Powered by Deep Web Technologies
Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

2

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

3

Global Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

4

Strengthening Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSiteNeutronStrategic Plan The

5

Global Food Security Programme Exploring public views  

E-Print Network [OSTI]

Global Food Security Programme ­ Exploring public views #12;©TNS June 2012 -1- Executive Summary significant public policy issues of this century. This scoping study for the Global Food Security programme. The project involved a total of 44 people in a two stage workshop process in London, Edinburgh and Aberystwyth

6

Global Material Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr Flickr Editor'sshortGeothermal HeatStartedGirlsMaterial Security |

7

Global Climate Change and National Security  

E-Print Network [OSTI]

5/16/2014 1 Global Climate Change and National Security RADM Jon White Oceanographer and Navigator months. · Oil, gas, and mineral resource exploitation expected to continue · Production/transportatio n

Howat, Ian M.

8

Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region service area. TheEPSCIResearch toAbout DOE'sGiving GivingGlobal

9

Global climate change and international security.  

SciTech Connect (OSTI)

This report originates in a workshop held at Sandia National Laboratories, bringing together a variety of external experts with Sandia personnel to discuss 'The Implications of Global Climate Change for International Security.' Whatever the future of the current global warming trend, paleoclimatic history shows that climate change happens, sometimes abruptly. These changes can severely impact human water supplies, agriculture, migration patterns, infrastructure, financial flows, disease prevalence, and economic activity. Those impacts, in turn, can lead to national or international security problems stemming from aggravation of internal conflicts, increased poverty and inequality, exacerbation of existing international conflicts, diversion of national and international resources from international security programs (military or non-military), contribution to global economic decline or collapse, or international realignments based on climate change mitigation policies. After reviewing these potential problems, the report concludes with a brief listing of some research, technology, and policy measures that might mitigate them.

Karas, Thomas H.

2003-11-01T23:59:59.000Z

10

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the ContributionsArmsSpeedingSpeeding accessand TechnicalTheGlobal SecurityHome Centers

11

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the ContributionsArmsSpeedingSpeeding accessand TechnicalTheGlobal SecurityHome

12

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the ContributionsArmsSpeedingSpeeding accessand TechnicalTheGlobal SecurityHomeExternal

13

Strengthening Global Security The central mission of the Laboratory  

E-Print Network [OSTI]

, security, and reliability of the U.S. nuclear deterrent while reducing the global threat of nuclear: Ensuring the safety, security, and reliability of the U.S. nuclear deterrent; Reducing global threatsStrengthening Global Security The central mission of the Laboratory is to ensure the safety

14

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the ContributionsArmsSpeedingSpeeding accessand TechnicalTheGlobal

15

Global Security, Medical Isotopes, and Nuclear Science  

SciTech Connect (OSTI)

Over the past century basic nuclear science research has led to the use of radioactive isotopes into a wide variety of applications that touch our lives everyday. Some are obvious, such as isotopes for medical diagnostics and treatment. Others are less so, such as National/Global security issues. And some we take for granted, like the small amount of 241Am that is in every smoke detector. At the beginning of this century, we are in a position where the prevalence and importance of some applications of nuclear science are pushing the basic nuclear science community for improved models and nuclear data. Yet, at the same time, the push by the basic nuclear science community to study nuclei that are farther and farther away from stability also offer new opportunities for many applications. This talk will look at several global security applications of nuclear science, summarizing current R&D and need for improved nuclear data It will also look at how applications of nuclear science, such as to medicine, will benefit from the push for more and more powerful radioactive ion beam facilities.

Ahle, L E

2007-09-17T23:59:59.000Z

16

Global Biofuel Production and Food Security: Implications for Asia Pacific  

E-Print Network [OSTI]

Global Biofuel Production and Food Security: Implications for Asia Pacific 56th AARES Annual Conference Fremantle, Western Australia 7-10 February 2012 William T. Coyle #12;Global Biofuel Production and Food Security: Making the Connection --Past analysis and the evidence about biofuels and spiking

17

Advancing Global Nuclear Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

OF THE NUCLEAR ENERGY AND NUCLEAR SECURITY WORKING GROUP OF THE BILATERAL U.S. - RUSSIA PRESIDENTIAL COMMISSION Secretary Moniz's Remarks at the 2014 IAEA General Conference...

18

Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS  

E-Print Network [OSTI]

2011- 2012 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS of aviation safety. Endings signal new beginnings and new beginnings mean evolving challenges for safety. This was the world in which the USC Aviation Safety and Security Program was born in 1952 and this is the world

Wang, Hai

19

Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS  

E-Print Network [OSTI]

2010- 2011 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS Relevance and currency -- that is what drives the Aviation Safety and Security Program of the USC Viterbi that our core course, Aviation Safety Management Systems, is so necessary in ensuring the safety

Wang, Hai

20

Securing the Sustainability of Global Medical Nuclear Supply Chains  

E-Print Network [OSTI]

, according to Kramer (2011), the South African Nuclear Energy Corp (Necsa) believes that the LEU productionSecuring the Sustainability of Global Medical Nuclear Supply Chains Through Economic Cost Recovery-17, 2012 University of Massachusetts Amherst Securing the Sustainability of Medical Nuclear Supply Chains

Nagurney, Anna

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Securing the Sustainability of Global Medical Nuclear Supply Chains  

E-Print Network [OSTI]

with associated increased volumes of waste. Indeed, according to Kramer (2011), the South African Nuclear EnergySecuring the Sustainability of Global Medical Nuclear Supply Chains Through Economic Cost Recovery University of Massachusetts Amherst Securing the Sustainability of Medical Nuclear Supply Chains #12

Nagurney, Anna

22

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumber ofES&HGlobal Security

23

Tag: global security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurityglobal security

24

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratorySpeeding access toSpeedingScientificA scientific approach to global

25

International Amaldi Conferences of Academies of Sciences and National Scientific Societies on Scientific Questions of Global Security  

E-Print Network [OSTI]

advice in questions of security policy, x the role of the nuclear option in regional conflicts, x methods on Scientific Questions of Global Security on Scientific Questions of Global Security 14-16 March 2008, DESY, Hamburg

26

Global Climate Change Adaptation Priorities for Biodiversity and Food Security  

E-Print Network [OSTI]

Global Climate Change Adaptation Priorities for Biodiversity and Food Security Lee Hannah 1,2* , Makihiko Ikegami 3 , David G. Hole 1,4 , Changwan Seo 5 , Stuart H. M. Butchart 6 , A. Townsend Peterson 7 , Patrick R. Roehrdanz 2 1 The Betty...72590. doi:10.1371/journal.pone.0072590 Editor: Alex J Cannon, Pacific Climate Impacts Consortium, Canada Received November 13, 2012; Accepted July 14, 2013; Published August 21, 2013 Copyright: 2013 Hannah et al. This is an open-access article...

