solenoidal Tracker at RHIC  

SciTech Connect (OSTI)

The Solenoidal Tracker At RHIC (STAR) will search for signatures of quark-gluon plasma (QGP) formation and investigate the behavior of strongly interacting matter at high energy density. The emphasis win be the correlation of many observables on an event-by-event basis. In the absence of definitive signatures for the QGP, it is imperative that such correlations be used to identify special events and possible signatures. This requires a flexible detection system that can simultaneously measure many experimental observables. The physics goals dictate the design of star and it`s experiment. To meet the design criteria, tracking, momentum analysis, and particle identification of most of the charged particles at midrapidity are necessary. The tracking must operate in conditions at higher than the expected maximum charged particle multiplicities for central Au + Au collisions. Particle identification of pions/kaons for p < 0.7 GeV/c and kaons/protons for p < 1 GeV/c, as well as measurement of decay particles and reconstruction of secondary vertices will be possible. A two-track resolution of 2 cm at 2 m radial distance from, the interaction is expected. Momentum resolution of {Delta}p/p {approximately} 0.02 at p = 0.1 GeV/c is required to accomplish the physics, and,{Delta}p/p of several percent at p = 10 GeV/c is sufficient to accurately measure the rapidly failing spectra at high Pt and particles from mini-jets and jets.

The STAR Collaboration

1992-06-15T23:59:59.000Z

108

Department of Energy Security Condition (SECON) | Department...  

Energy Savers [EERE]

facilities, sites and locations. SECON Level descriptions per DOE O 470.4B, Safeguards and Security Program, are linked to the SECON level displayed on the EHSS homepage....

109

T-599: Microsoft April 2011 Security Bulletin Release | Department of  

Broader source: Energy.gov (indexed) [DOE]

99: Microsoft April 2011 Security Bulletin Release 99: Microsoft April 2011 Security Bulletin Release T-599: Microsoft April 2011 Security Bulletin Release April 11, 2011 - 5:24am Addthis PROBLEM: Microsoft April 2011 Security Bulletin Release PLATFORM: Microsoft Windows, Microsoft Office, Microsoft Server Software, and Microsoft Developer Tools and Software ABSTRACT: Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. reference LINKS: Microsoft Security Bulletin Advance Notification for April 2011 Microsoft Security April Affected Software TechNet Webcast: Information About Microsoft April Security Bulletins IMPACT ASSESSMENT: High Discussion:

110

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

111

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

112

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

113

Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

114

ENERGY SECURITY  

Broader source: Energy.gov (indexed) [DOE]

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

115

Tracker: A three-dimensional raytracing program for ionospheric radio propagation  

SciTech Connect (OSTI)

TRACKER is an extension of a three-dimensional Hamiltonian raytrace code developed some thirty years ago by R. Michael Jones. Subsequent modifications to this code, which is commonly called the {open_quotes}Jones Code,{close_quotes} were documented by Jones and Stephensen (1975). TRACKER incorporates an interactive user`s interface, modern differential equation integrators, graphical outputs, homing algorithms, and the Ionospheric Conductivity and Electron Density (ICED) ionosphere. TRACKER predicts the three-dimensional paths of radio waves through model ionospheres by numerically integrating Hamilton`s equations, which are a differential expression of Fermat`s principle of least time. By using continuous models, the Hamiltonian method avoids false caustics and discontinuous raypath properties often encountered in other raytracing methods. In addition to computing the raypath, TRACKER also calculates the group path (or pulse travel time), the phase path, the geometrical (or {open_quotes}real{close_quotes}) pathlength, and the Doppler shift (if the time variation of the ionosphere is explicitly included). Computational speed can be traded for accuracy by specifying the maximum allowable integration error per step in the integration. Only geometrical optics are included in the main raytrace code; no partial reflections or diffraction effects are taken into account. In addition, TRACKER does not lend itself to statistical descriptions of propagation -- it requires a deterministic model of the ionosphere.

Argo, P.E.; DeLapp, D.; Sutherland, C.D.; Farrer, R.G.

1994-12-01T23:59:59.000Z

116

Sandia National Laboratories: Energy Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

with an elevation tracker and mounted on the rotating platform, the solar position ... CSP Contacts On April 14, 2011, in Sandia Concentrating Solar Technologies Contacts...

117

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

118

MIDC: Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links Links Other Data Collection Activities Baseline Surface Radiation Network (BSRN) Clear Sky Forcast for NREL/SRRL (or other locations) Colorado Dept. of Public Health & Environment: Air Quality Index (AQI) Reporting System Colorado State University: USDA UV-B Monitoring and Research Program European Skynet Radiometers network (ESR) Jefferson County, Colorado: Jeffco Weather Station NOAA: Climate Monitoring & Diagnostics Laboratory (CMDL) NREL OTF: Reference Meteorological and Irradiance System (RMIS) NREL RReDC: Cooperative Networks for Renewable Resource Measurements (CONFRRM) NREL RReDC: NASA Remote Sensing Validation Data: Saudi Arabia Rocky Mountain Arsenal (RMA): National Wildlife Refuge Sandia National Laboratories: Photovoltaic Systems Evaluation

119

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

120

Security Rulemaking  

Broader source: Energy.gov (indexed) [DOE]

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

122

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

123

K.K. Gan ATLAS Tracker Upgrade Workshop 1 Nov 5, 2008  

E-Print Network [OSTI]

channel Preliminary #12;K.K. Gan ATLAS Tracker Upgrade Workshop 8 Radiation-Hardness of GaAs PIN AOC.03 AOC 5.0 0.60 0.04 Optowell 3.125 0.60 0.10 Hamamatsu G8921 2.5 0.50 0.20 Si Taiwan 1.0 0.55 0 irradiation with SLHC dose: AOC(5 & 10 G) have good power #12;K.K. Gan ATLAS Tracker Upgrade Workshop 12

Gan, K. K.

124

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

125

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NSS cover - april NSS cover - april Read the April 2013 issue: web | interactive| pdf Skip to Content Skip to Search Skip to Utility Navigation Skip to Top Navigation Skip to Content Navigation Los Alamos National Laboratory submit About | Mission | Business | Newsroom | Phonebook Los Alamos National Laboratory links to site home page Science & Innovation Collaboration Careers, Jobs Community, Environment Science & Innovation Home » Science & Engineering Capabilities Accelerators, Electrodynamics Bioscience, Biosecurity, Health Chemical Science Earth, Space Sciences Energy Engineering High Energy Density Plasmas, Fluids Information Science, Computing, Applied Math Materials Science National Security, Weapons Science Nuclear & Particle Physics, Astrophysics, Cosmology

126

Energy Security Council  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Watkins...

127

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

128

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

129

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

130

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

131

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Tags Tag: Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website,...

132

VAST 2011 Mini-Challenge: UNC Charlotte Viral Tracker Alex Midgett Jackie Guest Kalpathi Subramanian  

E-Print Network [OSTI]

VAST 2011 Mini-Challenge: UNC Charlotte Viral Tracker Alex Midgett Jackie Guest Kalpathi primary fea- tures, (1) The Adaptive Grid Overlay, which computes an average threshold and highlights-mail:krs@uncc.edu Figure 1: Text Processing Pipeline. value. It is adaptive in the sense that the grid automatically re

Subramanian, Kalpathi R.

133

Rotation Angle for the Optimum Tracking of One-Axis Trackers  

SciTech Connect (OSTI)

An equation for the rotation angle for optimum tracking of one-axis trackers is derived along with equations giving the relationships between the rotation angle and the surface tilt and azimuth angles. These equations are useful for improved modeling of the solar radiation available to a collector with tracking constraints and for determining the appropriate motor revolutions for optimum tracking.

Marion, W. F.; Dobos, A. P.

2013-07-01T23:59:59.000Z

134

UBC Social, Ecological Economic Development Studies (SEEDS) Student Report GHG Emissions Data Tracker User Manual  

E-Print Network [OSTI]

UBC Social, Ecological Economic Development Studies (SEEDS) Student Report GHG Emissions Data of a project/report." #12;GHG Emissions Data Tracker User Manual #12;Add/Edit vehicles Vehicles type addition field #12;Add New GHG Emissions Data This is the average CO2 data, distinguish by year, that user can

135

ATLAS Tracker Upgrade: Silicon Strip Detectors for the sLHC  

E-Print Network [OSTI]

ATLAS Tracker Upgrade: Silicon Strip Detectors for the sLHC Sergey Burdin (University of Liverpool) for ATLAS Collaboration 13th ISTC SAC Seminar "New Perspectives of High Energy Physics" 1-5 September, 2010 2021 Commission new detectors Apr 2021 - Jun 2021 Take data July 2021 3 Sep 2010 2S.Burdin / Atlas

136

Security rethink  

Science Journals Connector (OSTI)

......breaches or heightening the risks. One of my clients...business to the socio-political situation of particular...based on the return on investment in keeping a high standard...times that security risks are at their highest...lay-offs. The return on investment must consider the positive......

Michael Chua

2002-09-01T23:59:59.000Z

137

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

138

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

139

Physical Security Systems | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

140

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

142

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

143

Nonproliferation & International Security | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

144

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

145

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

146

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

147

Transportation Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Transportation Security Transportation Security Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste...

148

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

149

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

150

Security for grids  

SciTech Connect (OSTI)

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

151

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department of  

Broader source: Energy.gov (indexed) [DOE]

6: Citrix Secure Gateway Unspecified Vulnerability 6: Citrix Secure Gateway Unspecified Vulnerability T-566: Citrix Secure Gateway Unspecified Vulnerability February 28, 2011 - 11:22pm Addthis PROBLEM: Citrix Secure Gateway Unspecified Vulnerability. PLATFORM: Citrix Secure Gateway version 3.1.4 ABSTRACT: A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia Advisory SA43497 Citrix Support IMPACT ASSESSMENT: High Discussion: This vulnerability only affects Secure Gateway version 3.1.4. Secure Gateway version 3.2.0 is not affected by this vulnerability, but Citrix recommends that customers currently using this version upgrade their deployments to version 3.2.1 in line with the guidance provided in

152

T-687: Microsoft Security Bulletin Advance Notification for August 2011 |  

Broader source: Energy.gov (indexed) [DOE]

87: Microsoft Security Bulletin Advance Notification for August 87: Microsoft Security Bulletin Advance Notification for August 2011 T-687: Microsoft Security Bulletin Advance Notification for August 2011 August 8, 2011 - 3:50pm Addthis PROBLEM: This is an advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Advance Notification for August 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: An advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. 12 Bulletin updates and two are considered 'Critical'. Impact: This advance notification provides a number as the bulletin identifier,

153

First results about on-ground calibration of the Silicon Tracker for the AGILE satellite  

E-Print Network [OSTI]

The AGILE scientific instrument has been calibrated with a tagged $\\gamma$-ray beam at the Beam Test Facility (BTF) of the INFN Laboratori Nazionali di Frascati (LNF). The goal of the calibration was the measure of the Point Spread Function (PSF) as a function of the photon energy and incident angle and the validation of the Monte Carlo (MC) simulation of the silicon tracker operation. The calibration setup is described and some preliminary results are presented.

Cattaneo, P W; Boffelli, F; Bulgarelli, A; Buonomo, B; Chen, A W; D'Ammando, F; Froysland, T; Fuschino, F; Galli, M; Gianotti, F; Giuliani, A; Longo, F; Marisaldi, M; Mazzitelli, G; Pellizzoni, A; Prest, M; Pucella, G; Quintieri, L; Rappoldi, A; Tavani, M; Trifoglio, M; Trois, A; Valente, P; Vallazza, E; Vercellone, S; Zambra, A; Barbiellini, G; Caraveo, P; Cocco, V; Costa, E; De Paris, G; Del Monte, E; Di Cocco, G; Donnarumma, I; Evangelista, Y; Feroci, M; Ferrari, A; Fiorini, M; Labanti, C; Lapshov, I; Lazzarotto, F; Lipari, P; Mastropietro, M; Mereghetti, S; Morelli, E; Moretti, E; Morselli, A; Pacciani, L; Perotti, F; Piano, G; Picozza, P; Pilia, M; Porrovecchio, G; Rapisarda, M; Rubini, A; Sabatini, S; Soffitta, P; Striani, E; Vittorini, V; Zanello, D; Colafrancesco, S; Giommi, P; Pittori, C; Santolamazza, P; Verrecchia, F; Salotti, L

2011-01-01T23:59:59.000Z

154

Climate-derived tensions in Arctic security.  

SciTech Connect (OSTI)

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

155

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

156

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

157

STAR (Solenoidal Tracker at RHIC) Figures and Data  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The primary physics task of STAR is to study the formation and characteristics of the quark-gluon plasma (QGP), a state of matter believed to exist at sufficiently high energy densities. STAR consists of several types of detectors, each specializing in detecting certain types of particles or characterizing their motion. These detectors work together in an advanced data acquisition and subsequent physics analysis that allows final statements to be made about the collision. The STAR Publications page provides access to all published papers by the STAR Collaboration, and many of them have separate links to the figures and data found in or supporting the paper. See also the data-rich summaries of the research at http://www.star.bnl.gov/central/physics/results/. [See also DDE00230

The STAR Collaboration

158

V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue |  

Broader source: Energy.gov (indexed) [DOE]

0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue 0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue July 2, 2013 - 12:38am Addthis PROBLEM: ASUS RT-N66U Router AiCloud Security Bypass Security Issue PLATFORM: ASUS RT-N66U Router firmware versions 3.0.0.4.270 and 3.0.0.4.354. ABSTRACT: A security issue in ASUS RT-N66U Router has been reported REFERENCE LINKS: Secunia Advisory SA53931 neohapsis IMPACT ASSESSMENT: Medium DISCUSSION: The security issue is caused due to the device not properly restricting access when processing certain HTTPS requests and can be exploited to gain access to otherwise restricted functionality and e.g. disclose the contents of arbitrary files and directories. Successful exploitation requires the AiCloud web service to be enabled.

159

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

160

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Security | Department of Energy  

Energy Savers [EERE]

Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

162

Security & Privacy | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

163

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

164

A European vision for addressing global security threats  

Science Journals Connector (OSTI)

There is a robust consensus among EU Member States about the need to identify the complex links between the threats and challenges to the EUs security. ... and instruments required to effectively respond to secu...

Gerhard Sabathil

2010-06-01T23:59:59.000Z

165

Energy Independence and Security Act of 2007 | Open Energy Information  

Open Energy Info (EERE)

This article is a stub. You can help OpenEI by expanding it. External Links Energy Independence and Security Act of 2007 Retrieved from "http:en.openei.orgw...

166

Office of Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

167

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

168

Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

169

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

170

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

171

Better Security Through Discussion | Department of Energy  

Office of Environmental Management (EM)

Better Security Through Discussion Better Security Through Discussion Better Security Through Discussion More Documents & Publications Indiana Department of Homeland Security -...

