Powered by Deep Web Technologies
Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

2

Comprehensive National Cyber Security: Leap-Ahead ...  

Science Conference Proceedings (OSTI)

Comprehensive National Cyber Security: Leap-Ahead Security for Interconnected Systems (+10 FTE, +$5,500,000). Challenge. image: ...

2010-10-05T23:59:59.000Z

3

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO)...

4

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

5

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

6

Cyber Security Audit and Attack Detection Toolkit: National SCADA...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and...

7

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

8

NCSec: a national cyber security referential for the development of a code of practice in national cyber security management  

Science Conference Proceedings (OSTI)

Governments worldwide have faced computer security challenges. These challenges are serious in a context where there is an absence of appropriate organizational and institutional structures to deal with incidents. But more important which agency or agencies ... Keywords: ISO27002, cyber criminality, cyber security, organizational structure, referential

Mohamed Dafir Ech-cherif el Kettani; Taieb Debbagh

2008-12-01T23:59:59.000Z

9

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

10

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

11

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

12

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

13

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

14

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

15

Metaphors for cyber security.  

SciTech Connect

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

16

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

17

Management of Los Alamos National Laboratory's Cyber Security Program, IG-0880  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Los Alamos National Los Alamos National Laboratory's Cyber Security Program DOE/IG-0880 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 February 11, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Los Alamos National Laboratory's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Los Alamos National Laboratory (LANL), operated by the National Nuclear Security Administration on behalf of the Department of Energy, is one of the world's largest multi- disciplinary laboratories and is primarily responsible for helping to ensure the safety and

18

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

19

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Reports Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO),

20

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

22

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

23

Distribution System Cyber Security Architecture  

Science Conference Proceedings (OSTI)

The National Institute of Standards and Technology (NIST) has developed the NISTIR 7628: Guidelines for Smart Grid Cyber Security, while ASAP-SG has developed both the Security Profile for AMI (v2.0) and the Security Profile for Distribution Management. These documents are necessarily high level and generic, covering a broad range of smart grid assets, and focus exclusively on determining the security requirements. However, utilities and their vendors often cannot get a clear picture of what existing tec...

2010-12-31T23:59:59.000Z

24

Cyber Security and Resilient Systems  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nations cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

25

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

26

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

27

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

28

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

29

Chapter_14_Cyber_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

30

Security and Cyber Guidance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April...

31

AMI Cyber Security Incident Response Guidelines  

Science Conference Proceedings (OSTI)

This document is intended to be used by system and asset owners to assist in the preparation and response to AMI cyber security incidents. This document was developed by conducting interviews with EPRI members, AMI asset owners, and vendors, regarding practices involved in responding to AMI cyber security incidents and mapping the responses to requirements put forth by the Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Open Smart Grid (Open-SG) Working ...

2012-12-07T23:59:59.000Z

32

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

33

Cyber Security Management Memorandum | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Management Memorandum Cyber Security Management Memorandum On December 7, 2009, the Deputy Secretary of Energy released this memorandum directing the creation of a...

34

Technical Options to Address Cyber Security, Interoperability...  

NLE Websites -- All DOE Office Websites (Extended Search)

Technical Options to Address Cyber Security, Interoperability and Other Issues with ZigBee SEP Title Technical Options to Address Cyber Security, Interoperability and Other Issues...

35

INL Cyber Security Research | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Research Cyber security research at INL will help protect critical infrastructure control system computers against worms and other viruses. INL Cyber Security Research More...

36

Cyber Assessment Methods for SCADA Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

37

NIST Finalizes Initial Set of Smart Grid Cyber Security ...  

Science Conference Proceedings (OSTI)

... guidelines is intended to facilitate organization-specific Smart Grid cyber security ... the nation's electric infrastructure to make it smarter, more efficient ...

2010-09-29T23:59:59.000Z

38

The Department's Unclassified Cyber Security Program - 2012, IG-0877  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information technology resources continues to expand, the number of cyber security threats against Federal agencies has also increased. In fact, Federal cyber security officials have warned that the number of cyber attackers has increased and that the Nation's

39

The Department's Unclassified Cyber Security Program 2002, IG...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Unclassified Cyber Security Program 2002, IG-0567 The Department's Unclassified Cyber Security Program 2002, IG-0567 The Department's Unclassified Cyber Security Program 2002,...

40

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

NLE Websites -- All DOE Office Websites (Extended Search)

CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY...

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

RFI Comments - Advanced Cyber Security Center  

Science Conference Proceedings (OSTI)

Page 1. Page 1 of 3 Advanced Cyber Security Center Rollout ... The Need The advanced cyber threat is real and growing. ...

2013-04-09T23:59:59.000Z

42

Sandia National Laboratories: National Security Missions: Defense...  

NLE Websites -- All DOE Office Websites (Extended Search)

Cybersecurity Delivering experience & expertise Training the next generation of cyber defenders Cybersecurity computing Defending national security Applying science and engineering...

43

Primer Control System Cyber Security Framework and Technical Metrics  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

44

Strengthening Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

E E n E rgyB i z November/December 2008 » TECHNOLOGY FRONTIER (Guest OpiniOn) remOte attaCks On systems that control power production and distribution are no longer hypothetical events. At least four utilities have been subjected to extortion demands by criminals who used the Internet to infect the utilities' computers and caused or threatened power outages. Cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption caused a power outage affecting multiple cities. These are criminal acts, but nation-states are actively targeting utility computers, as well, so that in time of war they can turn off their adversary's power. While all this is happening, most executives in the

45

DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS. Key Cyber...

46

Cyber Security Standards.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

47

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

48

National Security & Safety Reports | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security & Safety Reports National Security & Safety Reports October 29, 2013 Evaluation Report: IG-0897 The Department of Energy's Unclassified Cyber Security Program -...

49

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee...

50

Strategy for Improvements in Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Improvements in Cyber Security Strategy for Improvements in Cyber Security Brase-LLNL-SEAB.10.11.pdf More Documents & Publications Mobile Device Security Checklist Open...

51

Cyber Security Procurement Methodology, Rev. 1  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or unclear division of responsibilities between the utility and vendor can often result in costly retrofits to meet the ...

2013-12-17T23:59:59.000Z

52

Microgrid cyber security reference architecture.  

SciTech Connect

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

53

Cyber Security in Smart Grid Substations  

E-Print Network (OSTI)

Cyber Security in Smart Grid Substations Thijs Baars Lucas van den Bemd Michail Theuns Robin van.089 3508 TB Utrecht The Netherlands #12;CYBER SECURITY IN SMART GRID SUBSTATIONS Thijs Baars T.Brinkkemper@uu.nl Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands

Utrecht, Universiteit

54

Cyber Security Metrics and Measures abstract  

Science Conference Proceedings (OSTI)

Paul E. Black, Karen Scarfone, and Murugiah Souppaya, Cyber Security Metrics and Measures, in Wiley Handbook of Science and Technology for ...

2013-05-07T23:59:59.000Z

55

Computer Use Agreement, BNL Cyber Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Users Be aware of, knowledgeable about, and comply with the requirements of the BNL Cyber Security Program as described in SBMS. Follow BNL policy regarding the use and...

56

Hiring and Managing a Cyber Security Workforce:  

Science Conference Proceedings (OSTI)

... DHS cyber security workers and others from outside of ... Sell the mission! Protecting the US nuclear arsenal or the New York City water supply is a ...

2013-09-19T23:59:59.000Z

57

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

58

NNSA Seeking Comments on Consolidated IT and Cyber Security Support...  

NLE Websites -- All DOE Office Websites (Extended Search)

NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013...

59

THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519 THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519 Protecting unclassified information systems continues to...

60

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY...

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION, IG-0531 INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION, IG-0531 The Office of Inspector...

62

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

63

Strategy for Improvements in Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strategy for Improvements in Cyber Security Strategy for Improvements in Cyber Security Brase-LLNL-SEAB.10.11.pdf More Documents & Publications Computational Advances in Applied...

64

Office of Electricity Delivery and Energy Reliability Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On September 23, 2010, speaking at the inaugural GridWise...

65

Report of the Cyber Security Research Needs for Open Science...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Cyber Security Research Needs for Open Science Workshop Report of the Cyber Security Research Needs for Open Science Workshop Protecting systems and users, while maintaining...

66

Evaluation Report on The Department's Unclassified Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report on The Department's Unclassified Cyber Security Program 2002, DOEIG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOEIG-0567 As...

67

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

68

Office of Cyber Security Evaluations - Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Evaluations Reports to the Independent Oversight Program Mission and Functions Mission The Office of Cyber Security Evaluations is responsible for the independent...

69

Common Cyber Security Vulnerabilities Observed in Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

70

Smart Grid Investment Grant Program (SGIG): Cyber Security Issues...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

(SGIG): Cyber Security Issues and Requirements, November 19, 2009 Smart Grid Investment Grant Program (SGIG): Cyber Security Issues and Requirements, November 19, 2009 Presentation...

71

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines September 2, 2010 - 3:15pm Addthis WASHINGTON, D.C. - The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats. The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set

72

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeking Comments on Consolidated IT and Cyber Security Support Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

73

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NNSA Seeking Comments on Consolidated IT and Cyber Security Support NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

74

Cyber security exercises and competitions as a platform for cyber security experiments  

Science Conference Proceedings (OSTI)

This paper discusses the use of cyber security exercises and competitions to produce data valuable for security research. Cyber security exercises and competitions are primarily arranged to train participants and/or to offer competence contests for those ... Keywords: data collection, research method, security competitions, security exercises

Teodor Sommestad; Jonas Hallberg

2012-10-01T23:59:59.000Z

75

Proposed Comprehensive Cyber Security Legislation, May 2011  

Science Conference Proceedings (OSTI)

The role of cyber security in the critical infrastructures of the United States has been recognized by the President and by members of Congress. To address potential cyber security threats and vulnerabilities, the Senate has proposed revisions to specific laws and regulations. This white paper includes a technical assessment of some of the key proposed revisions.

2011-10-26T23:59:59.000Z

76

The Department's Unclassified Cyber Security Program 2002, IG-0567  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT'S UNCLASSIFIED DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security

77

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

78

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

79

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

80

Evaluation Report on The Department's Unclassified Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report on The Department's Unclassified Cyber Security Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security information. It requires agencies to conduct annual reviews and evaluations of unclassified and

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Cyber Security Testing and Training Programs for Industrial Control Systems  

DOE Green Energy (OSTI)

Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

Daniel Noyes

2012-03-01T23:59:59.000Z

82

Cyber Security Audit and Attack Detection Toolkit  

Science Conference Proceedings (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

83

Security and Cyber Evaluations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential

84

The development of cyber security warning, advice and report points  

Science Conference Proceedings (OSTI)

The threat to electronic information systems increasingly has origins in organised crime or nation-state sponsored or supported activity. Any successful cyber security programme relies upon the sharing of information. How this is achieved is a question ... Keywords: information sharing, security information, warning advice and reporting points

Tony Proctor

2012-10-01T23:59:59.000Z

85

DOE Cyber Security Role, Competency and Functional Matrix  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

86

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

87

Cyber Security Evaluations Appraisal Process Guide - April 2008 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 April 2008 Cyber Security Evaluations Appraisal Process Guide was developed for the purpose of documenting the appraisal approach and techniques specific to evaluations of classified and unclassified cyber security programs throughout DOE. Office of Cyber Security Evaluations Appraisal Process Guide provides additional insight into the Office of Cyber Security Evaluations (HS-62) evaluation approach and processes associated with assessing classified and unclassified cyber security programs. The objective of this document is to establish a standard approach and methodology for conducting cyber security reviews that is well understood by all inspection participants.

88

Control Systems Cyber Security Standards Support Activities  

Science Conference Proceedings (OSTI)

The Department of Homeland Securitys Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSPs current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

Robert Evans

2009-01-01T23:59:59.000Z

89

Internet voting: structural governance principles for election cyber security in democratic nations  

Science Conference Proceedings (OSTI)

In Europe, the U.S., and Asia, political and market forces seek expanded use of the Internet for voting and election administrative functions. Governmental responses have differed, but commonly governments omit qualified computer security experts from ... Keywords: assurance, cybersecurity, elections, governance, integrity, internet, mitigations, security, threats, transparency, voting

Candice Hoke

2010-12-01T23:59:59.000Z

90

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

91

Enhancing NASA Cyber Security Awareness From the C-Suite ...  

Science Conference Proceedings (OSTI)

... Leadership concerns with IT security impacts ? Cyber Security Summit Full day of workshops / panel sessions on transformation of IT / IT security ...

2013-03-28T23:59:59.000Z

92

Small Business Cyber Security Workshop for Portland, Oregon ...  

Science Conference Proceedings (OSTI)

Page 1. Portland District Office Small Business Cyber Security Workshop Portland District Office 601 SW Second Ave. Suite ...

2013-07-24T23:59:59.000Z

93

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

94

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

95

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

96

DOE P 205.1, Departmental Cyber Security Management Policy  

Directives, Delegations, and Requirements

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security ...

2001-05-08T23:59:59.000Z

97

Obama's Call for Public-Private Cyber Security Collaboration...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the...

98

Obama's Call for Public-Private Cyber Security Collaboration Reflected in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obama's Call for Public-Private Cyber Security Collaboration Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities May 29, 2009 - 4:08pm Addthis In releasing the results of his Administration's 60-day cyber security review, President Barack Obama today emphasized that partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the computer-based systems that monitor and control the nation's electric grid and oil and gas pipelines remains a shared challenge for the Department of Energy. As the industry quickly works to develop and demonstrate Smart Grid technologies to build a more reliable and resilient

99

Cyber Assessment Methods for SCADA Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

100

Security Issues and Challenges for Cyber Physical System  

Science Conference Proceedings (OSTI)

In this paper, we investigate the security challenges and issues of cyber-physical systems. (1)We abstract the general workflow of cyber physical systems, (2)identify the possible vulnerabilities, attack issues, adversaries characteristics and a set ... Keywords: Cyber-Physical System, Security, actuation, context-aware

Eric Ke Wang; Yunming Ye; Xiaofei Xu; S. M. Yiu; L. C. K. Hui; K. P. Chow

2010-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

security efforts by establishing the national SCADA test bed program INL [INL/EXT- 05-00671, Idaho National Laboratory. US-CERT [2008], Control Systems Security

Amin, Saurabh

2011-01-01T23:59:59.000Z

102

Development of the PowerCyber SCADA security testbed  

Science Conference Proceedings (OSTI)

Meeting current demands for critical infrastructure cyber security education and research will require accurate testbed development. The PowerCyber was designed to closely resemble power grid communication utilizing actual field devices and SCADA software. ...

