Powered by Deep Web Technologies
Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Headquarters Program & Staff Office Mailing Addresses | Department of  

Broader source: Energy.gov (indexed) [DOE]

Headquarters Program & Staff Office Mailing Headquarters Program & Staff Office Mailing Addresses Headquarters Program & Staff Office Mailing Addresses The following addresses are for delivery of regular mail and small packages: Delivery to the Headquarters buildings in Washington, DC: Name of Individual Title Routing Symbol/Forrestal Building U.S. Department of Energy 1000 Independence Ave., S.W. Washington, DC 20585 Name of Individual Title Routing Symbol/L'Enfant Plaza Building U.S. Department of Energy 1000 Independence Ave., S.W. Washington, DC 20585-1615 Delivery to the Headquarters buildings in Germantown, MD: Name of Individual Title Routing Symbol/Germantown Building U.S. Department of Energy 1000 Independence Ave., S.W. Washington, DC 20585-1290 Name of Individual Title Routing Symbol/Cloverleaf Building

2

Mailing Addresses and Information Numbers for Operations, Field, and Site  

Broader source: Energy.gov (indexed) [DOE]

About Energy.gov » Mailing Addresses and Information Numbers for About Energy.gov » Mailing Addresses and Information Numbers for Operations, Field, and Site Offices Mailing Addresses and Information Numbers for Operations, Field, and Site Offices Name Telephone Number U.S. Department of Energy Ames Site Office 111 TASF, Iowa State University Ames, Iowa 50011 515-294-9557 U.S. Department of Energy Argonne Site Office 9800 S. Cass Avenue Argonne, IL 60439 630-252-2000 U.S. Department of Energy Berkeley Site Office Berkeley National Laboratory 1 Cyclotron Road Berkeley, CA 94720 510-486-5784 U.S. Department of Energy Bonneville Power Administration P.O. Box 3621 905 NE 11th Avenue Portland, OR 97232 Bonneville Power Administration General and Regional Offices 503-230-3000 U.S. Department of Energy Brookhaven Site Office Upton, NY 11973 631-344-5050

3

Mailing Addresses for National Laboratories and Technology Centers |  

Broader source: Energy.gov (indexed) [DOE]

Mailing Addresses for National Laboratories and Mailing Addresses for National Laboratories and Technology Centers Mailing Addresses for National Laboratories and Technology Centers Name Telephone Number U.S. Department of Energy Albany Research Center 1450 Queen Ave. SW Albany, OR 97321-2198 541-967-5892 U.S. Department of Energy Ames Laboratory #311 TASF, Iowa State University Ames, Iowa 50011 515-294-2680 U.S. Department of Energy Argonne National Laboratory (East) 9700 S. Cass Avenue Argonne, IL 60439 630-252-2000 U.S. Department of Energy Argonne National Laboratory (West) P.O. Box 2528 Idaho Fall, ID 83403-2528 208-533-7341 U.S. Department of Energy Bettis Atomic Power Laboratory, Bechtel Bettis, Inc. 814 Pittsburgh McKeesport Boulevard West Mifflin, PA 15122-0079 412-476-5000 U.S. Department of Energy

4

Title: Family Given Name: Affiliation: Mailing Address 1: Mailing Address 2: Postcode: Country: Mr AKINNIRAN AKINSOLA ABRAHAM ADENIRAN OGUNSANYA COLLEGE 4 LAKETU STREET, IKORODU LAGOS 23401 NIGERIA  

E-Print Network [OSTI]

Title: Family Given Name: Affiliation: Mailing Address 1: Mailing Address 2: Postcode: Country: Mr BLANGAH RISE #06-28 90043 SINGAPORE Mr CHEN JU NATIONAL UNIVERSITY OF SINGAPORE COM1, LAW LINK 117590 UNIVERSITY OF SINGAPORE COM1, LAW LINK 117590 SINGAPORE Mr CHOO KHAR HENG I2R 21 HENG MUI KENG TERRACE 119613

Wong, Limsoon

5

Report Period: EIA ID NUMBER: Appendix A: Mailing Address: Appendix B:  

U.S. Energy Information Administration (EIA) Indexed Site

Report Period: Report Period: EIA ID NUMBER: Appendix A: Mailing Address: Appendix B: Zip Code - Secure File Transfer option available at: - - - - Email form to: OOG.SURVEYS@eia.doe.gov Fax form to: (202) 586-9772 Email address: Oil & Gas Survey U.S. Department of Energy Ben Franklin Station PO Box 279 Washington, DC 20044-0279 Questions? Call toll free: 1-800-638-8812 1. Total Acquisitions (Enter the total volume of foreign crude oil acquired during the report month for importation into the United States. This is the sum of column (l), Part III, excluding resubmission.) 2. Offshore Inventories (Enter the total volume of foreign oil owned by the firm, for eventual importation into the United States which is held in storage outside the United States and/or is enroute to the United States as of the

6

The empirical analysis of the abuse of e-mail addresses placed on the Internet  

Science Journals Connector (OSTI)

This chapter is dedicated to the (empirical analysis of the) resource e-mail addresses, which is vital for any potential bulk mailer and spammer. Its availability is part of spammers demands on technological c...

2007-01-01T23:59:59.000Z

7

Conference Housing Reservation Form Please print and mail this form to the address below.  

E-Print Network [OSTI]

Conference Housing Reservation Form Please print and mail this form to the address below. UNO: 504-280-5584 Conference Group Information Group Name: ___________________________ _________ Number group participants under the age of 18, one chaperone is required.) Conference Sponsor (for billing

Kulp, Mark

8

Connecticut Native American Intertribal Urban Council Mailing address: 545 Whalley Ave New Haven, Ct. 06511  

E-Print Network [OSTI]

Connecticut Native American Intertribal Urban Council Mailing address: 545 Whalley Ave New Haven American students residing in and attending school in Massachusetts, Connecticut, or Rhode Island eligible. The applicant must reside in Massachusetts, Connecticut, or Rhode Island (proof of residence

Massachusetts at Lowell, University of

9

DIEGO FAZI Mailing address: Solar Energy Conversion Group Chemical Sciences & Engineering Division  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

DIEGO FAZI DIEGO FAZI Mailing address: Solar Energy Conversion Group Chemical Sciences & Engineering Division Bldg 200, Room E105 Argonne National Laboratory 9700 South Cass Ave. Argonne IL 60439-4831 E-mail addresses: dfazi@anl.gov Office Number: 630-252-5796 Fax: 630-252-9289 Personal Pages: http://faculty.wcas.northwestern.edu/diego-fazi/ http://www.fazid.org Research Interests Diego Fazi comes from a theoretical Physics background and he performed research in gravitational-wave astronomy within the project LIGO from 2005 to 2012. In October 2012 Dr. Fazi joined the CSE division at Argonne as a postdoctoral appointee in the Solar Conversion

10

* Corresponding author. E-mail address: dengx@physics.utoledo.edu (X. Deng)  

E-Print Network [OSTI]

.2% e$ciency for 1 ft 2 solar panels [3] and 8% stable e$ciency for 4 ft 2 production scale PV modules* Corresponding author. E-mail address: dengx@physics.utoledo.edu (X. Deng) Solar Energy Materials & Solar Cells 62 (2000) 89}95 Amorphous silicon and silicon germanium materials for high-e$ciency triple

Deng, Xunming

11

Oregon Ocean Policy Advisory Council Scott McMullen, Chair Mailing Address: Oregon DLCD  

E-Print Network [OSTI]

Oregon Ocean Policy Advisory Council Scott McMullen, Chair Mailing Address: Oregon DLCD James W Members of Oregon's Congressional Delegation FROM: Scott McMullen, Chair, Oregon's Ocean Policy Advisory Council RE: Meeting on Federal Funding for Oregon Seafloor Mapping DATE: September 14, 2006 Oregon's Ocean

Wright, Dawn Jeannine

12

*Corresponding author. Fax: #1-925-244-7129. E-mail address: yzhang@aer.com (Y. Zhang)  

E-Print Network [OSTI]

!ects of air pollution, atmospheric visibility reduction, acid deposition, and the earth's radiation budget*Corresponding author. Fax: #1-925-244-7129. E-mail address: yzhang@aer.com (Y. Zhang) Atmospheric Jacobson , Simon L. Clegg , Francis S. Binkowski Atmospheric & Environmental Research, Inc., 2682 Bishop

Jacobson, Mark

13

* Corresponding author. Tel.: #1-773-702-1651; fax: #1-773-702-E-mail address: mmrksich@midway.uchicago.edu (M. Mrksich).  

E-Print Network [OSTI]

* Corresponding author. Tel.: #1-773-702-1651; fax: #1-773-702- 0805. E-mail address: mmrksich@midway

Mrksich, Milan

14

change_address_111609  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CHANGE OF ADDRESS and EMERGENCY NOTIFICATION CHANGE OF ADDRESS and EMERGENCY NOTIFICATION TO: HUMAN RESOURCES DATE: Z# Social Security # Print First Name Print Middle Name or Initial Print Last Name (Currently in Payroll System) Complete appropriate changes: NAME CHANGE: Print Name Change to ADDRESS CHANGE: Mailing Address City State Zip

15

NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1  

ScienceCinema (OSTI)

Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

Thomas D'Agostino

2010-09-01T23:59:59.000Z

16

Mary Lou Fulton Teachers College Mailing Address: PO Box 37100, Phoenix, AZ 85069-7100  

E-Print Network [OSTI]

-level personnel Maximize the expertise of Mentor Teachers by facilitating ongoing training and support Develop with district personnel to select high quality mentor teachers. #12;Mary Lou Fulton Teachers College Mailing will ensure the successful operation of the iTeachAZ site they coordinate by maintaining a positive

17

A European vision for addressing global security threats  

Science Journals Connector (OSTI)

There is a robust consensus among EU Member States about the need to identify the complex links between the threats and challenges to the EUs security. ... and instruments required to effectively respond to secu...

Gerhard Sabathil

2010-06-01T23:59:59.000Z

18

To use this form it must be printed, filled out and mailed to the address above with a Money Order payable to Hunter College.  

E-Print Network [OSTI]

To use this form it must be printed, filled out and mailed to the address above with a Money Order sent to a unit of the City University of New York. Money Orders are accepted, Credit Card payments must

Qiu, Weigang

19

This form may be submitted to the EIA by mail, fax, e-mail, or secure file trans  

U.S. Energy Information Administration (EIA) Indexed Site

using a secure method of transmission: HTTPS. This is an industry standard method to send information over the web using secure, encrypted processes. (It is the same method that commercial companies communicate with customers when transacting business on the web.) To use this service, we recommend the use of Microsoft Internet Explorer 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://idc.eia.doe.gov/upload/noticeoog.jsp." using a secure method of transmission: HTTPS. This is an industry standard method to send information over the web using secure, encrypted processes. (It is the same method that commercial companies communicate with customers when transacting business on the web.) To use this service, we recommend the use of Microsoft Internet Explorer 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://idc.eia.doe.gov/upload/noticeoog.jsp." ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," OMB No. 1905-0057" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," Expiration Date: 7/31/2016" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," Version No: 2013.002" "ANNUAL REPORT OF THE ORIGIN OF NATURAL GAS LIQUIDS PRODUCTION"

20

Weekly Address: Time to Create the Energy Security Trust | Department of  

Broader source: Energy.gov (indexed) [DOE]

Weekly Address: Time to Create the Energy Security Trust Weekly Address: Time to Create the Energy Security Trust Weekly Address: Time to Create the Energy Security Trust March 18, 2013 - 3:23pm Addthis Matt Compton Deputy Director of Online Content for the Office of Digital Strategy at the White House. Editor's Note: This blog is cross-posted from WhiteHouse.gov. President Obama discusses the need to harness American energy in order to reduce our dependence on oil and make the United States a magnet for new jobs. He highlights his all-of-the-above approach to American energy -- including a proposal to establish an Energy Security Trust, which invests in research that will help shift our cars and trucks off of oil. Addthis Related Articles National Energy Action Month Photo courtesy of the Pacific Northwest National Laboratory.

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

please use the form below. For general information about NNSA, please feel free to contact us: Mailing Address National Nuclear Security Administration U.S....

22

Student name (Last, First, Middle/Maiden) Student ID# (if none, SSN) Street Address *E-mail (U of M, or if none, other e-mail) Telephone number  

E-Print Network [OSTI]

Student name (Last, First, Middle/Maiden) Student ID# (if none, SSN) Street Address *E-mail (U of M-time Discretionary Course Cancellation Each student is permitted one discretionary course cancellation during his for the course. Withdrawals may impact your financial aid. Contact the Office of Student Finance. Course

Amin, S. Massoud

23

This form may be submitted to the EIA by mail, fax, e-mail, or secure file trans  

U.S. Energy Information Administration (EIA) Indexed Site

5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0174" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 12/31/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2013.01" "FORM EIA-782A" "REFINERS'/GAS PLANT OPERATORS' MONTHLY PETROLEUM PRODUCT SALES REPORT" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction. See Instructions for further details on the sanctions and the provisions concerning the confidentiality of information submitted on this form."

24

Authors' Note: Address correspondence to John Byrne, Center for Energy & Environmental Policy, University of Delaware, Newark, DE 19716-7301; e-mail: jbbyrne@udel.edu.  

E-Print Network [OSTI]

, University of Delaware, Newark, DE 19716-7301; e-mail: jbbyrne@udel.edu. In an October, 2008 New York Times81 Authors' Note: Address correspondence to John Byrne, Center for Energy & Environmental Policy article, journalist John Tierney argued that recent discus- sions about energy futures ". . . have

Delaware, University of

25

Student Academic Affairs Office 144 Computer Applications Building 605 E. Springfield Ave Champaign, IL 61820 Mailing Address: 270 Lincoln Hall 702 S. Wright St. Urbana, IL 61801 (217) 333-1158  

E-Print Network [OSTI]

· Champaign, IL 61820 Mailing Address: 270 Lincoln Hall · 702 S. Wright St. · Urbana, IL 61801 · (217) 333 1, 1001 S. Wright St., Champaign, IL 61820. Electronic submissions may be sent to las

Frank, Thomas D.

26

Electronic Mail Analysis Capability  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes the pilot program to test the Department of Energy (DOE) Electronic Mail Analysis Capability (EMAC), which will be used to monitor and analyze outgoing and incoming electronic mail (e-mail) from the National Nuclear Security Administration (NNSA) and DOE laboratories that are engaged in nuclear weapons design or work involving special nuclear material. No cancellation.

2001-01-08T23:59:59.000Z

27

Recent advances to address European Union Health Security from cross border chemical health threats  

Science Journals Connector (OSTI)

Abstract The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development.

R. Duarte-Davidson; R. Orford; S. Wyke; M. Griffiths; R. Amlt; R. Chilcott

2014-01-01T23:59:59.000Z

28

MAILING ADDRESS Old Dominion University  

E-Print Network [OSTI]

-888-814-4135 2. Register with eVA http://eva.state.va.us/register/ vendorreg.htm 1-866-289-7367 3. Small, women Business Enter- prise (DMBE) www.dmbe.state.va.us 1-804-786-6585 Steps for Doing Business with ODU #12;Virginia Business Opportunities >>> Old Dominion University utilizes eVA, the Commonwealth's e

29

REVIEW OF THE POTENTIAL OF NUCLEAR HYDROGEN FOR ADDRESSING ENERGY SECURITY AND CLIMATE CHANGE  

SciTech Connect (OSTI)

Nuclear energy has the potential to exert a major positive impact on energy security and climate change by coupling it to the transportation sector, primarily through hydrogen production. In the short term, this coupling will provide carbon-free hydrogen for upgrading increasingly lower quality petroleum resources such as oil sands, offsetting carbon emissions associated with steam methane reforming. In the intermediate term, nuclear hydrogen will be needed for large-scale production of infrastructure-compatible synthetic liquid fuels. In the long term, there is great potential for the use of hydrogen as a direct vehicle fuel, most likely in the form of light-duty pluggable hybrid hydrogen fuel cell vehicles. This paper presents a review of the potential benefits of large-scale nuclear hydrogen production for energy security (i.e. displacing imported petroleum) and reduction of greenhouse gas emissions. Lifecycle benefits of nuclear energy in this context are presented, with reference to recent major publications on this topic. The status of US and international nuclear hydrogen research programs are discussed. Industry progress toward consumer-grade hydrogen fuel cell vehicles are also be examined.

James E. O'Brien

2010-06-01T23:59:59.000Z

30

A Secure Address Resolution Protocol Mohamed G. Gouda ChinTser Huang  

E-Print Network [OSTI]

[i] broadcasts a rqst(ipa) message over the Ethernet to every other computer in the network, where ipa is the IP[j] receives the rqst(ipa) message, it detects that ipa is not its own IP address and discards the message. Third, when the ARP process in computer h[j] receives the rqst(ipa) message, it detects that ipa is its

Huang, Chin-Tser

31

Metered Mail Form International Mail Only  

E-Print Network [OSTI]

Metered Mail Form International Mail Only Charge to Department USPS First Class Mail International International Metered Mail Form and must be kept separate from all other domestic mail. · International mail

Palmeri, Thomas

32

Contact Information Updated: June 17, 2014 Co. Comm/Sealer Address Telephone/Fax General County E-Mail/Office Hours  

E-Print Network [OSTI]

Contact Information Updated: June 17, 2014 Co. Comm/Sealer Address Telephone/Fax General County E-F: 8-5 El Centro, 92243-2850 Inyo/Mono County Srvs Bldg, 207 W South St (760) 873-7860 inyomonoag-6300 agcomm@co.kern.ca.us Ruben Arroyo Bakersfield, 93307-2857 (661) 868-6301 M-F: 8-5 Kings 680 N Campus

33

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

34

Tobias Maile  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Tobias Maile Tobias Maile 1 Cyclotron Road MS 90R3111 Berkeley CA 94720 (510) 486-5961 TMaile@lbl.gov This publications database is an ongoing project, and not all Division publications are represented here yet. Publications 2013 O'Donnell, James, Tobias Maile, Cody Rose, Natasa Mrazovic, Elmer Morrissey, Cynthia Regnier, Kristen Parrish, and Vladimir Bazjanac. Transforming BIM to BEM: Generation of Building Geometry for the NASA Ames Sustainability Base BIM., 2013. Download: PDF (2.98 MB) 2012 Maile, Tobias, Mangesh Basarkar, James O'Donnell, Philip Haves, and Kevin Settlemyer. "Mapping Hvac Systems for Simulation In EnergyPlus." In SimBuild 2012 IBPSA Conference. Madison, WI, USA, 2012. Download: PDF (1.24 MB) 2011 Maile, Tobias, Vladimir Bazjanac, James O'Donnell, and Matthew Garr. "A

35

Metered Mail Form Domestic Mail Only  

E-Print Network [OSTI]

Metered Mail Form Domestic Mail Only For USPS Mail Only Charge to Department First Class Mail Media Meter Form. · All outgoing USPS Mail that needs postage should be kept separate from all other mail already be sealed prior to being metered. Failure to properly seal this type of mail could result

Palmeri, Thomas

36

Via Mail:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

January 21, 2009 Via email: GC-62@hq.doe.gov Via Mail: Office of the Assistant General Counsel for Technology Transfer and Intellectual Property U.S. Department of Energy 1000...