172

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

173

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

174

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

175

U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

97: Cisco Adaptive Security Appliances Denial of Service 97: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability is caused due to an unspecified error when handling IPv6 transit traffic and can be exploited to cause a reload of the affected device. reference LINKS: Vendor Advisory Secunia ID 49647 CVE-2012-3058 IMPACT ASSESSMENT: High Discussion: Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) and Cisco

176

Center for Environment and National Security at Scripps | Open Energy  

Open Energy Info (EERE)

National Security at Scripps National Security at Scripps Jump to: navigation, search Logo: Center for Environment and National Security at Scripps Name Center for Environment and National Security at Scripps Place San Diego, California Website http://sio.ucsd.edu/cens/ References CENS - About[1] LinkedIn Connections Contents 1 Overview 2 Headlines 3 Resources 3.1 CENS Programs 3.2 CENS Tools 4 References Overview Center for Environment and National Security at Scripps is an organization based in San Diego, California. "The Center uses the formidable science and research capacity of Scripps Institution of Oceanography to clarify significant environmental impacts on our national security and international human security, thus bringing information to policy makers for the resolution of society's most pressing

177

T-717: Microsoft Security Bulletin Summary for September 2011 | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Microsoft Security Bulletin Summary for September 2011 7: Microsoft Security Bulletin Summary for September 2011 T-717: Microsoft Security Bulletin Summary for September 2011 September 14, 2011 - 9:30am Addthis PROBLEM: Summary of Microsoft security bulletins released on September 13, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Summary for September 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: CVE-2011-1984 - MS11-070 WINS Local Elevation of Privilege Vulnerability CVE-2011-1991 - MS11-071 Windows Components Insecure Library Loading Vulnerability CVE-2011-1986 - MS11-072 Excel Use after Free WriteAV Vulnerability CVE-2011-1987 - MS11-072 Excel Out of Bounds Array Indexing Vulnerability

178

US National Nuclear Security Administration NNSA | Open Energy Information  

Open Energy Info (EERE)

Nuclear Security Administration NNSA Nuclear Security Administration NNSA Jump to: navigation, search Name US National Nuclear Security Administration (NNSA) Place Washington, DC Zip 20585 Product Washington D.C.-based nuclear body established by the United States Congress as a separately organized agency within the US Department of Energy. References US National Nuclear Security Administration (NNSA)[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. US National Nuclear Security Administration (NNSA) is a company located in Washington, DC . References ↑ "US National Nuclear Security Administration (NNSA)" Retrieved from "http://en.openei.org/w/index.php?title=US_National_Nuclear_Security_Administration_NNSA&oldid=352617

179

T-628: Debian APR Library Security Update | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update May 23, 2011 - 3:35pm Addthis PROBLEM: Debian APR Library Security Update. PLATFORM: APR packages: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0 ABSTRACT: A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. reference LINKS: Debian Security Advisory DSA-2237-2 Security Database Adviory Security Focus Advisory CVE-2011-1928 CVE-2011-0419 Secunia Advisory SA44574 IMPACT ASSESSMENT: Medium Discussion: A directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack.

180

T-533: Microsoft January 2011 Security Bulletin Release | Department of  

Broader source: Energy.gov (indexed) [DOE]

3: Microsoft January 2011 Security Bulletin Release 3: Microsoft January 2011 Security Bulletin Release T-533: Microsoft January 2011 Security Bulletin Release January 12, 2011 - 2:25pm Addthis PROBLEM: Microsoft January 2011 Security Bulletin Release PLATFORM: Various Windows OS Platforms, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2 ABSTRACT: Microsoft released 2 bulletins to address 3 vulnerabilities involving Microsoft Windows and components in Windows OS, and Windows Server Releases. Only 1 of these bulletins get our maximum severity rating of Critical. reference LINKS: Microsoft Security Bulletin Advance Notification for December 2010 TechNet Webcast: Information About Microsoft January 2011 Security Bulletins Discussion: Microsoft Security Bulletin MS11-001 - Important CVE-2010-3145 - This

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

MN Office of Energy Security | Open Energy Information  

Open Energy Info (EERE)

MN Office of Energy Security MN Office of Energy Security Jump to: navigation, search Name MN Office of Energy Security Place St. Paul, MN Website http://www.mnofficeofenergysec References MN Office of Energy Security[1] Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building Systems Integration LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! MN Office of Energy Security is a company located in St. Paul, MN. References ↑ "MN Office of Energy Security" Retrieved from "http://en.openei.org/w/index.php?title=MN_Office_of_Energy_Security&oldid=379158" Categories: Clean Energy Organizations Companies Organizations

182

NERSC Computer Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

183

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

184

Mathematical modeling and simulation in applications for safety and security in society,  

E-Print Network [OSTI]

of safety and security. · Object-oriented modeling for safety and security. · Modeling and simulation r e n c e T h e m e s Modeling and Simulation for Public Safety Linköping, Sweden L i n k ö p i n g· Mathematical modeling and simulation in applications for safety and security in society

Zhao, Yuxiao

185

A reliable, fast and low cost maximum power point tracker for photovoltaic applications  

SciTech Connect (OSTI)

This work presents a new maximum power point tracker system for photovoltaic applications. The developed system is an analog version of the ''P and O-oriented'' algorithm. It maintains its main advantages: simplicity, reliability and easy practical implementation, and avoids its main disadvantages: inaccurateness and relatively slow response. Additionally, the developed system can be implemented in a practical way at a low cost, which means an added value. The system also shows an excellent behavior for very fast variables in incident radiation levels. (author)

Enrique, J.M.; Andujar, J.M.; Bohorquez, M.A. [Departamento de Ingenieria Electronica, de Sistemas Informaticos y Automatica, Universidad de Huelva (Spain)

2010-01-15T23:59:59.000Z

186

The SuperB Silicon Vertex Tracker and 3D vertical integration  

E-Print Network [OSTI]

The construction of the SuperB high luminosity collider was approved and funded by the Italian government in 2011. The performance specifications set by the target luminosity of this machine (> 10^36 cm^-2 s^-1) ask for the development of a Silicon Vertex Tracker with high resolution, high tolerance to radiation and excellent capability of handling high data rates. This paper reviews the R&D activity that is being carried out for the SuperB SVT. Special emphasis is given to the option of exploiting 3D vertical integration to build advanced pixel sensors and readout electronics that are able to comply with SuperB vertexing requirements.

Re, Valerio

2011-01-01T23:59:59.000Z

187

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Broader source: Energy.gov (indexed) [DOE]

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

188

Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

189

Security Notice | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

190

Frequently Used Forms and Links | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Safeguards & Security Safeguards & Security » Frequently Used Forms and Links Safety, Security and Infrastructure (SSI) SSI Home Facilities and Infrastructure Safeguards & Security Frequently Used Forms and Links Environment, Safety and Health (ES&H) Organization Chart .pdf file (82KB) Phone Listing .pdf file (129KB) SC HQ Continuity of Operations (COOP) Implementation Plan .pdf file (307KB) Categorical Exclusion Determinations SLI & SS Budget Contact Information Safety, Security and Infrastructure U.S. Department of Energy SC-31/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-4097 F: (301) 903-7047 Safeguards & Security Frequently Used Forms and Links Print Text Size: A A A RSS Feeds FeedbackShare Page Frequently Used Forms Badging DOE F 206.4 - Information Sheet for Sponsorship of HSPD-12 Credential

191

Homeland Security Programs | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

192

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

193

Security Policy, Guidance & Reports  

Broader source: Energy.gov [DOE]

Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energys corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that Departmental personnel security programs (including the National Nuclear Security Administration [NNSA]) are consistent and effectively implemented.

194

Description and performance of track and primary-vertex reconstruction with the CMS tracker  

E-Print Network [OSTI]

A description is provided of the software algorithms developed for the CMS tracker both for reconstructing charged-particle trajectories in proton-proton interactions and for using the resulting tracks to estimate the positions of the LHC luminous region and individual primary-interaction vertices. Despite the very hostile environment at the LHC, the performance obtained with these algorithms is found to be excellent. For $t\\bar{t}$ events under typical 2011 pileup conditions, the average track-reconstruction efficiency for promptly-produced charged particles with transverse momenta of $p_T$ > 0.9 GeV is 94% for pseudorapidities of |$\\eta$| < 0.9 and 85% for |$\\eta$| between 0.9 and 2.5. The inefficiency is caused mainly by hadrons that undergo nuclear interactions in the tracker material. For isolated muons, the corresponding efficiencies are essentially 100%. For isolated muons of $p_T$ = 100 GeV emitted at |$\\eta$| lower than 1.4, the resolutions are approximately 2.8% in $p_T$, and respectively, 10 mi...

Chatrchyan, Serguei; Sirunyan, Albert M; Tumasyan, Armen; Adam, Wolfgang; Bergauer, Thomas; Dragicevic, Marko; Er, Janos; Fabjan, Christian; Friedl, Markus; Fruehwirth, Rudolf; Ghete, Vasile Mihai; Hartl, Christian; Hrmann, Natascha; Hrubec, Josef; Jeitler, Manfred; Kiesenhofer, Wolfgang; Knnz, Valentin; Krammer, Manfred; Krtschmer, Ilse; Liko, Dietrich; Mikulec, Ivan; Rabady, Dinyar; Rahbaran, Babak; Rohringer, Herbert; Schfbeck, Robert; Strauss, Josef; Taurok, Anton; Treberer-Treberspurg, Wolfgang; Waltenberger, Wolfgang; Wulz, Claudia-Elisabeth; Mossolov, Vladimir; Shumeiko, Nikolai; Suarez Gonzalez, Juan; Alderweireldt, Sara; Bansal, Monika; Bansal, Sunil; Beaumont, Willem; Cornelis, Tom; De Wolf, Eddi A; Janssen, Xavier; Knutsson, Albert; Luyckx, Sten; Mucibello, Luca; Ochesanu, Silvia; Roland, Benoit; Rougny, Romain; Van Haevermaet, Hans; Van Mechelen, Pierre; Van Remortel, Nick; Van Spilbeeck, Alex; Blekman, Freya; Blyweert, Stijn; D'Hondt, Jorgen; Devroede, Olivier; Heracleous, Natalie; Kalogeropoulos, Alexis; Keaveney, James; Kim, Tae Jeong; Lowette, Steven; Maes, Michael; Olbrechts, Annik; Python, Quentin; Strom, Derek; Tavernier, Stefaan; Van Doninck, Walter; Van Lancker, Luc; Van Mulders, Petra; Van Onsem, Gerrit Patrick; Villella, Ilaria; Caillol, Ccile; Clerbaux, Barbara; De Lentdecker, Gilles; Favart, Laurent; Gay, Arnaud; Lonard, Alexandre; Marage, Pierre Edouard; Mohammadi, Abdollah; Perni, Luca; Reis, Thomas; Seva, Tomislav; Thomas, Laurent; Vander Velde, Catherine; Vanlaer, Pascal; Wang, Jian; Adler, Volker; Beernaert, Kelly; Benucci, Leonardo; Cimmino, Anna; Costantini, Silvia; Crucy, Shannon; Dildick, Sven; Garcia, Guillaume; Klein, Benjamin; Lellouch, Jrmie; Mccartin, Joseph; Ocampo Rios, Alberto Andres; Ryckbosch, Dirk; Salva Diblen, Sinem; Sigamani, Michael; Strobbe, Nadja; Thyssen, Filip; Tytgat, Michael; Walsh, Sinead; Yazgan, Efe; Zaganidis, Nicolas; Basegmez, Suzan; Beluffi, Camille; Bruno, Giacomo; Castello, Roberto; Caudron, Adrien; Ceard, Ludivine; Da Silveira, Gustavo Gil; De Callatay, Bernard; Delaere, Christophe; Du Pree, Tristan; Favart, Denis; Forthomme, Laurent; Giammanco, Andrea; Hollar, Jonathan; Jez, Pavel; Komm, Matthias; Lemaitre, Vincent; Liao, Junhui; Michotte, Daniel; Militaru, Otilia; Nuttens, Claude; Pagano, Davide; Pin, Arnaud; Piotrzkowski, Krzysztof; Popov, Andrey; Quertenmont, Loic; Selvaggi, Michele; Vidal Marono, Miguel; Vizan Garcia, Jesus Manuel; Beliy, Nikita; Caebergs, Thierry; Daubie, Evelyne; Hammad, Gregory Habib; Alves, Gilvan; Correa Martins Junior, Marcos; Dos Reis Martins, Thiago; Pol, Maria Elena; Henrique Gomes E Souza, Moacyr; Ald Jnior, Walter Luiz; Carvalho, Wagner; Chinellato, Jose; Custdio, Analu; Da Costa, Eliza Melo; De Jesus Damiao, Dilson; De Oliveira Martins, Carley; Fonseca De Souza, Sandro; Malbouisson, Helena; Malek, Magdalena; Matos Figueiredo, Diego; Mundim, Luiz; Nogima, Helio; Prado Da Silva, Wanda Lucia; Santaolalla, Javier; Santoro, Alberto; Sznajder, Andre; Tonelli Manganote, Edmilson Jos; Vilela Pereira, Antonio; Bernardes, Cesar Augusto; De Almeida Dias, Flavia; Tomei, Thiago; De Moraes Gregores, Eduardo; Mercadante, Pedro G; Novaes, Sergio F; Padula, Sandra; Genchev, Vladimir; Iaydjiev, Plamen; Marinov, Andrey; Piperov, Stefan; Rodozov, Mircho; Sultanov, Georgi; Vutova, Mariana; Dimitrov, Anton; Glushkov, Ivan; Hadjiiska, Roumyana; Kozhuharov, Venelin; Litov, Leander; Pavlov, Borislav; Petkov, Peicho; Bian, Jian-Guo; Chen, Guo-Ming; Chen, He-Sheng; Chen, Mingshui; Du, Ran; Jiang, Chun-Hua; Liang, Dong; Liang, Song; Meng, Xiangwei; Plestina, Roko; Tao, Junquan; Wang, Xianyou; Wang, Zheng; Asawatangtrakuldee, Chayanit; Ban, Yong; Guo, Yifei; Li, Qiang; Li, Wenbo; Liu, Shuai; Mao, Yajun; Qian, Si-Jin; Wang, Dayong; Zhang, Linlin; Zou, Wei; Avila, Carlos; Carrillo Montoya, Camilo Andres; Chaparro Sierra, Luisa Fernanda; Florez, Carlos; Gomez, Juan Pablo; Gomez Moreno, Bernardo; Sanabria, Juan Carlos; Godinovic, Nikola; Lelas, Damir; Polic, Dunja; Puljak, Ivica; Antunovic, Zeljko; Kovac, Marko; Brigljevic, Vuko; Kadija, Kreso; Luetic, Jelena; Mekterovic, Darko; Morovic, Srecko; Sudic, Lucija; Attikis, Alexandros; Mavromanolakis, Georgios; Mousa, Jehad; Nicolaou, Charalambos; Ptochos, Fotios; Razis, Panos A; Finger, Miroslav; Finger Jr, Michael; Abdelalim, Ahmed Ali; Assran, Yasser; Elgammal, Sherif; Ellithi Kamel, Ali; Mahmoud, Mohammed; Radi, Amr; Kadastik, Mario; Mntel, Mait; Murumaa, Marion; Raidal, Martti; Rebane, Liis; Tiko, Andres; Eerola, Paula; Fedi, Giacomo; Voutilainen, Mikko

2014-01-01T23:59:59.000Z

195

An amplifier-shaper-discriminator with baseline restoration for the ATLAS transition radiation tracker  

SciTech Connect (OSTI)

The ASDBLR is a bipolar integrated circuit that provides eight channels of amplifier, shaper, discriminator and baseline restorer on a 6.17 by 4.78 mm silicon substrate. It is designed for use in the straw-based Transition Radiation Tracker (TRT) of the ATLAS detector at the LHC. Competing requirements for short measurement time ({approx}8ns), good double pulse resolution ({approx}40ns), low power (<30mW/ch), and low operational threshold ({approx}1.5fC) led to the choice of a largely differential circuit which includes detector tail compensation. A capacitively-coupled baseline restorer eliminates effective threshold shifts that would otherwise occur at the high per-wire hit rates (up to 20MHz). A full-scale dynamic range of 200fC and two discriminators will separate threshold adjusts allow the ASDBLR to function both as a tracker and a TR photon detector. Selectable ion-tail compensation makes the circuit compatible with both CF4 and Xe-based gases.