Adam Hahn; Ben Kregel; Manimaran Govindarasu; Justin Fitzpatrick; Rafi Adnan; Siddharth Sridhar; Michael Higdon

2010-04-01T23:59:59.000Z

103

Optimizing investments in cyber-security for critical infrastructure  

Science Conference Proceedings (OSTI)

Investments in the cyber-security of critical infrastructure must balance preventing intrusion, detecting a cyber-attack, and mitigating the attacker's physical effects on computer controlled equipment. For this purpose, we outline a method for making ...

Ike Patterson; James Nutaro; Glenn Allgood; Teja Kuruganti; David Fugate

2013-01-01T23:59:59.000Z

104

21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 Steps to Improve Cyber Security of SCADA Networks 1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in cyber space today. By allowing the collection and analysis of data and control of equipment such as pumps and valves from remote locations, SCADA networks provide great efficiency and are widely used. However, they also present a security risk. 21 Steps to Improve Cyber Security of SCADA Networks

105

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

106

Office of Security and Cyber Evaluations  

NLE Websites -- All DOE Office Websites (Extended Search)

Welcome to the Office of Security and Cyber Evaluations The Office of Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential differences in approach since your last interaction with us.

107

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

108

GridStat Cyber Security and Regional Deployment Project Report  

Science Conference Proceedings (OSTI)

GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStats cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

Clements, Samuel L.

2009-02-18T23:59:59.000Z

109

Wireless Policy, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

110

Cyber Security in Smart Grid Substations  

E-Print Network (OSTI)

Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands, and the cyber security of substations in particular. The focus of this study is the perception of risks and threats in smart grid cyber security and the international standards implemented in smart grids. The created overview is based on semi-structured interviews with 13 experts originating from eight different European countries. These participants are employed at electricity producers, grid operators, technology consultants and technology providers in the utilities sector. Their expertise ranges from information security to electricity grids, specifically smart grid security. Some of them are members of smart grid security related standard committees. The key results of the state of practice are the following: 1. The interconnectivity of the smart grid with multiple stakeholders and European colleagues is indicated as the biggest threat to the security of the smart grid. 2. Another often mentioned threat is awareness. The experts generally indicate that awareness within top management is high. However, personnel on lower levels are reluctant to incorporate security in their processes. 3. All organizations are in a certain stage of implementing standards, the ISO27000 series

Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schnbeck; Sjaak Brinkkemper; Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schnbeck; Sjaak Brinkkemper

2012-01-01T23:59:59.000Z

111

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed More Documents & Publications Security is Not an Option ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004)

112

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

113

Advanced Metering Infrastructure Cyber Security Risks  

Science Conference Proceedings (OSTI)

The deployment of advanced metering infrastructure (AMI) systems is introducing millions of components to the electric grid that support two-way communication for next-generation grid applications. Although these systems can increase operational efficiencies and enable new capabilities such as demand-response, they also increase the attack surface for potential adversaries. Utilities must address these new cyber security risks as part of their overall enterprise risk management strategy. These ...

2013-12-23T23:59:59.000Z

114

Cyber Security | More Science | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

115

Cyber Security Procurement Methodology for Power Delivery Systems  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new power delivery systems requires cyber security experts, power system engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly backfit to meet requirements.The Electric Power Research ...

2012-12-31T23:59:59.000Z

116

The Department of Energy Launches Cyber Security Initiative ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

launching an initiative to enhance cyber security on the electric grid. The initiative, led by the Department's Office of Electricity Delivery and Energy Reliability (OE), the...

117

NERSC Cyber Security Challenges That Require DOE Development and Support  

E-Print Network (OSTI)

network segments. Table 1. Network Comparison: NERSC vs.Large Corporation NERSC External Network Traffic patternsLBNL-62284 NERSC Cyber Security Challenges That Require DOE

Draney, Brent; Campbell, Scott; Walter, Howard

2008-01-01T23:59:59.000Z

118

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

119

Cyber Science and Security - An R&D Partnership at LLNL  

Science Conference Proceedings (OSTI)

Lawrence Livermore National Laboratory has established a mechanism for partnership that integrates the high-performance computing capabilities of the National Labs, the network and cyber technology expertise of leading information technology companies, and the long-term research vision of leading academic cyber programs. The Cyber Science and Security Center is designed to be a working partnership among Laboratory, Industrial, and Academic institutions, and provides all three with a shared R&D environment, technical information sharing, sophisticated high-performance computing facilities, and data resources for the partner institutions and sponsors. The CSSC model is an institution where partner organizations can work singly or in groups on the most pressing problems of cyber security, where shared vision and mutual leveraging of expertise and facilities can produce results and tools at the cutting edge of cyber science.

Brase, J; Henson, V

2011-03-11T23:59:59.000Z

120

Training Module for Cyber Security in Nuclear Plant Digital Modifications  

Science Conference Proceedings (OSTI)

Nuclear power plants face increasing regulatory requirements from the U.S. Nuclear Regulatory Commission (NRC) and the Federal Energy Regulatory Commission (FERC) for cyber security of digital devices, components, and systems. The focus of these cyber security requirements is to protect plant digital computer systems, communications systems, and networks from cyber attacks that would affect reactor safety or generation reliability. This Electric Power Research Institute (EPRI) computer-based training mod...

2011-04-28T23:59:59.000Z

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

122

Federal Communications Commission Cyber Security ...  

Science Conference Proceedings (OSTI)

... Chief Information Officer for 25 Years ... the United Nations Under Secretary General and CIO ... after he hacked into a federal investigation database. ...

2011-11-15T23:59:59.000Z

123

Office of Cyber Security Evaluations Appraisal Process Guide, April 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER SECURITY EVALUATIONS CYBER SECURITY EVALUATIONS APPRAISAL PROCESS GUIDE April 2008 Office of Health, Safety and Security U.S. Department of Energy Office of Cyber Security Evaluations Appraisal Process Guide Preface April 2008 i Preface Department of Energy (DOE) Order 470.2B, Independent Oversight and Performance Assurance Program, and Office of Health, Safety and Security (HSS) Standard Operating Procedure, SOP-10-01, Independent Oversight Appraisal Process Protocols, February 2008, provide direction for the Office of Independent Oversight (HS-60) to establish the requirements, responsibilities, and processes for the development and maintenance of Appraisal Process Protocols that describe the activities for evaluating the effectiveness of DOE safeguards and security; cyber security; emergency management; and

124

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

125

The National Initiative for Cybersecurity Education (NICE)  

Science Conference Proceedings (OSTI)

... The National Cyber Security Division outlines the Department of Homeland Security's strategic national cybersecurity objectives. ...

2013-07-09T23:59:59.000Z

126

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-12-20T23:59:59.000Z

127

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-10-01T23:59:59.000Z

128

Lab hosts multi-lab cyber security games  

NLE Websites -- All DOE Office Websites (Extended Search)

Joint Cyber Coordination Center, or JC3. The JC3 is focused on improving the national response to threats, leveraging complex resources, and sharing information to meet...

129

The Department's Cyber Security Incident Management Program, IG-0787 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

130

Microsoft Word - Cyber Security Strat Plan final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

R R A A T T E E G G I I C C P P L L A A N N FEBRUARY 12, 2007 CYBER SECURITY STRATEGIC PLAN VERSION 1.0 2 Table of Contents INTRODUCTION ......

131

Cyber Security Solutions for Instrumentation and Control Systems  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced as a result of continual threats to business and process control networks. Many standards have been drafted, undergone revision, and are being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection standards requirements of the North American Electric Reliability Corporation and related requirements in the international community. Compliance with ...

2012-12-12T23:59:59.000Z

132

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

Robert P. Evans

2006-05-01T23:59:59.000Z

133

Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues  

SciTech Connect

This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nations current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

Wayne F. Boyer; Scott A. McBride

2009-04-01T23:59:59.000Z

134

Ideal based cyber security technical metrics for control systems  

Science Conference Proceedings (OSTI)

Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provide the basis for management decisions that affect the protection of the ... Keywords: control system security, cyber security metrics

Wayne Boyer; Miles McQueen

2007-10-01T23:59:59.000Z

135

Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research: Energy Infrastructure Cyber Protection  

Science Conference Proceedings (OSTI)

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Protecting and trusting information is not unique to the grid. Indeed, the information security market is worth tens of billions of dollars, almost exclusively in cyber security products and services. Yet, solutions designed for the Internet are often not appropriate for securing the energy grid, which has a different set of priorities and communication needs. Any viable information security solution must address those unique challenges and features. The discussion at the CSIIR Workshop was primarily focused about the Energy Infrastructure Cyber Protection (ENCyP) Initiative. ENCyP is a multidisciplinary strategic theme oriented on cyber protection for the most critical and most vulnerable components of Energy Delivery System (EDS). The initiative derived from ORNL's focus on energy and cyber-physical defenses. On this basis we received just over 100 submissions stemming from both novel theoretical and empirical research focused on the many different aspects of ENCyP. We encouraged the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the evolving context ENCyP. Topics included: Security assurance/interoperability for Energy Delivery Systems (EDS) Scalable/trusted control (cyber-physical) systems security Visual analytics for cyber security Next generation control systems vulnerability assessment Wireless Smart Grid security SCADA, EDS communications security test beds Use cases and attack scenarios for EDS Wide area monitoring, protection & control AMI, demand-response, distribution grid management security Electric transportation & distributed energy resources security Policy/standards driven architectures for EDS Anti-tamper device architectures Cryptographic key management for EDS Security risk assessment and management for EDS Insider and life-cycle threats Automated vulnerability detection Access control management and authentication services for EDS Secure information exchange gateway & watchdog switches Bio-Inspired technologies for enhancing EDS cybersecurity A principle goal of the workshop was to foster discussions and dialog among the 210 registered attendees from North and South America, Europe, Asia, and Africa. This goal was initiated and facilitated by 8 plenary keynote addresses including our banquet and reception speakers. There were also six invited speakers, including two panels of government and national laboratory representatives. A total of one hundred and three papers (i.e., extended abstracts [EAs]) were submitted involving over three hundred independent reviews from more than one hundred reviewers. Thirty two percent of the papers that were submitted received two reviews while all of the rest of the papers received three or more. Fifty-four EAs were accepted. Twenty-five posters were invited. All of the EAs, presentations and posters are included in our proceedings. The subject areas span the topics above and were organized into nine tracks: Security Assurance for EDS; Wide Area Mo

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [University of Idaho

2011-01-01T23:59:59.000Z

136

Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

SciTech Connect

The Annual Cyber Security and Information Intelligence Research Workshop [CSIIRW] was be held at Oak Ridge National Laboratory in Oak Ridge, TN on April 21 - 23, 2010. The aim of this workshop is to introduce and discuss novel theoretical and empirical research focused on (the many) different aspects of software security/dependability, because as we know, the heart of the cyber infrastructure is software. As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value (wiki). The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. Cyber crime is a very serious and growing problem which now has an annual global turnover in the criminal world of more than 1000 BUSD [recent numbers from an FBI white paper] with the hardest hit industries being the banks and the insurance companies. A recent EU study of the banking world showed that more than 60% of cyber crime in banks was carried out by insiders of which ~65% by senior managers. Moreover, cyber security practice and policy is largely heuristic, reactive, and increasingly cumbersome, struggling to keep pace with rapidly evolving threats. Advancing beyond this reactive posture will require a transformation in computing and communication systems architecture and new capabilities that do not merely solve today s plethora of security enigmas, but enable comprehensive game-changing strategies [A Scientific R&D Approach to Cyber Security, C. Catlett, et al., Community-driven report submitted to the DOE, Dec. 2008]. The aim of this workshop is to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. We encourage the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the ever evolving context of cyberspace.

Sheldon, Frederick T [ORNL; Prowell, Stacy J [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2010-01-01T23:59:59.000Z

137

Cyber Security Strategy Guidance for the Electric Sector  

Science Conference Proceedings (OSTI)

Smart grid technologies are introducing millions of new intelligent components to the electric grid that communicate in much more advanced ways (two-way communication, dynamic optimization, and wired and wireless communications) than in the past. Cyber security is important because the bi-directional flow of two-way communication and the control capabilities in the smart grid will enable an array of new functionalities and applications. Two areas of critical importance for the smart grid are cyber securi...

2012-05-30T23:59:59.000Z

138

Survey Cyber security in the Smart Grid: Survey and challenges  

Science Conference Proceedings (OSTI)

The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, ... Keywords: Attacks and countermeasures, Cryptography, Cyber security, Security protocols, Smart Grid

Wenye Wang; Zhuo Lu

2013-04-01T23:59:59.000Z

139

Overcoming performance collapse for 100Gbps cyber security  

Science Conference Proceedings (OSTI)

In this paper, we present a series of performance tests carried out on R-Scope Dominate-T (RDT), a 1U network security appliance configured with four Tilera Gx-36 processors and with an aggregated network IO capacity of 160Gbps. RDT is optimized with ... Keywords: cyber-security

Jordi Ros-Giralt; Bob Rotsted; Alan Commike

2013-06-01T23:59:59.000Z

140

Cyber-Physical Systems Security for Smart Grid  

E-Print Network (OSTI)

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy, mitigation, and resilience ­ is among the most important R&D needs for the emerging smart grid. One

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Cyber-Physical Systems Security for Smart Grid  

E-Print Network (OSTI)

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy important R&D needs for the emerging smart grid. One of the overarching goals of the future research

142

Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry  

SciTech Connect

This document contains introductory material that discusses cyber security challenges in using cloud computing in the electric utility industry.

Akyol, Bora A.

2012-09-01T23:59:59.000Z

143

Cyber Security ProcurementApplication of the Methodology, Third Example: Digital Feedwater Control  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements to new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of cyber security controls due to lack of proper requirements and/or unclear division of responsibilities between the utility and vendor can result in costly retrofits to meet the ...