37

Secure NEPA Documents | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Secure NEPA Documents Secure NEPA Documents Secure NEPA Documents The Department of Energy (DOE) limits electronic access to certain NEPA documents on this website due to the potential security sensitivity of some information these documents may contain. DOE regrets any inconvenience caused by this decision, which reflects an awareness of the need to protect the public. Requesting Secure NEPA Documents You may request copies of documents by e-mail or by leaving a message on our toll-free information line at 1-800-472-2756. Please provide the following information in your request: Title and Number of Document requested First Name: Last Name: Address: City: State: Zip Code: Organization (If Applicable): E-mail: Phone: List of Secure NEPA Documents April 1, 2007 EIS-0376: Final Environmental Impact Statement

38

Secure NEPA Documents | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Secure NEPA Documents Secure NEPA Documents Secure NEPA Documents The Department of Energy (DOE) limits electronic access to certain NEPA documents on this website due to the potential security sensitivity of some information these documents may contain. DOE regrets any inconvenience caused by this decision, which reflects an awareness of the need to protect the public. Requesting Secure NEPA Documents You may request copies of documents by e-mail or by leaving a message on our toll-free information line at 1-800-472-2756. Please provide the following information in your request: Title and Number of Document requested First Name: Last Name: Address: City: State: Zip Code: Organization (If Applicable): E-mail: Phone: List of Secure NEPA Documents May 1, 1984 EIS-0108: Final Environmental Impact Statement

39

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Contact Us Home > Field Offices > Welcome to the Sandia Field Office > Contact Us Contact Us If you have questions about activities at the Sandia Field Office, please contact the SFO Public Affairs Director at (505) 845-5264. Our mailing address is: U. S. Department of Energy, National Nuclear Security Administration, Sandia Field Office, P.O. Box 5400, Albuquerque, NM 87185. Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About SFO Contact Us Contract Administration & Business Management Emergency Information Facilities & Projects Nuclear Operations Environment, Safety & Health Public Affairs Safeguards & Security Performance and Quality Assurance

40

Via Mail:  

Broader source: Energy.gov (indexed) [DOE]

1, 2009 1, 2009 Via email: GC-62@hq.doe.gov Via Mail: Office of the Assistant General Counsel for Technology Transfer and Intellectual Property U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 ATTN: TECHNOLOGY TRANSFER QUESTIONS Dear Sir or Madam: This letter is in response to the Notice of Inquiry: Technology Transfer Practices at Department of Energy ("DOE") Laboratories. (Federal Register Vol. 73, No. 229, p. 72036). The following comments are respectfully submitted on behalf of Eastman Chemical Company ("Eastman"). Eastman is a global FORTUNE 500 company with 2007 sales of $6.8 billion and approximately

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Minutes from the January 10, 2013 Printing and Mail Teleconference  

Broader source: Energy.gov (indexed) [DOE]

January 10, 2013 January 10, 2013 Mail discussion Al Majors opened the meeting by discussing the Mail Management Report and latest update on status. One final report is yet to be submitted, after which close out will be accomplished. Copies will be provided to the Mail Managers once completed. Al introduced Derrick Miliner, Program Manager from the General Services Administration, Office of Government-wide Policy, and acknowledged Mr. Miliner's role in completing the Mail Management Report. Mail Security Plans A number of unclassified site specific mail security plans have been received. Requirement for classified site specific mail security plans is to submit a letter or email stating that the classified plan is in place. Mail Manager Change Notification to Headquarters

42

Current address: Samuel Johnson  

E-Print Network [OSTI]

CV: E-mail : Homepage: Current address: Samuel Johnson samuel.johnson@imperial.ac.uk www. #12;Submitted work 1. The meaning of niche: Cause or consequence of food-web structure?, S. Johnson, V learning, S. Johnson, J. Marro, and J.J. Torres, PLoS ONE 8(1): e50276 (2013) 3. Enhancing neural network

Johnson, Samuel

43

Postal address School of Industrial Design, LTH, P.O. Box 118, 221 00 Lund, SWEDEN Telephone +46 46 222 71 88 E-mail Lynn.Lindegren@kansli.lth.se Website www.industrialdesign.lth.se  

E-Print Network [OSTI]

Postal address School of Industrial Design, LTH, P.O. Box 118, 221 00 Lund, SWEDEN Telephone +46 46 of Industrial Design spring semester 2014. Full-time studies in Sweden are 30 ECTS. BA programme ­ 2nd semester

44

Postal address School of Industrial Design, LTH, P.O. Box 118, 221 00 Lund, SWEDEN Telephone +46 46 222 71 88 E-mail Lynn.Lindegren@kansli.lth.se Website www.industrialdesign.lth.se  

E-Print Network [OSTI]

Postal address School of Industrial Design, LTH, P.O. Box 118, 221 00 Lund, SWEDEN Telephone +46 46 of Industrial Design autumn term 2013. Full-time studies in Sweden are 30 ECTS. BA programme ­ 1 st term Course

45

Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security  

SciTech Connect (OSTI)

The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

Electric Power Research

2007-11-01T23:59:59.000Z

46

Special Mailing Distribution Lists | Staff Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Special Mailing Distribution Lists Special Mailing Distribution Lists Special mailing distribution lists -- to be used repeatedly over long periods of time -- may be established by written request to the Senior Communications Clerk, at mailroomdl@bnl.gov. It is important to notify the Senior Communications Clerk of all changes to the Mailing Distribution Lists. Assignments to all other Standard Distribution Lists are made automatically according to each employee's personnel code. Deletions resulting from terminations are effected automatically. The Mail Room maintains an automatic addressing system for the following Standard Distribution Lists: Director's Office; Department Chairs and Division Managers and their Deputies, Associate, Assistant and Acting Chairs; Division and major Section Heads in the Departments and Divisions; BSA Board of Directors.

47

Contact Us | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contact Us Contact Us Contact Us Mail and delivery address information: Y-12 National Security Complex P.O. Box 2009 Oak Ridge, TN 37831-8245* Non-mail deliveries: Bear Creek Road P.O. Box 2009 Oak Ridge, TN 37830 *This mailstop is for general inquiries. For other mail, please contact the intended recipient for the appropriate mailstop. If you don't find what you're looking for on our Home Page or through our Search page, try one of the resources listed below. Media Inquiries Ellen Boatner, 865.241.4937 Public and Governmental Affairs Alice Brandon, 865.576.2963 Benefits One Call, 865.574.1500 New Hope Center Public Use Areas Ray Smith, 865.576.7781 Procurement procurement@y12.doe.gov, 865.576-8500 Socioeconomic Programs Lisa Copeland, 865.576.2090 Employment Staffing, staff@y12.doe.gov, 865.576.1377

48

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

49

Mail Services User's Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed information on using the Department of Energy (DOE) mail services. Canceled by DOE G 573.1-1.

2000-07-12T23:59:59.000Z

50

Minutes from the June 28, 2012 Printing and Mail Teleconference  

Broader source: Energy.gov (indexed) [DOE]

June 28, 2012 Mail discussion Al Majors opened the meeting by introducing United Parcel Service (UPS) Representative Shelly Scott. Ms. Scott's contact information is: Shelly Scott shellyscott@ups.com 404 402-9827 (cell) Ms. Scott discussed issues relating to various UPS services available to the department. Next Al introduced Michael R. Sanders, President and Chief Executive Officer of Intra-Mail Network, an innovative, information Technology Company that improves the delivery of mail or email to individuals at institutions. Mr. Sanders provided an overview of services and capabilities available to help eliminate mailing-related problems. DOE Headquarters Mail Center is currently conducting a mailing list clean up (pilot) with Intra-Mail Network to eliminate the unwanted incoming junk mail addressed to Headquarters

51

Nuclear Energy & Energy Security  

Science Journals Connector (OSTI)

Safety issues related to use of nuclear energy and secure operation of nuclear installations are mail stones of great importance. Although none of technologies producing energy are absolutely safe it is obvious t...

Jumber Mamasakhlisi

2010-01-01T23:59:59.000Z

52

Mailing Addresses and Information Numbers for Operations, Field...  

Office of Environmental Management (EM)

1 Cyclotron Road Berkeley, CA 94720 510-486-5784 U.S. Department of Energy Bonneville Power Administration P.O. Box 3621 905 NE 11th Avenue Portland, OR 97232 Bonneville Power...

53

Work Address:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

BO SAULSBURY BO SAULSBURY Work Address: Home Address: Oak Ridge National Laboratory 12952 Buckley Road National Transportation Research Center Knoxville, TN 37934 Building NTRC-2, Room 118 (865) 288-0750 Oak Ridge, TN 37831-6479 (865) 574-4694 saulsburyjw@ornl.gov Technical Specialties: Land use planning Environmental and socioeconomic impact assessment National Environmental Policy Act (NEPA) project management Vehicle fuel economy Education: 1986 B. A., History (minors in English and Business), The University of Tennessee 1989 M. S., Planning, The University of Tennessee (Thesis title: Land Use Compatibility Planning for Airfield Environs: Intergovernmental Cooperation to Protect Land Users From the Effects of Aircraft Operations)

54

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

55

Mail Services User's Guide  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides information on using Department of Energy (DOE) mail services in accordance with U.S. Postal Service, General Services Administration (GSA), and DOE regulations. Cancels DOE M 573.1-1. Canceled by DOE N 251.89.

2005-10-03T23:59:59.000Z

56

Mail and Distribution | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Mail and Distribution Mail and Distribution The DOE Mail Center provides a variety of mail services for all official and other authorized mail for the Department of Energy and its...

57

Youve Got Mail: Addressing E-mail Communication in New Graduate Teaching Assistant Training  

E-Print Network [OSTI]

A primary goal of graduate teaching assistant (GTA) training is to prepare new instructors to handle their teaching roles with confidence. One important element of that role is instructional communication. This article ...

Bruss, Kristine S.

2009-01-01T23:59:59.000Z

58

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

59

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network [OSTI]

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

60

pine (mail utility info)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

pine (mail utility info) pine (mail utility info) Basics, FAQ, etc, On our UNIX machines, module load pine The line module load pine should ALSO be in the file ~/.rc/user_modules (The pine module also includes pico) pine usage with IMAP4 (UNIX) Moving pine email files into IMAP4 LBNL UNIX info on pine links to Pine Information Center Pine 4.2.1/Solaris: Forwarding as attachment; the following procedure has proved successful for at least some users: Check the option "enable-full-header-cmd". To get to this option, 1. M (Main Menu) 2. S (Setup) "Choose a setup task from the menu below :" 3. C (Configure) 4. Scroll down to "Advanced Command Preferences", and press "X" to set "enable-full-header-cmd". It looks like this: ================================================================

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

62

MAIL TO: FAX TO: PayFlex Systems USA, Inc.  

E-Print Network [OSTI]

MAIL TO: FAX TO: PayFlex Systems USA, Inc. Extend Health P.O. Box 3039 Omaha, NE 68103-3039 PayFlex Systems USA, Inc. Extend Health (402) 231-4310 (No Cover Page Required) Page 1 of ______________ Direct be your Social Security/Employer-Assigned Number) I hereby authorize PayFlex Systems USA, Inc. (Pay

Pennycook, Steve

63

SOCIAL SECURITY ADMINISTRATION in JUPITER Office Address  

E-Print Network [OSTI]

Parkside Dr, Take the 1st right onto Donald Ross Rd, Continue straight to stay on Donald Ross Rd. Turn left. The office sits between okeechobee blvd and belvedere rd, behind chevron gas station. The office is north: 1. Fau Svc Rd @ Se Quad Stop ID: 1743, Bus towards Rt 10 Southbound 2. Military Trl & Johnson Dairy

Fernandez, Eduardo

64

Securing America's Future Energy April 8, 2011 | Department of...  

Broader source: Energy.gov (indexed) [DOE]

America's Future Energy an e-mail with attachments of a New York Times article on oil prices. Securing America's Future Energy April 8, 2011 More Documents & Publications...

65

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

66

Addressing the workforce pipeline challenge  

SciTech Connect (OSTI)

A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need.

Leonard Bond; Kevin Kostelnik; Richard Holman

2006-11-01T23:59:59.000Z

67

Addressing the workforce pipeline challenge  

SciTech Connect (OSTI)

A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need. (authors)

Bond, L.; Kostelnik, K.; Holman, R. [Idaho National Laboratory, P.O. Box 1625, Idaho Falls, ID 83415-3898 (United States)

2006-07-01T23:59:59.000Z

68

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

69

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

70

NACS Voice Mail Replacement Project  

E-Print Network [OSTI]

NACS Voice Mail Replacement Project Presented to the TPAG Monday, November 13, 2006 #12 criteria Integration with email is a key factor Taking a second look at Cisco & AVST Cost of Interactive

Brody, James P.

71

Minutes from the February 23, 2012 Printing and Mail Teleconference  

Broader source: Energy.gov (indexed) [DOE]

Printing and Mail Managers Exchange Forum Teleconference February 23, 2012 Participants: Headquarters (5) National Energy Technology Laboratory, PA National Security Complex Y-12 (2) Oak Ridge National Laboratory Y-12 Site Office (2) Hanford Site Office Oak Ridge Association University Oak Ridge Operations Office BWXT Pantex Site Office JanTec Corporation, Richland, Washington Los Alamos National Laboratory Chicago Office Bettis Atomic Power Laboratory National Security Technology C1, Las Vegas SLAC National Accelerator Laboratory Comments/Additions to minutes from last meeting. There were no comments. Printing Agenda Items......... Update on the Department-wide Printing and Publishing Activities Three-Year Plan (2013-2015).

72

Principal Associate Director - Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

73

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Broader source: Energy.gov (indexed) [DOE]

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

74

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Broader source: Energy.gov (indexed) [DOE]

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

75

Leadership Development Series: "A Holistic Look at Cyber Security" |  

Broader source: Energy.gov (indexed) [DOE]

Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" January 30, 2014 10:30AM to 12:00PM EST Registration link: By e-mail, $0 Course type: Classroom/Auditorium, Video Cast & Teleconference Course Location: DOE Headquarters, Forrestal Building, Washington, DC/ Main Auditorium Course Description: Dr. Steven Bucci, Director, Douglas and Sarah Allison Center for Foreign Policy Studies. The sheer volume of cyber activity is masking serious threats that impact government, business and our personal lives every day. Incidents are now ubiquitous, pervasive and constitute the new "normal". These day to day threats are not existential, but if not addressed, will hinder our

76

Report Period: EIA ID NUMBER: Instructions: (e.g., Street Address, Bldg, Floor, Suite)  

U.S. Energy Information Administration (EIA) Indexed Site

Report Period: Report Period: EIA ID NUMBER: Instructions: (e.g., Street Address, Bldg, Floor, Suite) Secure File Transfer option available at: (e.g., PO Box, RR) Electronic Transmission: The PC Electronic Data Reporting Option (PEDRO) is available. Zip Code: - If interested in software, call (202) 586-9659. Email form to: Fax form to: (202) 586-9772 - - Mail form to: Oil & Gas Survey - - U.S. Department of Energy Ben Franklin Station PO Box 279 Washington, DC 20044-0279 Questions? Call toll free: 1-800-638-8812 OOG.SURVEYS@eia.doe.gov Contact Name: Version No.: 2013.01 Date of this Report: Mo Day State: Year Phone No.: DOMESTIC CRUDE OIL FIRST PURCHASE REPORT Company Name: A completed form must be filed by the 30th calendar day following the end of the report

77

Federal Energy Management Program: Energy Independence & Security Act  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Energy Independence & Security Act to someone by E-mail Share Federal Energy Management Program: Energy Independence & Security Act on Facebook Tweet about Federal Energy Management Program: Energy Independence & Security Act on Twitter Bookmark Federal Energy Management Program: Energy Independence & Security Act on Google Bookmark Federal Energy Management Program: Energy Independence & Security Act on Delicious Rank Federal Energy Management Program: Energy Independence & Security Act on Digg Find More places to share Federal Energy Management Program: Energy Independence & Security Act on AddThis.com... Requirements by Subject Requirements by Regulation National Energy Conservation Policy Act Executive Order 13514 Energy Independence & Security Act

78

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

79

Physical security of cut-and-cover underground facilities  

SciTech Connect (OSTI)

To aid designers, generic physical security objectives and design concepts for cut-and-cover underground facilities are presented. Specific aspects addressing overburdens, entryways, security doors, facility services, emergency egress, security response force, and human elements are discussed.

Morse, W.D.

1998-08-01T23:59:59.000Z

80

An Operations Research approach to aviation security  

E-Print Network [OSTI]

Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore ...

Martonosi, Susan Elizabeth

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Contact Us | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Phone: 574.1500 or 1.877.TO.1.CALL (1.877.861.2255) Facsimile: 865.241.0531 Telecommunications Device for Deaf: 865.241.4344 Mailing Address Benefits Service Center PO Box...

82

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Contact Us Contact Us NPO Public Affairs Manager Steven Wyatt (865) 576-9918 NPO Mailing Address NNSA Production Office PO Box 2050 Oak Ridge, TN 37831 Fax Number (865) 576-1237...

83

Safeguards and Security and Cyber Security RM  

Broader source: Energy.gov (indexed) [DOE]

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

84

FAQS Reference Guide Safeguards and Security  

Broader source: Energy.gov [DOE]

This reference guide addresses the competency statements in the May 2009 edition of DOE-STD-1171-2009, Safeguards and Security Functional Area Qualification Standard.

85

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

86

Securing Control Systems Modems  

Broader source: Energy.gov (indexed) [DOE]

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

87

Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

88

Architecture AddressingModes  

E-Print Network [OSTI]

MIPS R2000 Architecture and Assembly (Part 1) 1. CPU Registers 2. Byte Order 3. AddressingModes 4­endian byte order 3 2 1 0 0 1 2 3 Or Byte number #12; AddressingModes . MIPS is a load/store architecture . RICS -- Load/Store architecture -- All instructions have equal length of 4 bytes -- Every register can

Nguyen, Dat H.

89

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

90

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

91

CPEP products and Mailing List  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CPEP es una organización sin fines de lucro formada por profesores, CPEP es una organización sin fines de lucro formada por profesores, educadores, y físicos. Los materiales preparados por el CPEP presentan los conocimientos actuales sobre la naturaleza fundamental de la materia y la energía, incorporando los principales descubrimientos e investigaciones de las tres últimas décadas. Los productos desarrollados por el CPEP están disponibles por intermedio de nuestro distribuidor: Science Kit 777 Park Drive Tonawanda, NY 14150 USA Phone: 1(800)828-7777 or 1(716)874-6020 FAX: 1(716)874-9572 Para obtener información (sin efectuar una orden de compra) o para ser incorporado en nuestra lista de correo dirigirse a: E-mail: pdg@lbl.gov or Call: 1(510)486-5885, or Write: CPEP MS 50-308, Lawrence Berkeley National Laboratory,

92

E-Print Network 3.0 - allan award address Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Sample search results for: allan award address Page: << < 1 2 3 4 5 > >> 1 Curriculum vitae of GERARD J. ALLAN Summary: Curriculum vitae of GERARD J. ALLAN Office: Mailing...

93

E-Print Network 3.0 - address captain james Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

results for: address captain james Page: << < 1 2 3 4 5 > >> 1 TEAM REGISTRATION FORM In county please complete this form and send to the addressfaxe-mail Summary: : Team...

94

Addressing Missclassified Positions  

Broader source: Energy.gov (indexed) [DOE]

2 2009 2 2009 MEMORANDUM FOR HUMAN RESOURCE DIRECTORS FROM: CAPITAL OFFICER SUBJECT: GULDANCE MEMORANDUM #3: Addressing Misclassified Positions This memorandum provides policy guidance on how to consistently address misclassified positions within the Department and is effective immediately. There are several different circumstances that affect how a misclassified position will be addressed. These are discussed below: If it is determined that a position is classified to the wrong title, then the classification must be corrected immediately. If it is determined that a position is classified to the wrong series, then the classification must be corrected immediately. Note: The series determination involves distinguishing between one-grade interval work and two-grade interval

95

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

96

Alternative Fuels Data Center: State Agency Coordination to Address Climate  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

State Agency State Agency Coordination to Address Climate Change to someone by E-mail Share Alternative Fuels Data Center: State Agency Coordination to Address Climate Change on Facebook Tweet about Alternative Fuels Data Center: State Agency Coordination to Address Climate Change on Twitter Bookmark Alternative Fuels Data Center: State Agency Coordination to Address Climate Change on Google Bookmark Alternative Fuels Data Center: State Agency Coordination to Address Climate Change on Delicious Rank Alternative Fuels Data Center: State Agency Coordination to Address Climate Change on Digg Find More places to share Alternative Fuels Data Center: State Agency Coordination to Address Climate Change on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

97

Addressing Genetics Delivering Health  

E-Print Network [OSTI]

Addressing Genetics Delivering Health A strategy for advancing the dissemination and application of genetics knowledge throughout our health professions Funded by Hilary Burton September 2003 Executive education of health workers q providing strategic overview of education programme q collaborating

Rambaut, Andrew

98

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network [OSTI]

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

99

MCMASTER UNIVERSITY SECURITY & PARKING SERVICES  

E-Print Network [OSTI]

number of vehicles: Do you require: Rebate tickets Validation tickets Exit tickets Please check all that apply Number of tickets required: Rebate Exit Validation Time of Event: Contact Name: Mailing Address and instructions on use of rebate tickets Payment methods: cash, credit, and McMaster University Account GL Number

Hitchcock, Adam P.