Hannah, Lee; Ikegami, Makihiko; Hole, David G.; Seo, Changwan; Butchart, Stuart H. M.; Peterson, A. Townsend; Roehrdanz, Patrick

2013-08-21T23:59:59.000Z

27

William Rees appointed to new Global Security leadership position  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption byAbout PrintableBlenderWhatFellows - Past andD.Global security

28

Securing Offshore Infrastructures Through a Global Alert and Graded Response System  

E-Print Network [OSTI]

1 « SARGOS » Securing Offshore Infrastructures Through a Global Alert and Graded Response System and graded response system to answer the recent but strong need for securing critical civilian offshore of their 2009 global safety program (CSOSG). 1. Introduction Offshore oil installations are critical energy

Paris-Sud XI, Université de

29

Work distribution in global product development organizations  

E-Print Network [OSTI]

The evolution of the internet, digital design tools, and more importantly, increasing access to global markets and workforce, has increased the interest of firms in offshoring their engineering and product development ...

Tripathy, Anshuman

2010-01-01T23:59:59.000Z

30

Global food security, biodiversity conservation and the future of agricultural intensification  

E-Print Network [OSTI]

Global food security, biodiversity conservation and the future of agricultural intensification Teja increase, achieving efficient and productive agri- cultural land use while conserving biodiversity. In conclusion, linking agricultural intensifi- cation with biodiversity conservation and hunger reduction

31

Global Food Security Programme A survey of public attitudes  

E-Print Network [OSTI]

security is not an issue that affects me rather it's more a problem for people in developing countries' (55 by climate change (59%) and the price of food (47%). Similarly, when asked what would have the most effect on food security in the future, respondents stated increasing population (34%), climate change (19

32

NIST Seeks Input for Planned 2011 Update of Security Control Catalog For Federal Information Systems and Organizations  

E-Print Network [OSTI]

; Supply chain security; Industrial/process control systems; and Privacy. NIST SP 80053, Revision 3 Publication 80053, Recommended Security Controls for Federal Information Systems and Organizations webbased access to the security controls for federal information systems and organizations

33

President Obama Hosts Global Nuclear Security Summit | National Nuclear  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - SeptemberMicroneedles for medicalSecurity Administration Calls for anThat

34

Radiological and Nuclear Security in A Global Context  

E-Print Network [OSTI]

This paper considers the state of nuclear and radiological security in the UK and abroad and reports on the methods that could be employed by terrorists with radiological or nuclear material to cause destruction. It is shown that despite current safeguards that problems arise due to materials that are unaccounted for and poor implementation of detection regimes in some geographical regions. The prospect of a future terrorist event that involves nuclear or radiological materials seems likely despite best efforts of prevention.

Jones, Nick

2010-01-01T23:59:59.000Z

35

Sandia National Laboratories: The Center for Global Security and  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErikGroundbreakingStandardsTCES Sandia Researchers

36

REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH  

E-Print Network [OSTI]

REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE's information systems. The uniform approach to describing controls for both national security and nonnational, implement, and assess their security controls most effectively when the process is carried out as part

37

LANL | Physics | Nuclear Weapons and Global Security Data Analysis  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfraredJeffersonJonathanMultimaterial2Recovery ActNuclear Weapons and Global

38

Global Threat Reduction Initiative | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Big Sky LearningGet Assistance GetGiantOn The VergeGlobal Threat

39

PACIFIC NORTHWEST NATIONAL LABORATORY'S CENTER FOR GLOBAL SECURITY  

E-Print Network [OSTI]

the Treaty The Comprehensive Nuclear Test Ban Treaty puts a cap on the development of nuclear weapons by banning nuclear weapon testing. The Treaty Organization will verify the ban on nuclear tests, operating the Comprehensive Nuclear Test Ban Treaty Wednesday, December 14, 2011 10 a.m. ­ 11:30 a.m. in the Battelle

40

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Resilient and Self-Organizing Overlay of Collaborative Security Monitors  

E-Print Network [OSTI]

, destructive and widespread, especially those distributed attacks that exploit multiple launching sites, security systems that are deployed in isolation within administrative domains and do not exchange infor

Li, Jun

42

Global biosurveillance: enabling science and technology. Workshop background and motivation: international scientific engagement for global security  

SciTech Connect (OSTI)

Through discussion the conference aims to: (1) Identify core components of a comprehensive global biosurveillance capability; (2) Determine the scientific and technical bases to support such a program; (3) Explore the improvement in biosurveillance to enhance regional and global disease outbreak prediction; (4) Recommend an engagement approach to establishing an effective international community and regional or global network; (5) Propose implementation strategies and the measures of effectiveness; and (6) Identify the challenges that must be overcome in the next 3-5 years in order to establish an initial global biosurveillance capability that will have significant positive impact on BioNP as well as public health and/or agriculture. There is also a look back at the First Biothreat Nonproliferation Conference from December 2007. Whereas the first conference was an opportunity for problem solving to enhance and identify new paradigms for biothreat nonproliferation, this conference is moving towards integrated comprehensive global biosurveillance. Main reasons for global biosurveillance are: (1) Rapid assessment of unusual disease outbreak; (2) Early warning of emerging, re-emerging and engineered biothreat enabling reduced morbidity and mortality; (3) Enhanced crop and livestock management; (4) Increase understanding of host-pathogen interactions and epidemiology; (5) Enhanced international transparency for infectious disease research supporting BWC goals; and (6) Greater sharing of technology and knowledge to improve global health.