Bevensee, B.; Newcomer, F.M.; Van Berg, R.; Williams, H.H. [Univ. of Pennsylvania, Philadelphia, PA (United States)] [Univ. of Pennsylvania, Philadelphia, PA (United States)

1996-06-01T23:59:59.000Z

196

Information Security Policy Policy Title Information Security Policy  

E-Print Network [OSTI]

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

197

Personal Security Assistance for Secure Internet Commerce  

E-Print Network [OSTI]

Jansson Swedish Institute of Computer Science Box 1263, S-164 28 Kista, Sweden ara@sics.se, sverker visiting your computer. Current agent security approaches are often based on trust in an ex- ternal assigned correct access-restrictions. We argue that a more rewarding security policy is to grant

Janson, Sverker

198

Cyber Security Evaluations - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

199

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

200

Office of Information Security  

Broader source: Energy.gov [DOE]

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

202

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

203

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

204

PIPELINES AS COMMUNICATION NETWORK LINKS  

SciTech Connect (OSTI)

This report presents the results of an investigation into two methods of using the natural gas pipeline as a communication medium. The work addressed the need to develop secure system monitoring and control techniques between the field and control centers and to robotic devices in the pipeline. In the first method, the pipeline was treated as a microwave waveguide. In the second method, the pipe was treated as a leaky feeder or a multi-ground neutral and the signal was directly injected onto the metal pipe. These methods were tested on existing pipeline loops at UMR and Batelle. The results reported in this report indicate the feasibility of both methods. In addition, a few suitable communication link protocols for this network were analyzed.

Kelvin T. Erickson; Ann Miller; E. Keith Stanek; C.H. Wu; Shari Dunn-Norman

2005-03-14T23:59:59.000Z

205

Security Scheme in Wireless Grid  

Science Journals Connector (OSTI)

In this paper, we considered the two security services of authorization and data security in wireless Grid. The security issues is related to authorization and security, specific to Grid, the characteristics of t...

Yue Hong Zhang; Li Hao; Zhong Shan Yang

2011-01-01T23:59:59.000Z

206

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

207

T-724: Microsoft Security Advisory: Fraudulent digital certificates could  

Broader source: Energy.gov (indexed) [DOE]

724: Microsoft Security Advisory: Fraudulent digital certificates 724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing T-724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing September 22, 2011 - 12:45pm Addthis PROBLEM: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing. PLATFORM: Microsoft Untrusted Certificate Store: DigiNotar root certificates ABSTRACT: Microsoft has released a Microsoft security advisory about this issue for IT professionals. reference LINKS: MS Article ID: 2616676 Microsoft Security Advisory: 2607712 DOE-CIRC Tech Bulletin: T-706 IMPACT ASSESSMENT: Medium Discussion: The Microsoft update revokes the trust of the following DigiNotar root certificates by putting them in the Microsoft Untrusted Certificate Store:

208

T-665: Microsoft Security Bulletin Advance Notification for July 2011 |  

Broader source: Energy.gov (indexed) [DOE]

5: Microsoft Security Bulletin Advance Notification for July 5: Microsoft Security Bulletin Advance Notification for July 2011 T-665: Microsoft Security Bulletin Advance Notification for July 2011 July 11, 2011 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2011 PLATFORM: Windows Operating System and Components ABSTRACT: Microsoft released 4 bulletins to address vulnerability involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: TechNet Webcast Microsoft Security Bulletin Summaries and Webcasts Microsoft Security Bulletin Advance Notification for July 2011

209

T-584: Microsoft March 2011 Security Bulletin Release | Department of  

Broader source: Energy.gov (indexed) [DOE]

84: Microsoft March 2011 Security Bulletin Release 84: Microsoft March 2011 Security Bulletin Release T-584: Microsoft March 2011 Security Bulletin Release March 21, 2011 - 4:25pm Addthis PROBLEM: Microsoft March 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms.(Affected Software and Download Locations) ABSTRACT: Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: Microsoft Security Bulletin Summary for March 2011 Microsoft Technical Security Notifications

210

Average Interest Rate for Treasury Securities | Data.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Average Interest Rate for Treasury Securities Average Interest Rate for Treasury Securities Consumer Data Apps Challenges Resources About Blogs Let's Talk Feedback Consumer You are here Data.gov » Communities » Consumer » Data Average Interest Rate for Treasury Securities Dataset Summary Description This dataset shows the average interest rates for U.S Treasury securities for the most recent month compared with the same month of the previous year. The data is broken down by the various marketable and non-marketable securities. The summary page for the data provides links for monthly reports from 2001 through the current year. Average Interest Rates are calculated on the total unmatured interest-bearing debt. The average interest rates for total marketable, total non-marketable and total interest-bearing debt do not include the U.S. Treasury Inflation-Protected Securities.

211

T-553: Microsoft February 2011 Security Bulletin Release | Department of  

Broader source: Energy.gov (indexed) [DOE]

53: Microsoft February 2011 Security Bulletin Release 53: Microsoft February 2011 Security Bulletin Release T-553: Microsoft February 2011 Security Bulletin Release February 9, 2011 - 7:28am Addthis PROBLEM: Microsoft February 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms. (Affected Software and Download Locations) ABSTRACT: Microsoft released 21 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 3 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference links: Microsoft Security Bulletin Summary for February 2011 Microsoft Technical Security Notifications

212

Related Sites | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Related Sites Related Sites Related Sites Links to the following sources of information are provided as resources. Listings are obtained from government, industry and trade organizations and from other resources. B&W Corporate B&W Corporate The Babcock & Wilcox Company is a leading international provider of energy products and services. B&W Lawrence Livermore Lawrence Livermore National Laboratory helps reduce and counter threats to national and global security through the advancement and application of science and technology. B&W Pantex Located in Amarillo, Texas, the Pantex Plant supports stockpile stewardship, nonproliferation, and safeguards and security. Government System for Award Management The System for Award Management (SAM) (formerly Central Contractor

213

A Near-Infrared Cell Tracker Reagent for Multiscopic In Vivo Imaging and Quantification of Leukocyte Immune  

E-Print Network [OSTI]

A Near-Infrared Cell Tracker Reagent for Multiscopic In Vivo Imaging and Quantification in a broad, multi-scale context. Although tomographic and microscopy-based far and near infrared fluorescence imaging. Citation: Swirski FK, Berger CR, Figueiredo J-L, Mempel TR, von Andrian UH, et al (2007) A Near-Infrared

von Andrian, Ulrich H.

214

Information Security Guide  

E-Print Network [OSTI]

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

215

Securing linked transportation systems: economic implications and investment strategies  

E-Print Network [OSTI]

implications and investment strategies Adib Kanafani andeconomic implications and investment strategies Journal ofimplications and investment strategies Adib Kanafani &

Kanafani, Adib; Huang, Jiangchuan

2010-01-01T23:59:59.000Z

216

Influence of measurement noise and laser arrangement on measurement uncertainty of laser tracker multilateration in machine tool volumetric verification  

Science Journals Connector (OSTI)

Abstract This paper aims to present different techniques and factors that affect the measurement accuracy of a commercial laser tracker responsible for capturing checkpoints used in machine tool volumetric verification. This study was conducted to uncover various sources of error affecting the measurement uncertainty of the laser tracker, additional sources of error that further contributed to the uncertainty, and the factors influencing these techniques. We also define several noise reduction techniques for the measurements. The improvement in the accuracy of captured points focuses on a multilateration technique and its various resolution methods both analytically and geometrically. Similarly, we present trilateration and least squares techniques that can be used for laser tracker self-calibration, which is an essential parameter in multilateration. This paper presents the influence of the spatial distribution of laser trackers (LTs) in measurement noise reduction by multilateration, which produces an improvement in volumetric error machine tool reduction. A study of the spatial angle between LTs, the distance and the visibility of the point to be measured are presented using a synthetic test. All of these factors limit the scope of multilateration. Similarly, a comparison of self-calibration techniques using the least squares and trilateration methods with which to determine the relative position of the laser tracker employees is presented. We also present the influence of the relationship between the radial and angular measurement noise self-calibration processes as it relates to the volumetric error reduction achieved by the machine tool with multilateration. All studies were performed using synthetic tests generated using a synthetic data parametric generator.

S. Aguado; J. Santolaria; D. Samper; J.J. Aguilar

2013-01-01T23:59:59.000Z

217

A combined ultrasonic flow meter and binary vapour mixture analyzer for the ATLAS silicon tracker  

E-Print Network [OSTI]

An upgrade to the ATLAS silicon tracker cooling control system may require a change from C3F8 (octafluoro-propane) evaporative coolant to a blend containing 10-25% of C2F6 (hexafluoro-ethane). Such a change will reduce the evaporation temperature to assure thermal stability following radiation damage accumulated at full LHC luminosity. Central to this upgrade is a new ultrasonic instrument in which sound transit times are continuously measured in opposite directions in flowing gas at known temperature and pressure to deduce the C3F8/C2F6 flow rate and mixture composition. The instrument and its Supervisory, Control and Data Acquisition (SCADA) software are described in this paper. Several geometries for the instrument are in use or under evaluation. An instrument with a pinched axial geometry intended for analysis and measurement of moderate flow rates has demonstrated a mixture resolution of 3.10-3 for C3F8/C2F6 molar mixtures with 20%C2F6, and a flow resolution of 2% of full scale for mass flows up to 30gs-1. In mixtures of widely-differing molecular weight (mw), higher mixture precision is possible: a sensitivity of <5.10-5 to leaks of C3F8 into part of the ATLAS tracker nitrogen envelope (mw difference 160) has been seen. An instrument with an angled sound path geometry has been developed for use at high fluorocarbon mass flow rates of around 1.2 kgs-1 - corresponding to full flow in a new 60kW thermosiphon recirculator under construction for the ATLAS silicon tracker. Extensive computational fluid dynamics studies were performed to determine the preferred geometry (ultrasonic transducer spacing and placement, together with the sound crossing angle with respect to the vapour flow direction). A prototype with 45deg crossing angle has demonstrated a flow resolution of 1.9% of full scale for linear flow velocities up to 15 ms-1. The instrument has many potential applications.

R. Bates; M. Battistin; S. Berry; J. Berthoud; A. Bitadze; P. Bonneau; J. Botelho-Direito; N. Bousson; G. Boyd; G. Bozza; E. Da Riva; C. Degeorge; B. DiGirolamo; M. Doubek; D. Giugni; J. Godlewski; G. Hallewell; S. Katunin; D. Lombard; M. Mathieu; S. McMahon; K. Nagai; E. Perez-Rodriguez; C. Rossi; A. Rozanov; V. Vacek; M. Vitek; L. Zwalinski

2012-10-17T23:59:59.000Z

218

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

219

Lemnos Interoperable Security Program  

Broader source: Energy.gov (indexed) [DOE]

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

220

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

V-098: Linux Kernel Extended Verification Module Bug Lets Local...  

Broader source: Energy.gov (indexed) [DOE]

reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

222

U-155: WebCalendar Access Control and File Inclusion Bugs Let...  

Broader source: Energy.gov (indexed) [DOE]

were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966...

223

V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...  

Broader source: Energy.gov (indexed) [DOE]

reported in Solaris REFERENCE LINKS: SecurityTracker Alert ID: 1028802 Oracle Critical Patch Update Advisory - July 2013 CVE-2013-3745 CVE-2013-3746 CVE-2013-3748 CVE-2013-3750...

224

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Broader source: Energy.gov (indexed) [DOE]

LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory IMPACT ASSESSMENT: Medium Discussion: A remote authenticated user can...

225

The Vertex Tracker at the e+e- Linear Collider Conceptual Design, Detector R&D and Physics Performances for the Next Generation of Silicon Vertex Detectors  

E-Print Network [OSTI]

The e+e- linear collider physics programme sets highly demanding requirements on the accurate determination of charged particle trajectories close to their production point. A new generation of Vertex Trackers, based on different technologies of high resolution silicon sensors, is being developed to provide the needed performances. These developments are based on the experience with the LEP/SLC vertex detectors and on the results of the R&D programs for the LHC trackers and also define a further program of R&D specific to the linear collider applications. In this paper the present status of the conceptual tracker design, silicon detector R&D and physics studies is discussed.

Marco Battaglia; Massimo Caccia

1999-11-26T23:59:59.000Z

226

Link Building Martin Olsen  

E-Print Network [OSTI]

Link Building Martin Olsen PhD Dissertation Department of Computer Science Aarhus University Denmark #12;#12;Link Building A Dissertation Presented to the Faculty of Science of Aarhus University The Computational Complexity of Link Building Proc. Computing and Combinatorics, 14th Annual International

227

Performance studies of the ATLAS transition radiation tracker barrel using SR1 cosmics data  

E-Print Network [OSTI]

The ATLAS experiment at the Large Hadron Collider (LHC) is designed to measure Nature at the energy scale often associated with electroweak symmetry breaking. When it comes online in 2008, the LHC and ATLAS will work to discover, among other things, the Higgs boson and any other signatures for physics beyond the Standard Model. As part of the ATLAS Inner Detector, the Transition Radiation Tracker will be an important part of ATLASs ability to make precise measurements of particle properties. This paper summarizes work done to study and categorize the performance of the TRT, using a combination of cosmic ray test data from the SR1 facility and Monte Carlo. In general, it was found that the TRT is working well, with module-level eciencies around 90 % and module-level noise just above 2 %. Reasonably good agreement was observed with Monte Carlo, though there are some apparently pathological dierences between the two that deserve further attention.