100

Field Facilities Contacts for Printing and Mail  

Broader source: Energy.gov (indexed) [DOE]

Facilities Contacts for Printing and Mail Facilities Contacts for Printing and Mail Print and Mail Contacts Site Printing Contact Mail Contact NNSA, Albuquerque Deborah Miller (505) 845-6049 Thomas H. Clinkenbeard NNSA Service Center PO Box 5400 Albuquerque, NM 87185-5400 (505) 845-4602 tclinkenbeard@doeal.gov (mailto:tclinkenbeard@doeal.gov) Argonne National Laboratory Doreen Schoening Argonne National Laboratory U.S. Department of Energy 9700 South Cass Avenue Blvd 340 Lemonmt, IL 60439 (630) 840-6399 dschoening@anl.gov (mailto:dschoening@anl.gov) Bechtel Jacobs James Hughes Bechtel Jacobs - Mail Stop 7294 U.S. Department of Energy PO Box 4699 Oak Ridge, TN 37831 (865) 576-8423 Berkeley Site Office Mercedes Downing Berkeley Site Office U.S. Department of Energy 1 Cyclotron Road Bldg 90

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 5, 2013 March 5, 2013 PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated March 5, 2013 PSH-12-0131 - In the Matter of: Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which he

102

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

November 1, 2012 November 1, 2012 PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that October 26, 2012 PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she

103

Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy  

Broader source: Energy.gov (indexed) [DOE]

Native Village of Teller Addresses Heating Fuel Shortage, Improves Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security June 22, 2012 - 4:54pm Addthis The combination of the Native Village of Teller’s limited fuel storage capacity and a harsh winter led to a supply shortage. Photo by Alexander Dane, NREL The combination of the Native Village of Teller's limited fuel storage capacity and a harsh winter led to a supply shortage. Photo by Alexander Dane, NREL Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security Native Village of Teller fuel storage. Photo by Alexander Dane, NREL Native Village of Teller fuel storage. Photo by Alexander Dane, NREL The combination of the Native Village of Teller's limited fuel storage capacity and a harsh winter led to a supply shortage. Photo by Alexander Dane, NREL

104

Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy  

Broader source: Energy.gov (indexed) [DOE]

Native Village of Teller Addresses Heating Fuel Shortage, Improves Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security June 22, 2012 - 4:54pm Addthis The combination of the Native Village of Teller’s limited fuel storage capacity and a harsh winter led to a supply shortage. Photo by Alexander Dane, NREL The combination of the Native Village of Teller's limited fuel storage capacity and a harsh winter led to a supply shortage. Photo by Alexander Dane, NREL Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security Native Village of Teller fuel storage. Photo by Alexander Dane, NREL Native Village of Teller fuel storage. Photo by Alexander Dane, NREL The combination of the Native Village of Teller's limited fuel storage capacity and a harsh winter led to a supply shortage. Photo by Alexander Dane, NREL

105

Name * First Last Address Street Address Address Line 2 City State ...  

E-Print Network [OSTI]

Name * First Last; Address. Street Address Address Line 2. City State / Province / Region Postal / Zip Code. United States, United Kingdom, Australia, Canada...

106

Moulinath Banerjee Work Address  

E-Print Network [OSTI]

.Stat.(Honors) 1995, in First Division with Distinction. Employment Associate Professor of Statistics, UniversityMoulinath Banerjee Work Address University of Michigan Department of Statistics 439, West Hall 1085 estimation, Statistical Methods in Astronomy, Biomedical studies and Epidemiology, Threshold and boundary

Banerjee, Moulinath

107

Moulinath Banerjee Work Address  

E-Print Network [OSTI]

.Stat.(Honors) 1995, in First Division with Distinction. Employment Associate Professor of Statistics, University Methods in Non­standard Problems. Currently employed as Tenure-track Assistant Professor of StatisticsMoulinath Banerjee Work Address University of Michigan Department of Statistics 439, West Hall 1085

Banerjee, Moulinath

108

Office of Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Security Office of Security Mission and Functions The Office of Security (HS-50) is one of the major subordinate offices within the Office of Health, Safety and Security (HSS). HS-50 is committed to improving the Department's safeguards and security posture by providing safeguards and security subject matter expertise upon request to assist field and Headquarters elements and by deploying safeguards and security technologies that serve as force multipliers for addressing the emerging and challenging threats faced by the Department. As the Departments principal security office, we work closely with the program offices, field sites, Headquarters, and with the other offices within HSS to ensure that site assistance efforts are well coordinated and that the lessons learned from security assistance and deployed technologies

109

*Author to whom correspondence should be addressed. E-mail: seideman@chem.northwestern.edu  

E-Print Network [OSTI]

. Armed with great ambitions and ingenuity, re- searchers have made advances towards fabricating few in the formation of electronic resonances characterized by a finite life- time and an energy shift. Provided as the deviation of the resonance state potential energy surface from the neutral surface morphology

Seideman, Tamar

110

*Corresponding author. E-mail address: a.wolf@mpi-hd.mpg.de (A. Wolf )  

E-Print Network [OSTI]

unnoticed by the atomic and molecular physics community; in fact, low-energy single-pass merged beams and Methods in Physics Research A 441 (2000) 183}190 Recombination in electron coolers A. Wolf *, G. Gwinner experiments at the same time just started to measure the much higher rates due to dissociative recombination

Savin, Daniel Wolf

111

Site Office Contracting Officer E-mail address Ames Site Office...  

National Nuclear Security Administration (NNSA)

Robert.Poole@nnsa.doe.gov Nevada Site Office Darby Dieterich Dieterich@nv.doe.gov Oak Ridge Site Office Lisa Carter Carterlb@oro.doe.gov Pacific Northwest Site Office Lance...

112

*Corresponding author. E-mail address: #ame@zen.phys.columbia.edu (J. Hong).  

E-Print Network [OSTI]

and Methods in Physics Research A 452 (2000) 192}204 Laboratory tests on neutron shields for gamma in the past. We report here on the "rst prototype models for supershields based on boron and hydrogen. We the secondary particle production. Neutron-induced background can be the dominant component of the total back

113

E-mail address: khattori@uottawa.ca The Canadian Mineralogist  

E-Print Network [OSTI]

within silicate minerals, and along grain boundaries of silicate and oxide minerals. The morphology) micro-analyses of 53 sulfide grains larger than 20 µm in diameter reveal a wide range of compositions 10­5, and Sb, up to 146 ppm, Sb/S up to 37 10­5. S/Se and Ni show an inverse correlation in the sub-arc

114

* Corresponding author. E-mail address: anna@engineering.ucsb.edu (A. Stefanopoulou).  

E-Print Network [OSTI]

. the diesel engine in steady state (Moody, 1986). Secondly, it modi"es the power transfer to the turbine and}1031 Maneuverability and smoke emission constraints in marine diesel propulsion Anna Stefanopoulou *, Roy Smith that reduces smoke generation on an experimental marine diesel engine equipped with a variable geometry

Stefanopoulou, Anna

115

Research Advisory Council Name School/Department Address E-Mail  

E-Print Network [OSTI]

School of Medicine & Biomedical Sciences Department of Medicine 345 Biomedical Research Bldg. South and Instruction 505 Baldy Hall North Campus clements@buffalo.edu Robert Daly College of Arts and Sciences and Sciences Department of Music 222 Baird Hall North Campus felder@buffalo.edu Denise M. Ferkey College

Krovi, Venkat

116

*Corresponding author. E-mail address: lshekhtm@inp.nsk.su (L.I. Shekhtman).  

E-Print Network [OSTI]

with a maximum load capacity of 600 mAs [2] and using data from Ref. [3] to convert tube load into the dose of an object has to be reversed proportional to the size of micro-calci"cation to the power 4 (see 0168-dimensional detector is used in scan- ning mode. In this case the tube load becomes higher than in case of a true two

Kozak, Victor R.

117

Mary Lou Fulton Teachers College Mailing Address: PO Box 37100, Phoenix, AZ 85069-7100  

E-Print Network [OSTI]

-6350 Technology Infusion Specialist, #10708 The Mary Lou Fulton Teachers College invites applications for one full time Technology Infusion Specialist position. Duties and Responsibilities include: Under the direction of the technology infusion coordinator, the technology infusion specialist will work with MLFTC staff and faculty

118

* Corresponding author. E-mail address: cparigge@utsi.edu (C. Parigger)  

E-Print Network [OSTI]

Institute, Tullahoma, TN 37388-9700, USA Abstract Laser-induced breakdown and ignition of atmospheric Science Ltd. All rights reserved. 1. Introduction Laser-induced ignition of gas- and two-phase mixtures o as compared to the electric spark. Finally, using #ame detection sensors, a laser-induced ignition source has

Davis, Lloyd M.

119

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

120

Guidelines for Cover Letters 1. Never mail a resume without a cover letter.  

E-Print Network [OSTI]

Guidelines for Cover Letters 1. Never mail a resume without a cover letter. 2. Address by name that captures the attention of the prospective employer so that the letter and resume are considered worth reading. 6. Highlight and draw attention to the points in your resume that uniquely qualify you

Petrick, Irene J.

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Printing and Mail Managers Exchange Forum Teleconference  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

to talk about mail related items. 1) Mr. Nellums introduced Derek Milner, Policy Advisor from the GSA Office of Government-wide policy. a. Mr. Milner stated that he is being...

122

Printing and Mail Managers Exchange Forum Teleconference  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Majors to talk about mail related items. 1) Mr. Majors introduced Derek Milner, Policy Advisor from the GSA Office of Government-wide policy. a. Mr. Milner announced that he is...

123

Security Cases  

Broader source: Energy.gov (indexed) [DOE]

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

124

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity...

125

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

June 13, 2013 June 13, 2013 PSH-13-0034 - In the Matter of Personnel Security Hearing On June 13, 2013, a Hearing Officer determined that an individual's security clearance should not be restored. In reaching this determination, the Hearing Officer found that the individual had not successfully addressed the DOE's security concerns regarding her finances under criterion (l). June 11, 2013 PSH-13-0019 - In the Matter of Personnel Security On June 11, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's authorization access should be restored. A Local Security Office suspended the individual's security clearance following the individual contemplating suicide and, subsequently, being diagnosed by a DOE consulting psychologist as meeting the criteria for

126

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

October 10, 2013 October 10, 2013 PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. October 10, 2013 PSH-13-0070 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. Following the individual's employer receiving garnishment notices from both federal and state tax authorities in January 2013, the

127

Federal Energy Management Program: Energy Independence and Security Act,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements to someone by E-mail Share Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Facebook Tweet about Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Twitter Bookmark Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Google Bookmark Federal Energy Management Program: Energy Independence and Security Act, Section 432: Federal Facility Management and Benchmarking Requirements on Delicious

128

Legal and policy issues associated with monitoring employee E-mail  

SciTech Connect (OSTI)

This paper examines the legal issues involved with employer monitoring of employee e-mail. In addition to identifying pertinent legal issues, the paper provides guidelines that will help the Pacific Northwest National Laboratory (PNNL) establish a program for monitoring outgoing e-mail to insure compliance with company policies, particularly those regarding protection of trade secrets and proprietary information, and to comply with the Department of Energy`s (DOE) procedures for protecting Export Controlled Information (ECI). Electronic communication has allowed companies to enhance efficiency, responsiveness and effectiveness. E-mail allows employees to transmit all types of data to other individuals inside and outside of their companies. The ease with which information can be transmitted by e-mail has placed trade secrets, proprietary information, and other sensitive data at risk from inadvertent disclosure by employees. As employers attempt to protect their interests through measures such as monitoring e-mail, they may expose themselves to liability under federal and state laws for violating employee privacy. Business use of e-mail has proliferated so rapidly that the federal and state legal systems have not been able to adequately address the issues arising out of its use in the workplace.

Segura, M.A.; Rither, A.C.

1997-01-01T23:59:59.000Z

129

Minutes from the Print and Mail Managers Exchange Forum Teleconferences |  

Broader source: Energy.gov (indexed) [DOE]

Minutes from the Print and Mail Managers Exchange Forum Minutes from the Print and Mail Managers Exchange Forum Teleconferences Minutes from the Print and Mail Managers Exchange Forum Teleconferences Minutes from the Print and Mail Managers Exchange Forum Teleconferences. Contact the Office of Administrative Management and Support at (202) 586-4318 with any questions. Last updated 04/01/13 Minutes from the March 14, 2013 Printing and Mail Teleconference Minutes from the January 10, 2013 Printing and Mail Teleconference Minutes from the November 01, 2012 Printing and Mail Teleconference Minutes from the June 28, 2012 Printing and Mail Teleconference Minutes from the May 03, 2012 Printing and Mail Teleconference Minutes from the February 23, 2012 Printing and Mail Teleconference Minutes from the October 26, 2011 Printing and Mail Teleconference

130

Security systems engineering overview  

SciTech Connect (OSTI)

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

131

Multi Modal Verification for Teleservices and Security Applications (MZVTS)  

Science Journals Connector (OSTI)

This paper presents the European ACTS project ( MZVTS ), which stands for Multi Modal Verification for Teleservices and Security Applications. The primar) goal of this project is to address the issue of secured access to local and centralised services ...

G. Richard; Y. Menguy; 1. Guis; N. Suaudeau; J. Boudy; P. Lockwood; C. Fernandez; F. Fernndez; C. Kotropoulos; A. Tefas; Pitas; R. Heimgartner; P. Ryser; C. Beumier; P. Verlinde; S. Pigeon; G. Matas; J. Kittler; J. Bign; Y. Abdeljaoued; E. Meurville; L. Besacier; M. Ansorge; G. Maitre; J. Luettin; S. Ben-Yacoub; B. Ruiz; K. Aldama; J. Cortes

1999-06-01T23:59:59.000Z

132

A New Grid Security Framework with Dynamic Access Control  

Science Journals Connector (OSTI)

In this paper, a new Grid security framework based on dynamic access control is introduced to address some security problem in Grid. Based on the dynamic evaluating results about ... levels to access rights. In o...

Bing Xie; Xiaolin Gui; Yinan Li; Depei Qian

2004-01-01T23:59:59.000Z

133

NNSA Administrator Addresses Next Generation of Computational Scientists |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Addresses Next Generation of Computational Scientists | Addresses Next Generation of Computational Scientists | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Speeches > NNSA Administrator Addresses Next Generation of Computational ... Speech NNSA Administrator Addresses Next Generation of Computational Scientists Jun 22, 2010

134

Address EJ Conference  

Broader source: Energy.gov (indexed) [DOE]

Congressman Clyburn to Congressman Clyburn to Address EJ Conference Congressman Clyburn has graciously agreed to speak at The State of Environmental Justice in America 2011 Conference. Congressman Clyburn (D - SC) has been a member of the U.S. House of Congress since 1993. He has held the positions of Chairman of the Democratic Black Caucus, House Democratic Caucus Vice Chair, Chair of the Democratic Caucus and from 2006 until January 2011, was the House Majority Whip. Currently, as Assistant Democratic Leader in the 112th Congress and the number three Democrat in the House, James E. Clyburn will be the leadership liaison to the Appropriations Committee and one of the Democratic Caucus' primary liaisons to the White House. Congressman Clyburn has been a life long champion and has worked diligently

135

Cyber Security | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

136

Introduction to Apple Mail with IMAP Version 4 October 2008  

E-Print Network [OSTI]

Introduction to Apple Mail with IMAP Version 4 ­ October 2008 Massachusetts Institute of Technology #12;Apple Mail Quick Start Guide Page 2 Getting Started This Quick Start class assumes that: 1. Apple Mail is configured for use at MIT. If you need help with configuration please see Apple Mail at MIT

Gabrieli, John

137

Environmental Security and Restoration | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Environmental Security & Restoration Environmental Security & Restoration Argonne's work in environmental security and restoration addresses soil, surface water, sediment, and groundwater at contaminated sites. Argonne's work in environmental restoration addresses soil, surface water, sediment, and groundwater at contaminated sites, starting with environmental evaluations and planning projects. Assessments are also conducted of approaches for long-term stewardship of remediated sites with residual contamination. Remedies range from precise excavations to innovative combinations of engineered wetlands and phytoremediation. Argonne researchers conduct approaches for long-term stewardship of remediated sites with residual contamination. The objective of environmental security programs is to support efforts to reduce national

138

Cyber Security Guidelines, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

139

Department of Energy Releases Strategic Plan to Address Energy Challenges |  

Broader source: Energy.gov (indexed) [DOE]

Department of Energy Releases Strategic Plan to Address Energy Department of Energy Releases Strategic Plan to Address Energy Challenges Department of Energy Releases Strategic Plan to Address Energy Challenges October 2, 2006 - 9:01am Addthis WASHINGTON, DC - Secretary of Energy Samuel W. Bodman today released the Department's five-year strategic plan that focuses on the Department's role in powering and securing America's future. The plan addresses overall Department goals for developing and deploying new clean energy technologies, reducing our dependence on foreign energy sources, protecting our nuclear weapons stockpile, and ensuring that America remains competitive in the global marketplace. The Department's plan builds on President Bush's Advanced Energy and American Competitiveness Initiatives, which are increasing America's energy security, spurring scientific

140

Safety, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Lab announces security changes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

142

Food Security Implication Of Climate Change In Developing Countries: Findings From A Case Study In Mali  

E-Print Network [OSTI]

&M University, College Station, TX 77843-2124, U.S.A. E-mail:tanveer@tamu.edu Bruce A. McCarl* Reagents held constant, would lessen food production and consumption, worsening food security conditions

McCarl, Bruce A.

143

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

144

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

nonpartisan organization with a mission to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological, and chemical weapons and to...

145

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

146

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

147

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

148

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

149

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

150

FAQS Reference Guide Safeguards and Security General Technical Base  

Broader source: Energy.gov [DOE]

This reference guide addresses the competency statements in the July 2009 edition of DOE-STD-1123-2009, Safeguards and Security General Technical Base Qualification Standard.

151

The supply security of hydrogen as transport fuel.  

E-Print Network [OSTI]

??The impact that hydrogen and fuel cell technology can have on the security of European transport fuel supply is addressed in this paper. This impact (more)

Hansen, Anders Chr.

2007-01-01T23:59:59.000Z

152

Environmental Security and Restoration [EVS Program Area]  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Environmental Security and Restoration Environmental Security and Restoration EVS focuses on environmental and human health aspects of homeland and national security, as well as restoration of sites contaminated with hazardous materials. Contamination in our environment - in air, water, and soil - contributes to health problems and affects the quality of our lives. The EVS Division confronts this challenge by addressing environmental and human health aspects of homeland and national security and by characterizing and restoring sites contaminated with hazardous materials. We integrate extensive expertise in engineering, health physics, hydrogeology, environmental science, chemistry, spatial analysis, database management, and computer programming to contribute to environmental security and restoration.