Cui, Helen H [Los Alamos National Laboratory

2011-01-18T23:59:59.000Z

43

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

44

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Big Sky LearningGet Assistance GetGiantOn The Verge Visits GE's

45

RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS  

E-Print Network [OSTI]

organizational managers in making informed decisions regarding the security of their information systems. NIST agencies implementing risk-based planning and management also must consider effectiveness, efficiency for their information and information systems with the gains in capabilities and improved support of organizational

46

Security decision-making among interdependent organizations R. Ann Miura-Ko, Benjamin Yolken, John Mitchell, and Nicholas Bambos  

E-Print Network [OSTI]

the same passwords at several independent web sites, security deci- sions by one organization may have- ments of others. We apply this framework to investigate three examples: web site security with shared

Mitchell, John C.

47

Recommended Security Controls for Federal Information Systems and Organizations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST 800-53 Revision 3 + Draft Revision 4 Recommended

48

Sustainable Development and Globalization: New Challenges and Opportunities for Work Organization  

E-Print Network [OSTI]

The relationship between industrialization and its effects on the environment has captured the serious attention of national governments and international organizations, especially in light of increasing globalization. ...

Ashford, Nicholas

2004-01-01T23:59:59.000Z

49

Global energy gradients and size in colonial organisms: Worker mass and worker number  

E-Print Network [OSTI]

Global energy gradients and size in colonial organisms: Worker mass and worker number in ant size varies globally is a key challenge to ecology. Solar energy may shape gradients of body size by its effects on local temperature and net primary productivity (16­20). Rising global temperatures (21

Kaspari, Mike

50

Soil Security: Solving the Global Soil Crisis Andrea Koch, Alex McBratney, Mark Adams, Damien Field, Robert Hill,  

E-Print Network [OSTI]

, climate change and energy sustainability. Soil science has not been sufficiently translated to policySoil Security: Solving the Global Soil Crisis Andrea Koch, Alex McBratney, Mark Adams, Damien Field England Michael Zimmermann University of Natural Resources and Life Sciences Vienna Abstract Soil

Grunwald, Sabine

51

Securing the Sustainability of Global Medical Nuclear Supply Chains Through Economic Cost Recovery, Risk Management, and Optimization  

E-Print Network [OSTI]

Securing the Sustainability of Global Medical Nuclear Supply Chains Through Economic Cost Recovery of Business, Economics and Law University of Gothenburg, Gothenburg, Sweden Ladimer S. Nagurney Department of the complex operations of medical nuclear supply chains in the case of the radioisotope molybdenum

Nagurney, Anna

52

Estimation of organ and effective dose due to Compton backscatter security scans  

SciTech Connect (OSTI)

Purpose: To estimate organ and effective radiation doses due to backscatter security scanners using Monte Carlo simulations and a voxelized phantom set. Methods: Voxelized phantoms of male and female adults and children were used with the GEANT4 toolkit to simulate a backscatter security scan. The backscatter system was modeled based on specifications available in the literature. The simulations modeled a 50 kVp spectrum with 1.0 mm-aluminum-equivalent filtration and a previously measured exposure of approximately 4.6 {mu}R at 30 cm from the source. Photons and secondary interactions were tracked from the source until they reached zero kinetic energy or exited from the simulation's boundaries. The energy deposited in the phantoms' respective organs was tallied and used to calculate total organ dose and total effective dose for frontal, rear, and full scans with subjects located 30 and 75 cm from the source. Results: For a full screen, all phantoms' total effective doses were below the established 0.25 {mu}Sv standard, with an estimated maximum total effective dose of 0.07 {mu}Sv for full screen of a male child. The estimated maximum organ dose due to a full screen was 1.03 {mu}Gy, deposited in the adipose tissue of the male child phantom when located 30 cm from the source. All organ dose estimates had a coefficient of variation of less than 3% for a frontal scan and less than 11% for a rear scan. Conclusions: Backscatter security scanners deposit dose in organs beyond the skin. The effective dose is below recommended standards set by the Health Physics Society (HPS) and the American National Standards Institute (ANSI) assuming the system provides a maximum exposure of approximately 4.6 {mu}R at 30 cm.

Hoppe, Michael E.; Schmidt, Taly Gilat [Department of Biomedical Engineering, Marquette University, P.O. Box 1881, Milwaukee, Wisconsin 53201 (United States)

2012-06-15T23:59:59.000Z

53

Policy 3505 Information Technology Security 1 OLD DOMINION UNIVERSITY  

E-Print Network [OSTI]

Code of Practice for Information Security Management (ISO/IEC 27002:2005) The international standard Electrotechnical Commission (IEC) A global organization that develops and publishes standards, the private sector, consumer groups, professional associations, and others. International Organization

54

Mapping the Impact of Security Threats on Safety-Critical Global Navigation Satellite Systems Chris W. Johnson (1), A. Atencia Yepez (2)  

E-Print Network [OSTI]

Mapping the Impact of Security Threats on Safety-Critical Global Navigation Satellite Systems Chris of attack scenarios can be used to assess the resilience of safety cases to the impact of external security accident advocated the development of safety argumentation across the oil and gas industry (US Presidential

Johnson, Chris

55

Understanding global secondary organic aerosol amount and size-resolved condensational behavior  

E-Print Network [OSTI]

Understanding global secondary organic aerosol amount and size-resolved condensational behavior and Adams, 2009b) ·Condensation, coagulation, nucleation ·40 size bins (1 nm ­ 10 µm) ·Nucleation rates the aerosol mass distribution. However, recent closure studies with field measurements show that a significant

56

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network [OSTI]

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

57

Title: Early and global estimation of microvascular target organ damage in hypertension by use of innovative software  

E-Print Network [OSTI]

Title: Early and global estimation of microvascular target organ damage in hypertension by use-mail: artriant@hotmail.com Disclosure: none Conflicts of interest: none Key Words: hypertension, target organ cardiovascular risk assessment and early #12;identification of hypertensive target organ damage is continuously

Markatos, Evangelos P.