2013-12-19T23:59:59.000Z

144

Cyber Security Procurement - Application of the Methodology, Second Example: Feedpump Turbine Speed Control  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of cyber security controls owing to a lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly retrofits to meet the ...

2013-12-20T23:59:59.000Z

145

Nuclear Forensics | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Initiatives Cyber Security Nuclear Forensics Bioinformatics National Security Home | Science & Discovery | National Security | Initiatives | Nuclear Forensics SHARE Nuclear Forensics image Tools, techniques, and expertise in nuclear fuel cycle research gained over seven decades help ORNL scientists control and track nuclear bomb-grade materials to be sure they don't fall into the wrong hands. Among the leading-edge technologies used by researchers are high-resolution techniques that allow analysis of radiation detector data in stunning detail. Researchers are also developing aerosol sampling systems to collect airborne particulates and instantly send an alert if radiation is detected. For more information, please contact: nuclearforensicsinitiative

146

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

147

Towards A Network-of-Networks Framework for Cyber Security  

Science Conference Proceedings (OSTI)

Networks-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in this paper we build towards a three-layer NoN model for an enterprise cyber system. Each layer captures a different facet of a cyber system. We then discuss the potential benefits of graph-theoretic analysis enabled from such a model. Our goal is to provide a novel and powerful tool for modeling and analyzing problems in cyber security.

Halappanavar, Mahantesh; Choudhury, Sutanay; Hogan, Emilie A.; Hui, Peter SY; Johnson, John R.; Ray, Indrajit; Holder, Lawrence B.

2013-06-07T23:59:59.000Z

148

of Western Area Power Administration's Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Western Area Power Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 October 22, 2012 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Western Area Power Administration's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Department of Energy's Western Area Power Administration (Western) markets and delivers hydroelectric power and related services to 15 states within the central and western United States. As the largest U.S. Power Marketing Administration, millions of households and

149

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

2005-10-01T23:59:59.000Z

150

National Vulnerability Database (NVD)  

Science Conference Proceedings (OSTI)

... Technology (NIST) Computer Security Division and is sponsored by the Department of Homeland Security's (DHS) National Cyber Security Division ...

2013-03-06T23:59:59.000Z

151

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

9.2.2 Security Interdependence . . . . . . Bounded Control7 Security Constrained Networked Control 7.1Inputs 9 Security Interdependencies for Networked 9.1

Amin, Saurabh

2011-01-01T23:59:59.000Z

152

Smart Grid Cyber Security Strategy and Requirements  

E-Print Network (OSTI)

(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nations measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITLs responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Interagency Report discusses ITLs research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Interagency Report 7628 (draft) 305 pages (February 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. Acknowledgments

The Smart; Grid Interoperability

2010-01-01T23:59:59.000Z

153

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

This project provides ongoing updates on the status of research and development activities, federal and state policy and regulatory proposals, standards and guidance document development, key personnel, and organizations that are funding or executing smart grid cyber security and privacy activities.

2012-04-17T23:59:59.000Z

154

A Comparison of Cross-Sector Cyber Security Standards  

Science Conference Proceedings (OSTI)

This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

Robert P. Evans

2005-09-01T23:59:59.000Z

155

Cyber Security Summer School: Lessons for the Modern Grid | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid June 20, 2011 - 4:34pm Addthis Carol Hawk Program Manager, Cyber Security for Energy Delivery Systems What does this mean for me? Computer systems do more than store and share information. They help control our traffic lights, trains and specifically, our electric grid -- tasks for which continuous function is the primary concern. Protecting control systems on the grid from cyber attack requires a completely different approach to cyber security than information technology systems. The Cyber Summer School gave aspiring attendees a practical understanding of the connection between power systems and computer science required to secure a clean, reliable energy future.

156

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

RSA SecurID User Guide VPN Home What is RSA SecurID? RSA SecurID two-factor authentication is based on something you know (a password or PIN) and something you have (an...

157

Mathematical and Statistical Opportunities in Cyber Security  

E-Print Network (OSTI)

3] Matt Bishop. Computer Security Art and Science. Addisonconference on Hot topics in security, pages 15, Berkeley,In IEEE Symposium on Security and Privacy, June 2005. [6

Meza, Juan

2009-01-01T23:59:59.000Z

158

Cyber Security Solutions for Instrumentation and Control Systems, Topic 3: Security Status Monitoring  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced in response to continual threats to business and process control networks. Many standards have been drafted and subsequently revised and are now being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with the requirements set forth in the North American Electric Reliability Corporations Critical Infrastructure Protection standards and related requirements in the international ...

2013-11-08T23:59:59.000Z

159

The cyber-physical attacker  

Science Conference Proceedings (OSTI)

The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker ... Keywords: attacker model, cyber-physical systems, cyber-physical threats, security protocol verification

Roberto Vigo

2012-09-01T23:59:59.000Z

160

A Cyber-Physical Experimentation Environment for the Security Analysis  

E-Print Network (OSTI)

Although many studies address the security of Networked Industrial Control Systems (NICS), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these systems. This paper presents an innovative framework for an experimentation environment that can reproduce concurrently physical and cyber systems. The proposed approach uses an emulation testbed based on Emulab to recreate cyber components and a real-time simulator, based on Simulink, to recreate physical processes. The main novelty of the proposed framework is that it provides a set of experimental capabilities that are missing from other approaches, e.g. safe experimentation with real malware, flexibility to use different physical processes. The feasibility of the approach is confirmed by the development of a fully functional prototype, while its applicability is proven through two case studies of industrial systems from the electrical and chemical domain.

Bla Genge; Christos Siaterlis; Igor Nai Fovino; Marcelo Masera

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

with the CCD have created a reputation on college campuses of Sandia as leader in cyber security. Interactions between the diverse group of students in the CCD has cultivated...

162

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

163

Antivirus Procedures, Cyber Security, Information Technology...  

NLE Websites -- All DOE Office Websites (Extended Search)

Anti-virus Software Trend OfficeScan for PCs & Trend Micro Security for Mac Anti-Virus procedures are an important component of BNL's host-based security architecture. Anti-Virus...

164

A Novel Cyber-Insurance for Internet Security  

E-Print Network (OSTI)

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In reality, an Internet user faces risks due to security attacks as well as risks due to non-security related failures (e.g., reliability faults in the form of hardware crash, buffer overflow, etc.) . These risk types are often indistinguishable by a naive user. However, a cyber-insurance agency would most likely insure risks only due to security attacks. In this case, it becomes a challenge for an Internet user to choose the right type of cyber-insurance contract as standard optimal contracts, i.e., contracts under security attacks only, might prove to be sub-optimal for ...

Pal, Ranjan; Psounis, Konstantinos

2011-01-01T23:59:59.000Z

165

Cyber Security Incidents, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

166

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber...

167

Department of Energy's July 2013 Cyber Security Breach  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Department of Energy's July The Department of Energy's July 2013 Cyber Security Breach DOE/IG-0900 December 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 December 6, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Review of the "Department of Energy's July 2013 Cyber Security Breach" BACKGROUND To facilitate its administrative and operational needs, the Department of Energy maintains a substantial amount of personally identifiable information (PII). The Department's Management Information System (MIS) provides a gateway for users to access a system known as the DOE Employee Data Repository (DOEInfo) database. That system was implemented in 1994, and

168

Cyber Security and Information Intelligence Research Workshop (CSIIRW'11) Proceedings  

SciTech Connect

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Moreover, Massachusetts Institute of Technology (MIT) released the results of a two-year study, The Future of the Electric Grid.

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2011-01-01T23:59:59.000Z

169

Cyber Security and Privacy Industry Tracking Newsletter, April 2012  

Science Conference Proceedings (OSTI)

EPRIs tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-04-11T23:59:59.000Z

170

Cyber Security and Privacy Industry Tracking Newsletter, April, 2013  

Science Conference Proceedings (OSTI)

EPRIs tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-03-26T23:59:59.000Z

171

Cyber Security and Privacy Industry Tracking Newsletter, July 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-06-25T23:59:59.000Z

172

Cyber Security and Privacy Industry Tracking Newsletter: December 2012  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute (EPRI) remains committed to supporting the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts, EPRI works diligently to stay abreast of the present state of standards and guideline developments, as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups and insights into future activities.This ...

2012-12-28T23:59:59.000Z

173

Cyber Security and Privacy Industry Tracking Newsletter, October 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-10-11T23:59:59.000Z

174

Framework for Evaluating Cyber Security Posture for Power Delivery Systems  

Science Conference Proceedings (OSTI)

While many asset owners and operators are performing self-assessments of their control systems, the methods used vary widely across the electric sector. This lack of consistent criteria and metrics makes it difficult to benchmark and compare the cyber security posture of power delivery systems.The objective of this technical update is to develop an evaluation framework that uses both the Department of Energy (DOE) Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) ...

2013-11-28T23:59:59.000Z

175

Cyber Security and Privacy Industry Tracking Newsletter, October 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-09-26T23:59:59.000Z

176

Cyber Security and Privacy Industry Tracking Newsletter, July 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-07-02T23:59:59.000Z

177

Cyber Security Through Science | More Science | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

178

Cyber Security Procurement - Application of the Methodology, First Example: Single Loop  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly backfits to meet the requirements.The ...

2013-07-29T23:59:59.000Z

179

Survey Paper Cyber security in the Smart Grid: Survey and challenges q  

E-Print Network (OSTI)

Survey Paper Cyber security in the Smart Grid: Survey and challenges q Wenye Wang , Zhuo Lu Accepted 29 December 2012 Available online 17 January 2013 Keywords: Smart Grid Cyber security Attacks and countermeasures Cryptography Security protocols a b s t r a c t The Smart Grid, generally referred to as the next

Wang, Wenye

180

DOE O 205.1B Chg 2, Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. ...

2011-05-16T23:59:59.000Z

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

182

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

183

Cyber Security: Innovative Technologies for National Security  

Science Conference Proceedings (OSTI)

... infrastructurestransportation, financial, power grids, military ... is inherently an open network, these systems ... dollars in direct losses, downtime, stolen ...

2010-10-05T23:59:59.000Z

184

The Cyber Threat to National Critical Infrastructures: Beyond Theory  

Science Conference Proceedings (OSTI)

Adversary threats to critical infrastructures have always existed during times of conflict, but threat scenarios now include peacetime attacks from anonymous computer hackers. Current events, including examples from Israel and Estonia, prove that a certain ... Keywords: Estonia, business continuity and disaster recover planning, critical, cyber, infrastructure, security architecture and design, telecommunications and network security threat

Kenneth Geers

2009-01-01T23:59:59.000Z

185

Technical Services | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Technical Technical Services Technical Services Technical services spans Y-12 disciplines that support manufacturing at Y-12. Information Systems (National Security Systems Development) Provide solutions for information security, including the protection of national security, proprietary and any other class of highly sensitive information. Develop highly integrated, enterprise level software applications for use within the federal space and adaptable to commercial application. Leverage the transformative information technology capabilities of the NNSA to a broad spectrum of federal applications for rapidly deployed, cost effective and reproducible technical solutions. Develop virtual collaborative networks for cluster manufacturing. Develop, test, and implement operational cyber security strategies

186

Smart Grid Cyber Security Strategy and Requirements The Cyber Security Coordination Task Group  

E-Print Network (OSTI)

(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nations measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITLs responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Interagency Report discusses ITLs research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Interagency Report 7628 (draft) 236 pages (September 2009) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. Acknowledgments

Annabelle Lee Lead; Tanya Brewer; Annabelle Lee Lead; Tanya Brewer

2009-01-01T23:59:59.000Z

187

Sandia National Laboratories: National Security Missions: Defense...  

NLE Websites -- All DOE Office Websites (Extended Search)

that help protect U.S. government, military, and civilian computer networks from cyber threats; conduct threat assessments; and work nationally to increase public...

188

Ensuring a Secure and Robust Cyber Infrastructure (+$43.4 ...  

Science Conference Proceedings (OSTI)

... the Federal Information Security Management Act are ... the President's FY 2012 budget calls for ... National Program Office for the National Strategy for ...

2011-02-14T23:59:59.000Z

189

Technical Guideline for Cyber Security Requirements and Life Cycle Implementation Guidelines for Nuclear Plant Digital Systems  

Science Conference Proceedings (OSTI)

Nuclear power plants face increasing regulatory requirements from the U.S. Nuclear Regulatory Commission (NRC) and the Federal Energy Regulatory Commission (FERC) for cyber security of digital devices, components, and systems. The focus of these cyber security requirements is to protect plant digital computer systems, communications systems, and networks from cyber attacks that would affect reactor safety or generation reliability. This EPRI guideline document provides technical guidance for addressing c...

2010-10-29T23:59:59.000Z

190

Evaluation Report on "The Department's Unclassified Cyber Security Program"  

SciTech Connect

Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing discl

2009-10-01T23:59:59.000Z

191

Cybercrime and cyber-security issues associated with China: some economic and institutional considerations  

Science Conference Proceedings (OSTI)

China is linked to cybercrimes of diverse types, scales, motivations and objectives. The Chinese cyberspace thus provides an interesting setting for the study of cybercrimes. In this paper, we first develop typology, classification and characterization ... Keywords: China, Cyber-security, Cyber-security related alliances, Cybercrime, International relations, International trade, Intrinsic and extrinsic motivations

Nir Kshetri

2013-03-01T23:59:59.000Z

192

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

193

Probabilistic Characterization of Adversary Behavior in Cyber Security  

SciTech Connect

The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

Meyers, C A; Powers, S S; Faissol, D M

2009-10-08T23:59:59.000Z

194

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

195

Office of Cyber Security Evaluations Appraisal Process Guide...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IARC Information Assurance Resource Center IG Office of the Inspector General IP Internet Protocol ISSM Integrated Safeguards and Security Management NNSA National Nuclear...

196

Cyber Security and Privacy Landscape of the Electric Sector: Release 2  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies, such as the Department of Energy (DOE), the Department of Homeland Security (DHS), the Department of Defense (DOD), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the eff...