153

1. From the Mail Services website, (www.princeton.edu/mail) click on Metered Mail to access the Meter Request Form.  

E-Print Network [OSTI]

1. From the Mail Services website, (www.princeton.edu/mail) click on Metered Mail to access the Meter Request Form. 2. Log in using your Princeton NetID and password. The system will pre the drop-down menu. To enter a new chartstring, click "Create New." Online Meter Request Form A step

Singh, Jaswinder Pal

154

April 23, 2004 BY ELECTRONIC MAIL  

E-Print Network [OSTI]

entitled: "Council Recommendations for the Future Role of the Bonneville Power Administration in Power. A fundamental change in how Bonneville carries out its role in power supply: We whole- heartedly agreeApril 23, 2004 BY ELECTRONIC MAIL Northwest Power Planning Council 851 S.W. Sixth Ave., Suite 1100

155

Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical  

Broader source: Energy.gov (indexed) [DOE]

Southern Company: DOE Smart Grid RFI Addressing Policy and Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges. Southern recognizes that many policy and logistical concerns must be addressed for the promises of smart grid technologies and applications to be fully realized in ways that are beneficial, secure, and cost-effective lor utility customers. Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges More Documents & Publications Re: DOE Request for Information - Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy

156

Energy Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

157

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

158

This form may be submitted to the EIA by mail, fax, e-mail, or secure file trans  

U.S. Energy Information Administration (EIA) Indexed Site

notice914.jsp" notice914.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0205" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 05/31/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Burden: 3 hours" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"MONTHLY NATURAL GAS PRODUCTION REPORT",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2011.001" "FORM EIA-914" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For the sanctions and the provisions concerning the confidentiality of information submitted on this form, see the form instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction."

159

This form may be submitted to the EIA by mail, fax, e-mail, or secure file trans  

U.S. Energy Information Administration (EIA) Indexed Site

C" C" "MONTHLY REPORT OF PRIME SUPPLIER SALES OF PETROLEUM PRODUCTS" "SOLD FOR LOCAL CONSUMPTION" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction. See Instructions for further details on the sanctions and the provisions concerning the confidentiality of information submitted on this form." "PART 1. RESPONDENT IDENTIFICATION DATA",,,,,,,,,,,,,,,,,,,,,,,"PART 2. SUBMISSION INFORMATION"

160

T-599: Microsoft April 2011 Security Bulletin Release | Department of  

Broader source: Energy.gov (indexed) [DOE]

99: Microsoft April 2011 Security Bulletin Release 99: Microsoft April 2011 Security Bulletin Release T-599: Microsoft April 2011 Security Bulletin Release April 11, 2011 - 5:24am Addthis PROBLEM: Microsoft April 2011 Security Bulletin Release PLATFORM: Microsoft Windows, Microsoft Office, Microsoft Server Software, and Microsoft Developer Tools and Software ABSTRACT: Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. reference LINKS: Microsoft Security Bulletin Advance Notification for April 2011 Microsoft Security April Affected Software TechNet Webcast: Information About Microsoft April Security Bulletins IMPACT ASSESSMENT: High Discussion:

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

162

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

163

Barriers to creating a secure MPI  

SciTech Connect (OSTI)

This paper explores some of the many issues in developing security enhanced MPI for embedded real-time systems supporting the Department of Defense`s Multi-level Security policy (DoD MLS) are presented along with the preliminary design for such an MPI variant. In addition some of the many issues that need to be addressed in creating security enhanced versions of MPI for other domains are discussed. 19 refs.

Brightwell, R.; Greenberg, D.S.; Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States); Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States). Dept. of Computer Sciences

1997-08-01T23:59:59.000Z

164

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

165

Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

166

Army Energy Security Considerations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ARMY Energy Security ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703)-601-0374 E-mail: don.juhasz@hqda.army.mil FUEL CELL OPPORTUNITIES 26 April 2007 1 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy * * * * FOREIGN OIL 2 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 World Energy Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11% of installations' budget US ARMY IS DEPENDENT ON 1 ¾ ¾ ¾ ¾ ¾ In ¾ 3 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Challenges To Managing The Future World population growing: 6.5 B in 2006, 2030 estimate 7.9 B

167

ENERGY SECURITY  

Broader source: Energy.gov (indexed) [DOE]

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

168

Network Security  

Science Journals Connector (OSTI)

Regulatory standards such as the NERC CIP primarily address generation plants and HV substations. Estimates suggest that, based on this...

Kenneth C. Budka; Jayant G. Deshpande

2014-01-01T23:59:59.000Z

169

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

170

Security Operations, Laboratory Protection Division, Brookhaven National  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Operations Security Operations Homepage Brookhaven ID Badges, Passes, & Vehicle Stickers Hours of Operation Points of Contact Unclassified Foreign Visits and Assignments: FAQs BNL Site Access Main Gate Access Forms Security Operations L. Butera, Manager Brookhaven National Laboratory Bldg. 50 - P.O. Box 5000 Upton, NY 11973-5000 (631) 344-4691 E-mail: lbutera@bnl.gov Security Operations Mission Statement: To protect DOE special nuclear materials, classified matter, sensitive information, and certain sensitive property against theft, diversion, or destruction; to prevent the sabotage of programs that could result in significant scientific or financial impact; to prevent the malevolent release of hazardous materials including radiological, chemical, and infectious agents or other criminal acts that would endanger employees, the public, and the environment.

171

Secretary Chu Announces Latest Efforts to Address Cybersecurity |  

Broader source: Energy.gov (indexed) [DOE]

Latest Efforts to Address Cybersecurity Latest Efforts to Address Cybersecurity Secretary Chu Announces Latest Efforts to Address Cybersecurity September 23, 2010 - 12:00am Addthis Washington, D.C. - Speaking at the inaugural GridWise Global Forum, U.S. Energy Secretary Steven Chu today announced the investment of more than $30 million for ten projects that will address cybersecurity issues facing the nation's electric grid. Together, these projects represent a significant investment in addressing cybersecurity issues in the nation's electric infrastructure. Today's announcement supports the Administration's goal of building a 21st Century clean energy economy supported by a secure, reliable, electricity system delivering power to American homes and businesses. "These awards help us make a significant leap forward to strengthen the

172

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

173

Security Rulemaking  

Broader source: Energy.gov (indexed) [DOE]

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

174

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

175

Argonne Chemical Sciences & Engineering - People - National Security -  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security National Security Nuclear Forensics and Nanoscale Engineering Chemical Analysis and Research Analytical Chemistry Laboratory Management and Support David B. Chamberlain, Chemical Engineer and Department Manager phone: 630/252-7699, fax: 630/972-4409, e-mail: david.chamberlain@anl.gov M.S., Chemical Engineering, University of Idaho Spent fuel reprocessing Radiological forensics Sealed radioactive source characterization Radioactive materials and national security Mary Anne Yates, Senior Technical Advisor/Senior Chemist phone: 630/252-7699, fax: 630/972-4409, e-mail: mayates@anl.gov Ph.D., Nuclear Chemistry, Carnegie Mellon University Homeland Security Counterterrorism Publications in nuclear, atomic, and particle physics Jodi L. Canaday, Administrative Secretary

176

Setting up your @mun.ca e-mail  

E-Print Network [OSTI]

Setting up your @mun.ca e-mail A Step-by-Step Guide Revised by the Academic Advising Centre ­ October 2011 #12;Why do I need an @mun.ca e-mail? Memorial University has implemented a new policy whereby all official e-mail correspondence between students and the University will be sent to an @mun.ca e

Warkentin, Ian G.

177

Refereed paper: Collecting security baggage on the internet  

Science Journals Connector (OSTI)

The PCM was introduced as a model to address security problems in unsafe computer environments. This works on a principal called baggage collection. The model describes how using baggage can solve security problems in complex computer environments, but ... Keywords: Authorization Applet, Java, Java Baggage Security Application, PCM, Trusted Third Party, baggage

S. H. Von Solms, J. H. S. Geldenhuys

1998-01-01T23:59:59.000Z

178

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

179

Address: 125252, Russia, Moscow, Zorge Street, 9, www.farmina.ru The status and development trends of the Russian HP market  

E-Print Network [OSTI]

#12;2 Address: 125252, Russia, Moscow, Zorge Street, 9, www.farmina.ru The status and development Shishov, Farmina, Russia E-mail:vv@shishov.net . ., , 10.2013 #12;3 Address: 125252, Russia . « » 2020 . 45 , (), [1]. #12;4 Address: 125252, Russia, Moscow, Zorge Street, 9, www

Oak Ridge National Laboratory

180

Energy Security Council  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Watkins...

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Message Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

182

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

183

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

184

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

185

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Tags Tag: Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website,...

186

Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of  

Broader source: Energy.gov (indexed) [DOE]

Smart Grid RFI: Addressing Policy and Logistical Challenges. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. The Alliance to Save Energy is a coalition of prominent business, government, environmental, and consumer leaders who promote the efficient use of energy worldwide to benefit consumers, the environment, economy, and national security. The Alliance to Save Energy (the Alliance) thanks the Department of Energy for the opportunity to comment on broad issues of policy and logistical challenges faced in smart grid implementation. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. More Documents & Publications

187

Neile Miller addresses DOE/NNSA intergovernmental meeting | National  

National Nuclear Security Administration (NNSA)

Neile Miller addresses DOE/NNSA intergovernmental meeting | National Neile Miller addresses DOE/NNSA intergovernmental meeting | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Neile Miller addresses DOE/NNSA intergovernmental meeting Neile Miller addresses DOE/NNSA intergovernmental meeting Posted By Office of Public Affairs NNSA Blog

188

CHRISTOPHER JOHN LOBB ADDRESS: Office  

E-Print Network [OSTI]

CHRISTOPHER JOHN LOBB ADDRESS: Office: Center for Superconductivity Research Department of Physics. Proc. No. 58 (AIP, New York, 1980), p. 308. 7. C. J. Lobb and Keith R. Karasek, A Monte Carlo

Lathrop, Daniel P.

189

Security rethink  

Science Journals Connector (OSTI)

......breaches or heightening the risks. One of my clients...business to the socio-political situation of particular...based on the return on investment in keeping a high standard...times that security risks are at their highest...lay-offs. The return on investment must consider the positive......

Michael Chua

2002-09-01T23:59:59.000Z

190

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

191

Physical Security Systems | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

192

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

193

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

194

POLICY GUIDANCE MEMORANDUM #03 Addressing Missclassified Positions...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

3 Addressing Missclassified Positions POLICY GUIDANCE MEMORANDUM 03 Addressing Missclassified Positions This memorandum provides policy guidance on how to consistently address...

195

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

196

Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems  

Science Journals Connector (OSTI)

The specification of security requirements for systems of systems is often an activity that is forced upon non-security experts and performed under time pressure. This paper describes how we have addressed this p...

Albin Zuccato; Nils Daniels; Cheevarat Jampathom

2010-01-01T23:59:59.000Z

197

Minutes from the November 01, 2012 Printing and Mail Teleconference  

Energy Savers [EERE]

November 1, 2012 Mail discussion Al Majors opened the meeting by introducing Derrick Milner, Program Manager from the General Services Administration, Office of Government-wide...

198

Minutes from the May 3, 2012 Printing and Mail Teleconference  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

3, 2012 Printing and Mail Managers Exchange Forum Teleconference Al Majors opened the meeting by introducing Derrick Milner, Program Manager from the General Services...

199

NREL: Dynamic Maps, GIS Data, and Analysis Tools - GIS Mailing...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

GIS Mailing List The Geographic Information System (GIS) at NREL update will periodically highlight the latest GIS activities in renewable energy and energy efficiency technologies...

200

This form may be submitted to the EIA by mail, fax, e-mail, or...  

U.S. Energy Information Administration (EIA) Indexed Site

of transmission: HTTPS. This is an industry-standard method to send information over the web using secure, encrypted processes. (It is the same method that commercial companies use...

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

202

Nonproliferation & International Security | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

203

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

204

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

205

Telecommunications Account/Address Change  

E-Print Network [OSTI]

Telecommunications Account/Address Change Fax the completed form to 979.847.1111. If you do will be effective within 30 days from the date the work order is received by Telecommunications. Refer to http Departmental Approval Print Name Signature Date Telecommunications Office Use Only Date completed: Completed by

206

BICYCLE URBANISM SYMPOSIUM KEYNOTE ADDRESS  

E-Print Network [OSTI]

for expanding their cycling networks, combined with a range of complementary programs such as bike sharing, bikeBICYCLE URBANISM SYMPOSIUM KEYNOTE ADDRESS Cycling to the Future: Lessons from Cities across the Globe In this talk, John Pucher documents the boom in cycling in both European and North American cities

Hochberg, Michael

207

A cryogenic data addressed memory  

Science Journals Connector (OSTI)

A computer storage system which is addressed by content rather than location is described. The design has been verified by constructing and successfully operating a three-word module consisting of 81 crossed-film cryotrons on a 6-inch by 3-inch substrate.

V. L. Newhouse; R. E. Fruin

1962-05-01T23:59:59.000Z

208

Building Address Locations -Assumes entire  

E-Print Network [OSTI]

Housman Building 80 E. Concord St R BU School of Medicine, Instructional Building 80 E. Concord St L BU JBuilding Address Locations - Assumes entire building unless noted Designation Submit through* 560, 4 BU Crosstown Center 801 Massachusetts Ave Floor 1, 2 BMC BCD Building 800 Harrison Avenue BCD BMC

Guenther, Frank

209

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

210

Transportation Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Transportation Security Transportation Security Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste...

211

Collecting security baggage on the internet  

Science Journals Connector (OSTI)

The PCM was introduced as a model to address security problems in unsafe computer environments. This works on a principal called baggage collection. The model describes how using baggage can solve security problems in complex computer environments, but does not state how this baggage is collected. This paper will provide a practical solution and implementation to this problem by describing how making use of Java and digital certificates can collect baggage.

S.H. von Solms; J.H.S. Geldenhuys

1998-01-01T23:59:59.000Z

212

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

213

Data-Driven Mailing Helps Heat Up Untapped Seattle Market  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Focus Series Focus Series Data-Driven Mailing Helps Heat Up Untapped Seattle Market Recognizing owners of oil-heated homes in Seattle, Washington, as a long-untapped market, Community Power Works engaged them through a direct mail campaign in April 2012. Not only did the mailing generate hundreds of sign-ups, but the number of oil-heated homes initiating upgrades increased to 50% in the six months after the mailing. In the interview below, Community Power Works Project Manager Ruth Bell and Program/System Analyst Vince Schueler of the Washington State University (WSU) Energy Program 1 provide a summary of the successes and lessons learned. Following the interview is an example letter used by Community Power Works in its direct mail outreach. Q. Why focus on oil-heated homes in Seattle?

214

PSH-13-0132 - In the Matter of Personnel Security | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Personnel Security Interview of the individual to address concerns about his alcohol consumption, which arose because he appeared to work twice with a high Blood Alcohol Content...

215

PSH-13-0131 - In the Matter of Personnel Security Hearing | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Personnel Security Interview of the individual to address concerns about his alcohol consumption which arose during the Office of Personnel Management's re-investigation of the...

216

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

217

Security for grids  

SciTech Connect (OSTI)

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

218

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect (OSTI)

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

219

PSH-12-0076 - Personnel Security Hearing | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6 - Personnel Security Hearing 6 - Personnel Security Hearing PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted . A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's falsification and financial irresponsibility. His behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that the requisite element of "deliberateness" was met under Criterion F. She further found that

220

Security Model For Service-Oriented Architecture  

E-Print Network [OSTI]

In this article, we examine how security applies to Service Oriented Architecture (SOA). Before we discuss security for SOA, lets take a step back and examine what SOA is. SOA is an architectural approach which involves applications being exposed as "services". Originally, services in SOA were associated with a stack of technologies which included SOAP, WSDL, and UDDI. This article addresses the defects of traditional enterprise application integration by combining service oriented-architecture and web service technology. Application integration is then simplified to development and integration of services to tackle connectivity of isomerous enterprise application integration, security, loose coupling between systems and process refactoring and optimization.

Karimi, Oldooz

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Recommended Practice for Securing Control System Modems  

SciTech Connect (OSTI)

This paper addresses an often overlooked backdoor into critical infrastructure control systems created by modem connections. A modems connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

James R. Davidson; Jason L. Wright

2008-01-01T23:59:59.000Z

222

The Career Center 29 You should always include a cover letter when mailing, e-mailing, or faxing a resume.  

E-Print Network [OSTI]

a resume. A cover letter serves two basic purposes: as an introduction and as a marketing tool. Your cover letter for each resume you mail. Generic cover letters look like just that (what do you do with mail printing hard copies, use good quality paper. The paper should match that of your resume. A cover letter

Kasman, Alex

223

Columbia Graduate Engineering Mailing Address: 100 Hamilton Hall Office of Financial Aid & Educational Financing 1130 Amsterdam Avenue, MC 2802  

E-Print Network [OSTI]

& Educational Financing 1130 Amsterdam Avenue, MC 2802 New York, NY 10027 In-Person Drop Off: Lerner Hall, Room as a matriculating student in a degree-seeking program. Enrollment (expected or actual): Summer 2011 ___________ Fall and Unsubsidized Stafford Student Loan programs have a 1% origination fee. Federal Direct Stafford Loan borrowers

Shepard, Kenneth

224

*Tel.: #1-858-534-4287. E-mail address: bewley@ucsd.edu (T.R. Bewley).  

E-Print Network [OSTI]

://turbulence.ucsd.edu. Progress in Aerospace Sciences 37 (2001) 21}58 Flow control: new challenges for a new Renaissance Thomas R, in an attempt to clarify the author's perspective on how recent advances in these constituent disciplines "t"c disciplines individually grow towards their maturity, many new opportunities for signi"cant advances lie

Bewley, Thomas

225

*Corresponding author. Fax: #33-5-613-32790. E-mail address: crav@aero.obs-mip.fr (V. Crassier).  

E-Print Network [OSTI]

, Steven Businger , Christian Gerbig , Frank Raes , Jochen Rudolph Laboratoire d'Ae&rologie, UMR CNRS Marine Environmental Laboratory, NOAA, Seattle, USA Department of Meteorology, University of Hawai'i

226

*Corresponding author. Fax: #39-0862-437570. E-mail address: stefano.pirro@lngs.infn.it (S. Pirro).  

E-Print Network [OSTI]

Abstract Present results on neutrinoless double beta decay of Te obtained with an array of 20 cryogenic array, corresponding to 1.5 kg yr, a limit on neutrinoless double beta decay half-life of 9.5;10 yr (90. The advantages of using large mass, high resolu- tion detectors to search for neutrinoless double beta decay (0

227

Climate-derived tensions in Arctic security.  

SciTech Connect (OSTI)

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

228

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

229

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

230

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

231

Headquarters_Security_Overview_Handbook_March_2012  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

H H H E E A A D D Q Q U U A A R R T T E E R R S S S S E E C C U U R R I I T T Y Y O O V V E E R R V V I I E E W W H H A A N N D D B B O O O O K K November 2012 UNITED STATES DEPARTMENT OF ENERGY Office of Health, Safety and Security Office of Security Operations Office of Headquarters Security Operations Phone: 301-903-9990 Fax: 301-903-4601 E-mail: HS-92Operations@hq.doe.gov 1 Table of Contents Making a Difference 2 Introduction 2 Responsibilities 2 Headquarters Protective Force (PF) 2 Headquarters Security Officers (HSOs) 2 Headquarters Security Procedures 3-5 Classified Matter Protection and Control 5-8 A Final Word 8 Emergency Telephone Numbers 9 Reminders 9 2 MAKING A DIFFERENCE

232

Independent Oversight Inspection, Office of Secure Transportation - March  

Broader source: Energy.gov (indexed) [DOE]

Inspection, Office of Secure Transportation - Inspection, Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the Office of Secure Transportation The Secretary of Energy's Office of Independent Oversight, within the Office of Health, Safety and Security, conducted an inspection of the emergency management program at the Office of Secure Transportation (OST) in January and February 2007. The inspection was performed by the Office of Emergency Management Oversight. This 2007 inspection found that, in general, OST efforts have been effective in addressing weaknesses in field response; however, some corrective actions were either ineffective or did not fully address elements of the program, particularly those that affect the EOC cadre. A

233

Office of Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

234

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

235

Security | Department of Energy  

Energy Savers [EERE]

Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

236

Security & Privacy | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

237

Minutes from the May 26, 2010 Printing and Mail Teleconference  

Broader source: Energy.gov (indexed) [DOE]

26, 2010 26, 2010 Printing and Mail Managers Exchange Forum Teleconference Seventeen individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors. Comments/Additions to last Months Minutes Dallas Woodruff, Headquarters opened the meeting by thanking everyone for participating in the today's teleconference. Printing Agenda Items... Update on the FY 2010, Congressional Joint Committee on Printing Commercial Printing Report "JCP Form No. 2" Dallas Woodruff, Headquarters informed the group that Headquarters received responses from all DOE printing and duplicating facilities. The report is due to the Congressional Joint Committee on Printing no later than May 31, 2010.