58

Global distribution and climate forcing of marine organic aerosol: 1. Model improvements and evaluation  

SciTech Connect (OSTI)

Marine organic aerosol emissions have been implemented and evaluated within the National Center of Atmospheric Research (NCAR)'s Community Atmosphere Model (CAM5) with the Pacific Northwest National Laboratory's 7-mode Modal Aerosol Module (MAM-7). Emissions of marine primary organic aerosols (POA), phytoplanktonproduced isoprene- and monoterpenes-derived secondary organic aerosols (SOA) and methane sulfonate (MS{sup -}) are shown to affect surface concentrations of organic aerosols in remote marine regions. Global emissions of submicron marine POA is estimated to be 7.9 and 9.4 Tg yr{sup -1}, for the Gantt et al. (2011) and Vignati et al. (2010) emission parameterizations, respectively. Marine sources of SOA and particulate MS{sup -} (containing both sulfur and carbon atoms) contribute an additional 0.2 and 5.1 Tg yr{sup -1}, respectively. Widespread areas over productive waters of the Northern Atlantic, Northern Pacific, and the Southern Ocean show marine-source submicron organic aerosol surface concentrations of 100 ngm{sup -3}, with values up to 400 ngm{sup -3} over biologically productive areas. Comparison of long-term surface observations of water insoluble organic matter (WIOM) with POA concentrations from the two emission parameterizations shows that despite revealed discrepancies (often more than a factor of 2), both Gantt et al. (2011) and Vignati et al. (2010) formulations are able to capture the magnitude of marine organic aerosol concentrations, with the Gantt et al. (2011) parameterization attaining better seasonality. Model simulations show that the mixing state of the marine POA can impact the surface number concentration of cloud condensation nuclei (CCN). The largest increases (up to 20 %) in CCN (at a supersaturation (S) of 0.2 %) number concentration are obtained over biologically productive ocean waters when marine organic aerosol is assumed to be externally mixed with sea-salt. Assuming marine organics are internally-mixed with sea-salt provides diverse results with increases and decreases in the concentration of CCN over different parts of the ocean. The sign of the CCN change due to the addition of marine organics to seasalt aerosol is determined by the relative significance of the increase in mean modal diameter due to addition of mass, and the decrease in particle hygroscopicity due to compositional changes in marine aerosol. Based on emerging evidence for increased CCN concentration over biologically active surface ocean areas/periods, our study suggests that treatment of sea spray in global climate models (GCMs) as an internal mixture of marine organic aerosols and sea-salt will likely lead to an underestimation in CCN number concentration.

Meskhidze, N.; Xu, J.; Gantt, Brett; Zhang, Yang; Nenes, Athanasios; Ghan, Steven J.; Liu, Xiaohong; Easter, Richard C.; Zaveri, Rahul A.

2011-11-23T23:59:59.000Z

59

Predicted change in global secondary organic aerosol concentrations in response to future climate, emissions, and land use change  

E-Print Network [OSTI]

The sensitivity of secondary organic aerosol (SOA) concentration to changes in climate and emissions is investigated using a coupled global atmosphere-land model driven by the year 2100 IPCC A1B scenario predictions. The ...

Heald, C. L.; Henze, D. K.; Horowitz, L. W.; Feddema, Johannes J.; Lamarque, J. F.; Guenther, A.; Hess, P. G.; Vitt, F.; Seinfeld, J. H.; Goldstein, A. H.; Fung, I.

2008-03-01T23:59:59.000Z

60

The AeroCom Evaluation and Intercomparison of Organic Aerosol in Global Models  

DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

This paper evaluates the current status of global modeling of the organic aerosol (OA) occurrence in the troposphere and analyzes the differences calculated between models as well as between models and observations. Thirty-one global chemistry/transport and general circulation models have participated in this intercomparison, in the framework of AeroCom phase II. The simulation of OA varies greatly between models in terms of the magnitude of primary emissions, secondary OA (SOA) formation, the number of OA species used (2 to 62), the complexity of OA parameterizations (gas-particle partitioning, chemical aging, multiphase chemistry, aerosol microphysics), and the OA physical, chemical and optical properties. The diversity of the global OA simulation results has increased since earlier AeroCom experiments, mainly due to the increasing complexity of the SOA parameterization in models, and the implementation of new, highly uncertain, OA sources. Diversity of over an order of magnitude exists in the modeled vertical distribution of OA that deserves a dedicated future study. Furthermore, although the OA/OC ratio depends on OA sources and atmospheric processing and is important for model evaluation against OA and OC observations, it is resolved only by few global models. The median global primary OA source strength is 56 Tg a 1 (range 34 - 144 Tg a-1) and the median secondary OA source strength (natural and anthropogenic) is 19 Tg a-1 (range 13-121 Tg a-1). Among the models that take into account the semi-volatile SOA nature, the median source is calculated to be 51 Tg a-1 (range 16-121 Tg a-1), much larger than the median value of the models that calculate SOA in a more simplistic way (19 Tg a-1; range 13-20 Tg a-1, with one model at 37 Tg a-1). The median atmospheric burden of OA is 1.4 Tg (24 models in the range of 0.6-2.0 Tg and 4 between 2.4-3.8 Tg) with a median OA lifetime of 5.4 days (range 3.8-9.6 days). In models that reported both OA and sulfate burdens, the median value of the OA/sulfate burden ratio of is calculated to be 0.77; 13 models calculate a ratio lower than 1, and 9 models higher than 1. For 26 models that reported OA deposition fluxes, the median wet removal is 70 Tg a-1 (range 28-209 Tg a-1), which is on average 85% of the total OA deposition.