2012-07-02T23:59:59.000Z

197

Cyber Security and Privacy Landscape of the Electric Sector, Release 5  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2013-03-27T23:59:59.000Z

198

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012, OAS-L-13-01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 OAS-L-13-01 November 2012 Department of Energy Washington, DC 20585 November 7, 2012 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Daniel M. Weeber Assistant Inspector General for Audits and Administration Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2012" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy responsible for, among other things, regulating interstate transmission of the Nation's electricity, natural gas and oil. In addition, the Commission licenses and inspects private, municipal and state hydroelectric projects. To achieve its mission, the Commission relies

199

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011, OAS-M-12-01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 OAS-M-12-01 November 2011 Department of Energy Washington, DC 20585 November 15, 2011 MEMORANDUM FOR THE CHAIRMAN, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2011" INTRODUCTION AND OBJECTIVE The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy responsible for regulating the Nation's oil pipeline, natural gas, hydroelectric and wholesale electric industries. The Commission relies on a wide range of information technology (IT) resources in achieving its mission of assisting consumers in

200

Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse  

SciTech Connect

The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

Czejdo, Bogdan [ORNL; Ferragut, Erik M [ORNL; Goodall, John R [ORNL; Laska, Jason A [ORNL

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

DOE Issues Energy Sector Cyber Organization NOI  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues National Energy Sector Cyber Organization Notice of Intent Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. The cyber organization is expected to have the knowledge, expertise, capabilities, and capacity, at a minimum to: * Identify and prioritize cyber security research and development issues.

202

Towards an Experimental Testbed Facility for Cyber-Physical Security Research  

Science Conference Proceedings (OSTI)

Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

2012-01-07T23:59:59.000Z

203

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

204

Cyber-Security Considerations for the Smart Grid  

Science Conference Proceedings (OSTI)

The electrical power grid is evolving into the smart grid. The goal of the smart grid is to improve efficiency and availability of power by adding more monitoring and control capabilities. These new technologies and mechanisms are certain to introduce vulnerabilities into the power grid. In this paper we provide an overview of the cyber security state of the electrical power grid. We highlight some of the vulnerabilities that already exist in the power grid including limited capacity systems, implicit trust and the lack of authentication. We also address challenges of complexity, scale, added capabilities and the move to multipurpose hardware and software as the power grid is upgraded. These changes create vulnerabilities that did not exist before and bring increased risks. We conclude the paper by showing that there are a number mitigation strategies that can help keep the risk at an acceptable level.

Clements, Samuel L.; Kirkham, Harold

2010-07-26T23:59:59.000Z

205

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

206

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

207

A cyber-physical experimentation environment for the security analysis of networked industrial control systems  

Science Conference Proceedings (OSTI)

Although many studies address the security of Networked Industrial Control Systems (NICSs), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these ...

BLa Genge; Christos Siaterlis; Igor Nai Fovino; Marcelo Masera

2012-09-01T23:59:59.000Z

208

Effective real-world project collaboration: Strategies from a cyber security degree program  

Science Conference Proceedings (OSTI)

The undergraduate degree of computer and cyber security has been offered at the School of Information Technology, Phetchaburi Rajabhat University, Thailand since 2005. Our program requires direct field experience when students are taking upper-level ...

Wajee Chookittikul; Peter E. Maher

2011-05-01T23:59:59.000Z

209

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network (OSTI)

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

210

Cyber Security Solutions for Instrumentation and Control Systems, Topic 2: Patch Management and Automated Change Management  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced as a result of continual threats to business and process control networks. Many standards have been drafted, have undergone revision, and are being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection (CIP) standards requirements of the North American Electric Reliability Corporation (NERC) and related requirements in the international ...

2013-04-18T23:59:59.000Z

211

National Security & Safety Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 16, 2009 Audit Evaluation Report: IG-0828 The Department's Unclassified Cyber Security Program - 2009 September 11, 2009 Inspection Report: IG-0821 Fire Suppression and...

212

Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department's Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates numerous networks and systems to help accomplish its strategic missions in the areas of energy, defense, science and the environment. The systems are frequently subjected to sophisticated cyber attacks that could impact the Department's

213

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

214

Leadership Development Series: "A Holistic Look at Cyber Security" |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" January 30, 2014 10:30AM to 12:00PM EST Registration link: By e-mail, $0 Course type: Classroom/Auditorium, Video Cast & Teleconference Course Location: DOE Headquarters, Forrestal Building, Washington, DC/ Main Auditorium Course Description: Dr. Steven Bucci, Director, Douglas and Sarah Allison Center for Foreign Policy Studies. The sheer volume of cyber activity is masking serious threats that impact government, business and our personal lives every day. Incidents are now ubiquitous, pervasive and constitute the new "normal". These day to day threats are not existential, but if not addressed, will hinder our

215

Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor  

SciTech Connect

Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.

Ondrej Linda; Todd Vollmer; Jim Alves-Foss; Milos Manic

2011-08-01T23:59:59.000Z

216

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

217

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

218

CYBER SECURITY AWARENESS & TRAINING Program Plan of Activity...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Publications IM-31, Policy, Guidance, and Planning Division Course Catalogue Cyber Tips Book Mark (2009 NCSA Month) Protect Your Family Brochure (Training and Awareness Materail)...

219

Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks  

E-Print Network (OSTI)

CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

Tilaro, F

2011-01-01T23:59:59.000Z

220

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

222

National Security & Safety | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety Safety National Security & Safety In the video above, three veterans discuss how the skills they learned in the service are helping them advance energy security and grow the clean energy economy. The veterans shared their experiences at a Champions of Change event at the White House. | Video by Matty Greene, Energy Department. The Energy Department plays an important and multifaceted role in protecting national security. In addition to our work to increase nuclear nonproliferation and ensure the security of the U.S. nuclear weapons stockpile, we manage the Strategic Petroleum Reserve, invest in protections against cyber and physical attacks on U.S. energy infrastructure, conduct programs to ensure worker health and safety, provide training tools and

223

National cyber defense high performance computing and analysis : concepts, planning and roadmap.  

SciTech Connect

There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

224

Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor  

Science Conference Proceedings (OSTI)

Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.

Ondrej Linda; Todd Vollmer; Jason Wright; Milos Manic

2011-04-01T23:59:59.000Z

225

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

226

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

227

Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies To Meet The Cyber Security And Information Intelligence Challenges Ahead  

Science Conference Proceedings (OSTI)

As our dependence on the cyber infrastructure grows ever larger, more complex and more distributed, the systems that compose it become more prone to failures and/or exploitation. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. Information explosion describes the pervasive abundance of (public/private) information and the effects of such. Gathering, analyzing, and making use of information constitutes a business- / sociopolitical- / military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace "mechanization." The goal of the workshop was to challenge, establish and debate a far-reaching agenda that broadly and comprehensively outlined a strategy for cyber security and information intelligence that is founded on sound principles and technologies. We aimed to discuss novel theoretical and applied research focused on different aspects of software security/dependability, as software is at the heart of the cyber infrastructure.

Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2008-01-01T23:59:59.000Z

228

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

229

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

230

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

231

CYBER SECURITY AWARENESS & TRAINING Program Plan of Activity...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

III. Theme The theme for the 2009 Summer Takin' It to the Streets awareness event is "Shape Up...Get Cyber Fit." 3 7222009 Last update: 5312011 IV. Audience The intended...

232

National Vulnerability Database Contact Information  

Science Conference Proceedings (OSTI)

... is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security's National Cyber Security Division. ...

233

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

234

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

235

T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security  

Science Conference Proceedings (OSTI)

Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

2009-07-20T23:59:59.000Z

236

Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

Science Conference Proceedings (OSTI)

Our reliance on the cyber infrastructure has further grown and the dependencies have become more complex. The infrastructure and applications running on it are not generally governed by the rules of bounded systems and inherit the properties of unbounded systems, such as the absence of global control, borders and barriers. Furthermore, the quest for increasing functionality and ease of operation is often at the cost of controllability, potentially opening up avenues for exploitation and failures. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. In the presence of information explosion, i.e., the pervasive abundance of (public/private) information and the effects of such, intelligence has the potential to shift the advantages in the dynamic game of defense and attacks in cyber space. Gathering, analyzing, and making use of information constitutes a business-/sociopolitical-/military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace. The goal of the workshop is to establish, debate and challenge the far-reaching agenda that broadly and comprehensively outlines a strategy for cyber security and information intelligence that is founded on sound principles and technologies.

Sheldon, Frederick T [ORNL; Peterson, Greg D [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2009-01-01T23:59:59.000Z

237

Pricing and Investments in Internet Security: A Cyber-Insurance Perspective  

E-Print Network (OSTI)

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In this regard, an important research problem is the analysis of optimal user self-defense investments and cyber-insurance contracts under the Internet environment. In this paper, we investigate two problems and their relationship: 1) analyzing optimal self-defense investments in the Internet, under optimal cyber-insurance coverage, where optimality is an insurer objective and 2) designing optimal cyber-insurance contracts for Internet users, where a contract is a (premium, coverage) pair.

Pal, Ranjan

2011-01-01T23:59:59.000Z

238

Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber security and information intelligence challenges and strategies  

SciTech Connect

As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information, which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value. The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. The aim of this workshop (www.csiir.ornl.gov/csiirw) was to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. Topics include: Scalable trustworthy systems Enterprise-level metrics Coping with insider and life-cycle threats Coping with malware and polymorphism Phishing/whaling, spam and cyber crime High assurance system survivability Cyber security for the Smart Grid Digital provenance and data integrity Privacy-aware security and usable security Social networking models for managing trust and security A principle goal of the workshop was to foster discussions and dialog among the 150 registered attendees from North America, Europe, Asia, and Africa. This goal was initiated and facilitated by 14 plenary keynote addresses including a banquet presentation and the CIO / CTO perspectives panel. A total of 98 papers (i.e., extended abstracts [EAs]) were submitted and 54 EAs were accepted plus 11 posters were invited. All of the abstracts and either presentation materials or posters are included in the proceedings. The subject areas span the topics above and were organized into eight tracks: Trust, Design, Malware, Network, Privacy and Metrics, Enterprise, Survivability and Formal Methods.

Sheldon, Frederick T [ORNL; Prowell, Stacy J [ORNL; Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2010-01-01T23:59:59.000Z

239

Modeling and simulation for cyber-physical system security research, development and applications.  

SciTech Connect

This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

2010-02-01T23:59:59.000Z

240

Compliance Order, Los Alamos National Security, LLC - July 12, 2007 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Compliance Order, Los Alamos National Security, LLC - July 12, 2007 Compliance Order, Los Alamos National Security, LLC - July 12, 2007 Compliance Order, Los Alamos National Security, LLC - July 12, 2007 July 12, 2007 Issued to Los Alamos National Security, LLC related to the Unauthorized Reproduction and Removal of Classified Matter from the Los Alamos National Laboratory The Compliance Order directs LANS to implement specific corrective actions to remediate both the laboratory management deficiencies that contributed to the thumb drive security incident at Los Alamos National Laboratory (LANL) discovered in October 2006 and, more broadly, longstanding deficiencies in the classified information and cyber security programs at LANL. Violation of the Compliance Order would subject LANS to issuance of a notice of violation and assessment of civil penalties up to S100,000 per

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Compliance Order, Los Alamos National Security, LLC - July 12, 2007 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Compliance Order, Los Alamos National Security, LLC - July 12, 2007 Compliance Order, Los Alamos National Security, LLC - July 12, 2007 Compliance Order, Los Alamos National Security, LLC - July 12, 2007 July 12, 2007 Issued to Los Alamos National Security, LLC related to the Unauthorized Reproduction and Removal of Classified Matter from the Los Alamos National Laboratory The Compliance Order directs LANS to implement specific corrective actions to remediate both the laboratory management deficiencies that contributed to the thumb drive security incident at Los Alamos National Laboratory (LANL) discovered in October 2006 and, more broadly, longstanding deficiencies in the classified information and cyber security programs at LANL. Violation of the Compliance Order would subject LANS to issuance of a notice of violation and assessment of civil penalties up to S100,000 per

242

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program … 2013  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013 OAS-M-14-01 October 2013 Department of Energy Washington, DC 20585 October 23, 2013 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy (Department) responsible for, among other things, regulating the interstate

243

Manager, Sandia National Laboratories | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

244

Cyber Security and You National Perspective  

E-Print Network (OSTI)

to reflect the Department's transformation operational goals. The 2001 Quadrennial Defense Review Report created by these challenges." The 2001 Quadrennial Defense Review Report lists the six critical operational picture. 1 2001 Quadrennial Defense Review Report, September 30, 2001, pg. 30; www

Sorin, Eric J.

245

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

246

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

247

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

248

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

- CA Grad Summer 644623 - CA High School Summer Search Sandia's CareersJobs Computer security is of critical importance, not only to Sandia National Laboratories but also to...

249

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

250

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration Finding of No Significant Impact for the Construction and Operation of a New Office Building and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area Office 528 35th Street Los Alamos, N M 8 7 5 4 4 DEPARTMENT OF ENERGY. NATIONAL NUCLEAR SECUIRTY ADMINISTRATION FINDING OF NO SIGNIFICANT INIPACT Construction and Operation of a New Office Building and Related Structures withinTA-3 at Los Alarnos National Laboratory, Los Alamos. New Mexico FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Construction and Operation of a New Office Building and Related Structures within TA-3 at L os Alamos National Laboratory, Los Alamos, New Mexico (DOE/EA- 7 375)

251

Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements  

E-Print Network (OSTI)

Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nations measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology (IT). ITLs responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in federal computer systems. This National Institute of Standards and Technology Interagency Report (NISTIR) discusses ITLs research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Interagency Report 7628, vol. 1 289 pages (August 2010) Certain commercial entities, equipment, or materials may be identified in this report in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply

The Smart; Grid Interoperability

2010-01-01T23:59:59.000Z

252

Sandia National Laboratories: National Security Missions: Internationa...  

NLE Websites -- All DOE Office Websites (Extended Search)

national security through global technical engagement. Enhance security of vulnerable nuclear weapons stockpiles and weapons-usable nuclear material in countries of concern and...