238

Resilient Asymmetric Security (RAS) Salim Hariri, UA Director  

E-Print Network [OSTI]

services will revolutionize the way we do business, maintain our health, conduct education, and how secure self-*, i.e., autonomic operations. To address these challenges, we are developing a Resilient

239

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

240

Via E-Mail Michael Li Electricity Policy Specialist U.S. Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

November 1, 2010 November 1, 2010 Via E-Mail Michael Li Electricity Policy Specialist U.S. Department of Energy Office of Electricity Delivery and Energy Reliability 1000 Independence Avenue, SW Washington, DC 20585 smartgridpolicy@hq.doe.gov Re: Smart Grid RFI: Addressing Policy And Logistical Challenges Dear Mr. Li: On behalf of the Association of Home Appliance Manufacturers (AHAM), I would like to provide our comments on the Smart Grid RFI: Addressing Policy and Logistical Challenges, 75 Fed. Reg. 57,006 (Sept. 17, 2010). The Association of Home Appliance Manufacturers (AHAM) represents manufacturers of major, portable and floor care home appliances, and suppliers to the industry. AHAM's membership includes over 150 companies throughout the world. In the U.S., AHAM members employ tens

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Office of Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

242

A Learning-Based Approach to Reactive Security  

E-Print Network [OSTI]

Terms--Reactive security, risk management, attack graphs, online learning, adversarial learning, game vulnerability is plugged, CISOs typically perform a cost- benefit analysis to identify which risks to address of reactive strategies in an economic model of the CISO's security cost-benefit trade- offs. Unlike previously

Song, Dawn

243

V-196: Microsoft Security Bulletin Advance Notification for July 2013  

Broader source: Energy.gov [DOE]

Microsoft Security Bulletin Advance Notification for July 2013. Microsoft has posted 6 Critical Bulletin and 1 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" July allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on July 10, 2013, at 11:00 AM Pacific Time (US & Canada).

244

Symbiosis: Addressing Biomass Production Challenges and Climate...  

Broader source: Energy.gov (indexed) [DOE]

Symbiosis: Addressing Biomass Production Challenges and Climate Change Symbiosis: Addressing Biomass Production Challenges and Climate Change This presentation was the opening...

245

EPA -- Addressing Children's Health through Reviews Conducted...  

Broader source: Energy.gov (indexed) [DOE]

Addressing Children's Health through Reviews Conducted Pursuant to the National Environmental Policy Act and Section 309 of the Clean Air Act EPA -- Addressing Children's Health...

246

Addressing Wind Turbine Tribological Challenges with Surface...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Addressing Wind Turbine Tribological Challenges with Surface Engineering Presented by Gary Doll of the University of Akron at the Wind Turbine Tribology Seminar 2014. Addressing...

247

Alternative Fuels Data Center: Energy Independence and Security Act of 2007  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Independence Independence and Security Act of 2007 (P.L. 110-140) to someone by E-mail Share Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Facebook Tweet about Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Twitter Bookmark Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Google Bookmark Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Delicious Rank Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on Digg Find More places to share Alternative Fuels Data Center: Energy Independence and Security Act of 2007 (P.L. 110-140) on AddThis.com... More in this section...

248

Minutes from the September 15, 2010 Printing and Mail Teleconference  

Broader source: Energy.gov (indexed) [DOE]

September 15, 2010 Printing and Mail Managers Exchange Forum Teleconference September 15, 2010 Printing and Mail Managers Exchange Forum Teleconference Twenty-four individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors. Comments/Additions to last Months Minutes Dallas Woodruff, Headquarters opened the meeting by thanking everyone for participating in the today's teleconference. Printing Agenda Items... Upcoming FY 2010 Department-wide Three-Year Plan Dallas Woodruff, Headquarters informed the group that the programmer has been making modifications to the spreadsheets such as the narrative section, equipment installed year, sites data consolidation etc. The enhancement to the narrative section will allow sites to enter data into the four narrative sections, which allow

249

HEART Reimbursement Act Form Mail completed form to  

E-Print Network [OSTI]

HEART Reimbursement Act Form Mail completed form to: Michigan State University MSU Human Resources Earnings Assistance and Relief (HEART) Act: If you are a member of a reserve component of the U.S. military

250

Yahoo! My Yahoo! Mail --Home News Home Hel  

E-Print Network [OSTI]

Yahoo! My Yahoo! Mail Search Sign In - -Home News Home Hel News Finance Sports Movies Welcome dalemeade08540 Sign Out Yahoo! India News Mon, Apr 18, 2005 Search News Stories for Search News Home Top

251

E-mail et Web : pour une navigation sans risque  

ScienceCinema (OSTI)

Prsentation orale en franais, support visuel en anglais. travers des exemples concrets, vous consoliderez vos connaissances et pourrez ainsi rajuster vos habitudes concernant l?utilisation scurise de votre bote e-mail et de votre navigateur Web.

None

2011-10-06T23:59:59.000Z

252

U-051: Skype Discloses IP Addresses to Remote Users | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

51: Skype Discloses IP Addresses to Remote Users 51: Skype Discloses IP Addresses to Remote Users U-051: Skype Discloses IP Addresses to Remote Users December 5, 2011 - 7:00am Addthis PROBLEM: A remote user can determine the IP address of a Skype user. PLATFORM: Skype application ABSTRACT: Skype Discloses IP Addresses to Remote Users reference LINKS: SecurityTracker Alert ID: 1026370 Forbes: Skype Flaw IMPACT ASSESSMENT: High Discussion: A remote user can initiate a Skype call to a target user to determine the target user's IP address and then terminate the call before the target user's Skype application has indicated an incoming call. The remote user does not need to be on the target user's contact list. Armed with an IP address, hackers can uncover specific information about victims, including who they chat with, what they download while online, and

253

Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

254

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

255

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

256

Better Security Through Discussion | Department of Energy  

Office of Environmental Management (EM)

Better Security Through Discussion Better Security Through Discussion Better Security Through Discussion More Documents & Publications Indiana Department of Homeland Security -...

257

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

258

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

259

Recommended Practice for Securing Control System Modems | Department of  

Broader source: Energy.gov (indexed) [DOE]

Practice for Securing Control System Modems Practice for Securing Control System Modems Recommended Practice for Securing Control System Modems This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. Recommended Practice for Securing Control System Modems More Documents & Publications

260

T-533: Microsoft January 2011 Security Bulletin Release | Department of  

Broader source: Energy.gov (indexed) [DOE]

3: Microsoft January 2011 Security Bulletin Release 3: Microsoft January 2011 Security Bulletin Release T-533: Microsoft January 2011 Security Bulletin Release January 12, 2011 - 2:25pm Addthis PROBLEM: Microsoft January 2011 Security Bulletin Release PLATFORM: Various Windows OS Platforms, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2 ABSTRACT: Microsoft released 2 bulletins to address 3 vulnerabilities involving Microsoft Windows and components in Windows OS, and Windows Server Releases. Only 1 of these bulletins get our maximum severity rating of Critical. reference LINKS: Microsoft Security Bulletin Advance Notification for December 2010 TechNet Webcast: Information About Microsoft January 2011 Security Bulletins Discussion: Microsoft Security Bulletin MS11-001 - Important CVE-2010-3145 - This

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Secure Smart Grid Association | Open Energy Information  

Open Energy Info (EERE)

Secure Smart Grid Association Secure Smart Grid Association Jump to: navigation, search Name Secure Smart Grid Association Address 2374 S Josephine St Place Denver, Colorado Zip 80210 Region Rockies Area Number of employees 1-10 Year founded 2009 Phone number 303-997-2824 Coordinates 39.673446°, -104.9575629° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.673446,"lon":-104.9575629,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

262

Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of  

Broader source: Energy.gov (indexed) [DOE]

Challenges. Challenges. Comments of the Alliance to Save Energy. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. The Alliance to Save Energy is a coalition of prominent business, government, environmental, and consumer leaders who promote the efficient use of energy worldwide to benefit consumers, the environment, economy, and national security. The Alliance to Save Energy (the Alliance) thanks the Department of Energy for the opportunity to comment on broad issues of policy and logistical challenges faced in smart grid implementation. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. More Documents & Publications DC OPC Comments. September 17, 2010 Comments of the National Rural Electric Cooperative Association, Request

263

NERSC Computer Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

264

U.S. Energy Secretary Addresses International Atomic Energy Agency General  

Broader source: Energy.gov (indexed) [DOE]

Secretary Addresses International Atomic Energy Agency Secretary Addresses International Atomic Energy Agency General Conference U.S. Energy Secretary Addresses International Atomic Energy Agency General Conference September 19, 2011 - 4:48pm Addthis VIENNA, AUSTRIA - U.S. Energy Secretary Steven Chu addressed the International Atomic Energy Agency's General Conference today in Vienna. Opening with a message from President Barack Obama, Secretary Chu highlighted the importance of safety and security in the nuclear industry in light of the tragic events at Fukushima this year, and outlined the four priorities of President Obama's nuclear agenda: promoting the peaceful use of nuclear energy, strengthening the nuclear proliferation regime, pursuing nuclear disarmament and enhancing nuclear security The following are excerpts of Secretary Chu's remarks as prepared for

265

U.S. Energy Secretary Addresses International Atomic Energy Agency General  

Broader source: Energy.gov (indexed) [DOE]

U.S. Energy Secretary Addresses International Atomic Energy Agency U.S. Energy Secretary Addresses International Atomic Energy Agency General Conference U.S. Energy Secretary Addresses International Atomic Energy Agency General Conference September 19, 2011 - 2:24pm Addthis VIENNA, AUSTRIA - U.S. Energy Secretary Steven Chu addressed the International Atomic Energy Agency's General Conference today in Vienna. Opening with a message from President Barack Obama, Secretary Chu highlighted the importance of safety and security in the nuclear industry in light of the tragic events at Fukushima this year, and outlined the four priorities of President Obama's nuclear agenda: promoting the peaceful use of nuclear energy, strengthening the nuclear proliferation regime, pursuing nuclear disarmament and enhancing nuclear security The following are excerpts of Secretary Chu's remarks as prepared for

266

Office of Security Assistance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

267

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

268

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Broader source: Energy.gov (indexed) [DOE]

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

269

Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

270

Security Notice | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

271

NNSA PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PERSONNEL SECURITY PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION Contractor Federal Name (Last, First, Middle): Suffix: Date of Birth: Social Security Number: Place of Birth (city and state/country): Citizenship(s): Email Address: Employer (legal name): Job Title: Required: LOCATION/BILLING Work Location: Contracting Office Location/SON: Prime Contract Number: Sub-contract Number: Facility Code: Employer Code: Required: CLEARANCE ACTION Requested Action(s): Clearance Level: (for employer/contract above) Clearance History Never held a clearance Previously held Currently holds Key Management Personnel (KMP)? Human Reliability Program (HRP)? PERSONNEL SECURITY USE ONLY: DOE Clearance: Special Access Program (SAP)? Yes No CLEARANCE JUSTIFICATION NARRATIVE

272

Nevada National Security Site Wraps Up 2013 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

National Security Site Wraps Up 2013 National Security Site Wraps Up 2013 Nevada National Security Site Wraps Up 2013 December 24, 2013 - 12:00pm Addthis A specialist with the Nevada National Security Site groundwater characterization team collects a groundwater sample at well PM-3 located on the Nevada Test and Training Range, which is Air Force controlled land surrounding the NNSS. Groundwater characterization activities address the impacts of historic nuclear testing on groundwater. A specialist with the Nevada National Security Site groundwater characterization team collects a groundwater sample at well PM-3 located on the Nevada Test and Training Range, which is Air Force controlled land surrounding the NNSS. Groundwater characterization activities address the impacts of historic nuclear testing on groundwater.

273

Chapter 12 - Security Risk Reviews  

Science Journals Connector (OSTI)

Publisher Summary This chapter discusses the security risk review (SRR). The purpose of the SRR process is to identify areas where one's security standards are not being met. The focus initially should be on applications and supporting infrastructure that are most critical to the organization. This risk analysis process follows five high-level steps: assess resources, generate findings, analyze risk, risk decision, and risk exceptions. The goal with the SRR is to prioritize not only the resources being evaluated but also the importance of the standards themselves. The standard requiring a log of all guest accesses to the data center may be rightly deemed less critical than the requirement to have swipe card access to the data center. Reviews should be performed periodically or whenever new policies/standards are adopted by the organization. A fundamental control for any organization is a collection of security policies and standards that set the tone for how to operate the business securely. Once these are in place, the challenge then becomes how to assess the organization's current alignment with these standards and determine which gaps most urgently need to be addressed. This may sound like an audit function, but there is a very important distinction here: this process is meant to proactively prioritize those areas where a deviation from the standard might be acceptable and recognize the cases where such a divergence cannot be tolerated. Like many risk activities, the result will either be a formal acceptance of the current state or a plan to mitigate the risks. This is one of the fundamental on-going risk assessment activities that will help to gauge the security posture of the organization versus what controls might be documented on paper.

Evan Wheeler

2011-01-01T23:59:59.000Z

274

Homeland Security Programs | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

275

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

276

Security Policy, Guidance & Reports  

Broader source: Energy.gov [DOE]

Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energys corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that Departmental personnel security programs (including the National Nuclear Security Administration [NNSA]) are consistent and effectively implemented.

277

Remarks by Secretary of Energy Spencer Abraham Luncheon Address to the Keidanren  

E-Print Network [OSTI]

in my job as Secretary is look beyond our borders to examine the energy needs and challengesRemarks by Secretary of Energy Spencer Abraham Luncheon Address to the Keidanren January 9, 2004, and I look forward to a continuation of our fruitful partnership on international energy security issues

278

Minutes from the January 19, 2011 Printing and Mail Teleconference  

Broader source: Energy.gov (indexed) [DOE]

January 2010 January 2010 Printing and Mail Managers Exchange Forum Teleconference Twenty-one individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors Comments/Additions to last Months Minutes No comments. Printing Agenda Items......... Update on the Department-wide FY-2010 Three-Year Plan Dallas Woodruff, Headquarters in formed the group that the Department-wide Printing and Publishing Activities is currently in the concurrence process. The report is due to congress by February 11, 2011. Mr. Woodruff thanks those that assisted in development of the report and he asked for recommendations on how to make the data submission more users friendly. Mr Woodruff also asked members to share any concern or problems they experienced regarding to using the Excel

279

Minutes from the March 17, 2010 Printing and Mail Teleconference  

Broader source: Energy.gov (indexed) [DOE]

March 17, 2010 March 17, 2010 Printing and Mail Managers Exchange Forum Teleconference Twenty-eight individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors. Comments/Additions to last Months Minutes Dallas Woodruff, Headquarters opened the meeting by thanking everyone for participating in the today's teleconference. Printing Agenda Items... Upcoming Congressional Joint Committee on Printing Commercial Printing Report "JCP Form No. 2" Dallas Woodruff, Headquarters informed the group that sites should receive the call letter for the report on or around March 30, 2010. The report is due back to Headquarters by May 3, 2009. Mr. Woodruff reminded the group that they must report negative responses as well.

280

Minutes from the November 17, 2010 Printing and Mail Teleconference  

Broader source: Energy.gov (indexed) [DOE]

November 17, 2010 November 17, 2010 Printing and Mail Managers Exchange Forum Teleconference Twenty seven individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors Comments/Additions to last Months Minutes No comments. Printing Agenda Items......... Update on the Department-wide "Three-Year Plan" Dallas Woodruff, Headquarters opened the meeting by thanking everyone for providing their sites Three-Year Plan data to Headquarters in timely manner. Mr. Woodruff went on to say a number of individuals indentified a problem with the narrative section of the PPAFI Spreadsheets (unable to print the narratives). Mr. Woodruff notified the programmer of the narrative section printing glitch.

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Minutes from the January 20, 2010 Printing and Mail Teleconference  

Broader source: Energy.gov (indexed) [DOE]

, 2010 , 2010 Printing and Mail Managers Exchange Forum Teleconference Twenty-one individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors. Comments/Additions to last Months Minutes Dallas Woodruff, Headquarters opened the meeting by thanking everyone for participating in the today's teleconference. Printing Agenda Items... Update on the Department-wide Printing and Publishing Activities Report Three-Year Plan. Dallas Woodruff, Headquarters thanked the group for their contributions made to the Department-wide printing program during FY 2009. Mr Woodruff also thanked the group for providing data for the FY 2009 Three-Year Plan in a timely manner. The Three-Year Plan is in track for completion before the February

282

Information Security Policy Policy Title Information Security Policy  

E-Print Network [OSTI]

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

283

Keynote Address: Future Vision | Department of Energy  

Office of Environmental Management (EM)

Future Vision Keynote Address: Future Vision May 20, 2014 1:00PM to 1:30PM PDT Pacific Ballroom Tuesday's keynote address by Raffi Garabedian, Chief Technology Officer, First Solar...

284

Weekly Security Incident Log Period of Aug 25 -Aug 31, 2014  

E-Print Network [OSTI]

2014-001396 ROSS BUILDING - NORTH TOWER University Property Complainant reported that several office on the pedestrian walkway outside the north entrance of the Lassonde building. 8/25/2014 03:06 AM Suspicious Vehicle location. 8/25/2014 09:31 PM Theft, Under 2014-001402 ROSS BUILDING - SOUTH TOWER By Mail Security

285

Addressing Climate Change in Environmental Impact Analysis  

E-Print Network [OSTI]

Addressing Climate Change in Environmental Impact Analysis 2010 CTS Research Conference Carissa impact analysis (EIA) as a tool to address climate change ·! Consider approaches to measuring and addressing climate change at the project scale #12;Purpose ·! Funded by U of M Institute on the Environment

Minnesota, University of

286

Personal Security Assistance for Secure Internet Commerce  

E-Print Network [OSTI]

Jansson Swedish Institute of Computer Science Box 1263, S-164 28 Kista, Sweden ara@sics.se, sverker visiting your computer. Current agent security approaches are often based on trust in an ex- ternal assigned correct access-restrictions. We argue that a more rewarding security policy is to grant

Janson, Sverker

287

Cyber Security Evaluations - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

288

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

289

Office of Information Security  

Broader source: Energy.gov [DOE]

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

290

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

291

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

292

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

293

Security Scheme in Wireless Grid  

Science Journals Connector (OSTI)

In this paper, we considered the two security services of authorization and data security in wireless Grid. The security issues is related to authorization and security, specific to Grid, the characteristics of t...

Yue Hong Zhang; Li Hao; Zhong Shan Yang

2011-01-01T23:59:59.000Z

294

U-078: Microsoft Security Bulletin Advance Notification for January 2012 |  

Broader source: Energy.gov (indexed) [DOE]

78: Microsoft Security Bulletin Advance Notification for January 78: Microsoft Security Bulletin Advance Notification for January 2012 U-078: Microsoft Security Bulletin Advance Notification for January 2012 January 10, 2012 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for January 2012. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for January 2012. Microsoft has posted 1 Critical Bulletins and 6 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on January 11, 2012, at 11:00 AM Pacific Time (US & Canada).