Tsigaridis, Kostas; Daskalakis, N.; Kanakidou, M.; Adams, P. J.; Artaxo, Paulo; Bahadur, R.; Balkanski, Y.; Bauer, S.; Bellouin, N.; Benedetti, Angela; Bergman, T.; Berntsen, T.; Beukes, J. P.; Bian, Huisheng; Carslaw, K. S.; Chin, M.; Curci, Gabriele; Diehl, Thomas; Easter, Richard C.; Ghan, Steven J.; Gong, S.; Hodzic, Alma; Hoyle, Christopher R.; Iversen, T.; Jathar, S.; Jimenez, J. L.; Kaiser, J. W.; Kirkevag, A.; Koch, Dorothy; Kokkola, H.; Lee, Y. H.; Lin, G.; Liu, Xiaohong; Luo, Gan; Ma, Xiaoyan; Mann, G. W.; Mihalopoulos, Nikos; Morcrette, J. -J.; Muller, J. F.; Myhre, G.; Myriokefalitakis, S.; Ng, Nga L.; O'Donell, D.; Penner, J. E.; Pozzoli, L.; Pringle, K. J.; Russell, Lynn; Schulz, M.; Sciare, J.; Seland, O.; Shindell, Drew; Sillman, S.; Skeie, R. B.; Spracklen, D. V.; Stavrakou, T.; Steenrod, Stephen D.; Takemura, T.; Tiitta, P.; Tilmes, S.; Tost, H.; van Noije, T.; van Zyl, P. G.; von Salzen, Knut; Yu, Fangqun; Wang, Zaizi; Wang, Zhilli; Zaveri, Rahul A.; Zhang, Hua; Zhang, Kai; Zhang, Qi; Zhang, Xiaoye

2014-10-15T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Tag: global security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

49all en Alarm Response Training ribbon cutting http:www.y12.doe.govnewspress-releasesalarm-response-training-ribbon-cutting

62

Global Security 2009  

Energy Savers [EERE]

sufficient amounts (5-10 ml) of bio-samples such as blood? Sample Analysis: How might we process and perform multiplexed analysis of the sample in a highly disposable format?...

63

Global Security 2009  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf11-161-LNG | Department of EnergyGeothermal TechnologiesTransformation

64

Global  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Big Sky LearningGet Assistance GetGiant ProteaseGlass andT.2 -Global

65

Civil and environmental engineers are a critical component in supporting the global economy, securing the health and welfare of  

E-Print Network [OSTI]

integrated areas: ENVIRONMENTAL ENGINEERING ENVIRONMENTAL FLUID MECHANICS AND WATER RESOURCES GEOSYSTEMS Environmentally friendly hydropower; Flood and drought management; Sustainable desalination technologies; River restoration; Water systems security; Remote and conventional sensors in water resources management; Policy

Jacobs, Laurence J.

66

There is an increasing order in digitized technology. This increasing order requires high qualitative document management system which can be used in secure fashion especially for organization with  

E-Print Network [OSTI]

qualitative document management system which can be used in secure fashion especially for organization with different branches and different location. In this paper we propose a qualitative document management. The proposed framework provides the necessary options for creating an effective document management system

67

T E C H N I C A L A D V A N C E Soil organic carbon dust emission: an omitted global  

E-Print Network [OSTI]

T E C H N I C A L A D V A N C E Soil organic carbon dust emission: an omitted global source emission, soil organic carbon Received 16 April 2013 and accepted 21 May 2013 Introduction Uncertainty, Gunnedah, NSW 2380, Australia Abstract Soil erosion redistributes soil organic carbon (SOC) within

68

Global niche markets and local development : clientelism and fairtrade farmer organizations in Paraguay's sugar industry  

E-Print Network [OSTI]

Globalization has transformed the markets in which agricultural goods are traded, placing new demands on farmers around the world. In developing countries, smallholder and peasant farmers lack many of the resources needed ...

Setrini, Gustavo

2011-01-01T23:59:59.000Z

69

Global Distribution and Climate Forcing of Marine Organic Aerosol - Part 2: Effects on Cloud Properties and Radiative Forcing  

SciTech Connect (OSTI)

A series of simulations with the Community Atmosphere Model version 5 (CAM5) with a 7-mode Modal Aerosol Model were conducted to assess the changes in cloud microphysical properties and radiative forcing resulting from marine organic aerosols. Model simulations show that the anthropogenic aerosol indirect forcing (AIF) predicted by CAM5 is decreased in absolute magnitude by up to 0.09 Wm{sup -2} (7 %) when marine organic aerosols are included. Changes in the AIF from marine organic aerosols are associated with small global increases in low-level incloud droplet number concentration and liquid water path of 1.3 cm{sup -3} (1.5 %) and 0.22 gm{sup -2} (0.5 %), respectively. Areas especially sensitive to changes in cloud properties due to marine organic aerosol include the Southern Ocean, North Pacific Ocean, and North Atlantic Ocean, all of which are characterized by high marine organic emission rates. As climate models are particularly sensitive to the background aerosol concentration, this small but non-negligible change in the AIF due to marine organic aerosols provides a notable link for ocean-ecosystem marine low-level cloud interactions and may be a candidate for consideration in future earth system models.

Gantt, Brett; Xu, Jun; Meskhidze, N.; Zhang, Yang; Nenes, Athanasios; Ghan, Steven J.; Liu, Xiaohong; Easter, Richard C.; Zaveri, Rahul A.

2012-07-25T23:59:59.000Z

70

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

71

SECURING RADIO FREQUENCY IDENTIFICATION (RFID)  

E-Print Network [OSTI]

business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

72

FLUIDIZED BED STEAM REFORMING MINERALIZATION FOR HIGH ORGANIC AND NITRATE WASTE STREAMS FOR THE GLOBAL NUCLEAR ENERGY PARTNERSHIP  

SciTech Connect (OSTI)

Waste streams that may be generated by the Global Nuclear Energy Partnership (GNEP) Advanced Energy Initiative may contain significant quantities of organics (0-53 wt%) and/or nitrates (0-56 wt%). Decomposition of high nitrate streams requires reducing conditions, e.g. organic additives such as sugar or coal, to reduce the NO{sub x} in the off-gas to N{sub 2} to meet the Clean Air Act (CAA) standards during processing. Thus, organics will be present during waste form stabilization regardless of which GNEP processes are chosen, e.g. organics in the feed or organics for nitrate destruction. High organic containing wastes cannot be stabilized with the existing HLW Best Developed Available Technology (BDAT) which is HLW vitrification (HLVIT) unless the organics are removed by preprocessing. Alternative waste stabilization processes such as Fluidized Bed Steam Reforming (FBSR) operate at moderate temperatures (650-750 C) compared to vitrification (1150-1300 C). FBSR converts organics to CAA compliant gases, creates no secondary liquid waste streams, and creates a stable mineral waste form that is as durable as glass. For application to the high Cs-137 and Sr-90 containing GNEP waste streams a single phase mineralized Cs-mica phase was made by co-reacting illite clay and GNEP simulated waste. The Cs-mica accommodates up to 30% wt% Cs{sub 2}O and all the GNEP waste species, Ba, Sr, Rb including the Cs-137 transmutation to Ba-137. For reference, the cesium mineral pollucite (CsAlSi{sub 2}O{sub 6}), currently being studied for GNEP applications, can only be fabricated at {ge} 1000 C. Pollucite mineralization creates secondary aqueous waste streams and NO{sub x}. Pollucite is not tolerant of high concentrations of Ba, Sr or Rb and forces the divalent species into different mineral host phases. The pollucite can accommodate up to 33% wt% Cs{sub 2}O.