253

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

254

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

255

Security aspects of cyber-physical device safety in assistive environments  

Science Conference Proceedings (OSTI)

As more devices that affect their environment come into use, their proper functioning to protect the welfare of their charges is a concern. Examples include assistive transport devices, robotics, drug delivery systems, etc. Here privacy is not the primary ... Keywords: assistive-environments, cyber-physical systems, pervasive computing, safety, security, standards

Steven J. Templeton

2011-05-01T23:59:59.000Z

256

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

257

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

258

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

259

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

260

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Boot Camps The Cyber Boot Camp Program was developed to help make science and technology more exciting by treating students to hands-on experience and interaction with...

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge  

Science Conference Proceedings (OSTI)

The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

Ondrej Linda; Todd Vollmer; Milos Manic

2012-08-01T23:59:59.000Z

262

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

263

Argonne's National Security Information Systems National  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security National Security Information Systems National Security The NSIS team has worked with various government agencies and programs over the past 15 years to create customized technological solutions that meet specific needs, while also fulfilling national security objectives, improving efficiency and reducing costs. Applying a broad range of expertise and experience, the Argonne team develops both unclassified and classified information technology (IT) systems for national security and nonproliferation programs, with a focus on security operations, international treaty implementation, export control and law enforcement support. Some examples of NSIS-developed systems include:  Electronic Facility Clearance (e-FCL) System for the U.S. Department of Defense (DOD)

264

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

265

National Security Science  

NLE Websites -- All DOE Office Websites (Extended Search)

NSS cover - april NSS cover - april Read the April 2013 issue: web | interactive| pdf Skip to Content Skip to Search Skip to Utility Navigation Skip to Top Navigation Skip to Content Navigation Los Alamos National Laboratory submit About | Mission | Business | Newsroom | Phonebook Los Alamos National Laboratory links to site home page Science & Innovation Collaboration Careers, Jobs Community, Environment Science & Innovation Home » Science & Engineering Capabilities Accelerators, Electrodynamics Bioscience, Biosecurity, Health Chemical Science Earth, Space Sciences Energy Engineering High Energy Density Plasmas, Fluids Information Science, Computing, Applied Math Materials Science National Security, Weapons Science Nuclear & Particle Physics, Astrophysics, Cosmology

266

Climate Change and National Security  

Science Conference Proceedings (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communitieswith resultant advantages and differences. Climate change research has ...

Elizabeth L. Malone

2013-01-01T23:59:59.000Z

267

Pollux | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Pollux | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

268

Testimonials | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Testimonials | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

269

Features | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

270

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

271

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

272

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

273

National Security & Safety Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 2, 2012 July 2, 2012 Inspection Report: INS-O-12-02 Management of Explosives at Selected Department Sites June 29, 2012 Audit Report: OAS-M-12-05 Office of Secure Transportation Capabilities May 31, 2012 Audit Report: IG-0866 Integrated Safety Management at Sandia National Laboratories April 23, 2012 Audit Report: OAS-L-12-05 The Joint Actinide Shock Physics Experimental Research Facility at the Nevada National Security Site March 6, 2012 Inspection Report: INS-L-12-02 Follow-up Inspection on Security Clearance Terminations and Badge Retrieval at the Lawrence Livermore National Laboratory February 28, 2012 Audit Report: IG-0860 The Department of Energy's Implementation of Homeland Security Presidential Directive 12 November 15, 2011 Evaluation Report: OAS-M-12-01 The Federal Energy Regulatory Commission's Unclassified Cyber Security

274

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

275

Cyber Security and Information Intelligence Research Workshop (CSIIRW'11) Proceedings  

SciTech Connect

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Moreover, Massachusetts Institute of Technology (MIT) released the results of a two-year study, The Future of the Electric Grid.

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2011-01-01T23:59:59.000Z

276

Simulating non-stationary congestion systems using splitting with applications to cyber security  

Science Conference Proceedings (OSTI)

According to the former counterterrorism czar, Richard A. Clarke (2010), our national infrastructure could be severely damaged in 15 minutes by a cyber attack. A worm attack on an Internet Protocol (IP) network is one type of attack that is possible. ...

Martin J. Fischer; Denise M. B. Masi; John F. Shortle; Chun-Hung Chen

2010-12-01T23:59:59.000Z

277

Defining and Computing a Value Based Cyber-Security Measure  

SciTech Connect

In past work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities\\; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper we discuss the specification and design of a system that collects, updates and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

Aissa, Anis Ben [University of Tunis, Belvedere, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

2011-01-01T23:59:59.000Z

278

NERSC Cyber Security Challenges That Require DOE Development and Support  

E-Print Network (OSTI)

manufacturer, or otherwise, does not necessarily constituteSecurity Challenges That Require DOE Development and Supportimpact on the ability of DOE to accomplish its science

Draney, Brent; Campbell, Scott; Walter, Howard

2008-01-01T23:59:59.000Z

279

Cyber Security Awareness Training in the Age of Mobile ...  

Science Conference Proceedings (OSTI)

... Page 24. Property of Titan Info Security Group, LLC ? Instead of clicking on links in email, go to the site like Facebook, LinkedIn, etc. ...

2013-03-28T23:59:59.000Z

280

GARS | Nonproliferation and National Security Department  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation and National Security Department Nonproliferation The Nonproliferation and National Security Department carries out research and development, provides technical...

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Events and Conferences | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Areas Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Events and Conferences Events...

282

SUBJECT: National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration Sandia Site Ofce P. 0. Box 5400 Albuquerque, NM 87185 JAN O=P= ONP= Annual National Environmental Policy Act Planning Sumary 2013 Attached is: the Annual National Environmental Policy Act (NEPA) Planning Summary for the National Nuclear Security Administation, Sandia Site Ofce (SSO). Currently, there are two environmental assessments planned and one environmental impact statement in progess for the

283

Remote Access to the BNL Network, Cyber Security, Information Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

284

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

285

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

286

The Internet Security Alliance Response to the National ...  

Science Conference Proceedings (OSTI)

... provides authority for even further cyber security regulation since this ... is not problematic for an incentive model because incentives too can ...

2013-04-11T23:59:59.000Z

287

Fact Sheet: Cyber Security Audit and Attack Detection Toolkit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Audit and Attack Detection Toolkit Adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will be provided at no or a low cost to control system asset owners. The popular Nessus Vulnerability Scanner supports an audit plug-in that gathers configuration information from

288

National SCADA Test Bed Enhancing control systems security in the energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Test Bed Enhancing control systems security in the SCADA Test Bed Enhancing control systems security in the energy sector National SCADA Test Bed Enhancing control systems security in the energy sector Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA) and distributed control systems (DCS) used to monitor and manage our energy infrastructure. Many of the systems still in use today were designed to operate in closed, proprietary networks. National SCADA Test Bed Enhancing control systems security in the energy sector More Documents & Publications NSTB Summarizes Vulnerable Areas Transmission and Distribution World March 2007: DOE Focuses on Cyber

289

National Nuclear Security Administration Overview  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2011 - 1, 2011 - Page 1 National Transportation Stakeholders Forum Denver, Colorado May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2 National Transportation Stakeholders Forum (NTSF) * Introduction * NNSA Certifying Official Role * Offsite Source Recovery Project * Waste Shipments * Nuclear Materials Management Planning * Summary May 11, 2011 - Page 3 NNSA Plays a Critical Role: Ensuring our Nation's Security * Maintaining the safety, security and effectiveness of the nuclear weapons stockpile without nuclear testing * Reducing the global danger from the proliferation of nuclear weapons and materials * Provide safe and effective nuclear propulsion for the

290

CyberPhysical System Security for the Electric Power Grid  

E-Print Network (OSTI)

on the vulnerabil- ity of SCADA protocols. Security venues such as DEFCON, Blackhat, and RSA have recently included implementation vulnerabilities that allow attack- ers to execute arbitrary code in specific SCADA protocols

Manimaran, Govindarasu

291

Remote Access to the BNL Network, Cyber Security, Information...  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecureID tokens as soon as possible....

292

How to Lock Your Computer, Cyber Security, Information Technology...  

NLE Websites -- All DOE Office Websites (Extended Search)

How to Lock Your Computer One way to increase security on your computer is to use a password-protected screen saver. All Brookhaven computers are now required to run a...

293

Sandia National Laboratories: National Security Missions: Nuclear...  

NLE Websites -- All DOE Office Websites (Extended Search)

Missions Nuclear Weapons Stockpile Stewardship Ensuring the nation's nuclear weapons stockpile is safe, secure, and reliable. About Nuclear Weapons Since 1949, Sandia's scientists...

294

Proxy Documentation, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Proxy Configuration Proxy Configuration Here you will find instructions for using the FTP and Web proxies. Keep in mind that depending on where you access the proxies from (whether you are inside or outside of the BNL network), the process will differ slightly. For FTP, you will not be required to enter any passwords to use the proxies while on the BNL network. However, when accessing the proxies from an outside network (e.g. anything not .bnl.gov), you will be required to authenticate using a RSA SecurID Token. If you do not already have one of these, please visit the RSA SecurID User Guide for instructions on obtaining one. Users who are only interested in configuring their web browsers need NOT bother with RSA SecurID, as the web proxies will not be needed when you are outside the BNL network.

295

Facilities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration Facilities Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Test...

296

Reports | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration Reports Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Test and...

297

National Nuclear Security Administration (NNSA)  

NLE Websites -- All DOE Office Websites (Extended Search)

Team Summary I. Background: Defense Programs (DP) provides the core of the NNSA National Security Enterprise through its preeminent nuclear weapons scientific, engineering, and...

298

Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Complex Y-12 National Security Complexs primary mission is to support of the DOE nuclear weapons stockpile maintenance program. Activities include assembly and disassembly...

299

Transmission and Distribution World March 2007: DOE Focuses on Cyber Security  

Energy.gov (U.S. Department of Energy (DOE))

Energy sector owners, operators and system vendors team up to boost control system security with national SCADA test bed.

300

THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002, IG-0569 THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002,...

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

IEC 61850 and IEC 62351 Cyber Security Acceleration Workshop  

Science Conference Proceedings (OSTI)

The purpose of this workshop was to identify and discuss concerns with the use and adoption of IEC 62351 security standard for IEC 61850 compliant control system products. The industry participants discussed performance, interoperability, adoption, challenges, business cases, and future issues.

Clements, Samuel L.; Edgar, Thomas W.; Manz, David O.

2012-04-01T23:59:59.000Z

302

NERSC Cyber Security Challenges That Require DOE Development and Support  

E-Print Network (OSTI)

) is to accelerate the pace of scientific discovery by providing high performance computing, information, data, and impacts the productivity of the DOE Science community. In particular, NERSC and other high performance computing (HPC) centers have special security challenges that are unlikely to be met unless DOE funds

Geddes, Cameron Guy Robinson

303

Presented by National Security College  

E-Print Network (OSTI)

of maritime security, the Taiwan question, and the US-China nuclear balance and extended deterrence. HePresented by National Security College Japan Institute Strategic and Defence Studies Centre Department of Political and Social Change ARC Centre of Excellence in Policing and Security Pivotal Alliance

304

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 National Security Complex Y-12 National Security Complex Home > About Us > Our Operations > Acquisition and Project Management > M & O Support Department > Y-12 National Security Complex Y-12 National Security Complex Y-12 National Security Complex DE-AC05-00OR22800 Operated by Babcock & Wilcox Technical Services Y-12, LLC Updated to Modification 297 dated 09/30/2013 BASIC Contract (Official) Modifications (Official) Funding Mods Available Upon Request Conformed Contract (Unofficial) Basic Contract dated 8/31/2000 (pdf, 13,886KB) Y-12 A001 (9/15/00) (pdf, 60KB) Y-12 Conformed Contract (Conformed to Mod 297 dated 09/30/2013 (pdf, 4201 KB) Y-12 A002 (10/15/00) (pdf, 130KB) Y-12 M003 (10/26/00) (pdf, 77KB) Y-12 M004 (10/31/00) (pdf, 865KB) Y-12 M006 (10/31/00) (pdf, 191KB)

305

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

Us Screen reader users: click here for plain HTML Go to Google Maps Home The Center for Cyber Defenders Loading... Still loading... Slow? Use the troubleshooting guide or basic...

306

Nonproliferation and National Security Multimedia - Argonne National  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation and National Security Nonproliferation and National Security > Multimedia Multimedia Nuclear Systems Analysis Engineering Analysis Nonproliferation and National Security Detection & Diagnostic Systems Engineering Development & Applications Argonne's Nuclear Science & Technology Legacy Other Multimedia Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Bookmark and Share Nonproliferation and National Security: Multimedia Related Resources Nonproliferation and National Security Vulnerability Assessment Team (VAT) Click on the "Date" header to sort the videos/podcasts in chronological order (ascending or descending). You may also search for a specific keyword; click on the reset button refresh to remove the keyword filter and show again all the Videos/Podcasts.

307

Network and System Management for Reliability and Cyber Security  

Science Conference Proceedings (OSTI)

The evolving control of the electric power grid is increasingly dependent on information technology and telecommunication infrastructures, which, like the grid itself, must be managed in a holistic way to ensure reliability and security. The management of this information infrastructure requires connectivity and analytics to support both information technology (IT) and operational technology (OT) assets in a unified manner.This project utilized a telecommunications modeled network ...

2012-11-28T23:59:59.000Z

308

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

monitor and control critical infrastructure equipment, ranging from valves in oil and gas pipelines to switches and breakers in the national electric grid. If compromised, these...

309

Speeches | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

310

Newsletters | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Newsletters | National Nuclear Security Administration Newsletters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Newsletters Home > Media Room > Newsletters Newsletters NNSA publishes a monthly newsletter featuring current events and activities across the nuclear security enterprise. Online archives are available back

311

Speeches | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

312

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

313

Previous Sandia National Laboratories | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Previous Sandia National Laboratories | National Nuclear Security Previous Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Previous Sandia National Laboratories Home > About Us > Our Operations > Acquisition and Project Management > M & O Support Department > Sandia National Laboratories > Previous Sandia

314

Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements  

SciTech Connect

AbstractThis paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

Ondrej Linda; Milos Manic; Miles McQueen

2012-09-01T23:59:59.000Z

315

Shopping For Danger: E-commerce techniques applied to collaboration in cyber security  

SciTech Connect

Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today, but it is uncommonly practiced or encouraged in operating environments. Barriers to productive collaboration often include data sensitivity, time and effort to communicate, institutional policy, and protection of domain knowledge. We propose an ambient collaboration framework, Vulcan, designed to remove the barriers of time and effort and mitigate the others. Vulcan automated data collection, collaborative filtering, and asynchronous dissemination, eliminating the effort implied by explicit collaboration among peers. We instrumented two analytic applications and performed a mock analysis session to build a dataset and test the output of the system.