Wall, R

228

Safeguards and Security and Cyber Security RM  

Broader source: Energy.gov (indexed) [DOE]

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

229

An on-line acoustic fluorocarbon coolant mixture analyzer for the ATLAS silicon tracker  

SciTech Connect (OSTI)

The ATLAS silicon tracker community foresees an upgrade from the present octafluoro-propane (C{sub 3}F{sub 8}) evaporative cooling fluid - to a composite fluid with a probable 10-20% admixture of hexafluoro-ethane (C{sub 2}F{sub 6}). Such a fluid will allow a lower evaporation temperature and will afford the tracker silicon substrates a better safety margin against leakage current-induced thermal runaway caused by cumulative radiation damage as the luminosity profile at the CERN Large Hadron Collider increases. Central to the use of this new fluid is a new custom-developed speed-of-sound instrument for continuous real-time measurement of the C{sub 3}F{sub 8}/C{sub 2}F{sub 6} mixture ratio and flow. An acoustic vapour mixture analyzer/flow meter with new custom electronics allowing ultrasonic frequency transmission through gas mixtures has been developed for this application. Synchronous with the emission of an ultrasound 'chirp' from an acoustic transmitter, a fast readout clock (40 MHz) is started. The clock is stopped on receipt of an above threshold sound pulse at the receiver. Sound is alternately transmitted parallel and anti-parallel with the vapour flow for volume flow measurement from transducers that can serve as acoustic transmitters or receivers. In the development version, continuous real-time measurement of C{sub 3}F{sub 8}/C{sub 2}F{sub 6} flow and calculation of the mixture ratio is performed within a graphical user interface developed in PVSS-II, the Supervisory, Control and Data Acquisition standard chosen for LHC and its experiments at CERN. The described instrument has numerous potential applications - including refrigerant leak detection, the analysis of hydrocarbons, vapour mixtures for semiconductor manufacture and anesthetic gas mixtures. (authors)

Bates, R. [Dept. of Physics and Astronomy, Univ. of Glasgow, G12 8QQ (United Kingdom); Battistin, M. [CERN, 1211 Geneva 23 (Switzerland); Berry, S.; Bitadze, A. [Dept. of Physics and Astronomy, Univ. of Glasgow, G12 8QQ (United Kingdom); Bonneau, P. [CERN, 1211 Geneva 23 (Switzerland); Bousson, N. [Centre de Physique des Particules de Marseille, 163 Avenue de Luminy, 13288 Marseille Cedex 09 (France); Boyd, G. [Dept. of Physics and Astronomy, Univ. of Oklahoma, Norman, OK 73019 (United States); Botelho-Direito, J.; DiGirolamo, B. [CERN, 1211 Geneva 23 (Switzerland); Doubek, M. [Czech Technical Univ., Technicka 4, 166 07 Prague 6 (Czech Republic); Egorov, K. [Physics Dept., Indiana Univ., Bloomington, IN 47405 (United States); Godlewski, J. [CERN, 1211 Geneva 23 (Switzerland); Hallewell, G. [Centre de Physique des Particules de Marseille, 163 Avenue de Luminy, 13288 Marseille Cedex 09 (France); Katunin, S. [B.P. Konstantinov Petersburg Nuclear Physics Inst. PNPI, 188300 St. Petersburg (Russian Federation); Mathieu, M.; McMahon, S. [Rutherford Appelton Laboratory - Science and Technology Facilities Council, Chilton, Didcot OX11 OQX (United Kingdom); Nagai, K. [Graduate School of Pure and Applied Sciences, Univ. of Tsukuba, 1-1-1 Tennodai, Tsukuba, Ibaraki 305-8577 (Japan); Perez-Rodriguez, E. [CERN, 1211 Geneva 23 (Switzerland); Rozanov, A. [Centre de Physique des Particules de Marseille, 163 Avenue de Luminy, 13288 Marseille Cedex 09 (France); Vacek, V.; Vitek, M. [Czech Technical Univ., Technicka 4, 166 07 Prague 6 (Czech Republic)

2011-07-01T23:59:59.000Z

230

Energy Links Page - EIA  

U.S. Energy Information Administration (EIA) Indexed Site

Publications & Reports > Energy Links Page Publications & Reports > Energy Links Page Related Energy Links Energy Companies Coal & Other Electricity Foreign Integrated Natural Gas Transmission, Distribution, and Marketing News Services and Periodicals Oil & Gas Exploration and Production Petroleum Refining, Marketing, and Transportation State Owned U.S. Integrated Government Agencies Other DOE National Laboratories Federal Energy States Universities Trade Associations & Other Trade Associations Other Associations International Statistics Energy Services Other Energy Sites EIA Links Disclaimer These pages contain hypertext links to information created and maintained by other public and private organizations. These links provide additional information that may be useful or interesting and are being provided consistent with the intended purpose of the EIA Web site. EIA does not control or guarantee the accuracy, relevance, timeliness, or completeness of this outside information. EIA does not endorse the organizations sponsoring linked websites and we do not endorse the views they express or the products/services they offer.

231

Secure Smart Grid Association | Open Energy Information  

Open Energy Info (EERE)

Secure Smart Grid Association Secure Smart Grid Association Jump to: navigation, search Name Secure Smart Grid Association Address 2374 S Josephine St Place Denver, Colorado Zip 80210 Region Rockies Area Number of employees 1-10 Year founded 2009 Phone number 303-997-2824 Coordinates 39.673446°, -104.9575629° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.673446,"lon":-104.9575629,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

232

Grant Application Process | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Grant Application Process | National Nuclear Security Administration Grant Application Process | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Grant Application Process Home > Grant Application Process Grant Application Process Please visit www.grants.gov off site link to find out more about the grant application process. At www.grants.gov off site link you can find

233

Contact Us | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contact Us Contact Us Home > Field Offices > Welcome to the Los Alamos Field Office > Contact Us Contact Us Contact the NNSA Los Alamos Field Office NNSA Los Alamos Field Office (NA-00-LA) 3747 West Jemez Road Los Alamos, NM 87544 (505) 667-6691 Please send any comments, questions, or feedback to Toni Chiri Featured Links LANL Phonebook National Nuclear Security Administration Los Alamos National Laboratory Los Alamos County USA Gov Department of Energy (DOE) New Mexico Environmental Department - LANL U.S. Department of Homeland Security Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program LANS Contract Los Alamos Field Office Emergency Public Information Related Links

234

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

235

National Nuclear Security Administration | Department of Energy  

Office of Environmental Management (EM)

National Nuclear Security Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction...

236

Waste Isolation Pilot Plant Transportation Security | Department...  

Office of Environmental Management (EM)

Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security More Documents &...

237

SECURITY TERMINATION STATEMENT | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

238

Office of Security Operations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

239

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

240

Security and Privacy Notice  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

242

Security Topic Group  

Broader source: Energy.gov (indexed) [DOE]

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

243

Operational Security (OPSEC) Reminder | Department of Energy  

Office of Environmental Management (EM)

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

244

US, UK, Kazakhstan Secure Radiological Transportation Vehicles...  

National Nuclear Security Administration (NNSA)

place them in secure storage, and improve radiological transportation security and site security. The United Kingdom-funded projects provide an immediate security and safety...

245

College of Safety & Security | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Safety & Security College of Safety & Security College of Safety & Security Mission Through the National Training Center (NTC), the Office of Health, Safety and Security (HSS)...

246

Office of Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Office of Security Mission The Office of Security maintains the Department of Energy's security integrity through the development and promulgation of safeguards and...

247

Safeguards and Security Program - DOE Directives, Delegations...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

70.1A, Safeguards and Security Program by jcowden Functional areas: Safeguards, Security, and Emergency Management, Safety and Security The Safeguards and Security Program ensures...

248

Office of Security Enforcement | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Enforcement Office of Security Enforcement MISSION The Office of Security Enforcement implements the Department's classified information security enforcement program in...

249

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

250

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

251

Industrial and Grid Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial and Grid Security Establishing resilient infrastructures that operate when sensors and physical assets are perturbed is an important national objective. Two related LDRD...

252

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of...

253

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

254

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

255

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

256

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

257

Related Links | Department of Energy  

Energy Savers [EERE]

Algal Biofuels Related Links Related Links The links below provide useful algae resources and are organized by categories. Beyond this page, learn more about BETO's Algae...

258

Energy Efficiency Links  

U.S. Energy Information Administration (EIA) Indexed Site

Energy Energy Efficiency Organizations Energy Efficiency Organizations Release Date: October 1999 Last Updated: Septembert 2009 EIA Links Disclaimer: These pages contain hypertext links to information created and maintained by other public and private organizations. These links provide additional information that may be useful or interesting and are being provided consistent with the intended purpose of the EIA website. EIA does not control or guarantee the accuracy, relevance, timeliness, or completeness of this outside information. EIA does not endorse the organizations sponsoring linked websites, the views they express, or the products and services they offer. U.S. Federal Government / Regional / U.S. Nonprofit / International U.S. Federal Government and Related Agencies

259

Nuclear Data Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links to Useful Online Nuclear Physics Journals Important Online Resources Science Direct American Institute of Physics Journals APS Journals Online: Physical Review A, B, C, D, E,...

260

NREL: News - Related Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Related Links The U.S. Department of Energy provides news online: EERE Network News News and Blog Science News Science and Technology Highlights from the National Laboratories...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Southeast Idaho Area Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Area Attractions and Events Area Geography Area History Area Links Driving Directions Idaho Falls Attractions and Events INL History INL Today Research Park Sagebrush Steppe...

262

Renewable-Based Energy Secure Communities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Renewable-Based Energy Secure Communities Renewable-Based Energy Secure Communities Renewable-Based Energy Secure Communities U.S. Department of Energy (DOE) Community Renewable Energy Deployment (CommRE) projects receive financial assistance and support from numerous federal and state agencies and partnering organizations. The University of California at Davis CommRE project is not only being funded by DOE, but also by the California Energy Commission's (CEC) Renewable-Based Energy Secure Communities (RESCO) program. Below are summaries of select RESCO projects and links to additional information. About Renewable-Based Energy Secure Communities RESCO projects are funded by the CEC's Public Interest Energy Research (PIER) Program, which supports public interest energy research, development, and demonstration. The goal of RESCO is to develop and

263

V-008: Debian Security Advisory | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8: Debian Security Advisory 8: Debian Security Advisory V-008: Debian Security Advisory October 23, 2012 - 6:00am Addthis PROBLEM: Debian Security Advisory PLATFORM: Debian GNU/Linux 6.0 ABSTRACT: Debian update for bind9 REFERENCE LINKS: Debian Security Advisory DSA-2560-1 Debian bugtracking system: Bug 690118 ISC Reference Number: AA-00801 Secunia Advisory SA51054 CVE-2012-5166 IMPACT ASSESSMENT: Medium DISCUSSION: was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply, when certain combinations of resource records are present. This vulnerability affects both recursive and authoritative servers. For the stable distribution (squeeze), this problem has been fixed in version 1:9.7.3.dfsg-1~squeeze8. IMPACT: Debian has issued an update for bind9. This fixes a vulnerability, which

264

Homeland Security | U.S. DOE Office of Science (SC)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Homeland Security Homeland Security High Energy Physics (HEP) HEP Home About Research Facilities Science Highlights Benefits of HEP Medicine Homeland Security Industry Computing Sciences Workforce Development A Growing List Accelerators for Americas Future External link Funding Opportunities Advisory Committees News & Resources Contact Information High Energy Physics U.S. Department of Energy SC-25/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-3624 F: (301) 903-2597 E: sc.hep@science.doe.gov More Information » Benefits of HEP Homeland Security Print Text Size: A A A RSS Feeds FeedbackShare Page Homeland security: monitoring nuclear nonproliferation In nuclear reactors, the amount of plutonium builds up as the uranium fuel is used, and the number and characteristics of antineutrinos emitted by

265

V-008: Debian Security Advisory | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

08: Debian Security Advisory 08: Debian Security Advisory V-008: Debian Security Advisory October 23, 2012 - 6:00am Addthis PROBLEM: Debian Security Advisory PLATFORM: Debian GNU/Linux 6.0 ABSTRACT: Debian update for bind9 REFERENCE LINKS: Debian Security Advisory DSA-2560-1 Debian bugtracking system: Bug 690118 ISC Reference Number: AA-00801 Secunia Advisory SA51054 CVE-2012-5166 IMPACT ASSESSMENT: Medium DISCUSSION: was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply, when certain combinations of resource records are present. This vulnerability affects both recursive and authoritative servers. For the stable distribution (squeeze), this problem has been fixed in version 1:9.7.3.dfsg-1~squeeze8. IMPACT: Debian has issued an update for bind9. This fixes a vulnerability, which

266

An inter-realm, cyber-security infrastructure for virtual supercomputing  

SciTech Connect (OSTI)

Virtual supercomputing, (ise ., high-performance grid computing), is poised to revolutionize the way we think about and use computing. However, the security of the links interconnecting the nodes within such an environment will be its Achilles heel, particularly when secure communication is required to tunnel through heterogeneous domains. In this paper we examine existing security mechanisms, show their inadequacy, and design a comprehensive cybersecurity infrastructure that meets the security requirements of virtual supercomputing. Keywords Security, virtual supercomputing, grid computing, high-performance computing, GSS-API, SSL, IPsec, component-based software, dynamic reconfiguration.

Al-Muhtadi, J. (Jalal); Feng, W. C. (Wu-Chun); Fisk, M. E. (Mike E. )

2001-01-01T23:59:59.000Z

267

V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus  

Broader source: Energy.gov (indexed) [DOE]

21: Cisco IronPort Web / Email Security Appliance Sophos 21: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities November 12, 2012 - 6:00am Addthis PROBLEM: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities PLATFORM: Cisco IronPort Email Security Appliances (C-Series and X-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. Cisco IronPort Web Security Appliances (S-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. ABSTRACT: Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. REFERENCE LINKS: Cisco Security Advisory ID: cisco-sa-20121108-sophos Secunia Advisory SA51197 IMPACT ASSESSMENT: High DISCUSSION: Cisco has acknowledged some vulnerabilities in Cisco IronPort Web Security

268

V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus  

Broader source: Energy.gov (indexed) [DOE]

1: Cisco IronPort Web / Email Security Appliance Sophos 1: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities November 12, 2012 - 6:00am Addthis PROBLEM: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities PLATFORM: Cisco IronPort Email Security Appliances (C-Series and X-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. Cisco IronPort Web Security Appliances (S-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. ABSTRACT: Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. REFERENCE LINKS: Cisco Security Advisory ID: cisco-sa-20121108-sophos Secunia Advisory SA51197 IMPACT ASSESSMENT: High DISCUSSION: Cisco has acknowledged some vulnerabilities in Cisco IronPort Web Security

269

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

270

2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

271

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

272

Search for Supersymmetry in Trilepton Final States with the ATLAS Detector and the Alignment of the ATLAS Silicon Tracker  

E-Print Network [OSTI]

One of the main goals of the ATLAS detector at the LHC of CERN, a proton-proton collider with a nominal centre-of-mass energy of 14 TeV, is to search for New Physics beyond the Standard Model (BSM). A widely favoured BSM candidate is Supersymmetry (SUSY), which postulates a superpartner for each Standard Model particle. The first part of this thesis describes a strategy for an early discovery of SUSY using the trilepton signature, with a focus on gravity-mediated SUSY breaking, mSUGRA. The discovery potential for SUSY for the case where strongly interacting supersymmetric particles are very massive is critically investigated. A possible choice of triggers for L = 10-31cm-2s-1 is suggested by optimising the event yield at intermediate and final selection stages. A novel method to measure the rate of leptons from heavy flavour decays passing isolation requirements by isolating tt events in data is outlined. The task of the ATLAS silicon tracker is to track particles produced in proton-proton collisions in its centre, measuring their momenta and production vertices. The precise knowledge of the silicon tracker module positions and their orientation in space (alignment) down to some microns and fractions of a miliradian in the critical coordinates is of vital importance for large parts of the ambitious ATLAS physics program. In the second part of the thesis, the alignment of the ATLAS silicon tracker using the Robust Alignment algorithm and particle tracks is described. The algorithm is applied to align end-cap A of the pixel detector using cosmic ray particle tracks recorded during its on-surface commissioning in 2006. Finally, about 2M cosmic ray tracks collected by ATLAS in situ in autumn 2008 are utilised to provide a coherent alignment of the entire silicon tracker with the Robust Alignment algorithm.