Jantzen, C; Michael Williams, M

2008-01-11T23:59:59.000Z

73

The oil crisis of the 1970's brought home to Professor M. Nafi Toksz the impor-tance of growing global energy demand and the energy security of the United  

E-Print Network [OSTI]

The oil crisis of the 1970's brought home to Professor M. Nafi Toksöz the impor- tance of growing global energy demand and the energy security of the United States."I felt that MIT should and could play, water, geothermal energy and waste repositories. Since its founding, it has become MIT's center

Entekhabi, Dara

74

Tales From the 'Global' Economy: Cross National Production Networks and the Re-organization of the European Economy  

E-Print Network [OSTI]

The Problem of Globalization," Economy and Society , 21,Globalization and the Future of the Nation State," Economy

Zysman, John; Doherty, Eileen; Schwartz, Andrew

1996-01-01T23:59:59.000Z

75

Life Cycle Assessment of the Energy Independence and Security Act of 2007: Ethanol - Global Warming Potential and Environmental Emissions  

SciTech Connect (OSTI)

The objective of this study is to use life cycle assessment (LCA) to evaluate the global warming potential (GWP), water use, and net energy value (NEV) associated with the EISA-mandated 16 bgy cellulosic biofuels target, which is assumed in this study to be met by cellulosic-based ethanol, and the EISA-mandated 15 bgy conventional corn ethanol target. Specifically, this study compares, on a per-kilometer-driven basis, the GWP, water use, and NEV for the year 2022 for several biomass feedstocks.

Heath, G. A.; Hsu, D. D.; Inman, D.; Aden, A.; Mann, M. K.

2009-07-01T23:59:59.000Z

76

Effect of Terrestrial and Marine Organic Aerosol on Regional and Global Climate: Model Development, Application, and Verification with Satellite Data  

SciTech Connect (OSTI)

In this DOE project the improvements to parameterization of marine primary organic matter (POM) emissions, hygroscopic properties of marine POM, marine isoprene derived secondary organic aerosol (SOA) emissions, surfactant effects, new cloud droplet activation parameterization have been implemented into Community Atmosphere Model (CAM 5.0), with a seven mode aerosol module from the Pacific Northwest National Laboratory (PNNL)???¢????????s Modal Aerosol Model (MAM7). The effects of marine aerosols derived from sea spray and ocean emitted biogenic volatile organic compounds (BVOCs) on microphysical properties of clouds were explored by conducting 10 year CAM5.0-MAM7 model simulations at a grid resolution 1.9???????°????????2.5???????° with 30 vertical layers. Model-predicted relationship between ocean physical and biological systems and the abundance of CCN in remote marine atmosphere was compared to data from the A-Train satellites (MODIS, CALIPSO, AMSR-E). Model simulations show that on average, primary and secondary organic aerosol emissions from the ocean can yield up to 20% increase in Cloud Condensation Nuclei (CCN) at 0.2% Supersaturation, and up to 5% increases in droplet number concentration of global maritime shallow clouds. Marine organics were treated as internally or externally mixed with sea salt. Changes associated with cloud properties reduced (absolute value) the model-predicted short wave cloud forcing from -1.35 Wm-2 to -0.25 Wm-2. By using different emission scenarios, and droplet activation parameterizations, this study suggests that addition of marine primary aerosols and biologically generated reactive gases makes an important difference in radiative forcing assessments. All baseline and sensitivity simulations for 2001 and 2050 using global-through-urban WRF/Chem (GU-WRF) were completed. The main objective of these simulations was to evaluate the capability of GU-WRF for an accurate representation of the global atmosphere by exploring the most accurate configuration of physics options in GWRF for global scale modeling in 2001 at a horizontal grid resolution of 1???????° x 1???????°. GU-WRF model output was evaluated using observational datasets from a variety of sources including surface based observations (NCDC and BSRN), model reanalysis (NCEP/ NCAR Reanalysis and CMAP), and remotely-sensed data (TRMM) to evaluate the ability of GU-WRF to simulate atmospheric variables at the surface as well as aloft. Explicit treatment of nanoparticles produced from new particle formation in GU-WRF/Chem-MADRID was achieved by expanding particle size sections from 8 to 12 to cover particles with the size range of 1.16 nm to 11.6 ???????µm. Simulations with two different nucleation parameterizations were conducted for August 2002 over a global domain at a 4???????º by 5???????º horizontal resolution. The results are evaluated against field measurement data from the 2002 Aerosol Nucleation and Real Time Characterization Experiment (ANARChE) in Atlanta, Georgia, as well as satellite and reanalysis data. We have also explored the relationship between ???¢????????clean marine???¢??????? aerosol optical properties and ocean surface wind speed using remotely sensed data from the Cloud-Aerosol Lidar with Orthogonal Polarization (CALIOP) on board the CALIPSO satellite and the Advanced Microwave Scanning Radiometer (AMSR-E) on board the AQUA satellite. Detailed data analyses

Meskhidze, Nicholas; Zhang, Yang; Kamykowski, Daniel

2012-03-28T23:59:59.000Z

77

Global Security Directorate - Nonproliferation, Safeguards, and Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Big Sky LearningGet Assistance GetGiantOn The Verge Visits

78

Specific Examples of Global Activities Environmental assessment in Azerbaijan  

E-Print Network [OSTI]

, global warming, and global entrepreneurship. Discovery Park works syner- gistically with the Office competitiveness, global energy security, global warming, and global entrepreneurship. Discovery Park worksSpecific Examples of Global Activities · Environmental assessment in Azerbaijan · Study abroad

79

american security perspectives: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

LEAD. A Holistic Approach to Managing Risk amidst Global Howe, Jacob 154 Annual Security Report October 2013 Materials Science Websites Summary: of Security Field Operations,...