Bruce, Joseph R.; Fink, Glenn A.

2012-05-24T23:59:59.000Z

316

22nd National Information Systems Security Conference  

Science Conference Proceedings (OSTI)

... Techniques Dr. Roshan Thomas, NAI Labs ... Kubic, National Security Agency Tom Shake, MIT ... Security Implementations Bret Hartman, Concept Five ...

2000-10-25T23:59:59.000Z

317

NNSA: Securing Domestic Radioactive Material | National Nuclear...  

National Nuclear Security Administration (NNSA)

Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

318

Disable Automatic Login, Cyber Security, Information Technology Division,  

NLE Websites -- All DOE Office Websites (Extended Search)

Disable Automatic Login Disable Automatic Login Automatic Login MUST be disabled... Follow the steps below to verify that auto login is disabled. Verify Security Settings Select Personal Section: Click Make sure the following required boxes are checked. - Require password to wake this computer from sleep or screen saver - Disable automatic login If so, close panel. If not, continue... Note: Mac users should have the panel locked at all times. Click the lock image to lock the panel if its open to prevent further changes. To unlock the above panel, click the lock image to bring up the login box. Insert your username & password, click . You should now be able to make changes to the panel.

319

Innovations for a secure nation  

NLE Websites -- All DOE Office Websites (Extended Search)

Innovations for a Secure Nation Innovations for a Secure Nation /about/_assets/images/icon-70th.jpg Innovations for a Secure Nation LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. image description Plasma technology for textile finishing applications gets a boost from LANL APJeT received a $100,000 Venture Acceleration Fund award from LANS helping to complete design and engineering of a commercial-scale production unit. - 4/3/12 One of several active projects, LANL and Chevron co-developed INFICOMM(tm), a wireless technology used to collect real-time temperature and pressure information from sensors in oil and gas wells, including very deep wells already producing oil and gas and drilling operations for new wells.

320

National Security Agency  

E-Print Network (OSTI)

The governmentattic.org web site (the site) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. NATIONAL SECURITY AGENCY

unknown authors

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Supercomputers | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Supercomputers | National Nuclear Security Administration Supercomputers | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Supercomputers Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Supercomputers

322

Announcements | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Announcements | National Nuclear Security Administration Announcements | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Announcements Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract > Announcements

323

Cyber Innovation Technology Summit | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Innovation Technology Summit Cyber Innovation Technology Summit Cyber Innovation Technology Summit November 5, 2013 8:00AM EST Course Title: Cyber Innovation Technology Summit Course Start/End Date: November 5, 2013 Start/End Time: 8:00AM-12:00 PM Course Type: Classrooom Course Location: Forrestal Large Auditorium Course Description: Every October and November, the Department of Energy (DOE) joins the Department of Homeland Security (DHS) and other federal, state and local agencies across the country in support of National Cybersecurity Awareness Month and the "Stop. Think. Connect." campaign. This year marks the tenth year of the cyber security awareness campaign. The theme for this year is Achieving Cybersecurity Together: It's Our Shared Responsibility. By consistently following simple

324

Expertise | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

event. As one of the National Nuclear Security Administration's original nuclear weapons production facilities, Y-12 National Security Complex has more than 60 years of...

325

Argonne Chemical Sciences & Engineering - National Security ...  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Forensics * Members * Contact * Publications * Overview National Security Home National Security - Nuclear Forensics Nick Woods with a custom modified HEPA-filtered...

326

Argonne's National Security Information Systems  

E-Print Network (OSTI)

was asked by the DOE National Nuclear Security Administration (NNSA) to install the ARG-US RFID equipment in the NNSA vehicles (a Peterbilt truck and a Dodge Sprinter van) and integration with the in-vehicle Omni about the DOE/NNSA's Global Threat Reduction Initiative (GTRI) for voluntary security enhancements

Kemner, Ken

327

DOE to Provide Nearly $8 Million to Safeguard the Nations Energy Infrastructure from Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE))

U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically-advanced controls and cyber-security devices into our electric grid and energy infrastructure.

328

Pollux | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Pollux | National Nuclear Security Administration Pollux | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Video Gallery > Pollux Pollux Pollux The National Nuclear Security Administration (NNSA) announced that Pollux, a subcritical experiment, was successfully conducted at its Nevada National Security Site (NNSS). This video is of the vessel containing the Pollux experiment.

329

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

330

International | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

International | National Nuclear Security Administration International | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog International Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > International International U.S. Department of Energy / U.S. Nuclear Regulatory Commission

331

Chemist, Sandia National Laboratories | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Chemist, Sandia National Laboratories | National Nuclear Security Chemist, Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Jerilyn Timlin Chemist, Sandia National Laboratories Jerilyn Timlin Jerilyn Timlin Role: Chemist, Sandia National Laboratories Award: National Institutes of Health (NIH) New Innovator Award

332

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

333

Budget | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Budget | National Nuclear Security Administration Budget | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Budget Home > About Us > Budget Budget Full details of the President's FY14 budget for NNSA can be found here. We're keeping the American people safe. President Obama has laid out the most ambitious view of nuclear security in decades. Our

334

Budget | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Budget | National Nuclear Security Administration Budget | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Budget Home > About Us > Budget Budget Full details of the President's FY14 budget for NNSA can be found here. We're keeping the American people safe. President Obama has laid out the most ambitious view of nuclear security in decades. Our

335

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

National Laboratories Press Release 62912). Institutional Research & Development National Nuclear Security Administration Office of Advanced Simulation and Computing and...

336

Bruce Held visits Y-12 National Security Complex | National Nuclear...  

NLE Websites -- All DOE Office Websites (Extended Search)

Held visits Y-12 National Security Complex | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

337

LANL | TT | Awards - Los Alamos National Lab: National Security ...  

Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA. Inside | Copyright 2010-11 Los Alamos National Security, ...

338

FY 2011 National Security Technologies, LLC, PER Summary | National...  

National Nuclear Security Administration (NNSA)

National Security Technologies, LLC, PER Summary | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

339

The National Information Systems Security Conference ...  

Science Conference Proceedings (OSTI)

The National Information Systems Security Conference announces its Keynote and Banquet Speakers. August Bequai, Esq ...

1996-10-28T23:59:59.000Z

340

Intelligence Programs | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

that build upon ORNL core competencies and signature strengths. Our Focus Areas Cyber Big Data Analytics Knowledge Discovery Analysis Signal Solutions Biometrics Intel...

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

NERSC Cyber Security Challenges That Require DOE Development andSupport  

Science Conference Proceedings (OSTI)

Traditional security approaches do not adequately addressall the requirements of open, scientific computing facilities. Many ofthe methods used for more restricted environments, including almost allcorporate/commercial systems, do not meet the needs of today's science.Use of only the available "state of the practice" commercial methods willhave adverse impact on the ability of DOE to accomplish its sciencegoals, and impacts the productivity of the DOE Science community. Inparticular, NERSC and other high performance computing (HPC) centers havespecial security challenges that are unlikely to be met unless DOE fundsdevelopment and support of reliable and effective tools designed to meetthe cyber security needs of High Performance Science. The securitychallenges facing NERSC can be collected into three basic problem sets:network performance and dynamics, application complexity and diversity,and a complex user community that can have transient affiliations withactual institutions. To address these problems, NERSC proposes thefollowing four general solutions: auditing user and system activityacross sites; firewall port configuration in real time;cross-site/virtual organization identity management and access control;and detecting security issues in application middleware. Solutions arealsoproposed for three general long term issues: data volume,application complexity, and information integration.

Draney, Brent; Campbell, Scott; Walter, Howard

2007-01-16T23:59:59.000Z

342

Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites

About About Careers Community Employees & Retirees Library Suppliers Contact Us Y-12 Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | B&W Y-12 donates $75,000 to Emory Valley Center Facebook Twitter YouTube Flickr RSS Feature Stories Expertise Our NRFTC trainers have many years of operational experience at Y-12 as well as on numerous international missions. Nuclear Detection and Forensics A strong technical nuclear detection and forensics capability is important to the nation's security. "Cook"ing at Y-12 for 70 years We have an enduring mission. Y-12 plays a key role in it. And a nuclear deterrent remains the ultimate insurance policy for America. Young Innovators' Society Awesome Eyeballs visit Y-12

343

Experiences and Challenges with Using Cert Data to Analyze International Cyber Security  

E-Print Network (OSTI)

With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The ...

Madnick, Stuart

344

Building the Next Generation of Cyber Defenders  

Science Conference Proceedings (OSTI)

Page 1. Building the Next Generation of Cyber Defenders ... 19th Century 20th Century The Cyber Security Problem Space ? Historic Background ...

2013-03-28T23:59:59.000Z

345

Leadership | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Leadership | National Nuclear Security Administration Leadership | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Leadership Home > Field Offices > Welcome to the Livermore Field Office > Leadership Leadership Kimberly D. Lebak, Manager Kim Lebak became the Livermore Site Manager in January, 2012 for the National Nuclear Security Administration of the U.S. Department of Energy.

346

Events | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Events | National Nuclear Security Administration Events | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Events Home > Media Room > Events Events Learn more about upcoming events in your community and find out how to request NNSA involvement at your next event. Event Nov 2, 2011 Webinar: Proposed Changes to the CFR Part 810 Regulation

347

Programs | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Programs | National Nuclear Security Administration Programs | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Programs Home > Field Offices > Welcome to the Sandia Field Office > Programs Programs The SFO Programs office is responsible for direction, day-to-day oversight and contract administration activities in support of the technical

348

Events | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Events | National Nuclear Security Administration Events | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Events Home > Media Room > Events Events Learn more about upcoming events in your community and find out how to request NNSA involvement at your next event. Event Nov 2, 2011 Webinar: Proposed Changes to the CFR Part 810 Regulation

349

What are we teaching in cyber competitions?  

Science Conference Proceedings (OSTI)

Student competitions are widespread across all academic disciplines, and are often touted as a means to motivate and educate students. Competitions may be internal within a single class or course, or vie school against school as regional, national, or ... Keywords: Educational institutions,Computer security,Robots,Computers,Organizations,Programming,Security Education,Cyber,Competitions

Steven Fulton, Dino Schweitzer, Judson Dressler

2012-10-01T23:59:59.000Z

350

Testimonials | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Testimonials | National Nuclear Security Administration Testimonials | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Testimonials Home > Federal Employment > Working at NNSA > Testimonials Testimonials At the NNSA, you will have the opportunity to work with some of the brightest professionals in the world who routinely tackle highly complex

351

Compensation | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Compensation | National Nuclear Security Administration Compensation | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Compensation Home > Federal Employment > Working at NNSA > Compensation Compensation Whether you're a new college graduate, someone with industry experience looking to move into a Federal job or a current government employee looking

352

Overview | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Overview | National Nuclear Security Administration Overview | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Overview Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > About ASC > Overview Overview

353

Accomplishments | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Accomplishments | National Nuclear Security Administration Accomplishments | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Accomplishments Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > About ASC > Accomplishments

354

Operations | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Operations Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Operations Operations NNSA's Emergency Response Operations program acts as the headquarters command and control, functioning as the coordinating focal point for all

355

Procurement | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Procurement | National Nuclear Security Administration Procurement | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Procurement Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Procurement Procurement NNSA's Small Business program serves as the Info-structure through which NNSA effectively disseminates information regarding our small business

356

Operations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Operations Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Operations Operations NNSA's Emergency Response Operations program acts as the headquarters command and control, functioning as the coordinating focal point for all

357

Accomplishments | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Accomplishments | National Nuclear Security Administration Accomplishments | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Accomplishments Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > About ASC > Accomplishments

358

Contact | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Contact | National Nuclear Security Administration Contact | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Contact Home > About Us > Our Locations > Albuquerque Complex > Federal Asian Pacific American Council - New Mexico Chapter Albuquerque, NM > Contact Contact "Promoting Equal Opportunity and Cultural Diversity for APAs in Government"

359

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

360

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

United States. The partnership of Oak Ridge National Laboratory, the Y-12 National Security Complex and the Savannah River National Laboratory are all tightly linked to the...

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Argonne Chemical Sciences & Engineering - National Security ...  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Home National Security - Nanoscale Engineering Super-absorbent gel Using this spray-on, super-absorbent gel and engineered nanoparticles, Argonne researchers are...

362

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

363

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

364

Wayne Meitzler PNNL Component Security R&D Program Manager  

E-Print Network (OSTI)

Wayne Meitzler PNNL Component Security R&D Program Manager Wayne Meitzler, as Pacific Northwest National Laboratory (PNNL) Component Security R&D Program Manager, has over 15 years of cyber security R systems. In the 90s, Wayne was one of the early cyber security R&D leaders at PNNL, and his research

Perkins, Richard A.

365

NATIONAL NUCLEAR SECURITY ADMINISTRATION  

National Nuclear Security Administration (NNSA)

NNSA Policy Letter: NAP-5 NNSA Policy Letter: NAP-5 (DOE P 450.3) Date: October 16, 2002 TITLE: Policy Letter for Standards Management I. OBJECTIVE: Establish NNSA expectations for Standards Management Programs used to select and maintain applicable standards for work performed at NNSA Headquarters and field sites. II. APPLICABILITY: NNSA federal staff and NNSA management and operating contractors, and other prime contractors as determined by NNSA Headquarters and/or field site management, shall use a defined formal process to tailor environment, safety, and health; project management; safeguards and security; quality assurance; business; and administrative standards and, as determined by NNSA management, other standards used to perform federal and contractor work. Here, the term standard encompasses federal,

366

Introduction SCADA Security for Managers and Operators | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector Introduction SCADA...