Oleg Brandt

2010-01-08T23:59:59.000Z

273

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

274

Arms control and European security  

SciTech Connect (OSTI)

In October 1987 on the eve of the Washington summit, the Committee on Atlantic Studies, a group of European and North American scholars established in 1964 to promote transatlantic dialogue, met in Toronto to discuss the implications of the new arms control for European security. This book is the fruit of that meeting. Incorporating subsequent developments, up to Grobachev's December 1988 speech to the U.N., it provides a timely assessment of arms control issues from a variety of European and North American perspectives. The contributors to this volume council caution, suggesting that while progress is possible, it will probably be slow. This volume stresses the interplay of strategic and regional arms control. It includes analyses of nuclear, conventional, and naval arms control questions and embodies a broader a broader conception of arms control. The book links arms control to such political measures as confidence-building, conflict avoidance and superpower agreement to the neutrality of particular states.

Auton, G.P.

1989-01-01T23:59:59.000Z

275

Security Assistance | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

276

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

277

Diversity Links; Diversity Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Source Disclaimer: Links and/or hyperlinks on this page may contain information gathered from public sources outside Brookhaven National Laboratory. This information is for reference purposes only and, as such, there is no endorsement of products or services therein, nor is BNL responsible for any content inaccuracies. By clicking any of the aforementioned links and/or hyperlinks, you acknowledge your understanding and agreement with this statement. Source Disclaimer: Links and/or hyperlinks on this page may contain information gathered from public sources outside Brookhaven National Laboratory. This information is for reference purposes only and, as such, there is no endorsement of products or services therein, nor is BNL responsible for any content inaccuracies. By clicking any of the aforementioned links and/or hyperlinks, you acknowledge your understanding and agreement with this statement. Diversity Links BNL & DOE Diversity Links Minority Recruitment Links BNL & DOE Diversity Links Brookhaven National Laboratory (BNL) Brookhaven Advocacy Council (BAC) Brookhaven Employees Recreation Association (BERA) | BERA Clubs U.S. DOE Office of Civil Rights and Diversity U.S. DOE Office of Civil Rights and Diversity - Homepage

278

Next Generation National Security Leaders  

SciTech Connect (OSTI)

It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had right-sized the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community or it may lie in more effectively using our existing resources and training programs.

Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

2012-07-19T23:59:59.000Z

279

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

280

Secure video communications system  

DOE Patents [OSTI]

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

282

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

283

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

284

Microsoft Word - Additional links  

Office of Legacy Management (LM)

Links: Links: Link to annual groundwater reports on LM website: http://www.lm.doe.gov/Monticello/Documents.aspx#gwreports Links to peer-reviewed papers referenced in the Program Status and Analytical Update (Note: Due to copyright restrictions, links to these papers, rather than reproductions, are provided): a. Harding, Lee E. "Non-linear uptake and hormesis effects of selenium in red- winged blackbirds (Agelaius phoeniceus)". Science of the Total Environment 389 (2008) 350-366. Available through sciencedirect at: http://www.sciencedirect.com/science/article/pii/S0048969707010029 b. King, Kirke A. and Thomas W. Custer. "Reproductive Success of Barn Swallows Nesting Near a Selenium-Contaminated Lake in East Texas, USA". Environmental Pollution 84 (1994) 53-58. Available through sciencedirect at:

285

PRIVACY/SECURITY NOTICE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

286

Securing Control Systems Modems  

Broader source: Energy.gov (indexed) [DOE]

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

287

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

288

U-009:Microsoft Security Bulletin Summary for October 2011 | Department of  

Broader source: Energy.gov (indexed) [DOE]

09:Microsoft Security Bulletin Summary for October 2011 09:Microsoft Security Bulletin Summary for October 2011 U-009:Microsoft Security Bulletin Summary for October 2011 October 12, 2011 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Summary for October 2011 PLATFORM: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2. ABSTRACT: Microsoft released 8 bulletins to address vulnerabilities. This Microsoft bulletin contains 2 critical vulnerabilities. reference LINKS: Microsoft Security Bulletin Summary for October 2011 Security Bulletin Summary October Archive IMPACT ASSESSMENT: High Discussion: For more details regarding the Microsoft October 2011 bulletins, please see follow link for CVE details. You can find more information located under the "Affected Software and Download Locations" section using the following

289

Office of Security Operations: Headquarters Security Officers (HSO) Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

290

Detecting and Mitigating Security Risks  

E-Print Network [OSTI]

______________________________________________________________________________________________________ 2 Introduction IT security threats are multiplying quickly. One reason is that sophisticated hacking. Second, while hacking once largely constituted an intellectual exercise for security enthusiasts, hacking

Fisher, Kathleen

291

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

292

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

293

January 2007 SECURITY CONTROLS FOR  

E-Print Network [OSTI]

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

294

Headquarters Facilities Master Security Plan  

Office of Environmental Management (EM)

Chapter 10-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: Title 32, CFR, Part 2001,...

295

Security and Privacy Notices | NREL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notices Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory...

296

Security Suites | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

297

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SNL SECURITY CONTACTS SNLNM Contacts SNLCA Contacts Function Contact Email Telephone Badge Office 505-284-3626 - Escorting security@sandia.gov 505-845-1321 Classification...

298

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

299

Global food security, biodiversity conservation and the future of agricultural intensification  

E-Print Network [OSTI]

Global food security, biodiversity conservation and the future of agricultural intensification Teja increase, achieving efficient and productive agri- cultural land use while conserving biodiversity. In conclusion, linking agricultural intensifi- cation with biodiversity conservation and hunger reduction

300

Lighting Group: Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links Links Links Organizations Illuminating Engineering Society of North America (IESNA) International Commission on Illumination (CIE) International Association of Lighting Designers (IALD) International Association of Energy-Efficient Lighting Lightfair International Energy Agency - Task 21: Daylight in Buildings: Design Tools and Performance Analysis International Energy Agency - Task 31: Daylighting Buildings in 21st Century National Association on Qualifications for the Lighting Professions (NCQLP) National Association of Independent Lighting Distributors (NAILD) International Association of Lighting Management Companies (NALMCO) Research Centers California Lighting Technology Center Lighting Research Center Lighting Research at Canada Institute for Research in Construction

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Using Tracker as a Pedagogical Tool for Understanding Toss Up-Free Fall Motion  

E-Print Network [OSTI]

This paper reports the use of Tracker as a pedagogical tool in supporting effective learning and teaching of toss up and free fall motion for beginning grade 9 students. This is a case study with (N=123) students of express-pure physics classes in a mainstream school in Singapore where we used a 8 multi-choice questions as a proxy to assess learning gains in pre and posttest to gauge the impact on learning. We found within experimental group gains with Cohens effect size d = 0.79 error 0.23 (large effect) and normalized gains with a gradient of g total = 0.42 error 0.08 (medium gain) above the traditional baseline value of g non interactive=0.23 for all the 6 teachers, 3 classes of students who participated in this study. Initial research findings suggest that allowing learners to relate abstract physics concepts to real life through coupling traditional video analysis and eventually video modeling could be an innovative and effective way to learn free fall motion. Finally, we discuss the pedagogical use of T...

Wee, Loo Kang; Leong, Tze Kwang; Tan, Ching

2015-01-01T23:59:59.000Z

302

The heart of ATLAS Commissioning and performance of the ATLAS silicon tracker  

E-Print Network [OSTI]

The Large Hadron Collider (LHC) has been built under the french-swiss border near Geneva, Switzerland. Two opposing beams of protons will collide with a centre of mass energy of 14 TeV, an energy seven million times that of the first accelerator. The LHC takes particle physics research to a new frontier. On September 10th 2008, the first single pilot beam of $2 x 10^9$ protons was circulated successfully through the entire LHC, with an injection energy of 0.45 TeV. The first collisions are expected in Summer 2009. One of the experiments designed to search for new particle phenomena is the ATLAS experiment. This is a general purpose detector capable of detecting and measuring the broadest range of particle signals. At the heart of the ATLAS detector lies the SemiConductor Tracker (SCT). It is a central part of the inner detector providing precision measurements of particle trajectories over a large $\\eta$ range. The work presented in this thesis focuses on the performance and commissioning of the SCT detector....

Magrath, Caroline Alexandra

2009-01-01T23:59:59.000Z

303

Privacy/Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

304

Fuel Cell Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Fuel Cell Links Fuel Cell Links The links below are provided as additional resources for fuel-cell-related information. Most of the linked sites are not part of, nor affiliated with, fueleconomy.gov. We do not endorse or vouch for the accuracy of the information found on such sites. Fuel Cell Vehicles and Manufacturers Chevrolet General Motors press release about the Chevrolet Fuel Cell Equinox Ford Ford overview of their hydrogen fuel cell vehicles Honda FCX Clarity official site Hyundai Hyundai press release announcing the upcoming Tucson Fuel Cell Mercedes-Benz Ener-G-Force Fuel-cell-powered concept SUV Nissan Nissan TeRRA concept SUV Toyota Overview of Toyota fuel cell technology Hydrogen- and Fuel-Cell-Related Information and Tools Fuel Cell Vehicles Brief overview of fuel cell vehicles provided by DOE's Alternative Fuels Data Center (AFDC)

305

Hybrid Vehicle Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Hybrid Links Hybrid Links Exit Fueleconomy.gov The links below are to pages that are not part of the fueleconomy.gov Web site. We offer these external links for your convenience in accessing additional information that may be useful or interesting to you. Hybrid Vehicles and Manufacturers Acura ILX Hybrid Audi Q5 Hybrid BMW ActiveHybrid 3 ActiveHybrid 5 ActiveHybrid 7 Buick LaCrosse eAssist* Regal eAssist* Chevrolet Malibu Eco* Impala eAssist* Ford Fusion Hybrid Honda Accord Hybrid Civic Hybrid Honda CR-Z Honda Insight Hyundai Sonata Hybrid Infiniti M Hybrid Q50 Hybrid Q50 S Hybrid QX60 Hybrid Kia Optima Hybrid Lexus CT 200h Lexus ES 300h GS 450h LS 600h L RX 450h Lincoln MKZ Hybrid Mercedes-Benz Mercedes E400 Hybrid Nissan Pathfinder Hybrid Porsche Cayenne S Hybrid Subaru XV Crosstrek Hybrid Toyota Avalon Hybrid

306

Location linked information  

E-Print Network [OSTI]

This work builds an infrastructure called Location Linked Information that offers a means to associate digital information with public, physical places. This connection creates a hybrid virtual/physical space, called glean ...

Mankins, Matthew William David, 1975-

2003-01-01T23:59:59.000Z

307

Links - 88-Inch Cyclotron  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lab Cafeteria Jobs at Berkeley Lab Today at Berkeley Lab Health and Safety Manual (PUB-3000) Science Links: Web Elements (Periodic Table) Science Daily News Sci Tech Daily News...

308

Nuclear Data Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links to Other Useful Sites Online Journals Institutions and Programs Related to Nuclear Physics U.S. Nuclear Data Program: All evaluated nuclear data supported by the U.S....

309

National Security Information Systems (NSIS) -National Security Systems &  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

310

2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

311

2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

312

Information Security: Coordination of Federal Cyber Security Research and  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

313

Office of Headquarters Security Operations | Department of Energy  

Office of Environmental Management (EM)

Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting...

314

Headquarters Security Quick Reference Book  

Broader source: Energy.gov [DOE]

This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

315

November 2003 NETWORK SECURITY TESTING  

E-Print Network [OSTI]

November 2003 NETWORK SECURITY TESTING Shirley M. Radack, Editor, Computer Security Division be tempted to neglect or insufficiently develop a comprehensive and systematic opera tional security testing program. This guide stresses the need for an effective security testing program within federal agencies

316

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

317

National Security, Weapons Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

318

Requirements for security signalling  

SciTech Connect (OSTI)

There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

Pierson, L.G.; Tarman, T.D.

1995-02-05T23:59:59.000Z

319

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, cancels DOE O 470.4B.

2011-07-21T23:59:59.000Z

320

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

322

Energy Security Through Hydrogen  

Science Journals Connector (OSTI)

Energy and environmental security are major problems facing our global economy. Fossil fuels, particularly crude oil, are ... energy sources. In the long term, a hydrogen-based economy will have an impact on all ...

Professor John W. Sheffield

2007-01-01T23:59:59.000Z

323

GRID Security Review  

Science Journals Connector (OSTI)

A Computational GRID is a collection of heterogeneous computing resources ... computational power of current micro-processors, Computational GRIDs or meta-systems have gradually become more ... a secure environme...

Lazaros Gymnopoulos; Stelios Dritsas; Stefanos Gritzalis

2003-01-01T23:59:59.000Z

324

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

325

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

326

defense nuclear security  

National Nuclear Security Administration (NNSA)

3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

Page...

327

Nuclear Energy & Energy Security  

Science Journals Connector (OSTI)

Safety issues related to use of nuclear energy and secure operation of nuclear installations are mail stones of great importance. Although none of technologies producing energy are absolutely safe it is obvious t...

Jumber Mamasakhlisi

2010-01-01T23:59:59.000Z

328

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

329

U-234: Oracle MySQL User Login Security Bypass Vulnerability | Department  

Broader source: Energy.gov (indexed) [DOE]

234: Oracle MySQL User Login Security Bypass Vulnerability 234: Oracle MySQL User Login Security Bypass Vulnerability U-234: Oracle MySQL User Login Security Bypass Vulnerability August 14, 2012 - 7:00am Addthis PROBLEM: Oracle MySQL User Login Security Bypass Vulnerability PLATFORM: Version(s): prior to 5.1.63 and 5.5.25 are vulnerable. ABSTRACT: Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions. REFERENCE LINKS: http://www.securityfocus.com/bid/53911/discuss CVE-2012-2122 IMPACT ASSESSMENT: Medium Discussion: Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.The vulnerability is identified as CVE-2012-2122 and was addressed in MySQL 5.1.63 and 5.5.25 in

330

U-145: Microsoft Security Bulletin Summary for April 2012 | Department of  

Broader source: Energy.gov (indexed) [DOE]

5: Microsoft Security Bulletin Summary for April 2012 5: Microsoft Security Bulletin Summary for April 2012 U-145: Microsoft Security Bulletin Summary for April 2012 April 11, 2012 - 9:30am Addthis PROBLEM: Microsoft Security Bulletin Summary for April 2012 PLATFORM: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, ABSTRACT: Microsoft Security Bulletin Summary for April 2012. Microsoft has posted 4 Critical Bulletins and 2 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on April 11, 2012, at 11:00 AM Pacific Time (US & Canada). reference LINKS: Microsoft Security Bulletin Security Bulletin Summary Archive

331

T-642: RSA SecurID update to Customers | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

332

First Analysis Securities Corporation | Open Energy Information  

Open Energy Info (EERE)

First Analysis Securities Corporation First Analysis Securities Corporation Jump to: navigation, search Logo: First Analysis Securities Corporation Name First Analysis Securities Corporation Address One South Wacker Drive, Suite 3900 Place Chicago, Illinois Zip 60606 Product Private equity, venture capital, investment banking and equity research. Year founded 1981 Phone number (312) 258-1400 Website http://www.firstanalysis.com/ Coordinates 41.8819019°, -87.6367295° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.8819019,"lon":-87.6367295,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

333

Principal Associate Director - Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

334

Nevada National Security Site - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

335

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

336

Framework for SCADA Security Policy  

Broader source: Energy.gov (indexed) [DOE]

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

337

Incidents of Security Concern  

Broader source: Energy.gov (indexed) [DOE]

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

338

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

339

Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999  

SciTech Connect (OSTI)

This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

2000-06-01T23:59:59.000Z

340

Security systems engineering overview  

SciTech Connect (OSTI)

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Argonne Team Challenges Physical Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

342

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

343

MAJOR CONFORMED CONTRACTS LINKS Site/Project Contract Link Idaho  

Office of Environmental Management (EM)

MAJOR CONFORMED CONTRACTS LINKS SiteProject Contract Link Idaho Idaho Cleanup Project http:www.id.doe.govdoeidICPContractICPContract.htm Advance Mixed Waste Treatment http:...