295

T-665: Microsoft Security Bulletin Advance Notification for July 2011 |  

Broader source: Energy.gov (indexed) [DOE]

5: Microsoft Security Bulletin Advance Notification for July 5: Microsoft Security Bulletin Advance Notification for July 2011 T-665: Microsoft Security Bulletin Advance Notification for July 2011 July 11, 2011 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2011 PLATFORM: Windows Operating System and Components ABSTRACT: Microsoft released 4 bulletins to address vulnerability involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: TechNet Webcast Microsoft Security Bulletin Summaries and Webcasts Microsoft Security Bulletin Advance Notification for July 2011

296

U-057: Microsoft Security Bulletin Advance Notification for December 2011 |  

Broader source: Energy.gov (indexed) [DOE]

57: Microsoft Security Bulletin Advance Notification for 57: Microsoft Security Bulletin Advance Notification for December 2011 U-057: Microsoft Security Bulletin Advance Notification for December 2011 December 9, 2011 - 12:00pm Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for December 2011. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for December 2011. Microsoft has posted 3 Critical Bulletins and 11 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on December 14, 2011, at 11:00 AM Pacific Time (US & Canada).

297

T-584: Microsoft March 2011 Security Bulletin Release | Department of  

Broader source: Energy.gov (indexed) [DOE]

84: Microsoft March 2011 Security Bulletin Release 84: Microsoft March 2011 Security Bulletin Release T-584: Microsoft March 2011 Security Bulletin Release March 21, 2011 - 4:25pm Addthis PROBLEM: Microsoft March 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms.(Affected Software and Download Locations) ABSTRACT: Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: Microsoft Security Bulletin Summary for March 2011 Microsoft Technical Security Notifications

298

T-553: Microsoft February 2011 Security Bulletin Release | Department of  

Broader source: Energy.gov (indexed) [DOE]

53: Microsoft February 2011 Security Bulletin Release 53: Microsoft February 2011 Security Bulletin Release T-553: Microsoft February 2011 Security Bulletin Release February 9, 2011 - 7:28am Addthis PROBLEM: Microsoft February 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms. (Affected Software and Download Locations) ABSTRACT: Microsoft released 21 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 3 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference links: Microsoft Security Bulletin Summary for February 2011 Microsoft Technical Security Notifications

299

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

300

Using audio in secure device pairing  

Science Journals Connector (OSTI)

Secure pairing of electronic devices is an important issue that must be addressed in many contexts. In the absence of prior security context, the need to involve the user in the pairing process is a prominent challenge. In this paper, we investigate the use of the audio channel for human-assisted device pairing. First we assume a common (insecure) wireless channel between devices. We then obviate the assumption of a pre-existing common channel with a single-channel device pairing approach only based on audio. Both approaches are applicable to a wide range of devices and place light burden on the user.

Michael T. Goodrich; Michael Sirivianos; John Solis; Claudio Soriente; Gene Tsudik; Ersin Uzun

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Information Security Guide  

E-Print Network [OSTI]

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

302

Microgrid cyber security reference architecture.  

SciTech Connect (OSTI)

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

303

Internet Dial-In Infodisk E-Mail Diskette Natural Gas Annual,  

Gasoline and Diesel Fuel Update (EIA)

Internet Internet Dial-In Infodisk E-Mail Diskette Natural Gas Annual, 1996 Provides information on supply and disposition of natural gas in the United States. Information is provided nationally, regionally, and by State for 1996. Historical Natural Gas Annual, 1930 through 1996 Contains historical information about supply and disposition of natural gas at the national, regional, and State level, as well as prices at selected points in the flow of gas from wellhead to burnertip. Natural Gas 1996: Issues and Trends Examines how industry restructuring continues to expand choices, and challenges, for industry, participants, and natural gas customers. Natural Gas 1995: Issues and Trends Addresses current issues affecting the natural gas industry and markets, and analyzes trends in the most recent natural gas data. Natural Gas 1994: Issues and Trends Provides an overview of the natural

304

e-mail: psharma@uh.edu L. T. Wheeler  

E-Print Network [OSTI]

P. Sharma e-mail: psharma@uh.edu L. T. Wheeler Department of Mechanical Engineering, University work, both with and without modifications, has been employed to tackle a diverse set of prob- lems: Localized thermal heating, residual strains, dislocation- induced plastic strains, phase transformations

Sharma, Pradeep

305

HEART SMART NUTRITION Mailout or E-mail Lesson Series  

E-Print Network [OSTI]

HEART SMART NUTRITION Mailout or E-mail Lesson Series MEMORANDUM TO : County Extension Agents Fellow, Professor and Extension Nutrition Specialist SUBJECT: Lesson Series Heart Smart Nutrition Heart. A county-wide Heart Smart seminar would also be another opportunity to sign up participants for the series

306

PSH-12-0120 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

PSH-12-0120 - In the Matter of Personnel Security Hearing PSH-12-0120 - In the Matter of Personnel Security Hearing PSH-12-0120 - In the Matter of Personnel Security Hearing On February 4, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about falsification and drug use. The individual's behavior raised security concerns under Criteria F, K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve these security concerns. Specifically, with respect to the individual's omissions on security forms, she found that the requisite element of "deliberateness" was

307

PSH-13-0040 - In the Matter of Personnel Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0 - In the Matter of Personnel Security 0 - In the Matter of Personnel Security PSH-13-0040 - In the Matter of Personnel Security On July 25, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In January 2013, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual' falsifications and drug use. The individual's behavior raised security concerns under Criteria F, K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve the security concerns associated with her falsifications on three security forms as well

308

PSH-12-0122 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

PSH-12-0122 - In the Matter of Personnel Security Hearing PSH-12-0122 - In the Matter of Personnel Security Hearing PSH-12-0122 - In the Matter of Personnel Security Hearing On February 15, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about falsification and drug use. The individual's behavior raised security concerns under Criteria F, K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve the security concerns associated with his marijuana use while in high school. However, she found that the individual had not sufficiently mitigated the security

309

Security in grid computing: A review and synthesis  

Science Journals Connector (OSTI)

This paper provides an extensive survey of the different methods of addressing security issues in the grid computing environment, and specifically contributes to the research environment by developing a comprehensive framework for classification of these research endeavors. The framework presented classifies security literature into System Solutions, Behavioral Solutions, Hybrid Solutions and Related Technologies. Each one of these categories is explained in detail in the paper to provide insight as to their unique methods of accomplishing grid security, the types of grid and security situations they apply best to, and the pros and cons for each type of solution. Further, several areas of research were identified in the course of the literature survey where more study is warranted. These avenues for future research are also discussed in this paper. Several types of grid systems exist currently, and the security needs and solutions to address those needs for each type vary as much as the types of systems themselves. This research framework will aid in future research efforts to define, analyze, and address grid security problems for the many varied types of grid setups, as well as the many security situations that each grid may face.

Erin Cody; Raj Sharman; Raghav H. Rao; Shambhu Upadhyaya

2008-01-01T23:59:59.000Z

310

Next Generation National Security Leaders  

SciTech Connect (OSTI)

It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had right-sized the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community or it may lie in more effectively using our existing resources and training programs.

Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

2012-07-19T23:59:59.000Z

311

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

312

Lemnos Interoperable Security Program  

Broader source: Energy.gov (indexed) [DOE]

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

313

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

314

Los Alamos National Laboratory Advancing National Security Through Scientific  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Scientific Scientific Inquiry LANL is a key player in energy security | pg. 14 In this Issue Take a look at LANL's visualization environment | pg. 20 October 2010 LANL is operated by Los Alamos National Security, LLC for the U.S. Department of Energy's National Nuclear Security Administration Editors: Barbara Mack and Jeff Berger Art Direction: Cisneros Design Produced by the Communications Office of Los Alamos National Laboratory E-mail: why@lanl.gov Printed on recycled paper LALP-10-054 About this magazine Why magazine is a new publication primarily for employees and retirees of Los Alamos National Laboratory. The Lab will publish Why four times a year and develop for it an online presence. This periodical is named for the crucial nature of scientific inquiry at Los Alamos

315

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

316

Smart Grid RFI: Addressing Policy and Logistical Challenges  

Broader source: Energy.gov (indexed) [DOE]

Electricity Delivery and Energy Reliability Electricity Delivery and Energy Reliability 1000 Independence Avenue, SW Room 8H033 Washington, DC 20585 Submitted electronically via smartgridpolicy@hq.doe.gov Smart Grid Request for Information: Addressing Policy and Logistical Challenges Comments of the Alliance to Save Energy The Alliance to Save Energy (the Alliance) thanks the Department of Energy for the opportunity to comment on broad issues of policy and logistical challenges faced in smart grid implementation. The Alliance to Save Energy is a coalition of prominent business, government, environmental, and consumer leaders who promote the efficient use of energy worldwide to benefit consumers, the environment, economy, and national security. The Alliance is a nonprofit 501 (c) (3) organization.

317

GIVS: integrity validation for grid security  

Science Journals Connector (OSTI)

In recent years, grid computing has been recognised as the next step in the evolution of distributed systems. However, only limited efforts have been made to address the security issues involved in these architectures. Questions like 'What happens if a user of the grid is interested in making the overall computation fail?' are still unanswered. In this paper, we address the problem of granting the correctness of grid computations. We introduce a Grid Integrity Validation Scheme (GIVS) that may reveal the presence of malicious hosts through statistical sampling of computational results. Performance overheads of GIVS strategies are evaluated using statistical models and simulation.

Stefano Zanero; Giuliano Casale

2008-01-01T23:59:59.000Z

318

First Analysis Securities Corporation | Open Energy Information  

Open Energy Info (EERE)

First Analysis Securities Corporation First Analysis Securities Corporation Jump to: navigation, search Logo: First Analysis Securities Corporation Name First Analysis Securities Corporation Address One South Wacker Drive, Suite 3900 Place Chicago, Illinois Zip 60606 Product Private equity, venture capital, investment banking and equity research. Year founded 1981 Phone number (312) 258-1400 Website http://www.firstanalysis.com/ Coordinates 41.8819019°, -87.6367295° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.8819019,"lon":-87.6367295,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

319

The international security yearbook 1983-1984  

SciTech Connect (OSTI)

A bipartisan study by eight former high-ranking officials including James R. Schlesinger, Edmund Muskie, Maxwell Taylor, and R. James Woolsey, providing an assessment of how global events have affected US defense and foreign policy interests. Topics addressed include the US-Soviet strategic and conventional weapons balance; regional threats to Western security in Latin America, the Persian Gulf, Southern Africa, and the Middle East; and significant scientific developments affecting nuclear proliferation and conventional armaments.

Blechman, B.M.; Luttwak, E.N.

1984-01-01T23:59:59.000Z

320

KEYNOTE ADDRESS ECONOMIES IN TRANSITION: SOME ASPECTS  

E-Print Network [OSTI]

couple of days, with my focus on transition economies and environmental management in this neighborhoodKEYNOTE ADDRESS ECONOMIES IN TRANSITION: SOME ASPECTS OF ENVIRONMENTAL POLICY Jeffrey Sachs. Tel: (617) 495-5999. Fax: (617) 495-0527. #12;2 Keynote Address Economies in Transition: Some Aspects

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

322

National Nuclear Security Administration | Department of Energy  

Office of Environmental Management (EM)

National Nuclear Security Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction...

323

Waste Isolation Pilot Plant Transportation Security | Department...  

Office of Environmental Management (EM)

Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security More Documents &...

324

SECURITY TERMINATION STATEMENT | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

325

The Future of Electric Vehicles and Arizona State University's MAIL  

Broader source: Energy.gov (indexed) [DOE]

The Future of Electric Vehicles and Arizona State University's The Future of Electric Vehicles and Arizona State University's MAIL Battery The Future of Electric Vehicles and Arizona State University's MAIL Battery August 11, 2010 - 4:26pm Addthis Cody Friesen and his team at Arizona State University | Photo Credit Arizona State University Cody Friesen and his team at Arizona State University | Photo Credit Arizona State University Andy Oare Andy Oare Former New Media Strategist, Office of Public Affairs What does this mean for me? EV batteries will have the ability to recharge at least 1000 times at a low cost due to its composition of only domestically-sourced, earth abundant material Electric Vehicles are becoming a reality. Last month, the President got behind the wheel of a Chevy Volt in Michigan, and traveled to Smith

326

Minutes from the March 14, 2013 Printing and Mail Teleconference  

Broader source: Energy.gov (indexed) [DOE]

March 14, 2013 March 14, 2013 Mail discussion Al Majors is on leave today. Ellsworth Howell Jr. and Tony Nellums are sitting for Al. There are no agenda items for the Mail portion. A discussion period for questions, comments, or suggestions was opened without response Printing discussion Discussed suggestions for reducing printing expenses Presidential Executive Order 13589 and reducing hard copy printing in favor of electronic publishing Sec. 5. Printing. Agencies are encouraged to limit the publication and printing of hard copy documents and to presume that information should be provided in an electronic form, whenever practicable, permitted by law, and consistent with applicable records retention requirements. Agencies should consider using acquisition vehicles developed by the

327

Application-aware secure multicast for power grid communications  

Science Journals Connector (OSTI)

We propose an application-aware approach to setting up secure multicast groups for power grid communications that automatically derives group memberships and verifies configuration conformance from data dependencies in system specifications. We design an abstract multicast model, analysis algorithms, and configuration derivation techniques. These are implemented in a prototype system, SecureSCL. We also provide experimental evidence that IPsec multicast can address latency constraints in power substation networks.

Jianqing Zhang; Carl A. Gunter

2011-01-01T23:59:59.000Z

328

Office of Security Operations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

329

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

330

Security and Privacy Notice  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

331

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

332

Security Topic Group  

Broader source: Energy.gov (indexed) [DOE]

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

333

T-618: Debian update for exim4: Mail Transport Agent | Department...  

Office of Environmental Management (EM)

18: Debian update for exim4: Mail Transport Agent T-618: Debian update for exim4: Mail Transport Agent May 9, 2011 - 7:00am Addthis PROBLEM: Debian has issued an update for exim4....

334

SOLAR COOKER UTILIZING SATELLITE DISH TECHNOLOGY Mechanical Engineering Department , Philadelphia University, Amman Jordan, e-mail  

E-Print Network [OSTI]

Department , Philadelphia University, Amman ­ Jordan, e-mail: asaleh@philadelphia.edu.jo 2 Mechanical Engineering Department, University of Jordan, Amman ­ Jordan, e-mail: badran@ju.edu.jo ABSTRACT A parabolic

335

ChainMail: A configurable multimodal lining to enable sensate surfaces and interactive objects  

E-Print Network [OSTI]

The ChainMail system is a scalable electronic sensate skin that is designed as a dense sensor network. ChainMail is built from small (1"x1") rigid circuit boards attached to their neighbors with flexible interconnects that ...

Mistree, Behram F. T.

336

Operational Security (OPSEC) Reminder | Department of Energy  

Office of Environmental Management (EM)

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

337

US, UK, Kazakhstan Secure Radiological Transportation Vehicles...  

National Nuclear Security Administration (NNSA)

place them in secure storage, and improve radiological transportation security and site security. The United Kingdom-funded projects provide an immediate security and safety...

338

College of Safety & Security | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Safety & Security College of Safety & Security College of Safety & Security Mission Through the National Training Center (NTC), the Office of Health, Safety and Security (HSS)...

339

Office of Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Office of Security Mission The Office of Security maintains the Department of Energy's security integrity through the development and promulgation of safeguards and...

340

Safeguards and Security Program - DOE Directives, Delegations...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

70.1A, Safeguards and Security Program by jcowden Functional areas: Safeguards, Security, and Emergency Management, Safety and Security The Safeguards and Security Program ensures...

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Office of Security Enforcement | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Enforcement Office of Security Enforcement MISSION The Office of Security Enforcement implements the Department's classified information security enforcement program in...

342

MARK WHITTLE CURRICULUM VITAE ADDRESS : Department of Astronomy,  

E-Print Network [OSTI]

, Charlottesville, VA 22903, U.S.A. Tel. (434) 924 4900. e-mail : dmw8f@virginia.edu BORN : March 30, 1956

Whittle, Mark

343

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

344

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

345

Industrial and Grid Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial and Grid Security Establishing resilient infrastructures that operate when sensors and physical assets are perturbed is an important national objective. Two related LDRD...

346

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of...

347

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

348

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

349

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

350

National Nuclear Security Administration Nevada Site Office  

Broader source: Energy.gov (indexed) [DOE]

93-851 8 93-851 8 JAM 1 4 2010 Scott Blake Harris, General Counsel, DOEiHQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL PLANNING SUMMARY Pursuant to DOE Order 451. IB, NEPA Compliance Program, NNSA/NSO is pleased to provide the enclosed Annual NEPA Planning Summary. The document provides a brief description of ongoing and planned NEPA actions for calendar year 201 0. If there are any questions regarding this summary, please contact our NEPA Compliance Officer, Linda M. Cohn, at (702) 295-0077. s r4/(&~1/:~d Stephen A. Mellington Enclosure: As stated cc wtencl. via e-mail: C. M. Borgstrom, DOEiHQ (GC-54) FORS B. A. Costner, DOEiHQ (GC-54) FORS M. E. Martin, NNSAIHQ (NA-56) FORS

351

U-164: Microsoft Security Bulletin Advance Notification for May 2012 |  

Broader source: Energy.gov (indexed) [DOE]

64: Microsoft Security Bulletin Advance Notification for May 64: Microsoft Security Bulletin Advance Notification for May 2012 U-164: Microsoft Security Bulletin Advance Notification for May 2012 May 8, 2012 - 7:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for May 2012. PLATFORM: Windows XP Service Pack 3, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1, Microsoft SharePoint Server, Microsoft Silverlight ABSTRACT: Microsoft Security Bulletin Advance Notification for May 2012. Microsoft has posted 3 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address

352

Administrator Thomas D'Agostino, National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Thomas D'Agostino, National Nuclear Security Thomas D'Agostino, National Nuclear Security Administration, Addresses United Nations on Nuclear Disarmament | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Speeches > Administrator Thomas D'Agostino, National Nuclear Security Administration, ... Speech Administrator Thomas D'Agostino, National Nuclear Security

353

Independent Oversight Inspection, Y-12 National Security Complex - April  

Broader source: Energy.gov (indexed) [DOE]

Inspection, Y-12 National Security Complex - Inspection, Y-12 National Security Complex - April 2003 Independent Oversight Inspection, Y-12 National Security Complex - April 2003 Inspection of Environment, Safety, and Health Management at the Y-12 National Security Complex The Secretary of Energy's Office of Independent Oversight and Performance Assurance (OA) conducted an inspection of environment, safety, and health (ES&H) at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in March-April 2003. The inspection was performed by OA's Office of Environment, Safety and Health Evaluations. Overall, YSO and BWXT have established a generally effective ISM program. YSO and BWXT management have demonstrated their commitment to continuous improvement and have effective tools and process enhancements to address

354

Administrator Thomas D'Agostino, National Nuclear Security  

National Nuclear Security Administration (NNSA)

Thomas D'Agostino, National Nuclear Security Thomas D'Agostino, National Nuclear Security Administration, Addresses United Nations on Nuclear Disarmament | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Speeches > Administrator Thomas D'Agostino, National Nuclear Security Administration, ... Speech Administrator Thomas D'Agostino, National Nuclear Security

355

Secure password-based authenticated key exchange for web services  

SciTech Connect (OSTI)

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

2004-11-22T23:59:59.000Z

356

PSH-12-0101 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

01 - In the Matter of Personnel Security Hearing 01 - In the Matter of Personnel Security Hearing PSH-12-0101 - In the Matter of Personnel Security Hearing On November 21, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that it was too early to determine whether the individual had demonstrated a sustained pattern of financial responsibility for a

357

PSH-12-0104 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

104 - In the Matter of Personnel Security Hearing 104 - In the Matter of Personnel Security Hearing PSH-12-0104 - In the Matter of Personnel Security Hearing On December 13, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's alcohol use. A DOE psychiatrist examined the individual and concluded that the individual suffers from Alcohol Dependence. His behavior raised security concerns under Criteria H and J. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that the individual had

358

PSH-13-0060 - In the Matter of Personnel Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

60 - In the Matter of Personnel Security 60 - In the Matter of Personnel Security PSH-13-0060 - In the Matter of Personnel Security On August 22, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In January and March 2013, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's pattern of criminal conduct. The individual's behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented adequate evidence to mitigate the security concerns associated with his two charges of Driving Under the Influence and his involvement in