80

Positioning Security from electronic warfare  

E-Print Network [OSTI]

Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

Kuhn, Markus

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

82

06 DEC 2013 1 Information Security Guideline  

E-Print Network [OSTI]

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

83

Principal Associate Director - Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar Home DesignPresentations Presentations926Innovation| PrincetonPrincipal

84

Energy and Global Security - Home  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region service area. TheEPSCI Home It is Partnershipsn e rArgonneEnergy and

85

SELECTING INFORMATION TECHNOLOGY SECURITY  

E-Print Network [OSTI]

be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

86

RECOMMENDED SECURITY CONTROLS FOR FEDERAL  

E-Print Network [OSTI]

May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

87

An exploratory investigation of organizational security climate in a highly regulated environment.  

E-Print Network [OSTI]

??Security professionals, particularly those working in the field of nuclear security, have become increasingly interested in organizational characteristics which might influence an organization's security performance. (more)

Bitzer, Edward George

2010-01-01T23:59:59.000Z

88

An exploratory investigation of organizational security climate in a highly regulated environment.  

E-Print Network [OSTI]

?? Security professionals, particularly those working in the field of nuclear security, have become increasingly interested in organizational characteristics which might influence an organization's security (more)

Bitzer, Edward George, III

2011-01-01T23:59:59.000Z

89

The effect of surface irradiance on the absorption spectrum of chromophoric dissolved organic matter in the global ocean  

E-Print Network [OSTI]

.2 mm), is responsible for nearly 90% of ultraviolet (UV) radiation attenuation in the global ocean matter in the global ocean Chantal M. Swan a,n , Norman B. Nelson a , David A. Siegel a,b , Tihomir S to better assess the impact of CDOM on surface ocean photochemistry and remote sensing of ocean color

Siegel, David A.

90

Organization  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Regionat CornellInternships,(SC) Laboratories »OrganicOrganization

91

Continental energy security: Energy security in the North American context1  

E-Print Network [OSTI]

, commissioned reports, and signed legislation in an effort to stem crude oil imports and improve energy securityERG/201101 Continental energy security: Energy security in the North American context1 Larry Hughes, Canada 24 January 2011 1 A textbox for the Global Energy Assessment's Knowledge Module 5: Energy Security

Hughes, Larry

92

Organized by the Indiana University Romanian Studies Organization (RomSO@indiana.edu) Hosted by the School of Global and International Studies, IUSA,Russian  

E-Print Network [OSTI]

Organized by the Indiana University Romanian Studies Organization (RomSO@indiana.edu) Hosted Annual Romanian Studies Conference April 4-5, 2014 The conference will also feature Nicolae Feraru, a master of the Romanian ambal (known in English as the cimbalom or hammer dulcimer) and a 2013 recipient

Robeson, Scott M.

93

Extracting Security Control Requirements University of Tulsa  

E-Print Network [OSTI]

-component systems or systems of systems (SoSs) are difficult to verify because the security controls must to formulate functional requirements from security controls with SoSs as the target. The process starts accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

Gamble, R. F.

94

Global governance and diplomacy solutions for counterfeit medicines  

E-Print Network [OSTI]

Interpol. INTERPOL and pharmaceutical industry launch globalInterpol. INTERPOL and pharmaceutical industry launch globalorganization of pharmaceutical industry security directors

Mackey, Timothy Ken

95

Enterprise Security Planning using Zachman Framework: Designer's Perspective  

E-Print Network [OSTI]

Enterprise Security Planning using Zachman Framework: Designer's Perspective Abstract planning point of view. Index Terms - Enterprise Architecture, Zachman Framework, Enterprise Security security planning. This paper has been organized as follows. Section 2, describes the enterprise

Ertaull, Levent

96

University of Rochester Event Security Fund The purpose of this fund is to assist SA recognized organizations who (a) have a small membership or (b)  

E-Print Network [OSTI]

University of Rochester Event Security Fund The purpose of this fund is to assist SA recognized of this fund. o The event will have a beneficial impact on the University of Rochester community. o The size. This fund will be used to supplement budgeted event funds. Prerequisites for applying for the Event Security

Cantlon, Jessica F.

97

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using a Graphical  

E-Print Network [OSTI]

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using of California, Davis {hoagland,pandey,levitt}@cs.ucdavis.edu Technical Report CSE-98-3 A security policy states for organizations to declare their security policies, even informal state- ments would be better than the current

California at Davis, University of

98

Agricultural Sciences for Global Development  

E-Print Network [OSTI]

's areas of expertise cover other urgent global issues such as energy supply, climate change, biodiversity, like food security and climate change, are truly global. The global arena is changing fast therefore and the environment in developing countries. Our research is conducted in close cooperation with partners in a large

99

Supporting Organizations | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassiveSubmittedStatus TomAbout »Lab (NewportSuccessSupply Center for Nanophase

100

Status of the National Security Workforce  

SciTech Connect (OSTI)

This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

None

2008-03-31T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U.S. Homeland Security R&D Budgets  

SciTech Connect (OSTI)

The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.

Halvorson, C S

2009-03-30T23:59:59.000Z

102

Analysis of the optical coupling of wavelength-shifting fibers to organic liquid scintillator filled fluoropolymer tubes for industrial and nuclear security applications  

E-Print Network [OSTI]

Industrial and nuclear security applications continue to push radiation detection development into new and exciting frontiers. In this work, an innovative detection module is developed and tested for use in a cosmic ray ...

Schools, Chad C

2014-01-01T23:59:59.000Z

103

Enterprise Information Security Management Framework [EISMF  

E-Print Network [OSTI]

There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

104

Celebrating 15 years | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

established NNSA in 2000 as a separately organized agency within the Department of Energy to manage and ensure the security of the Nation's nuclear weapons stockpile, advance...