344

V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors when handling file actions can be exploited to bypass file action permission restrictions and e.g. create or read arbitrary files within or outside the webroot. 2) An error when validating file names within the file renaming functionality can be exploited to bypass the denied file extensions check

345

V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow  

Broader source: Energy.gov (indexed) [DOE]

8: Apache XML Security XPointer Expressions Processing Buffer 8: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability June 28, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Apache XML Security PLATFORM: vulnerability is reported in versions prior to 1.7.2 ABSTRACT: The vulnerability addresses the possibility of a heap overflow condition REFERENCE LINKS: Secunia Advisory SA53959 Apache Advisory CVE-2013-2210 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error within the XML Signature Reference processing code and can be exploited to cause a heap-based buffer overflow via a specially crafted document containing malformed XPointer expressions. IMPACT: Successful exploitation may allow execution of arbitrary code

346

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

347

Global Climate Change Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Climate Change Links Global Climate Change Links This page provides links to web pages that we at CDIAC feel do a responsible job of presenting information and discussion pertinent to the science behind the global climate change ("global warming") debate. These sites include those on both sides of the debate; some asserting that global warming is a clear and present danger, and others that might be labeled global warming "skeptics." Some of these sites don't take a position per se; they exist to offer the public objective scientific information and results on our present understanding of the climate system. The list is not intended to be comprehensive, by any means. We hope it will be especially helpful for those who may be just beginning their research into global

348

BCDA Machine Status Link  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Machine Status Link Machine Status Link Version 1.33 (December 2005) David M. Kline. The Machine Status Link (MSL) is responsible for distributing the digitized beam current, injection status, P0 clock, and other statuses over a single fiber to several locations around the Storage Ring. The MRD100 is a VME-based module that is part of the MSL and was specifically designed for the APS. It receives and interprets information from the XMS100 module by means of copper or fiber. Signals from the XMS100 module are sent at a P0 rate (3.667 microseconds). It sends two registers every cycle and all in about 12 cycles. Refer to the ASD website for additional information regarding the MSL. The focus of this page is to provide information of how to configure the MRD100 for a beamline IOC and to discuss the sample IOC

349

A systematic review of security requirements engineering  

Science Journals Connector (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

350

LTS Related Links - Hanford Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Information Management LTS Fact Sheets Briefings LTS Related Links LTS Contact Us 2015 Vision LTS Related Links Email Email Page | Print Print Page |Text Increase Font Size...

351

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

352

Solitons, links and knots  

Science Journals Connector (OSTI)

...Soc. Lond. A (1999) Solitons, links and knots 4309 on a grid containing 1003 points, where spatial derivatives are approximated...results we can speculate on some qualitative aspects of an energy mini- mization principle which leads to the interesting structures...

1999-01-01T23:59:59.000Z

353

Tag: GTRI | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

354

April 2014 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

355

Sandia National Laboratories: Water Security Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Water Security Program Water Security CustomersPartners Awards Key Publications Staff Biographies Water Security In many areas of the United States and multiple regions of...

356

Integrated safeguards and security management plan  

E-Print Network [OSTI]

LBNL/PUB-3151 INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT76SF00098 iv Integrated Safeguards and Security Managementprovided. Appendix A. Safeguards and Security Plan http://

Bowen editor, Sue

2001-01-01T23:59:59.000Z

357

Sandia National Laboratories: National Security Missions: Internationa...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security casks We reduce proliferation and terrorism threats to U.S. national security through global technical engagement. Enhance security of vulnerable nuclear weapons...

358

INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS  

E-Print Network [OSTI]

INFORMATION SECURITY GUIDELINES #12;CONSISTENT, EFFECTIVE INFORMATION SECURITY To respond to societal-to-date information security standards. Should we fail to do so, in the event

Prodiæ, Aleksandar

359

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES Form is used to document travel to sensitive countries. SECURITY...

360

Security, Emergency Planning & Safety Records | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

472.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

362

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

363

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

364

Cyber Security Issues and Requirements  

Broader source: Energy.gov (indexed) [DOE]

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

365

Website Policies and Important Links | Scientific and Technical Information  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Website Policies and Important Links Print page Print page Email page Email page This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright, Restrictions, and Permissions Notice Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Data Rights Freedom of Information Information Quality No Fear Act Schedule for Posting Information Comments Policy USAJOBS Grants Regulations USA.gov Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of

366

SC e-journals Website Policies and Important Links  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Website Policies and Important Links This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright, Restrictions, and Permissions Notice Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Data Rights Freedom of Information Information Quality No Fear Act Schedule for Posting Information Comments Policy USAJOBS Grants Regulations USA.gov Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any

367

Science Open Access Journals - Website Policies/Important Links  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Website Policies and Important Links This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright, Restrictions, and Permissions Notice Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Data Rights Freedom of Information Information Quality No Fear Act Schedule for Posting Information Comments Policy USAJOBS Grants Regulations USA.gov Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any

368

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

369

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

370

Security Clearances; Limitations  

Broader source: Energy.gov (indexed) [DOE]

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

371

New Security Challenges in the Global Era: Environmental Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

372

The security fallacy: Seven myths about physical security | Argonne  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

373

Security Science: The Theory and Practice of Security  

Science Journals Connector (OSTI)

Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners ...

Clifton Smith; David J Brooks

2012-12-01T23:59:59.000Z

374

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Office of Environmental Management (EM)

can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a...

375

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

376

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

377

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

378

Engineering secure software  

E-Print Network [OSTI]

Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style... Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style...

Jetly, Prateek

2012-06-07T23:59:59.000Z

379

Quantum-secured imaging  

E-Print Network [OSTI]

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magaa-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

380

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...? ? Advanced security methods ? Power analysis for key discovery ? Hardware attacks such as ?decapping? chips ? Developing vulnerability exploits ? Security analysis of smart grid systems & communications ? Reverse engineering ? Penetration testing ? Threat...

Ragsdale, G.

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Development of an optical three-dimensional laser tracker using dual modulated laser diodes and a signal detector  

SciTech Connect (OSTI)

Laser trackers are widely used in industry for tasks such as the assembly of airplanes and automobiles, contour measurement, and robot calibration. However, laser trackers are expensive, and the corresponding solution procedure is very complex. The influence of measurement uncertainties is also significant. This study proposes a three-dimensional space position measurement system which consists of two tracking modules, a zero tracking angle return subsystem, and a target quadrant photodiode (QPD). The target QPD is placed on the object being tracked. The origin locking method is used to keep the rays on the origin of the target QPD. The position of the target QPD is determined using triangulation since the two laser rays are projected onto one QPD. Modulation and demodulation are utilized to separate the coupled positional values. The experiment results show that measurement errors in the X, Y, and Z directions are less than {+-}0.05% when the measured object was moved by 300, 300, and 200 mm in the X, Y, and Z axes, respectively. The theoretical measurement error estimated from the measurement model is between {+-}0.02% and {+-}0.07% within the defined measurable range. The proposed system can be applied to the measurements of machine tools and robot arms.

Lee, Hau-Wei; Chen, Chieh-Li [Department of Aeronautics and Astronautics, National Cheng Kung University, No. 1, University Road, Tainan City 701, Taiwan (China); Liu, Chien-Hung [Institute of Electro-Optical and Materials Science, National Formosa University, Huwei, Yunlin 632, Taiwan (China)

2011-03-15T23:59:59.000Z

382

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network [OSTI]

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

383

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

384

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

385

The Universe Adventure - Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links Links Cosmology and Space Cosmic Journey A site chronicling the history of scientific cosmology, presented by the American Institute of Physics. Hubble Ultra-Deep Field Skywalker Lets you explore the famous Hubble Deep Field photo, which is the deepest view (in the visible spectrum) into the sky to date. QuietBay Constellation Tutorial A fun and easy tutorial to familiarize yourself with the night sky. Astronomy Picture of the Day Astronomy Picture of the Day features a new image from the universe every day, with short explanations written by professional astronomers. The Solar System NASA site that includes images and profiles of the planets (plus Pluto). Earth Guide An Earth planetary science site created by the Japan Science and Technology Agency describing many of the features of Earth and its place in the

386

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

387

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

388

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

389

Automated analysis of security APIs  

E-Print Network [OSTI]

Attacks on security systems within the past decade have revealed that security Application Programming Interfaces (APIs) expose a large and real attack surface but remain to be a relatively unexplored problem. In 2000, ...

Lin, Amerson H

2005-01-01T23:59:59.000Z

390

Covalently Linked DNA Nanotubes  

Science Journals Connector (OSTI)

SEM analyses of the nanotubes generated according to Scheme 2 further support the suggested folding of the 2D cross-linked DNA array into the nanotube structure. ... Here, we report a modular approach to DNA nanotube synthesis that provides access to geometrically well-defined triangular and square-shaped DNA nanotubes. ... and assembly of carbon nanotubes, and in nanotube-based DNA sensing and sepns. ...

Ofer I. Wilner; Anja Henning; Bella Shlyahovsky; Itamar Willner

2010-03-17T23:59:59.000Z

391

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network [OSTI]

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

392

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

393

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

394

About SRNL - Directorates - National Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Technical Partnerships Global...

395

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

396

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

397

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

398

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Broader source: Energy.gov (indexed) [DOE]

70: HP Security Bulletin - HP-UX Running OpenSSL, Remote 70: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

399

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Broader source: Energy.gov (indexed) [DOE]

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

400

U-190: Microsoft Security Bulletin MS12-037 - Critical | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Microsoft Security Bulletin MS12-037 - Critical 0: Microsoft Security Bulletin MS12-037 - Critical U-190: Microsoft Security Bulletin MS12-037 - Critical June 13, 2012 - 3:30pm Addthis PROBLEM: Microsoft Security Bulletin MS12-037 - Critical PLATFORM: Internet Explorer 8.x ABSTRACT: This security update resolves one publicly disclosed and twelve privately reported vulnerabilities in Internet Explorer. LINKS: Microsoft Security Bulletin MS12-037 - Critical Secunia Advisory SA49412 IMPACT ASSESSMENT: High Discussion: The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Broader source: Energy.gov (indexed) [DOE]

0: HP Security Bulletin - HP-UX Running OpenSSL, Remote 0: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

402

T-697: Google Chrome Prior to 13.0.782.107 Multiple Security  

Broader source: Energy.gov (indexed) [DOE]

97: Google Chrome Prior to 13.0.782.107 Multiple Security 97: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities August 19, 2011 - 3:02pm Addthis PROBLEM: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. PLATFORM: Cross Platform: Google Chrome Prior to 13.0.782.107: Versions and Vulnerabilities (Details) ABSTRACT: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. The Chromium Projects Security Overview. reference LINKS: SecurityFocus: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities

403

Transmission Line Security Monitor  

SciTech Connect (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2011-01-01T23:59:59.000Z

404

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

405

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

406

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

407

Model checking grid security  

Science Journals Connector (OSTI)

Grid computing is one of the leading forms of high performance computing. Security in the grid environment is a challenging issue that can be characterized as a complex system involving many subtleties that may lead designers into error. This is similar to what happens with security protocols where automatic verification techniques (specially model checking) have been proved to be very useful at design time. This paper proposes a formal verification methodology based on model checking that can be applied to host security verification for grid systems. The proposed methodology must take into account that a grid system can be described as a parameterized model, and security requirements can be described as hyperproperties. Unfortunately, both parameterized model checking and hyperproperty verification are, in general, undecidable. However, it has been proved that this problem becomes decidable when jobs have some regularities in their organization. Therefore, this paper presents a verification methodology that reduces a given grid system model to a model to which it is possible to apply a cutoff theorem (i.e., a requirement is satisfied by a system with an arbitrary number of jobs if and only if it is satisfied by a system with a finite number of jobs up to a cutoff size). This methodology is supported by a set of theorems, whose proofs are presented in this paper. The methodology is explained by means of a case study: the Condor system.

F. Pagliarecci; L. Spalazzi; F. Spegni

2013-01-01T23:59:59.000Z

408

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

409

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

410

Mac Security Bible  

Science Journals Connector (OSTI)

Your essential, no-holds-barred guide to Mac security threats and solutions Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely ...

Joe Kissell

2010-01-01T23:59:59.000Z

411

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

412

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

413

Secure Military Social Networking and Rapid Sensemaking in Domain Specific Concept Systems: Research Issues and Future Solutions  

E-Print Network [OSTI]

This paper identifies the need for a secure military social networking site and the underlying research issues linked to the successful development of such sites. The paper further proposes a solution to the most basic ...

Garside, Debbie

414

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Research Areas Fuel Cycle Science & Technology Fusion Nuclear Science Isotope Development and Production Nuclear Security Science & Technology Border Security Comprehensive...

415

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

416

Security Control Assessor | Department of Energy  

Energy Savers [EERE]

Training Worksheet More Documents & Publications Information System Security Manager (ISSM) Cybersecurity Program Manager (CSPM) Information System Security Officer (ISSO)...

417

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

418

NNSA: Securing Domestic Radioactive Material | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NNSA: Securing Domestic Radioactive Material | National Nuclear Security NNSA: Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > NNSA: Securing Domestic Radioactive Material Fact Sheet NNSA: Securing Domestic Radioactive Material Apr 12, 2013 The Department of Energy's National Nuclear Security Administration (NNSA),

419

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

420

Physical and Logical Security Convergence: Powered By Enterprise Security Management: Powered By Enterprise Security Management  

Science Journals Connector (OSTI)

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, ... Keywords: Computer Science, Security

Brian T. Contos; Steve Hunt; Colby Derodeff

2007-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

U.S. DOE SECURITY CLEARANCES U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance Reinvestigation Clearance Termination Clearance Transfer Sandia National Laboratories sponsors and processes U.S. DOE Security Clearances for contractor personnel working on an authorized contract requiring access to classified information. Clearance Office Functions Contractor Pre-Process Background Review Certification Clearance File Change Drug Testing e-Fingerprinting Enrollment Process Maintaining a DOE Security Clearance During an Extended Absence DOE Personnel Security Reporting Requirements Data Report on Spouse/Cohabitant Name Change Change in Citizenship Contractor Clearance Tools Clearance Action Status Inquiries

422

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

423

Headquarters Facilities Master Security Plan  

Broader source: Energy.gov [DOE]

The purpose of the Headquarters Facilities Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures in place at Department of Energy (DOE) Headquarters (HQ) facilities in the Washington, DC area. The HQFMSP does not establish new security requirements; security requirements are established by various Federal laws and regulations, Executive Orders, and DOE directives. This plan explains how these requirements are implemented at HQ and gives HQ personnel and visitors access to the security policies and procedures that affect them regularly. The HQFMSP does not apply to DOE sites or facilities outside the Washington, DC area.