367

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

368

Engineering | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Engineering | National Nuclear Security Administration Engineering | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Engineering Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Engineering Engineering NNSA uses modern tools and capabilities in the engineering sciences field which are needed to ensure the safety, security, reliability and

369

Lawrence Livermore National Laboratory | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Lawrence Livermore National Laboratory Lawrence Livermore National Laboratory Home > About Us > Our Operations > Acquisition and Project Management > M & O Support Department > Lawrence Livermore National Laboratory Lawrence Livermore National Laboratory Lawrence Livermore National Laboratory DE-AC52-07NA27344 Operated by Lawrence Livermore National Security, LLC BASIC Contract (Official) Modifications (Official) Funding Mods Available Upon Request Conformed Contract (Unofficial) LLNL Sec A (SF33) (pdf, 91KB) See Modifications Section under Conformed Contract Link LLNS Conformed Contract (weblink) LLNL Sec B-H (pdf, 306KB) LLNL Sec I pdf 687KB LLNL Sec J Appx A (pdf, 67KB) LLNL Sec J Appx B (pdf, 191KB) LLNL Sec J Appx C (pdf, 11KB) LLNL Sec J Appx D (pdf, 18KB)

370

Cyber Incidents Involving Control Systems  

Science Conference Proceedings (OSTI)

The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

Robert J. Turk

2005-10-01T23:59:59.000Z

371

2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop  

SciTech Connect

Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on rebalancing cyberspace to mitigate threats and maximize benefits, ensuring security and privacy in a constantly changing adversarial environment. Recognizing this great need, we requested original paper submissions in four general areas derived from the Federal Cybersecurity R&D program thrusts: Designed-In-Security (DIS) Builds the capability to design, develop, and evolve high-assurance, software-intensive systems predictably and reliably while effectively managing risk, cost, schedule, quality, and complexity. Tailored Trustworthy Spaces (TTS) Provides flexible, adaptive, distributed trust environments that can support functional and policy requirements arising from a wide spectrum of activities in the face of an evolving range of threats--recognizing the user's context and evolves as the context evolves. Moving Target (MT) Enables us to create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency. Cyber Economic Incentives (CEI) Develops effective incentives to make cybersecurity ubiquitous, including incentives affecting individuals and organizations.

Sheldon, Frederick T [ORNL; Giani, Annarita N. [Los Alamos National Laboratory (LANL); Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2013-01-01T23:59:59.000Z

372

2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop  

SciTech Connect

Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on rebalancing cyberspace to mitigate threats and maximize benefits, ensuring security and privacy in a constantly changing adversarial environment. Recognizing this great need, we requested original paper submissions in four general areas derived from the Federal Cybersecurity R&D program thrusts: Designed-In-Security (DIS) Builds the capability to design, develop, and evolve high-assurance, software-intensive systems predictably and reliably while effectively managing risk, cost, schedule, quality, and complexity. Tailored Trustworthy Spaces (TTS) Provides flexible, adaptive, distributed trust environments that can support functional and policy requirements arising from a wide spectrum of activities in the face of an evolving range of threats--recognizing the user's context and evolves as the context evolves. Moving Target (MT) Enables us to create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency. Cyber Economic Incentives (CEI) Develops effective incentives to make cybersecurity ubiquitous, including incentives affecting individuals and organizations.

Sheldon, Frederick T [ORNL; Giani, Annarita N. [Los Alamos National Laboratory (LANL); Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2013-01-01T23:59:59.000Z

373

Recovery | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Recovery | National Nuclear Security Administration Recovery | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Recovery Home > About Us > Our Programs > Emergency Response > Planning for Emergencies > Recovery Recovery NNSA ensures that capabilities are in place to respond to any NNSA and Department of Energy facility emergency. It is also the nation's premier

374

Preparedness | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Preparedness | National Nuclear Security Administration Preparedness | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Preparedness Home > About Us > Our Programs > Emergency Response > Planning for Emergencies > Preparedness Preparedness NNSA ensures that capabilities are in place to respond to any NNSA and Department of Energy facility emergency. It is also the nation's premier

375

Nonproliferation | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation Home > About Us > Our Programs > Nonproliferation Nonproliferation One of the gravest threats the United States and the international community face is the possibility that terrorists or rogue nations will acquire nuclear weapons or other weapons of mass destruction (WMD). NNSA,

376

Veterans | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Veterans | National Nuclear Security Administration Veterans | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Veterans Home > Federal Employment > Our Jobs > Hiring Flexibilities > Veterans Veterans NNSA strives to be a model employer for veterans who wish to continue their service to the nation through civilian employment. When applying for NNSA

377

Policy | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Policy | National Nuclear Security Administration Policy | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Policy Home > About Us > Our Programs > Emergency Response > Planning for Emergencies > Policy Policy NNSA ensures that capabilities are in place to respond to any NNSA and Department of Energy facility emergency. It is also the nation's premier

378

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Wnchington, DC 20585 Wnchington, DC 20585 July 13, 2010 OFFICE O F THE ADMINISTRATOR 'l'he Honorable Peter S. Winokur Chairman Defense Nuclear Facilities Safety Board 625 Indiana Avenue, NW, Suite 700 Washington, D.C. 20004 [>ear Mr. Chairman: By the direction of the Secretary of Energy, the enclosed is the Department's Implementation Plan (Plan) for Defense Nuclear Facilities Safety Board (Board) Recommendation 2009-2, Los Alamos Nutional Luhorutory Plutoniu?lt Fucilitj. Sr i s m ic Sufety. The Plan provides the Department's approach for implementing near-term actions to reduce the consequences of seismically-induced events at the Los Alamos National Laboratory Plutonium Facility, and longer-tcrm actions to ensure continued safe operation of the facility. Mr. James .I. McConnell. Assistant Deputy Administrator for Nuclear Safety and

379

Los Alamos National Lab: National Security Science  

NLE Websites -- All DOE Office Websites (Extended Search)

Content stc logo Content stc logo Best of Show Winner of STC's International Summit Awards Competition, 2013 Top Innovations of the Year Science and technology for a safe, secure nation Impenetrable encryption defends data from cyberterrorism keyboard with atrack button A hacker could crack a code, steal private information or shut down systems we rely on daily. Small enough to fit in a smart phone, our QkarD technology ("kee-u-kard") provides virtually impenetrable defense, using quantum cryptography to secure computers. This novel encryption generates security at the subatomic particle level. If someone tries to hack in, that particle is altered, and the owner quietly alerted. And it works-even against super-powerful quantum computers. Multipronged HIV vaccine shows promise in monkeys

380

NISTIR 7751, Computer Security Division 2010 Annual  

Science Conference Proceedings (OSTI)

... 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 14 ... 10. NISTIR 7628, Guidelines for Smart Grid Cyber Security. ...

2012-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

382

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

383

Contact Us | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Home > Contact Us Contact Us NNSA The National Nuclear Security Administration is always happy to hear from those we are committed to serve as part of the nation's security. To...

384

Y-12 National Security Complex - Enforcement Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 National Security Complex Preliminary Notice of Violation issued to Babcock & Wilcox Technical Services Y-12, LLC related to a Uranium Chip Fire at the Y-12 National Security...

385

NNSA Production Office | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Production Office | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing...

386

Nonproliferation and National Security Program Contacts, Argonne...  

NLE Websites -- All DOE Office Websites (Extended Search)

Contacts Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral...

387

Performance Evaluations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Performance Evaluations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

388

Major Contract Solicitations | National Nuclear Security Administratio...  

National Nuclear Security Administration (NNSA)

Solicitations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

389

Employee Concerns Reporting Form | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Reporting Form | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing...

390

NNSA has 'Natitude' | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

has 'Natitude' | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing...

391

Albuquerque Complex | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Albuquerque Complex | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

392

May 2013 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

3 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

393

August 2012 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

2 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

394

September 2013 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

3 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

395

November 2013 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

3 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

396

June 2011 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

1 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

397

February 2013 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

3 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

398

January 2014 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

4 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

399

Annual Reports | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Annual Reports | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing...

400

NEPA Terminology | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NEPA Terminology | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing...

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

BSL-3 Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Links | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

402

Electronic Comment Form | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Electronic Comment Form | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

403

BSL-3 Documents | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Documents | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

404

Program Requirements | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Requirements | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

405

Countering Nuclear Terrorism | National Nuclear Security Administratio...  

NLE Websites -- All DOE Office Websites (Extended Search)

Countering Nuclear Terrorism | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

406

December 2011 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

1 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

407

Our Programs | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

408

Proliferation Detection | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Proliferation Detection | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

409

Foreign WMD Proliferation Detection | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

WMD Proliferation Detection | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

410

Individualized Site Training | National Nuclear Security Administratio...  

National Nuclear Security Administration (NNSA)

Individualized Site Training | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

411

Search Response Team | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Search Response Team | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

412

ITL Security Bulletin: The National Vulnerability Database ...  

Science Conference Proceedings (OSTI)

... Harold Booth, Doug Rike and Greg Witte, Editors Computer Security Division Information Technology Laboratory National Institute of Standards ...

2013-12-17T23:59:59.000Z

413

March 2012 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

2 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

414

Continuing Management Reform | National Nuclear Security Administratio...  

National Nuclear Security Administration (NNSA)

Continuing Management Reform | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

415

Chernobyl Nuclear Accident | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Chernobyl Nuclear Accident | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

416

Nuclear Verification | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Verification | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

417

Material Removal and Disposition | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Removal and Disposition | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

418

NNSA Timeline | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Timeline | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

419

Our History | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

History | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

420

Video Gallery | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

November 2012 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

2 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

422

Our Mission | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Mission | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

423

July 2012 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

2 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

424

Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation.  

E-Print Network (OSTI)

??While smart grid technologies are deployed to help achieve improved grid resiliency and efficiency, they also present an increased dependency on cyber resources which may (more)

Hahn, Adam

2013-01-01T23:59:59.000Z

425

Federal Register Notice: National Nuclear Security Administration...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Register Notice: National Nuclear Security Administration Site-Wide Environmental Impact Statement for Sandia National Laboratories, New Mexico (SNLNM) Federal Register Notice:...

426

Weapons | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Weapons | National Nuclear Security Administration Weapons | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Weapons Home > Our Mission > Managing the Stockpile > Weapons Weapons The New START Treaty, which was signed in 2010, between the United States and Russian Federation will cap the strategic deployed nuclear arsenals of each country at 1,550 warheads, a nearly 75% reduction compared with the

427

National Nuclear Security Administration IUA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IUA IUA '1.L'\I~~ Pantex Site Office IIV1'~~4j P. O. Box 30030 Amarillo, TX 79120 National Nuclear Security Administration NEPA Compliance Officer Rationale Pantex Site Office Proj. No.: EXP-IO-OlS-C NEPA ID No.: PXP-IO-OOOI Uninterruptable Power Supply (UPS)/Generator Replacement Application of DOE NEPA Procedure: Categorical Exclusions B 1.3 and B 1.23, Applicable to Facility Operations (10 CFR Part 1021 , Subpart D, Appendix B), apply to the proposed activity described below. Rationale: The U.S . Department of Energy (DOE), National Nuclear Security Administration (NNSA), proposes to demolish Building 12-20, which is 225 square feet (sf) in size, along with a small concrete pad of approximately 32 sf. The building currently houses an inoperable

428

Benefits | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Benefits | National Nuclear Security Administration Benefits | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Benefits Home > Federal Employment > Working at NNSA > Benefits Benefits The great jobs we have at NNSA also come with comprehensive benefits packages. They are among the best and most comprehensive available and play a vital role in demonstrating the Federal government and NNSA's

429

Benefits | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Benefits | National Nuclear Security Administration Benefits | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Benefits Home > Federal Employment > Working at NNSA > Benefits Benefits The great jobs we have at NNSA also come with comprehensive benefits packages. They are among the best and most comprehensive available and play a vital role in demonstrating the Federal government and NNSA's

430

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

431

Nonproliferation and National Security Program - Nuclear Engineering  

NLE Websites -- All DOE Office Websites (Extended Search)

Major Programs > Nonproliferation and Major Programs > Nonproliferation and National Security Program Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program (NPNS)

432

National Security Studies Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Security Studies Program National Security Studies Program National Security Studies Program Objective The National Security Studies Program (NSSP) is designed to prepare future leaders of civilian agencies for high-level policy, command, and staff responsibilities. The NSSP focuses on international environments and commercial partnerships. All students successfully completing the program are awarded a Master's degree. The program does not involve a promotion or a change in position. Benefits to the Organization The program prepares federal civilian employees for high-level policy, command, and staff responsibilities. Participants will gain valuable experience in leadership, information strategy, national security studies, military strategy, logistics, economics, industry studies, and more. The

433

Los Alamos director echoes cyber concerns  

NLE Websites -- All DOE Office Websites (Extended Search)

Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Director Charlie McMillan told a gathering of energy executives that securing the electrical grid is a major concern now and it's only becoming more serious. May 21, 2013 Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Contact Fred deSousa

434

Oversight Reports - Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Oversight Reports - Nevada National Security Site May 22, 2013 Independent Oversight Review, Nevada National Security - May 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure December 18, 2012 Independent Activity Report, Nevada National Security Site - December 2012 Nevada National Security Site Operational Awareness Visit [HIAR NNSS-2012-12-03] October 3, 2012 Independent Activity Report, Nevada National Security Site - August 2012 Operational Awareness Oversight of the Nevada National Security Site [HIAR NNSS-2012-08-16] April 2, 2012 Independent Oversight, Nevada National Security Site - March 2012 Review of the Nevada National Security Site Implementation Verification

435

Response to Request for Additional Information regarding Request for Approval of the Cyber Security Plan San Onofre Nuclear Generating Station, Units 2 and 3  

E-Print Network (OSTI)

By letter dated July 22, 2010 (Reference) Southern California Edison submitted a license amendment request for approval of the Cyber Security Plan for San Onofre Nuclear Generating Station (SONGS) in accordance with 10 CFR 73.54. The purpose of this license amendment was to provide an Implementation Schedule, provide a table of SONGS deviations from NEI 08-09 Revision 6, and add a sentence to the existing Facilities Operating Licenses (FOL) license condition for Physical Security to require SCE to fully implement and maintain in effect all provisions of the Commission approved Cyber Security Plan. By e-mail dated March 1, 2011, the NRC requested additional information through three generic questions developed by the NRC staff following discussions with the Nuclear Energy Institute and the industry Cyber Security Task Force. Responses to the NRC request for additional information are provided in the Enclosure to this letter.