359

PSH-12-0133 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

33 - In the Matter of Personnel Security Hearing 33 - In the Matter of Personnel Security Hearing PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated with his misuse of information technology. However, she found that the individual had not sufficiently mitigated the

360

PSH-12-0073 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

73 - In the Matter of Personnel Security Hearing 73 - In the Matter of Personnel Security Hearing PSH-12-0073 - In the Matter of Personnel Security Hearing On November 8, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. A Local Security Office (LSO) conducted a Personnel Security Interview of the individual to address concerns about the individual's alcohol use. A DOE consultant psychologist found that the individual suffers from Alcohol Dependence, in early full remission. His behavior raised security concerns under Criteria H, J and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual demonstrated adequate evidence of rehabilitation and thus mitigated the security concerns under Criteria H and J. She

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

PSH-13-0044 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-13-0044 - In the Matter of Personnel Security Hearing On July 26 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. In November and December 2012, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's pattern of criminal conduct. The individual's behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate the security concerns associated with his three charges of Driving

362

PSH-13-0060 - In the Matter of Personnel Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

60 - In the Matter of Personnel Security 60 - In the Matter of Personnel Security PSH-13-0060 - In the Matter of Personnel Security On August 22, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In January and March 2013, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's pattern of criminal conduct. The individual's behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented adequate evidence to mitigate the security concerns associated with his two charges of Driving Under the Influence and his involvement in

363

PSH-11-0024 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

24 - In the Matter of Personnel Security Hearing 24 - In the Matter of Personnel Security Hearing PSH-11-0024 - In the Matter of Personnel Security Hearing The individual is an applicant for a DOE security clearance. In March 2011, as part of a background investigation, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address his alcohol use. In addition to the PSI, the LSO requested the individual's medical records and recommended a psychiatric evaluation of the individual by a DOE consultant psychiatrist (DOE psychiatrist). The DOE psychiatrist examined the individual in August 2011 and memorialized his findings in a report (Psychiatric Report). PSH-11-0024.pdf More Documents & Publications TSO-1102 - In the Matter of Personnel Security Hearing TSO-1013 - In the Matter of Personnel Security

364

PSH-12-0074 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that the individual's recent efforts to resolve his debt have not yet withstood the test of time. Given the

365

2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

366

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

367

Integrity, Reliability and Security: The Role of Technology  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

F. Lawson F. Lawson Director, Strategic Center for Natural Gas & Oil National Energy Technology Laboratory General session Natural Gas Technologies Conference 2005 Cosponsors: NETL/Gas Technology Institute Orlando, Florida January 31, 2005 Integrity, Reliability and Security: The Role of Technology Introduction Integrity, reliability, and security encompass all the attributes we want-indeed, need-from our natural gas industry. We need integrity in physical transportation and storage systems, reliability in operating systems, and security in supplies and delivery systems. This conference is the most comprehensive forum for addressing new and evolving technologies impacting all these needs. The conference scope runs the gamut: from finding and producing to storing,

368

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

369

FAU-CA Zertifikate an der FAU Einbindung in MacMail  

E-Print Network [OSTI]

FAU-CA ­ Zertifikate an der FAU Einbindung in MacMail #12;Zertifikat einbinden unter Mac Mail02.03.2011 ca@rrze.uni-erlangen.de 2 Voraussetzungen Digitaler Zertifikatsantrag im PEM-Format Online Zertifikatsdatei 02.03.2011 ca@rrze.uni-erlangen.de #12;Zertifikat einbinden unter Mac Mail Zertifikat

Fiebig, Peter

370

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

371

Opening Address CNR Programme for Photovoltaics  

Science Journals Connector (OSTI)

Ladies and Gentlemen, In my short address, I would like to say a few words only about the Energy Project (PPE) of the National Research Council of Italy in general, and about its activity in the field of Prope...

Prof. G. Elias

1982-01-01T23:59:59.000Z

372

The Society for Radiological Protection (SRP) e-mail discussion list  

Science Journals Connector (OSTI)

The SRP e-mail discussion list Radiation protection in the UK (http://groups.yahoo.com/group/srp-uk) completed its first year of operation in October 2001 with a membership of 520 and 487 postings. The list provides a new forum for communication between radiation protection professionals. Posted messages are distributed directly to the list, giving speed of response and spontaneity. They are archived as web pages. Postings have covered a wide variety of topics, including announcements of meetings, events, new publications and new equipment, news, discussion, requests for information and advice, replies, and offers of surplus equipment. The Health and Safety Executive took account of discussion on the list in the review of its Statement on Radiation Protection Advisers. As to the breakdown of membership by domain of e-mail address, some 84% of the list members are based in the UK, assuming that the non-national domains (com, net and org) contain the same proportion of UK members as the other domains. Of the UK domains, the academic (ac.uk) contains the largest number of members, followed by the National Health Service (nhs.uk) and `companies' (co.uk). An offer by Fred Dawson to arrange the transfer of members of his list Radpro to the SRP list was accepted by SRP Council. Both lists served essentially the same purpose. It is evident that the provision of the list supports the primary function for which SRP is constituted - to promote and advance radiation protection. The list is administered by the authors.

John Scott and Fred Dawson

2001-01-01T23:59:59.000Z

373

Security Assistance | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

374

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

375

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

376

Secure video communications system  

DOE Patents [OSTI]

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

377

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

378

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

379

PRIVACY/SECURITY NOTICE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

380

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Computer security: certification  

E-Print Network [OSTI]

-powerbook- g4-15.local. AAAA? ben-powerbook-g4-15.local. (367) #12;Example Data inside packet GET /tracking events · GZipped text ­ Inbox entries ­ Mail messages ["112677a23fed4887",0,0,"12:58 pm","\\u003cspan id

382

Office of Security Operations: Headquarters Security Officers (HSO) Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

383

Detecting and Mitigating Security Risks  

E-Print Network [OSTI]

______________________________________________________________________________________________________ 2 Introduction IT security threats are multiplying quickly. One reason is that sophisticated hacking. Second, while hacking once largely constituted an intellectual exercise for security enthusiasts, hacking

Fisher, Kathleen

384

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

385

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

386

January 2007 SECURITY CONTROLS FOR  

E-Print Network [OSTI]

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

387

Headquarters Facilities Master Security Plan  

Office of Environmental Management (EM)

Chapter 10-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: Title 32, CFR, Part 2001,...

388

Security and Privacy Notices | NREL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notices Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory...

389

Security Suites | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

390

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SNL SECURITY CONTACTS SNLNM Contacts SNLCA Contacts Function Contact Email Telephone Badge Office 505-284-3626 - Escorting security@sandia.gov 505-845-1321 Classification...

391

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

392

Achieving food and environmental security: new approaches to close the gap  

Science Journals Connector (OSTI)

...discourse about global sustainability [10]. Nine interlinked...for humanity. Three of these (biodiversity...addresses all the pillars of food security...1990s, one in three of the population...to agricultural sustainability, by protecting...

2014-01-01T23:59:59.000Z

393

*Name: Date of Birth: Banner/Student ID # Social Security # Phone: Cell  

E-Print Network [OSTI]

Transmitted Infection Anemia Eye Disease (excluding glasses) Joint Disease/Injury Sickle Cell Trait*Name: Date of Birth: Banner/Student ID # Social Security # Phone: Cell Permanent Address: Home Age, contact: Name Relationship: Phone: Day____________________ Eve____________________ Cell

Gering, Jon C.

394

Laboratory Equipment Donation Program - OPMO Address List  

Office of Scientific and Technical Information (OSTI)

OPMO Listing OPMO Listing OPMO contact information is listed below. Please refer to your "LEDP Grantee Application Result" e-mail for the name of the OPMO who approved your application. Clayton Acheson Office of River Protection (ORP) P. O. Box 450, MSIN H6-60 Richland, WA 99352 509-373-6140 clayton_s_acheson@orp.doe.gov Orlyn B. Akers Idaho Operations Office (ID) U.S. Department of Energy 1955 Freemont Avenue Idaho Falls, ID 83415-0001 (208) 526-5934 akersob@id.doe.gov Bonnie Anderson Chicago Operations Office (CH) U.S. Department of Energy 9800 South Cass Avenue Argonne, IL 60439 630-252-2134 Bonnie.Anderson@ch.doe.gov mary.cervantes@ch.doe.gov Tim Armstrong Savannah River Operations Office (SR) U.S. Department of Energy P. O. Box A Aiken, SC 29802 (803) 952-8489 timothy.armstrong@srs.gov

395

Modeling and simulation for cyber-physical system security research, development and applications.  

SciTech Connect (OSTI)

This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

2010-02-01T23:59:59.000Z

396

Comprehensive test ban treaty international monitoring system security threats and proposed security attributes  

SciTech Connect (OSTI)

To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

Draelos, T.J.; Craft, R.L.

1996-03-01T23:59:59.000Z

397

Applications for cyber security - System and application monitoring  

SciTech Connect (OSTI)

Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

Marron, J. E. [Invensys Process Systems, 33 Commercial Street, Foxboro, MA 02035 (United States)

2006-07-01T23:59:59.000Z

398

DNS Name Service based on Secure Multicast DNS for IPv6 Mobile Ad Hoc Networks  

E-Print Network [OSTI]

DNS Name Service based on Secure Multicast DNS for IPv6 Mobile Ad Hoc Networks Jaehoon Jeong which can provide mobile nodes in IPv6 mobile ad hoc network with secure name-to-address resolution and service discovery. Because mobile ad hoc network has dynamic topology, the current DNS is inappropriate

Jeong, Jaehoon "Paul"

399

Towards a Secure and Efficient Model for Grid Computing using Mobile Code  

E-Print Network [OSTI]

for a Grid infrastructure which addresses issues such as customizable distribution of computation, securityTowards a Secure and Efficient Model for Grid Computing using Mobile Code Walter Binder 1 mentioned as an attractive technol­ ogy for distributing computations inside a Grid consisting

Di Marzo Serugendo, Giovanna

400

1398 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 20, NO. 3, AUGUST 2005 Model Uncertainty in Security  

E-Print Network [OSTI]

1398 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 20, NO. 3, AUGUST 2005 Model Uncertainty in Security in a power market. The paper addresses two types of uncertainties: 1) struc- tural (e.g., branch outages minimal corrections in existing contractual transactions that ensure security. Given our interest in real

Stankoviæ, Aleksandar

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Review of the Potential of Nuclear Hydrogen for Addressing Energy Security and Climate Change  

Science Journals Connector (OSTI)

Technical Paper / Safety and Technology of Nuclear Hydrogen Production, Control, and Management / Nuclear Hydrogen Production

James E. O'Brien

402

Privacy/Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

403

Property:Address | Open Energy Information  

Open Energy Info (EERE)

Address Address Jump to: navigation, search This is a property of type String. Pages using the property "Address" Showing 25 pages using this property. (previous 25) (next 25) 1 1366 Technologies + 45 Hartwell Avenue + 1st Light Energy, Inc. + 3224 McHennry Ave Suite F + 2 21-Century Silicon, Inc. + 1681 Firman Drive, Suite 103 + 3 3Degrees + 2 Embarcadero Center Suite 2950 + 3M + 3M Center + 3TIER + 2001 Sixth Avenue + 4 4th Day Energy + 38886 River Belle + 5 5 boro biofuel + 100 maiden lane + 8 8minutenergy Renewables, LLC + 111 Woodmere Road, Suite 190 + @ @Ventures (California) + 800 Menlo Avenue, Suite 120 + @Ventures (Massachusetts) + 187 Ballardvale Street, Suite A260 + A A.J. Rose Manufacturing Company + 38000 Chester Road + A1 Sun, Inc. + 1435 4th St. +

404

National Security Information Systems (NSIS) -National Security Systems &  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

405

2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

406

2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

407

Shared address collectives using counter mechanisms  

DOE Patents [OSTI]

A shared address space on a compute node stores data received from a network and data to transmit to the network. The shared address space includes an application buffer that can be directly operated upon by a plurality of processes, for instance, running on different cores on the compute node. A shared counter is used for one or more of signaling arrival of the data across the plurality of processes running on the compute node, signaling completion of an operation performed by one or more of the plurality of processes, obtaining reservation slots by one or more of the plurality of processes, or combinations thereof.

Blocksome, Michael; Dozsa, Gabor; Gooding, Thomas M; Heidelberger, Philip; Kumar, Sameer; Mamidala, Amith R; Miller, Douglas

2014-02-18T23:59:59.000Z

408

Information Security: Coordination of Federal Cyber Security Research and  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

409

Office of Headquarters Security Operations | Department of Energy  

Office of Environmental Management (EM)

Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting...

410

Mapping virtual addresses to different physical addresses for value disambiguation for thread memory access requests  

DOE Patents [OSTI]

A multiprocessor system includes nodes. Each node includes a data path that includes a core, a TLB, and a first level cache implementing disambiguation. The system also includes at least one second level cache and a main memory. For thread memory access requests, the core uses an address associated with an instruction format of the core. The first level cache uses an address format related to the size of the main memory plus an offset corresponding to hardware thread meta data. The second level cache uses a physical main memory address plus software thread meta data to store the memory access request. The second level cache accesses the main memory using the physical address with neither the offset nor the thread meta data after resolving speculation. In short, this system includes mapping of a virtual address to a different physical addresses for value disambiguation for different threads.

Gala, Alan; Ohmacht, Martin

2014-09-02T23:59:59.000Z

411

Headquarters Security Quick Reference Book  

Broader source: Energy.gov [DOE]

This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

412

November 2003 NETWORK SECURITY TESTING  

E-Print Network [OSTI]

November 2003 NETWORK SECURITY TESTING Shirley M. Radack, Editor, Computer Security Division be tempted to neglect or insufficiently develop a comprehensive and systematic opera tional security testing program. This guide stresses the need for an effective security testing program within federal agencies

413

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

414

U-234: Oracle MySQL User Login Security Bypass Vulnerability | Department  

Broader source: Energy.gov (indexed) [DOE]

234: Oracle MySQL User Login Security Bypass Vulnerability 234: Oracle MySQL User Login Security Bypass Vulnerability U-234: Oracle MySQL User Login Security Bypass Vulnerability August 14, 2012 - 7:00am Addthis PROBLEM: Oracle MySQL User Login Security Bypass Vulnerability PLATFORM: Version(s): prior to 5.1.63 and 5.5.25 are vulnerable. ABSTRACT: Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions. REFERENCE LINKS: http://www.securityfocus.com/bid/53911/discuss CVE-2012-2122 IMPACT ASSESSMENT: Medium Discussion: Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.The vulnerability is identified as CVE-2012-2122 and was addressed in MySQL 5.1.63 and 5.5.25 in

415

U-145: Microsoft Security Bulletin Summary for April 2012 | Department of  

Broader source: Energy.gov (indexed) [DOE]

5: Microsoft Security Bulletin Summary for April 2012 5: Microsoft Security Bulletin Summary for April 2012 U-145: Microsoft Security Bulletin Summary for April 2012 April 11, 2012 - 9:30am Addthis PROBLEM: Microsoft Security Bulletin Summary for April 2012 PLATFORM: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, ABSTRACT: Microsoft Security Bulletin Summary for April 2012. Microsoft has posted 4 Critical Bulletins and 2 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on April 11, 2012, at 11:00 AM Pacific Time (US & Canada). reference LINKS: Microsoft Security Bulletin Security Bulletin Summary Archive

416

Instructions for Using Secure Email via Outlook Web Access | Department of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Email via Outlook Web Access Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter https://smail.doe.gov/ in the address field of your Internet browser. The Outlook Web Access window appears. When using an RSA SecurID hardware token: Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number

417

PSH-12-0059 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

59 - In the Matter of Personnel Security Hearing 59 - In the Matter of Personnel Security Hearing PSH-12-0059 - In the Matter of Personnel Security Hearing On September 13, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. The Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's falsifications and financial irresponsibility. The individual's behavior raised concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate these security concerns. Specifically, she found that despite the individual's acknowledgment of his financially

418

Advanced Security Acceleration Project for Smart Grid (ASAP-SG) | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Advanced Security Acceleration Project for Smart Grid (ASAP-SG) Advanced Security Acceleration Project for Smart Grid (ASAP-SG) June 12, 2013 Problem Statement: The goal of this project is to develop a set of computer and network security requirements for the smart grid deployment. The key problem addressed in this project is to provide actionable security guidance to utilities for secure deployment of smart grid systems. Technical Approach: This is a utility-driven, public-private collaborative project to develop system-level security requirements for smart grid technology. The set of requirements developed in the project can be used by utilities at various stages of deployment including procurement, configuration, deployment, commissioning, and operation of smart grid systems. The ASAP SG project develops security profiles for Smart Grid applications on the basis

419

PSH-13-0094 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-13-0094 - In the Matter of Personnel Security Hearing On November 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. In April 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use. During that PSI, the individual was referred to a DOE consultant psychologist (DOE psychologist) for an agency-sponsored evaluation who concluded that the individual suffers from Alcohol Dependence. The individual's behavior raised security concerns under Criteria H and J. After conducting a hearing and evaluating the documentary and testimonial evidence, the

420

PSH-13-0069 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

9 - In the Matter of Personnel Security Hearing 9 - In the Matter of Personnel Security Hearing PSH-13-0069 - In the Matter of Personnel Security Hearing On October 11, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In April 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his positive drug test. The individual's behavior raised security concerns under the Bond Amendment and Criteria K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer concluded the individual's use of his wife's prescription medication happened under unusual circumstances that are unlikely to recur in the future, and to the

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

PSH-13-0071 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

1 - In the Matter of Personnel Security Hearing 1 - In the Matter of Personnel Security Hearing PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. During that PSI, the individual was referred to a DOE consultant psychologist (DOE psychologist) for an agency-sponsored evaluation who concluded that the individual suffers from Alcohol Abuse. The individual's behavior raised security concerns Criteria H, J and L. After conducting a hearing and evaluating the documentary and testimonial

422

PSH-13-0097 - In the matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

7 - In the matter of Personnel Security Hearing 7 - In the matter of Personnel Security Hearing PSH-13-0097 - In the matter of Personnel Security Hearing The individual is an employee of a DOE contractor and holds a suspended access authorization. A Local Security Office (LSO) summoned the individual for a Personnel Security Interview (PSI), with a personnel security specialist on June 4, 2013, in order to address issues raised by an information report that he had failed to meet his income tax obligations and had his wages garnished by the Internal Revenue Service (IRS) as a result. Exhibits 5, 8. After the PSI, the LSO determined that derogatory information existed that cast into doubt the individual's eligibility for access authorization. The LSO informed the individual of this determination in a letter that set forth the DOE's security concerns

423

National Security, Weapons Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

424

Requirements for security signalling  

SciTech Connect (OSTI)

There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

Pierson, L.G.; Tarman, T.D.

1995-02-05T23:59:59.000Z

425

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, cancels DOE O 470.4B.

2011-07-21T23:59:59.000Z

426

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

427

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

428

Energy Security Through Hydrogen  

Science Journals Connector (OSTI)

Energy and environmental security are major problems facing our global economy. Fossil fuels, particularly crude oil, are ... energy sources. In the long term, a hydrogen-based economy will have an impact on all ...

Professor John W. Sheffield

2007-01-01T23:59:59.000Z

429

GRID Security Review  

Science Journals Connector (OSTI)

A Computational GRID is a collection of heterogeneous computing resources ... computational power of current micro-processors, Computational GRIDs or meta-systems have gradually become more ... a secure environme...

Lazaros Gymnopoulos; Stelios Dritsas; Stefanos Gritzalis

2003-01-01T23:59:59.000Z

430

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

431

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

432

defense nuclear security  

National Nuclear Security Administration (NNSA)

3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

Page...

433

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

434

Water Security Understand, evaluate, and reduce the environmental  

E-Print Network [OSTI]

Water Security Understand, evaluate, and reduce the environmental consequences of demand for water to address this focus through the study of sustainable fisheries management and environmentally compatible, and management. UMCES scientists are engaged in collaborative research enhance environmental science and its

Boynton, Walter R.