424

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

October 11, 2012 October 11, 2012 PSH-12-0081 - In the Matter of Personnel Security Hearing On October 11, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for providing false information on a Questionnaire for National Security Positions and failing to comply with rules regarding the handling of classified information and conduct within simited access areas. This behavior raised security concerns under Criteria F, G, and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer fo October 2, 2012 PSH-12-0052 - In the Matter of Personnel Security Hearing On October 2, 2012, an OHA Hearing Officer issued a decision in which he

425

Chapter_14_Cyber_Security  

Broader source: Energy.gov (indexed) [DOE]

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

426

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 5, 2013 March 5, 2013 PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated March 5, 2013 PSH-12-0131 - In the Matter of: Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which he

427

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

January 11, 2012 January 11, 2012 TSO-01113 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on financial issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in July 2011. PSI, DOE Ex. 13 In August 2011, the LSO issued the individual a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about his eligibility to hold a DOE security clearance. (DOE Ex. 1). December 21, 2011 TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection

428

Chapter_3_Personnel_Security  

Broader source: Energy.gov (indexed) [DOE]

Personnel Security Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is designed to ensure that individuals authorized to access classified information and Special Nuclear Material (SNM) do not pose a threat to national security interests. This assurance is provided by the process for issuing initial and continuing

429

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

November 1, 2012 November 1, 2012 PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that October 26, 2012 PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she

430

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

RESPONSIBILITIES RESPONSIBILITIES FSO Overview FSO Reporting Responsibilities Questions an FSOs at a Non-Possesssing Site Could Be Asked During an Audit Non-Possessing Contractor Security Requirements Plan Training for Facility Security Officers (FSOs) PHY-210DE Facility Security Officer Overview PHY-210DB, Introduction to Facility Security Officer (Self-Study Course ) Duration: 3 days Description: This correspondence course provides an overview of the roles and responsibilities of the DOE or DOE-contractor FSO. The course emphasizes facility clearance requirements, personnel security, information security, incident reporting, and other related programs. The course references the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22-M) and a comprehensive listing of DOE orders, manuals, guides, forms, and notices.

431

PROPOSAL FOR A SILICON VERTEX TRACKER (VTX) FOR THE PHENIX EXPERIMENT.  

SciTech Connect (OSTI)

We propose the construction of a Silicon Vertex Tracker (VTX) for the PHENIX experiment at RHIC. The VTX will substantially enhance the physics capabilities of the PHENIX central arm spectrometers. Our prime motivation is to provide precision measurements of heavy-quark production (charm and beauty) in A+A, p(d)+A, and polarized p+p collisions. These are key measurements for the future RHIC program, both for the heavy ion program as it moves from the discovery phase towards detailed investigation of the properties of the dense nuclear medium created in heavy ion collisions, and for the exploration of the nucleon spin-structure functions. In addition, the VTX will also considerably improve other measurements with PHENIX. The main physics topics addressed by the VTX are: (1) Hot and dense strongly interacting matter--Potential enhancement of charm production; Open beauty production; Flavor dependence of jet quenching and QCD energy loss; Accurate charm reference for quarkonium; Thermal dilepton radiation; High p{sub T} phenomena with light flavors above 10-15 GeV/c in p{sub T}; and Upsilon spectroscopy in the e{sup +}e{sup -} decay channel. (2) Gluon spin structure of the nucleon--{Delta}G/G with charm; {Delta}G/G with beauty; and x dependence of {Delta}G/G with {gamma}-jet correlations. (3) Nucleon structure in nuclei--Gluon shadowing over broad x-range. With the present PHENIX detector, heavy-quark production has been measured indirectly through the observation of single electrons. These measurements are inherently limited in accuracy by systematic uncertainties resulting from the large electron background from Dalitz decays and photon conversions. In particular, the statistical nature of the analysis does not allow for a model-independent separation of the charm and beauty contributions. The VTX detector will provide vertex tracking with a resolution of <50 {micro}m over a large coverage both in rapidity (|{eta}| < 1.2) and in azimuthal angle ({Delta}{phi} {approx} 2{pi}). With this device, significantly enhanced and qualitatively new data can be obtained. A more robust and accurate measurement of heavy-quark production over a wide kinematics range will be possible. The main benefits are in three areas. Firstly, by selecting electrons with a distance of closest approach (DCA) to the primary vertex larger than {approx}100 {micro}m, the background will be suppressed by several orders of magnitude and thereby a clean and robust measurement of heavy flavor production in the single electron channel will become available. Secondly, because the lifetime of mesons with beauty is significantly larger than that of mesons with charm, the VTX information will allow us to disentangle charm from beauty production over a broad p{sub T} range. Thirdly, a DCA cut on hadrons will reduce the combinatorial background of K{pi} to an extent that a direct measurement of D mesons through this decay channel will become possible. In addition, the VTX detector will substantially extend our p{sub T} coverage in high p{sub T} charged particles, and it also will enable us to measure {gamma}+jet correlations.

AKIBA,Y.

2004-03-30T23:59:59.000Z

432

Fermilab | About FermiLINK  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

About FermiLINK About FermiLINK Fermilab Today September 28, 2009 Mentors wanted for Diversity Office's FermiLINK program Fermilab Today October 5, 2009 Mentors wanted for Diversity Office's FermiLINK program Fermilab Today October 13, 2009 FermiLINK Q&A session Fermilab Today November 9, 2009 FermiLINK calls for mentees FermiLINK is Fermilab’s mentorship system designed to create an organizational network of leaders by providing opportunities for professional development and career management. This support structure creates access to the counsel and institutional knowledge of successful Fermilab professionals independent of the immediate supervisory hierarchy. FermiLINK provides web-based access to a host of mentors for issue-specific work-related challenges and opportunities. The network supports email,

433

Security, Safety and Health  

Broader source: Energy.gov (indexed) [DOE]

8, Fourth Quarter, 2012 8, Fourth Quarter, 2012 www.fossil.energy.gov/news/energytoday.html HigHligHts inside 2 Security and Sustainability A Column from the FE Director of Health, Security, Safety and Health 4 Training Goes 3-D NETL's AVESTAR Center Deploys New Virtual Training System 5 Secretary Achievement Awards Two FE Teams Earn Secretary of Energy Recognition 7 Vast Energy Resource Identified FE Study Says Billions of Barrels of Oil in Residual Oil Zones 8 Presidential Award NETL-RUA Engineer Earns Highest Government Honor in Science & Engineering This September marked a major mile- stone for one of the Office of Fossil Energy's largest carbon capture, utili- zation and storage projects: the opening

434

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

JUNE/JULY 2013 JUNE/JULY 2013 inside this issue ... Reaching the summit - Big hitters talk economic development Page 3 Saving yesterday's knowledge today Page 5 What's a fellow to do? Page 6 ... and other Y-12 news On June 3 newly appointed Secretary of Energy Ernest Moniz (right) made Oak Ridge the site of his first official visit since being sworn in as head of the U.S. Department of Energy. Secretary Moniz met earlier in the day with national lab directors at Oak Ridge National Laboratory, then came to Y-12 for tours and a meeting with the National Nuclear Security Administration Production Office, B&W Y-12 and ORNL employees. He was joined by Rep. Chuck Fleischmann. The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental

435

HEADQUARTERS SECURITY OFFICERS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

HEADQUARTERS SECURITY OFFICERS Revision Date: December 16, 2013 ELEMENT Office of Security Operations AR AR-1 AR-1 AR-1 CF CF-40 CF-40 CI CI-3 ED ED-2 EE EE-3A EE-3A NAME LOCATION PHONE FAX NUMBER WAYNE E. BERKEBILE E-325/GTN 301-903-1163 301-903-8108 Advanced Research Projects Agency - Energy MATTHEW TARDUOGNO L'N !NT 950/Rm. 8014 202-586-2892 202-287-5450 NICHOLE CLAGETT (ALT) L'N !NT 950/Rm. 8025 202-287-6409 202-287-5450 SARA DWYER (REP) L'N !NT 950/Rm. B-2 202-287-6411 202-287-5450 Office of the Chief Financial Officer PHILIP A. KNOPP Rm. 1310 CLV. 301-903-0364 301-903-1863 KIMBERLY J. LUCAS (ALT) Rm. 1310 CLV. 301-903-2485 301-903-6877 Assistant Secretary for Congressional and Intergovernmental Affairs

436

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration Finding of No Significant Impact for the Construction and Operation of a New Office Building and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area Office 528 35th Street Los Alamos, N M 8 7 5 4 4 DEPARTMENT OF ENERGY. NATIONAL NUCLEAR SECUIRTY ADMINISTRATION FINDING OF NO SIGNIFICANT INIPACT Construction and Operation of a New Office Building and Related Structures withinTA-3 at Los Alarnos National Laboratory, Los Alamos. New Mexico FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Construction and Operation of a New Office Building and Related Structures within TA-3 at L os Alamos National Laboratory, Los Alamos, New Mexico (DOE/EA- 7 375)

437

The Cyber Security Crisis  

SciTech Connect (OSTI)

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

438

The Climate Impacts LINK Project  

E-Print Network [OSTI]

The Climate Impacts LINK Project The Climatic Research Unit, University of East Anglia Funded Impacts LINK Project: Applying Results from the Hadley Centre's Climate Change Experiments for Climate change is relatively undeveloped.The Climate Impacts LINK Project was conceived to encourage research

Feigon, Brooke

439

Assembly and bench testing of a spiral fiber tracker for the J-PARC TREK/E36 experiment  

E-Print Network [OSTI]

This study presents the recent progress made in developing a spiral fiber tracker (SFT) for use in the experiment TREK/E36 planned at the Japan Proton Accelerator Research Complex. This kaon decay experiment uses a stopped positive kaon beam to search for physics beyond the Standard Model through precision measurements of lepton universality and through searches for a heavy sterile neutrino and a dark photon. Detecting and tracking positrons and positive muons from kaon decays are of importance in achieving high-precision measurements; therefore, we designed and are developing the new tracking detector using a scintillating fiber. The SFT was completely assembled, and in a bench test, no dead channel was determined.

Makoto Tabata; Sbastien Bianchin; Michael D. Hasinoff; Robert S. Henderson; Keito Horie; Youichi Igarashi; Jun Imazato; Hiroshi Ito; Alexander Ivashkin; Hideyuki Kawai; Yury Kudenko; Oleg Mineev; Suguru Shimizu; Akihisa Toyoda; Hirohito Yamazaki

2014-11-29T23:59:59.000Z

440

Assembly and bench testing of a spiral fiber tracker for the J-PARC TREK/E36 experiment  

E-Print Network [OSTI]

This study presents the recent progress made in developing a spiral fiber tracker (SFT) for use in the experiment TREK/E36 planned at the Japan Proton Accelerator Research Complex. This kaon decay experiment uses a stopped positive kaon beam to search for physics beyond the Standard Model through precision measurements of lepton universality and through searches for a heavy sterile neutrino and a dark photon. Detecting and tracking positrons and positive muons from kaon decays are of importance in achieving high-precision measurements; therefore, we designed and are developing the new tracking detector using a scintillating fiber. The SFT was completely assembled, and in a bench test, no dead channel was determined.

Tabata, Makoto; Hasinoff, Michael D; Henderson, Robert S; Horie, Keito; Igarashi, Youichi; Imazato, Jun; Ito, Hiroshi; Ivashkin, Alexander; Kawai, Hideyuki; Kudenko, Yury; Mineev, Oleg; Shimizu, Suguru; Toyoda, Akihisa; Yamazaki, Hirohito

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

442

T-610: Red Hat kdenetwork security update | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0: Red Hat kdenetwork security update 0: Red Hat kdenetwork security update T-610: Red Hat kdenetwork security update April 26, 2011 - 7:11am Addthis PROBLEM: A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. An attacker could use this flaw to create a specially-crafted Metalink file that, when opened, would cause KGet to overwrite arbitrary files accessible to the user running KGet. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. reference LINKS: RHSA-2011:0465-1 CVE-2011-1586 RH Classification RH Updates Support

443

Development of a Secure, Economic and Environmentally friendly Modern Power  

Open Energy Info (EERE)

Secure, Economic and Environmentally friendly Modern Power Secure, Economic and Environmentally friendly Modern Power System (Smart Grid Project) Jump to: navigation, search Project Name Development of a Secure, Economic and Environmentally friendly Modern Power System Country Denmark Coordinates 56.26392°, 9.501785° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":56.26392,"lon":9.501785,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

444

Automation and security of Supply (Smart Grid Project) | Open Energy  

Open Energy Info (EERE)

Automation and security of Supply (Smart Grid Project) Automation and security of Supply (Smart Grid Project) Jump to: navigation, search Project Name Automation and security of Supply Country Denmark Coordinates 56.26392°, 9.501785° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":56.26392,"lon":9.501785,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

445

National Interest Security Company NISC Formerly Technology Management  

Open Energy Info (EERE)

Interest Security Company NISC Formerly Technology Management Interest Security Company NISC Formerly Technology Management Services TMS Inc Jump to: navigation, search Name National Interest Security Company (NISC) (Formerly Technology & Management Services (TMS) Inc.) Place Gaithersburg, Maryland Zip 20879 Product TMS provides technical and engineering analyses Coordinates 39.139866°, -77.193829° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.139866,"lon":-77.193829,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

446

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Italy Nuclear Security Summit: Fact Sheet Fact Sheet Italy Nuclear Security Summit: Fact Sheet Mar 26, 2012 Between the 1960s and mid-1980s, Italy had an ambitious nuclear power

447

Office of Secure Transportation History | National Nuclear Security  

National Nuclear Security Administration (NNSA)

History | National Nuclear Security History | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Secure Transportation History Home > About Us > Our Programs > Defense Programs > Office of Secure Transportation > Office of Secure Transportation History Office of Secure Transportation History Since 1947, NNSA and its predecessor agencies have moved nuclear weapons,

448

Future Challenges for Linked APIs  

E-Print Network [OSTI]

Abstract. A number of approaches combine the principles and technologies of Linked Data and RESTful services. Services and APIs are thus enriched by, and contribute to, the Web of Data. These resource-centric approaches, referred to as Linked APIs, focus on flexibility and the integration capabilities of Linked Data. We use our experience in teaching students on how to use Linked APIs to identify the existing challenges in the area. Additionally we introduce the LAPIS catalogue, a directory for Linked APIs as basis for the research to address the identified challenges. 1

Steffen Stadtmller; Sebastian Speiser; Andreas Harth

449

Investigating the Link Between Radiologists Gaze, Diagnostic Decision, and Image Content  

SciTech Connect (OSTI)

Objective: To investigate machine learning for linking image content, human perception, cognition, and error in the diagnostic interpretation of mammograms. Methods: Gaze data and diagnostic decisions were collected from six radiologists who reviewed 20 screening mammograms while wearing a head-mounted eye-tracker. Texture analysis was performed in mammographic regions that attracted radiologists attention and in all abnormal regions. Machine learning algorithms were investigated to develop predictive models that link: (i) image content with gaze, (ii) image content and gaze with cognition, and (iii) image content, gaze, and cognition with diagnostic error. Both group-based and individualized models were explored. Results: By pooling the data from all radiologists machine learning produced highly accurate predictive models linking image content, gaze, cognition, and error. Merging radiologists gaze metrics and cognitive opinions with computer-extracted image features identified 59% of the radiologists diagnostic errors while confirming 96.2% of their correct diagnoses. The radiologists individual errors could be adequately predicted by modeling the behavior of their peers. However, personalized tuning appears to be beneficial in many cases to capture more accurately individual behavior. Conclusions: Machine learning algorithms combining image features with radiologists gaze data and diagnostic decisions can be effectively developed to recognize cognitive and perceptual errors associated with the diagnostic interpretation of mammograms.