Southern Edison; Douglas R. Bauder

2011-01-01T23:59:59.000Z

436

Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > Field Offices > Welcome to the NNSA Production Office > Links Home > Field Offices > Welcome to the NNSA Production Office > Links Links NNSA HQ National Nuclear Security Administration Advanced Simulation & Computing NNSA Graduate Program NNSA Small Business Program Office of Defense Nuclear Nonproliferation Field Offices NNSA Albuquerque Complex Kansas City Field Office Livermore Field Office Los Alamos Field Office Naval Reactors Idaho Branch Office Nevada Field Office Sandia Field Office DOE Oak Ridge Sites Oak Ridge Office Oak Ridge National Laboratory UCOR Oak Ridge Institute for Science and Education Oak Ridge Site Specific Advisory Board American Museum of Science and Energy City of Oak Ridge Plants Laboratories Bechtel Nevada Bettis Laboratory Kansas City Plant Knolls Atomic Power Laboratory Lawrence Livermore National Laboratory

437

Pantex Occupational Health System (OHS), National Nuclear Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security...

438

2012 Annual Planning Summary for National Nuclear Security Administrat...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration 2012 Annual Planning Summary for National Nuclear Security Administration The ongoing and projected Environmental Assessments and...

439

Sandia National Laboratories: National Security Missions: International  

NLE Websites -- All DOE Office Websites (Extended Search)

WMD Counterterrorism & Response WMD Counterterrorism & Response Airworthiness Weapons of Mass Destruction (WMD) Counterterrorism & Response provides operational planning assistance and training to counter domestic and international nuclear and radiological terrorism, including: Specialized training for nuclear and explosive threats for warfighters and law enforcement Technologies for evaluating airframe integrity and other critical structural integrity Our partners include National Nuclear Security Administration (NNSA), Department of Defense (DoD), and Federal Aviation Administration (FAA). Program Areas include: Airworthiness and Infrastructure Assurance Nuclear Incident Response Nuclear Counterterrorism Chemical, Biological, Radiological, Nuclear and Explosives Technology Development

440

FY 2009 National Security Technologies, LLC, PER Summary | National Nuclear  

National Nuclear Security Administration (NNSA)

National Security Technologies, LLC, PER Summary | National Nuclear National Security Technologies, LLC, PER Summary | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog FY 2009 National Security Technologies, LLC, PER Summary Home > About Us > Our Operations > Acquisition and Project Management > Performance Evaluations > FY 2009 National Security Technologies, LLC, PER

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

FY 2011 National Security Technologies, LLC, PER Summary | National Nuclear  

National Nuclear Security Administration (NNSA)

National Security Technologies, LLC, PER Summary | National Nuclear National Security Technologies, LLC, PER Summary | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog FY 2011 National Security Technologies, LLC, PER Summary Home > About Us > Our Operations > Acquisition and Project Management > Performance Evaluations > FY 2011 National Security Technologies, LLC, PER

442

FY 2007 National Security Technologies, LLC, PER Summary | National Nuclear  

National Nuclear Security Administration (NNSA)

National Security Technologies, LLC, PER Summary | National Nuclear National Security Technologies, LLC, PER Summary | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog FY 2007 National Security Technologies, LLC, PER Summary Home > About Us > Our Operations > Acquisition and Project Management > Performance Evaluations > FY 2007 National Security Technologies, LLC, PER

443

Cyber Friendly Fire  

Science Conference Proceedings (OSTI)

Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public. The network is essentially divided into a production component that hosts the web and network services, and a user component that hosts thirty employee workstations and other end devices. The organization's network is separated from the Internet by a Cisco ASA network security device that both firewalls and detects intrusions. Business sensitive information is stored in various servers. This includes data comprising thousands of internal documents, such as finance and technical designs, email messages for the organization's employees including the CEO, CFO, and CIO, the organization's source code, and Personally Identifiable client data. Release of any of this information to unauthorized parties would have a significant, detrimental impact on the organization's reputation, which would harm earnings. The valuable information stored in these servers pose obvious points of interest for an adversary. We constructed several scenarios around this environment to support studies in cyber SA and cyber FF that may be run in the test range. We describe mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approaches. Finally, we discuss possible future research directions.

Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

2011-09-01T23:59:59.000Z

444

Director at Sandia National Laboratories | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

at Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

445

NNSA: Securing Domestic Radioactive Material | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

NNSA: Securing Domestic Radioactive Material | National Nuclear Security NNSA: Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > NNSA: Securing Domestic Radioactive Material Fact Sheet NNSA: Securing Domestic Radioactive Material Apr 12, 2013 The Department of Energy's National Nuclear Security Administration (NNSA),

446

Issued by Sandia National Laboratories...  

NLE Websites -- All DOE Office Websites (Extended Search)

including physical security, cyber security, counterintelligence, security incident management, information security, operations security, personnel security, the human...

447

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... cyber maryLaNd summit. Please NOTE -- Last Updated Wednesday, January 20, 2010. PRESENTATIONS: ... NIST Voting Cyber Security: ...

448

Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research  

Science Conference Proceedings (OSTI)

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid ...

Frederick T. Sheldon; Robert Abercrombie; Axel Krings

2011-10-01T23:59:59.000Z

449

Consent Order, Lawrence Livermore National National Security, LLC -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lawrence Livermore National National Security, LLC - Lawrence Livermore National National Security, LLC - WCO-2010-01 Consent Order, Lawrence Livermore National National Security, LLC - WCO-2010-01 October 29, 2010 Consent Order issued to Lawrence Livermore National Security, LLC for deficiencies associated with the Lawrence Livermore National Laboratory Chronic Beryllium Disease Prevention Program This letter refers to the Office of Health, Safety and Security, Office of Enforcement investigation into deficiencies associated with the Lawrence Livermore National Laboratory (LLNL) Chronic Beryllium Disease Prevention Program (CBDPP) and related work planning and control processes. The results of the investigation were provided to Lawrence Livermore National Security, LLC (LLNS) in an Investigation Report dated July 7, 2009. An

450

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

451

Sandia National Laboratories: National Security Missions: Internationa...  

NLE Websites -- All DOE Office Websites (Extended Search)

objectives; Securing and safeguarding WMD materials and facilities; Enhancing security of nuclear weapons globally Countering, responding to, and recovering from WMD use by...

452

Student Experiential Opportunities in National Security Careers  

Science Conference Proceedings (OSTI)

This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

None

2007-12-31T23:59:59.000Z

453

Nuclear Forensics | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Forensics | National Nuclear Security Administration Forensics | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Forensics Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Nuclear Forensics Nuclear Forensics Forensics Operations The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security

454

Congressional Testimony | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Congressional Testimony | National Nuclear Security Administration Congressional Testimony | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Congressional Testimony Home > Media Room > Congressional Testimony Congressional Testimony NNSA officials frequently testify before Congressional committees and subcommittees on matters of nuclear and national security.

455

National Security & Safety | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Japanese Scientists to Discuss On-Going Fukushima Work Scientists from the Japanese Atomic Energy Agency (JAEA) and National Nuclear Security Administration (NNSA). | Photo from...

456

Environmental Program Services Contract | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

at corrective action units at the Nevada National Security Site and parts of the Nevada Test and Training Range, including Tonopah Test Range, and radioactive waste acceptance...

457

Contact Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Follow this link to skip to the main content Facebook Flickr RSS Twitter YouTube Contact Information | National Nuclear Security Administration Our Mission Managing the Stockpile...

458

Program Requirements | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Follow this link to skip to the main content Facebook Flickr RSS Twitter YouTube Program Requirements | National Nuclear Security Administration Our Mission Managing the Stockpile...

459

Weapons production | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Weapons production Weapons production An effective production infrastructure is critical to national security. Y-12 continues to replace World War II-era facilities to increase...

460

Edward Bruce Held | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

to the national security of the United States." In June 2013, Energy Secretary Ernest Moniz asked Mr. Held to assume the responsibilities of Associate Deputy Secretary and Acting...

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

THE OFFICE OF NONPROLIFERATION & NATIONAL SECURITY  

NLE Websites -- All DOE Office Websites (Extended Search)

W. HORAK Chair TECHNOLOGY COMMERCIALIZATION and PARTNERSHIPS W. COPAN Manager NONPROLIFERATION and NATIONAL SECURITY C. KESSLER Chair RESEARCH OPERATIONS L. Bowerman *Reports...

462

Our Jobs | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Our Jobs Home > Federal Employment > Our Jobs Our Jobs NNSA's...

463

Photo Gallery | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Photo Gallery Home > Media Room > Photo Gallery Photo Gallery The...

464

Research and Development | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Research and Development Home > About Us > Our Programs >...

465

Collaboration Topics - Visualization | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Collaboration Topics - Visualization Home > About Us > Our...

466

Recapitalizing Our Infrastructure | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Recapitalizing Our Infrastructure Home > Our Mission >...

467

High Explosives Application Facility | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration High Explosives Application Facility Home > About Us > Our...

468

Press Releases | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Press Releases Home > Media Room > Press Releases Press Releases...

469

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration Contact Us Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Test...

470

Managing the Stockpile | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Managing the Stockpile Home > Our Mission > Managing the Stockpile...

471

Collaboration Topics - System Software | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Collaboration Topics - System Software Home > About Us > Our...

472

Institutional Research & Development | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Institutional Research & Development Home > About Us > Our...

473

National Security Portfolio - Industrial Partnerships Office  

Giving animals in need a HOME. November 14, 2013. LLNL, Intel, Cray produce big data machine. ... for the Department of Energy's National Nuclear Security Administration

474

Media Room | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Media Room Home > Media Room Media Room NNSA's Office of...

475

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

> Contact Us Contact Us National Nuclear Security Administration Office of Test Capabilities and Evaluation, NA-115 1000 Independence Avenue, SW Washington, DC 20585 (202) 586-0812...

476

NNSA Streamlines Operations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NNSA Timeline > NNSA Streamlines Operations NNSA Streamlines Operations December 20, 2002 Washington, DC NNSA Streamlines Operations The National Nuclear Security Administration...

477

Report Articles | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Report Articles Report Articles The Y-12 Report communicates the significant accomplishments of and events involving the Y-12 National Security Complex and its people. View report...

478

NNSA: Securing Domestic Radioactive Material | National Nuclear...  

National Nuclear Security Administration (NNSA)

Feb 1, 2011 The Department of Energy's National Nuclear Security Administration (NNSA), which has unique expertise in nuclear weapons and nuclear material, plays a key role in the...

479

Commanding general visits Pantex | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Commanding general visits Pantex | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

480

Steve Asher | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Steve Asher | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

Note: This page contains sample records for the topic "national security cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

March 2011 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

March 2011 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

482

Code Tables | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Code Tables | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

483

Annual Planning Summaries: National Nuclear Security Administration...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Defense Science University Programs (NNSA-DSUP) Annual Planning Summaries: National Nuclear Security Administration-Defense Science University Programs (NNSA-DSUP...

484

Site Information | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

nonproliferation, bio threats, global climate modeling and other critical problems. NTS Nevada National Security Site (NNSS), near Las Vegas, Nev., is where the U.S....

485

Coordination Meeting with National Nuclear Security Administration...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Oversight's Office of Safety and Emergency Management Evaluations Activity Report for Coordination Meeting with National Nuclear Security Administration Los Alamos...

486

NEPA Reading Room | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

NEPA Reading Room | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing...

487

Department of Energy Established | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Department of Energy Established | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

488

The National Nuclear Security Administration's Weapons Dismantlement...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration's Weapons Dismantlement and Disposition Program OAS-L-13-06 January 2013 Department of Energy Washington, DC 20585 January 29, 2013...

489

Annual Planning Summaries: National Nuclear Security Administration...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Annual Planning Summary for National Nuclear Security Administration Service Center (NNSA-SC) Annual Planning Summaries briefly describe the status of ongoing NEPA compliance...

490

Nevada National Security Site Operational Awareness Oversight...  

NLE Websites -- All DOE Office Websites (Extended Search)

HSS Independent Activity Report - Rev. 0 Report Number: HIAR NNSS-2012-12-03 Site: Nevada National Security Site Subject: Office of Enforcement and Oversight's Office of Safety...

491

Enforcement Letter, National Security Technologies, LLC - May...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 21, 2007 Enforcement Letter issued to National Security Technologies, LLC related to Nuclear Safety Quality Assurance Requirements Deficiencies at the Nevada Test Site The...

492

NMMSS I Training | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

I Training | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

493

Sample Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Sample Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

494

Lawrence Livermore announces new strategic national security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Livermore announces new strategic national security assignments Lynda L Seaver, LLNL, (925) 423-3103, seaver1@llnl.gov Printer-friendly Bruce Goodwin Photos by Julie...

495

Michael K. Lempke | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Michael K. Lempke | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing...

496

October 2010 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

October 2010 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

497

NEPA Reading Room | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reading Room | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

498

Video Gallery | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Video Gallery | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

499

20th National Information Systems Security Conference  

Science Conference Proceedings (OSTI)

... NIST does not accept any other credit cards. ... and CD-ROM of the conference proceedings will be ... In January 1981, the National Computer Security ...

500

External > Programs > National Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The National Security mission in Oak Ridge is carried out at the National Nuclear Security Administration's (NNSA) Y-12 National Security Complex, formerly known as the Oak Ridge Y-12 Plant. Programs at Y-12 include manufacturing and reworking nuclear weapon components, dismantling nuclear weapon components returned from the national arsenal, serving as the nation's safe, secure storehouse of special nuclear materials, reducing the global threat from terrorism and weapons of mass destruction, and providing the U.S. Navy with safe, militarily effective nuclear propulsion systems. Y-12 is operated by B&W Y-12 LLC. ORO provides a variety of services to the NNSA's Y-12 Site Office as part of a service agreement between the two organizations.