435

Curriculum Vita of Moulinath Banerjee Work Address  

E-Print Network [OSTI]

Statistical Institute, Calcutta, India. B.Stat.(Honors) 1995, in First Division with Distinction. Employment. Currently employed as Associate Professor of Statistics, Columbia University, New York City. Jayanta KumarCurriculum Vita of Moulinath Banerjee Work Address University of Michigan Department of Statistics

Banerjee, Moulinath

436

Ranking users for intelligent message addressing  

Science Journals Connector (OSTI)

Finding persons who are knowledgeable on a given topic (i.e. Expert Search) has become an active area of recent research [1, 2, 3]. In this paper we investigate the related task of Intelligent Message Addressing, i.e., finding persons who are potential ...

Vitor R. Carvalho; William W. Cohen

2008-03-01T23:59:59.000Z

437

Addressable Advertising on Digital Television Vincent Dureau  

E-Print Network [OSTI]

Addressable Advertising on Digital Television Vincent Dureau Chief Technology Officer, OpenTV 275 of digital technology is having a profound effect on television advertising. While television advertising costs are increasing, its efficiency is decreasing. The traditional models for advertising on television

Masthoff, Judith

438

Nevada National Security Site - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

439

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

440

Framework for SCADA Security Policy  

Broader source: Energy.gov (indexed) [DOE]

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Incidents of Security Concern  

Broader source: Energy.gov (indexed) [DOE]

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

442

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

443

Advanced Security Infrastructures for Grid Education Prof R.O. Sinnott, A.J. Stell, Dr J.P. Watt, Prof D.W. Chadwick,  

E-Print Network [OSTI]

Advanced Security Infrastructures for Grid Education Prof R.O. Sinnott, A.J. Stell, Dr J.P. Watt domain. Keywords: Grid, education, Security, PERMIS, Shibboleth. 1. Introduction As Grid technology addressing these challenges. This is one of the first full Grid computing courses available today. Security

Kent, University of

444

Argonne Team Challenges Physical Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

445

Page 1 of 7 | Setup of Apple Mail | Studies Office | University of Aarhus | Oct 2007 How to set up  

E-Print Network [OSTI]

Page 1 of 7 | Setup of Apple Mail | Studies Office | University of Aarhus | Oct 2007 How to set up Apple Mail to check email from the University of Aarhus In the Mail menu, select Indstillinger... #12;Page 2 of 7 | Setup of Apple Mail | Studies Office | University of Aarhus | Oct 2007 Click the + button

446

May 2011 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

1 | National Nuclear Security Administration 1 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Newsletters > May 2011 Newsletter May 2011 Jun 3, 2011 In this issue: NNSA Releases Strategic Plan, Goals for Next Decade D'Agostino Addresses Small Business Conference Second Z Plutonium Experiment Tests Materials for NNSA

447

Ames Laboratory to Lead New Research Effort to Address Shortages in Rare  

Broader source: Energy.gov (indexed) [DOE]

Laboratory to Lead New Research Effort to Address Shortages in Laboratory to Lead New Research Effort to Address Shortages in Rare Earth and Other Critical Materials Ames Laboratory to Lead New Research Effort to Address Shortages in Rare Earth and Other Critical Materials January 9, 2013 - 12:13pm Addthis NEWS MEDIA CONTACT (202) 586-4940 WASHINGTON - The U.S. Department of Energy announced today that a team led by Ames Laboratory in Ames, Iowa, has been selected for an award of up to $120 million over five years to establish an Energy Innovation Hub that will develop solutions to the domestic shortages of rare earth metals and other materials critical for U.S. energy security. The new research center, which will be named the Critical Materials Institute (CMI), will bring together leading researchers from academia, four Department of Energy

448

V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow  

Broader source: Energy.gov (indexed) [DOE]

8: Apache XML Security XPointer Expressions Processing Buffer 8: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability June 28, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Apache XML Security PLATFORM: vulnerability is reported in versions prior to 1.7.2 ABSTRACT: The vulnerability addresses the possibility of a heap overflow condition REFERENCE LINKS: Secunia Advisory SA53959 Apache Advisory CVE-2013-2210 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error within the XML Signature Reference processing code and can be exploited to cause a heap-based buffer overflow via a specially crafted document containing malformed XPointer expressions. IMPACT: Successful exploitation may allow execution of arbitrary code

449

Energy Security Planning for Sustainable Buildings | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Program Areas » Sustainable Buildings & Campuses » Energy Program Areas » Sustainable Buildings & Campuses » Energy Security Planning for Sustainable Buildings Energy Security Planning for Sustainable Buildings October 4, 2013 - 4:56pm Addthis For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to comprehensively and intelligently address all elements of energy security analysis. Given recent blackouts and concerns about vulnerable infrastructure, many public and private organizations are taking steps to ensure reliable power and continuity of operations in the event of future outages. Some government facilities have the capacity to survive short-term power outages, but are now evaluating whether their back-up power capabilities

450

Independent Activity Report, Los Alamos National Security - June 2011 |  

Broader source: Energy.gov (indexed) [DOE]

National Security - June National Security - June 2011 Independent Activity Report, Los Alamos National Security - June 2011 June 2011 Review of the Los Alamos National Security Emergency Operations Division Emergency Management Self-assessment Practices [HIAR-LANL-2011-06-08] This review evaluated the establishment and maintenance of specific elements of the ERO, including their responsibilities for initial and ongoing response to and mitigation of an emergency. Additionally, evaluation criteria addressed effective control at the event scene and integration of local agencies and organizations that provide onsite response services. The review also evaluated whether an adequate number of experienced and trained personnel, including designated alternates, are available on demand for timely and effective performance of assigned ERO

451

Federal Energy Management Program: Energy Security Planning for Sustainable  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Planning for Sustainable Buildings Security Planning for Sustainable Buildings For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to comprehensively and intelligently address all elements of energy security analysis. Given recent blackouts and concerns about vulnerable infrastructure, many public and private organizations are taking steps to ensure reliable power and continuity of operations in the event of future outages. Some government facilities have the capacity to survive short-term power outages, but are now evaluating whether their back-up power capabilities are sufficient to serve their most critical needs during a prolonged outage.

452

Roadmap to Secure Control Systems in the Energy Sector  

Broader source: Energy.gov (indexed) [DOE]

Roadmap Roadmap to Secure Control Systems in the Energy Sector -  - Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improing cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and goernment to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors oer the next ten years. The Roadmap proides a strategic framework for guiding industry and goernment efforts based on a clear ision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. A distinctie feature of this collaboratie effort is the actie inolement and leadership of energy asset

453

Explaining investors' reaction to internet security breach using deterrence theory  

Science Journals Connector (OSTI)

This study uses the deterrence theory to explain investors' behaviour towards the announcement of internet security breaches in the public media. Using the event study methodology, we compute the abnormal returns over a three day window. We then use decision tree induction to investigate how firm type and time affect the likelihood that an attack would lead to abnormal returns. The results reveal that investors are more likely to react negatively to announcements involving internet firms. In addition, investors are more likely to react negatively to more recent attacks. We argue that managers, especially in Net firms, should develop effective mechanisms to address security breach since investors interpret a security breach as management's failure to deter computer abusers from violating organisational security policies and controls. From a theoretical perspective, we demonstrate that event study research can use theory to explain investor's behaviour towards announcement of events in the public media.

Francis Kofi Andoh-Baidoo

2013-01-01T23:59:59.000Z

454

Intra-site Secure Transport Vehicle test and evaluation  

SciTech Connect (OSTI)

In the past many DOE and DoD facilities involved in handling nuclear material realized a need to enhance the safely and security for movement of sensitive materials within their facility, or ``intra-site``. There have been prior efforts to improve on-site transportation; however, there remains a requirement for enhanced on-site transportation at a number of facilities. The requirements for on-site transportation are driven by security, safety, and operational concerns. The Intra-site Secure Transport Vehicle (ISTV) was designed to address these concerns specifically for DOE site applications with a standardized vehicle design. This paper briefly reviews the ISTV design features providing significant enhancement of onsite transportation safety and security, and also describes the test and evaluation activities either complete of underway to validate the vehicle design and operation.

Scott, S.

1995-07-01T23:59:59.000Z

455

Security technologies and protocols for Asynchronous Transfer Mode networks  

SciTech Connect (OSTI)

Asynchronous Transfer Mode (ATM) is a new data communications technology that promises to integrate voice, video, and data traffic into a common network infrastructure. In order to fully utilize ATM`s ability to transfer real-time data at high rates, applications will start to access the ATM layer directly. As a result of this trend, security mechanisms at the ATM layer will be required. A number of research programs are currently in progress which seek to better understand the unique issues associated with ATM security. This paper describes some of these issues, and the approaches taken by various organizations in the design of ATM layer security mechanisms. Efforts within the ATM Forum to address the user communities need for ATM security are also described.

Tarman, T.D.

1996-06-01T23:59:59.000Z

456

Veterans Advancing Clean Energy and Climate Security Champions of Change |  

Broader source: Energy.gov (indexed) [DOE]

Veterans Advancing Clean Energy and Climate Security Champions of Veterans Advancing Clean Energy and Climate Security Champions of Change Veterans Advancing Clean Energy and Climate Security Champions of Change Addthis 1 of 7 Nancy Sutley, Chair of the White House Council on Environmental Quality (CEQ), kicks-off Champions of Change to honor veterans for advancing clean energy and climate security. Image: Matty Greene, Energy Department. 2 of 7 Secretary Moniz and CEQ Chair Nancy Sutley watch remarks by White House Chief of Staff, Denis McDonough. Image: Matty Greene, Energy Department. 3 of 7 White House Chief of Staff, Denis McDonough, addresses attendees at the Champions of Change event. Image: Matty Greene, Energy Department. 4 of 7 Secretary Moniz delivers remarks at the Champions of Change event. Image: Matty Greene, Energy Department.

457

U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection  

Broader source: Energy.gov (indexed) [DOE]

57: Ruby Mail Gem Directory Traversal and Shell Command 57: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities April 27, 2012 - 7:00am Addthis PROBLEM: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities PLATFORM: Mail gem for Ruby 2.x ABSTRACT: Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system. Reference Links: Secunia Advisory SA48970 CVE-2012-2139 CVE-2012-2140 IMPACT ASSESSMENT: Medium Discussion: Input passed via the "to" parameter within the file delivery method is not properly verified before being used and can be exploited to modify arbitrary files via directory traversal attacks. Certain input passed to

458

From an IP address to a street address: using wireless signals to locate a target  

Science Journals Connector (OSTI)

How quickly can somebody convert an IP address of a target into a real-word street address? Law enforcement regularly has need to determine a suspect's exact location when investigating crimes on the Internet. They first use geolocation software and ...

Craig A. Shue; Nathanael Paul; Curtis R. Taylor

2013-08-01T23:59:59.000Z

459

The Office of Health, Safety and Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Chemical Safety 2013 Workshop Home Registration Closed Presentations Day 1 Day 2 Day 3 Workshop Information Health and Safety POSTPONED. Future events will be announced. Joint EFCOG/DOE Chemical Management 2013 Workshop March 19-21, 2013 DOE Forrestal Headquarters Auditorium and Remote via Web Includes concurrent 10 CFR 851 Worker Safety and Health Workshop Registration is closed. Contact David Weitzman or Joe Hopkins for possible web conference attendance. REGISTRATION FORM Fields marked with * must be completed. *First Name: *Last Name: Position/Title: Company: Affiliation: Address: City: State: Zip: *Phone: *E-Mail: *Attendee Type: Federal Employee Contractor Employee Other *United States Citizen: Yes No If no, contact Joe Hopkins, 301-903-5619, joe.hopkins@hq.doe.gov

460

A systematic review of security requirements engineering  

Science Journals Connector (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities  

Broader source: Energy.gov [DOE]

Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nations energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

462

Address (Smart Grid Project) | Open Energy Information  

Open Energy Info (EERE)

Jump to: navigation, search Project Name Address Country Spain Coordinates 40.388397°, -4.526367° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.388397,"lon":-4.526367,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

463

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

464

Data-Driven Mailing Helps Heat Up Untapped Seattle Market | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Helps Heat Up Untapped Seattle Market Data-Driven Mailing Helps Heat Up Untapped Seattle Market Abridged transcript of an interview with Community Power Works Project Manager Ruth...

465

Direct Mail Advertising to Hispanics: the Influence of Acculturation on Attitude Toward the Ad.  

E-Print Network [OSTI]

??This study examines the influence of acculturation, language used and model ethnicity on the effectiveness of direct mail advertising to Hispanic consumers, as measured by (more)

Graham, Kenneth Wilson

2005-01-01T23:59:59.000Z

466

E-mail Messages, spring 2011 Message 4 Hello! The course web ...  

E-Print Network [OSTI]

E-mail Messages, spring 2011. Message 4. Hello! The course web page has all of the information for this course. It includes course information, resources, exam

charlotb

2011-01-06T23:59:59.000Z

467

E-Mail messages, spring 2011 Message 3 Hello! Today, I have ...  

E-Print Network [OSTI]

E-Mail messages, spring 2011. Message 3. Hello! Today, I have attached some general comments about the class that I used to communicate to students the...

charlotb

2011-01-05T23:59:59.000Z

468

What You Need to Know About the Energy Security Trust | Department of  

Broader source: Energy.gov (indexed) [DOE]

What You Need to Know About the Energy Security Trust What You Need to Know About the Energy Security Trust What You Need to Know About the Energy Security Trust March 15, 2013 - 12:05pm Addthis In his 2013 State of the Union address, President Obama called on Congress to create an Energy Security Trust Fund, which would free American families and business from painful spikes in gas prices. The President’s plan builds on an idea that has bipartisan support from experts including retired admirals and generals and leading CEOs, and it focuses on one goal: shifting America’s cars and trucks off oil entirely. | Infographic from the White House. In his 2013 State of the Union address, President Obama called on Congress to create an Energy Security Trust Fund, which would free American families and business from painful spikes in gas prices. The President's plan

469

DOE Statement on UK Government's "Road to 2010" Report on Nuclear Security  

Broader source: Energy.gov (indexed) [DOE]

Statement on UK Government's "Road to 2010" Report on Nuclear Statement on UK Government's "Road to 2010" Report on Nuclear Security DOE Statement on UK Government's "Road to 2010" Report on Nuclear Security July 17, 2009 - 12:00am Addthis WASHINGTON, DC - Thomas P. D'Agostino, the Department of Energy's Under Secretary for Nuclear Security and Administrator of the National Nuclear Security Administration, today applauded the British government's new report on advancing the global nuclear security agenda. Issued yesterday, "The Road to 2010 - Addressing the Nuclear Question in the Twenty First Century" outlines a strategy for addressing the threat posed by the proliferation of nuclear weapons ahead of the 2010 Nuclear Non-Proliferation Treaty (NPT) Review Conference. Among other steps, it includes the creation of a UK Center for Nuclear

470

PSH-12-0094 - In the Matter of Personnel Security Hearing | Department of  

Broader source: Energy.gov (indexed) [DOE]

94 - In the Matter of Personnel Security Hearing 94 - In the Matter of Personnel Security Hearing PSH-12-0094 - In the Matter of Personnel Security Hearing On November 6, 2012, a Hearing Officer determined that an individual's security clearance should not be restored. In reaching this determination, the Hearing Officer found that the individual had not successfully addressed the DOE's security concerns regarding his abuse of alcohol. The Hearing Officer further concluded that the individual's six months of responsible behavior regarding alcohol were insufficient to demonstrate a sustained pattern of responsible use. This was because of the brevity of the period of time involved, the individual's failure to admit that he had a drinking problem, and his failure to take steps to address the problem other than abstinence. The Hearing officer also concluded that

471

What You Need to Know About the Energy Security Trust | Department of  

Broader source: Energy.gov (indexed) [DOE]

What You Need to Know About the Energy Security Trust What You Need to Know About the Energy Security Trust What You Need to Know About the Energy Security Trust March 15, 2013 - 12:05pm Addthis In his 2013 State of the Union address, President Obama called on Congress to create an Energy Security Trust Fund, which would free American families and business from painful spikes in gas prices. The President’s plan builds on an idea that has bipartisan support from experts including retired admirals and generals and leading CEOs, and it focuses on one goal: shifting America’s cars and trucks off oil entirely. | Infographic from the White House. In his 2013 State of the Union address, President Obama called on Congress to create an Energy Security Trust Fund, which would free American families and business from painful spikes in gas prices. The President's plan

472

Tag: GTRI | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

473

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

474

April 2014 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

475

Sandia National Laboratories: Water Security Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Water Security Program Water Security CustomersPartners Awards Key Publications Staff Biographies Water Security In many areas of the United States and multiple regions of...

476

Integrated safeguards and security management plan  

E-Print Network [OSTI]

LBNL/PUB-3151 INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT76SF00098 iv Integrated Safeguards and Security Managementprovided. Appendix A. Safeguards and Security Plan http://

Bowen editor, Sue

2001-01-01T23:59:59.000Z

477

Sandia National Laboratories: National Security Missions: Internationa...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security casks We reduce proliferation and terrorism threats to U.S. national security through global technical engagement. Enhance security of vulnerable nuclear weapons...

478

INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS  

E-Print Network [OSTI]

INFORMATION SECURITY GUIDELINES #12;CONSISTENT, EFFECTIVE INFORMATION SECURITY To respond to societal-to-date information security standards. Should we fail to do so, in the event

Prodiæ, Aleksandar

479

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES Form is used to document travel to sensitive countries. SECURITY...

480

Security, Emergency Planning & Safety Records | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

Note: This page contains sample records for the topic "mailing address secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

472.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

482

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

483

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

484

Cyber Security Issues and Requirements  

Broader source: Energy.gov (indexed) [DOE]

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

485

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

486

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

487

Security Clearances; Limitations  

Broader source: Energy.gov (indexed) [DOE]

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

488

New Security Challenges in the Global Era: Environmental Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

489

The security fallacy: Seven myths about physical security | Argonne  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

490

Security Science: The Theory and Practice of Security  

Science Journals Connector (OSTI)

Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners ...

Clifton Smith; David J Brooks

2012-12-01T23:59:59.000Z

491

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Office of Environmental Management (EM)

can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a...

492

Engineering secure software  

E-Print Network [OSTI]

Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style... Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style...

Jetly, Prateek

2012-06-07T23:59:59.000Z

493

Quantum-secured imaging  

E-Print Network [OSTI]

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magaa-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

494

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...? ? Advanced security methods ? Power analysis for key discovery ? Hardware attacks such as ?decapping? chips ? Developing vulnerability exploits ? Security analysis of smart grid systems & communications ? Reverse engineering ? Penetration testing ? Threat...

Ragsdale, G.

495

ADDRESSABLE PRINTHEADS Addressable printhead structures were designed and fabricated on 3" Si wafers. Fig 1  

E-Print Network [OSTI]

doping level and profile we ran simulations in Silvaco® ATHENA process simulation software. Considering for isolation Figure 1. 3D schematics of addressable printheads. #12;Figure 2 Sample output plot for Silvaco

Pala, Nezih

496

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network [OSTI]

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

497

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

498

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

499

*Corresponding author. Tel.: 630-252-5672; fax: 630-252-E-mail address: macrander@aps.anl.gov (A.T. Macrander)  

E-Print Network [OSTI]

prepared by glueing two pieces face-to-face using M-bond 610 adhesive. 0921-4526/00/$- see front matter

Headrick, Randall L.

500

ISRAEL JOURNAL OF ECOLOGY & EVOLUTION, Vol. 52, 2006, pp. 111122 *Author to whom correspondence should be addressed. E-mail: yohay@technion.ac.il  

E-Print Network [OSTI]

in the selF- incompatible IrIs bIsmarckIana (iridaceae), with implications For conservation Bosmat segal by the following set of traits: self-incompatibility with syn- chronous flowering; reliance on a small number Onco- cyclus, pollen limitation, seed production, self-incompatibility, supplemen- tary artificial