Tourassi, Georgia [ORNL; Voisin, Sophie [ORNL; Paquit, Vincent C [ORNL; Krupinski, Elizabeth [University of Arizona

2013-01-01T23:59:59.000Z

450

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

451

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

452

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL), which is an indoor/outdoor facility designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including sensors, cameras, power generation, access control, remote communication, unmanned aerial, and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain including open grassy fields, hilly wooded areas, sand pits, and lakes and streams which approximate the actual challenges of border and facility applications. A critical facet of this facility is the ability to test systems year-round under the seasonal

453

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

August 30, 2013 August 30, 2013 PSH-13-0049 - In the Matter of Personnel Security On August 30, 2013, a Hearing Officer issued a Decision in which he determined that an individual's access authorization should not be granted. In reaching this determination, the Hearing Officer found that the individual had not resolved security concerns under Criterion L regarding the Individual's failure to report an arrest for failure to appear at an arraignment concerning traffic tickets and a citation for failing to have a controlled prescription medication in its proper container. August 29, 2013 PSH-13-0057 - In the Matter of Personnel Security On August 28, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security

454

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

August 22, 2012 August 22, 2012 PSH-12-0065 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility. Exhibit (Ex.) 10 at 3. The Local Security Office (LSO) discovered that the Individual failed to list a 2004 Driving Under the Influence (DUI) arrest in a Questionnaire for National Security Positions form completed in October 2011. Ex. 10 at 10. August 22, 2012 PSH-12-0045 - In the Matter of Personnel Security Hearing OHA Hearing Officer issued a decision in which he determined that an Individual's DOE security clearance should be restored. The Individual had been caught viewing pornography on a DOE workplace computer. August 17, 2012 PSH-12-0048 - In the Matter of Personnel Security Hearing OHA Hearing Officer issued a decision in which he concluded that an

455

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

June 20, 2012 June 20, 2012 PSH-12-0044 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility and has possessed a security clearance on various occasions since 1978. Exhibit (Ex.) 8 at 2. In December 2011, the Individual reported to the Local Security Office (LSO) that his wages were being garnished for back federal taxes. Ex. 13 at 1. Consequently, the LSO conducted a personnel security interview (PSI) with the Individual in January 2012. Ex. 15. June 13, 2012 PSH-12-0010 - In the Matter of Personnel Security Hearing The individual works for a Department of Energy (DOE) contractor and is an applicant for DOE access authorization. In August 2010, the individual completed a Questionnaire for National Security Positions (QNSP) and was

456

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

14, 2012 14, 2012 PSH-12-0083 - In the Matter of In the Matter of Personnel Security Hearing On November 14, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for failing to comply with rules regarding the handling of classified information and conduct within limited access areas and for failing to report such non-compliance. This behavior raised security concerns under Criteria G and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented su November 13, 2012 PSH-12-0092 - In the Matter of Personnel Security Hearing On September 24, 2012, an OHA Hearing Officer issued a decision in which he

457

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

June 13, 2013 June 13, 2013 PSH-13-0034 - In the Matter of Personnel Security Hearing On June 13, 2013, a Hearing Officer determined that an individual's security clearance should not be restored. In reaching this determination, the Hearing Officer found that the individual had not successfully addressed the DOE's security concerns regarding her finances under criterion (l). June 11, 2013 PSH-13-0019 - In the Matter of Personnel Security On June 11, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's authorization access should be restored. A Local Security Office suspended the individual's security clearance following the individual contemplating suicide and, subsequently, being diagnosed by a DOE consulting psychologist as meeting the criteria for

458

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

October 10, 2013 October 10, 2013 PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. October 10, 2013 PSH-13-0070 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. Following the individual's employer receiving garnishment notices from both federal and state tax authorities in January 2013, the

459

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Energy Savers [EERE]

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

460

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Broader source: Energy.gov (indexed) [DOE]

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Broader source: Energy.gov (indexed) [DOE]

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

462

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Broader source: Energy.gov (indexed) [DOE]

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

463

PIA - WEB Physical Security Major Application | Department of...  

Energy Savers [EERE]

Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application More...

464

ETTP Security Access Control System (ESACS) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

465

Security Enforcement Reporting Criteria | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Classified information security noncompliances are categorized according to the disclosure or potential disclosure of DOE classified information placed at risk. There are two categories of noncompliances that are based on the relative severity of a classified information security incident. The categories are identified by an event category and type. Each of the two categories is further subdivided into three types based on the type of interest (security interest, management interest, and procedural interest). Security Enforcement Reporting Criteria More Documents & Publications Safety and Security Enforcement Coordinator Handbook DOE-STD-1210-2012 HQFMSP Chapter 11, Incidents of Security Concern

466

Newsletters | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Newsletters | National Nuclear Security Administration Newsletters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Newsletters Home > Media Room > Newsletters Newsletters NNSA publishes a monthly newsletter featuring current events and activities across the nuclear security enterprise. Online archives are available back

467

Speeches | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

468

Safety and Security Enforcement Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Enforcement Enforcement Enforcement Home Worker Safety and Health Enforcement Office of Nuclear Safety Enforcement Security Enforcement Notices of Violation Consent Orders / Settlement Agreements Compliance Orders Special Report Orders Enforcement Letters Regulatory Assistance Reviews Enforcement Program and Process Guidance and Information Non-Compliance Tracking System (NTS) Non-Compliance Reporting Thresholds Regulations and Directives Enforcement Staff Enforcement Coordinator Contact Information 2013 DOE Safety and Security Enforcement Workshop Request for Investigation or Inspection of Safety or Security Violations Archived Documents HSS Logo Safety and Security Enforcement Program Office of Enforcement and Oversight What's New: » Worker Safety and Health Enforcement Preliminary Notice of Violation issued to Brookhaven Science Associates, LLC

469

Climate Change and National Security  

E-Print Network [OSTI]

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

470

Sandia National Laboratories: Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Wind Generator Modeling On June 26, 2014, in Computational Modeling & Simulation, Energy, Energy Surety, Grid Integration, Infrastructure Security, Modeling, Modeling & Analysis,...

471

Hardware Security through Design Obfuscation.  

E-Print Network [OSTI]

??Security of integrated circuits (ICs) has emerged as a major concern at different stages of IC life-cycle, spanning design, test, fabrication and deployment. Modern ICs (more)

Chakraborty, Rajat Subhra

2010-01-01T23:59:59.000Z

472

Jordan | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Jordan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

473

Personnel Security Corner- PERSEC Corner  

Broader source: Energy.gov [DOE]

Welcome to the Departmental Personnel Security PERSEC Corner document collection. If you have not yet registered for access to this information, please complete our Registration form.

474

russia | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

russia | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

475

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber-physical solutions Cybersecurity for energy delivery systems outreach AMI smart metering upgradeability test framework Practical quantum security for grid automation...

476

Sandia National Laboratories: Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

July 31, 2014, in DETL, Distribution Grid Integration, Energy, Energy Surety, Facilities, Grid Integration, Infrastructure Security, News, News & Events, Photovoltaic, Renewable...

477

David Telles wins NNSA Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

478

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

479

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

480

Sandia National Laboratories: Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sandia Study Shows Large LNG Fires Hotter but Smaller Than Expected On December 6, 2011, in Analysis, Energy Assurance, Infrastructure Security, Modeling, Modeling & Analysis,...

Note: This page contains sample records for the topic "links security tracker" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

National Nuclear Security Administration Overview  

Broader source: Energy.gov (indexed) [DOE]

1, 2011 - 1, 2011 - Page 1 National Transportation Stakeholders Forum Denver, Colorado May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2 National Transportation Stakeholders Forum (NTSF) * Introduction * NNSA Certifying Official Role * Offsite Source Recovery Project * Waste Shipments * Nuclear Materials Management Planning * Summary May 11, 2011 - Page 3 NNSA Plays a Critical Role: Ensuring our Nation's Security * Maintaining the safety, security and effectiveness of the nuclear weapons stockpile without nuclear testing * Reducing the global danger from the proliferation of nuclear weapons and materials * Provide safe and effective nuclear propulsion for the

482

Speeches | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

483

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

require authoization be obtained throught the SNL Foreign National Request (FNR) Security Plan (SP) electronic process. The Contractor and Subcontractor must notify their...

484

Information Technology Management ((Information Security))  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as an Information Technology Specialist (Information Security) with responsibility for the implementation of a wide range of technically complex...

485

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the potential danger associated with an item is questionable, consult the physical security contact for additional information. Illegal drugs (does not include controlled...

486

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

487

A COMPARISON OF SECURITY SAFEGUARD SELECTION METHODS  

E-Print Network [OSTI]

A COMPARISON OF SECURITY SAFEGUARD SELECTION METHODS Thomas Neubauer Secure Business Austria of security safeguards is often a result of current needs or influ- enced by security problems that may go decision makers with an overview of common methods for the evaluation and selection of security safeguards

488

Computer Security Division 2009 Annual Report  

E-Print Network [OSTI]

Security 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 13 Cryptographic Validation Programs Computing Project 36 Policy Machine 36 Security for Grid and Pervasive Systems 38 Security OntologiesComputer Security Division 2009 Annual Report #12;Table of Contents Welcome 1 Division

489

Access control models and security labelling  

Science Journals Connector (OSTI)

Security labels convey information that is utilised to perform access control decisions, specify protective measures, and aid in the determination of additional handling restrictions required by security policies. In discussing security labelling, one ... Keywords: access control, assurance, dynamic labelling model, open system, security label, security policy

Chuchang Liu; Angela Billard; Maris Ozols; Nikifor Jeremic

2007-01-01T23:59:59.000Z

490

Zicom Electronic Security Systems Ltd | Open Energy Information  

Open Energy Info (EERE)

Zicom Electronic Security Systems Ltd Zicom Electronic Security Systems Ltd Jump to: navigation, search Name Zicom Electronic Security Systems Ltd. Place Mumbai, Maharashtra, India Zip 400093 Sector Solar, Wind energy Product Mumbai-based electronic security systems integrator. The firm plans to sell its security business and foray into solar and wind power. Coordinates 19.076191°, 72.875877° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":19.076191,"lon":72.875877,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

491

V-216: Drupal Monster Menus Module Security Bypass and Script Insertion  

Broader source: Energy.gov (indexed) [DOE]

216: Drupal Monster Menus Module Security Bypass and Script 216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities August 12, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been reported in the Monster Menus module for Drupal PLATFORM: Drupal Monster Menus Module 6.x and 7.x ABSTRACT: The vulnerabilities can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks. REFERENCE LINKS: Secunia Advisory SA54391 Drupal Security Advisory CVE-2013-4229 CVE-2013-4230 IMPACT ASSES SMENT: Medium DISCUSSION: 1) Input passed via the title when editing page settings is not properly sanitised before being edited the next time. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's

492

V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities  

Broader source: Energy.gov (indexed) [DOE]

7: Apache Tomcat Security Bypass and Denial of Service 7: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities November 6, 2012 - 6:00am Addthis PROBLEM: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities PLATFORM: Apache Tomcat 5.x Apache Tomcat 6.x Apache Tomcat 7.x ABSTRACT: Two vulnerabilities were reported in Apache Tomcat REFERENCE LINKS: Apache.org Apache Tomcat Denial of Service Apache Tomcat DIGEST authentication weaknesses Secunia Advisory SA51138 CVE-2012-2733 CVE-2012-3439 IMPACT ASSESSMENT: Medium DISCUSSION: A weakness and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). 1) An error within the "parseHeaders()" function

493

U-188: MySQL User Login Security Bypass and Unspecified Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

8: MySQL User Login Security Bypass and Unspecified 8: MySQL User Login Security Bypass and Unspecified Vulnerability U-188: MySQL User Login Security Bypass and Unspecified Vulnerability June 12, 2012 - 7:00am Addthis PROBLEM: A security issue and vulnerability have been reported in MySQL PLATFORM: MySQL 5.x ABSTRACT: An error when verifying authentication attempts can be exploited to bypass the authentication mechanism. Reference LINKS: Original Advisory CVE-2012-2122 Secunia Advisory 49409 IMPACT ASSESSMENT: High Discussion: Successful exploitation of this vulnerability requires MySQL to be built on a system with a library that allows "memcmp()" to return a value outside of the -128 through 127 range (e.g. sse-optimized glibc). NOTE: Vendor binaries are reportedly not affected. The security issue is reported in versions prior to 5.1.63 and 5.5.25.

494

V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability 7: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability July 11, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Adobe ColdFusion PLATFORM: The vulnerability is reported in version 10 for Windows, Macintosh, and Linux ABSTRACT: The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets REFERENCE LINKS: Secunia Advisory SA54024 Adobe Security Bulletin APSB13-19 Stackoverflow.com CVE-2013-3350 IMPACT ASSESSMENT: High DISCUSSION: The hotfix resolves a vulnerability that could permit an attacker to invoke public methods on ColdFusion Components (CFC) using WebSockets IMPACT: Security Bypass

495

T-531: The WebVPN implementation on Cisco Adaptive Security Appliances  

Broader source: Energy.gov (indexed) [DOE]

T-531: The WebVPN implementation on Cisco Adaptive Security T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 January 10, 2011 - 8:33pm Addthis PROBLEM: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) PLATFORM: Listed Vunerable Platform Details ABSTRACT: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777. reference LINKS: CVE Vulnerability Details: CVE-2010-4680 NIST Vulnerability Summary for CVE-2010-4680

496

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Broader source: Energy.gov (indexed) [DOE]

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

497

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Broader source: Energy.gov (indexed) [DOE]

200: Red Hat Directory Server Information Disclosure Security 200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

498

V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Struts DefaultActionMapper Redirection and OGNL 0: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities July 18, 2013 - 6:00am Addthis PROBLEM: Two weaknesses and multiple vulnerabilities have been reported in Apache Struts PLATFORM: Apache Struts 2.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions REFERENCE LINKS: Secunia Advisory SA54118 Apache Security Bulletin S2-16 Apache Security Bulletin S2-17 CVE-2013-2248 CVE-2013-2251 IMPACT ASSESSMENT: High DISCUSSION: 1) Input passed via the "redirect:" and "redirectAction:" prefixing parameters is not properly verified in the DefaultActionMapper class

499

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Broader source: Energy.gov (indexed) [DOE]

0: Red Hat Directory Server Information Disclosure Security 0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

500

Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes  

E-Print Network [OSTI]

of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

Bishop, Matt