105

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

106

Expanding Global Network: Discovery to Delivery The United States ranks #1 in innovation. Purdue is preparing for the 21st century global  

E-Print Network [OSTI]

challenges global health, global competitiveness, global energy security, global warming, global and visibility that Purdue enjoys at all levels globally. Provide global experience for Purdue facultyExpanding Global Network: Discovery to Delivery The United States ranks #1 in innovation. Purdue

107

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

108

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

109

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

110

National Nuclear Security Administration ENERGY U.S. DEPARTMENT...  

National Nuclear Security Administration (NNSA)

Gate, 19 June 2013 Operating Efficiently Engaging Globally The U.S. Department of EnergyNational Nuclear Security Administration's (DOENNSA) Office of Nonproliferation and...

111

Climate-derived tensions in Arctic security.  

SciTech Connect (OSTI)

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

112

NIST Computer Security Division csrc.nist.gov Summary of NIST SP 800-53 Revision 4,  

E-Print Network [OSTI]

and Privacy Controls for Federal Information Systems and Organizations Kelley Dempsey Computer Security-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, which .............................................................. 3 Figure 3: Security Control Selection Process

113

Global Statistics  

E-Print Network [OSTI]

1996). Globalization in Question: International Economy andGlobalization; Justice; Poverty; Underground Economy; United

Crow, Ben D

2006-01-01T23:59:59.000Z

114

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

2004-07-08T23:59:59.000Z

115

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

116

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

117

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

2011-06-20T23:59:59.000Z

118

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

119

GLOBAL SECURITY SYSTEMGLOBAL SECURITY SYSTEM FOR CONTAINERIZED COMMERCEFOR CONTAINERIZED COMMERCE  

E-Print Network [OSTI]

and mapped. ­ tools such as LTSA will be used to model the system and verify whether the specifications

Austin, Mark

120

Critical Infrastructure and Cyber Security  

E-Print Network [OSTI]

that employ stealth methods such as steganography, allowing botmasters to exploit public forums and search engines #1; As U.S. national elections draw near, an increase in phishing, scams and malicious code targeting candidates, campaigns, etc.... Chemical Manufacturing The Chemical Manufacturing sector combines organic and inorganic materials to make chemicals used in everyday life and that contribute to the national security, public safety, and economic security. The components...

Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Global Statistics  

E-Print Network [OSTI]

of Globalization: Statistics Weiss, L. (1997). "of Globalization: Statistics Milanovic, B. (1999). Truethe focus of global statistics, particularly in relation to

Crow, Ben D

2006-01-01T23:59:59.000Z

122

Global Cool Cities Alliance  

Broader source: Energy.gov [DOE]

The Department of Energy (DOE) is currently supporting the Global Cool Cities Alliance (GCCA), a non-profit organization that works with cities, regions, and national governments to speed the...

123

Security control methods for CEDR  

SciTech Connect (OSTI)

The purpose of this document is to summarize the findings of recent studies on the security problem in statistical databases and examine their applicability to the specific needs of CEDR. The document is organized as follows: In Section 2 we describe some general control methods which are available on most commercial database software. In Section 3 we provide a classification of statistical security methods. In Section 4 we analyze the type of users of CEDR and the security control methods which may be applied to each type. In Section 5 we summarize the findings of this study and recommend possible solutions.

Rotem, D.

1990-09-01T23:59:59.000Z

124

ITL BULLETIN FOR AUGUST 2010 ASSESSING THE EFFECTIVENESS OF SECURITY CONTROLS IN FEDERAL  

E-Print Network [OSTI]

discusses the process for assessing the security controls in organizational information systems that are implemented in federal information systems. The selection and assessment of appropriate security controls Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans

125

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

2011-06-20T23:59:59.000Z

126

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

127

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

128

Metaphors for cyber security.  

SciTech Connect (OSTI)

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

129

Secretary Bodman Meets with Global Energy Ministers at the Internation...  

Office of Environmental Management (EM)

would inherently improve individual and global energy security, reduce pressure on energy markets and help to improve the sustainability valuable natural resources. Lastly,...

130

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

131

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

132

Control Systems Cyber Security Standards Support Activities  

SciTech Connect (OSTI)

The Department of Homeland Securitys Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSPs current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

Robert Evans

2009-01-01T23:59:59.000Z

133

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

134

Integrated Safeguards and Security Management (ISSM) Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of this Policy is to formalize an Integrated Safeguards and Security Management (ISSM) framework. Safeguards and security management systems provide a formal, organized process for planning, performing, assessing, and improving the secure conduct of work in accordance with risk-based protection strategies. These systems are institutionalized through Department of Energy (DOE) directives and contracts. Does not cancel other directives. Canceled by DOE P 470.1A.

2001-05-08T23:59:59.000Z

135

Stumbling Toward Capitalism: The State, Global Production Networks, and the Unexpected Emergence of China's Independent Auto Industry  

E-Print Network [OSTI]

To increase the security of Chinese oil tankers throughChinas Oil Diplomacy: Is it a Global Security Threat? ?s energy security concerns over rapidly growing oil demand

Chang, Crystal Whai-ku

2011-01-01T23:59:59.000Z

136

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

137

An XML Security Framework that Integrates NIST RBAC, MAC and DAC Policies  

E-Print Network [OSTI]

is to integrate the local security (existing systems) and their associated access control models into a global is to ensure that local security policies (of constituent systems) and access control mechanisms are satisfied. As a result, the XML security framework requires the inclusion of a secure information engineering process

Demurjian, Steven A.

138

A Uniform Framework of Global Nuclear Materials Management  

SciTech Connect (OSTI)

Global Nuclear Materials Management (GNMM) anticipates and supports a growing international recognition of the importance of uniform, effective management of civilian, excess defense, and nuclear weapons materials. We expect thereto be a continuing increase in both the number of international agreements and conventions on safety, security, and transparency of nuclear materials, and the number of U.S.-Russian agreements for the safety, protection, and transparency of weapons and excess defense materials. This inventory of agreements and conventions may soon expand into broad, mandatory, international programs that will include provisions for inspection, verification, and transparency, To meet such demand the community must build on the resources we have, including State agencies, the IAEA and regional organizations. By these measures we will meet the future expectations for monitoring and inspection of materials, maintenance of safety and security, and implementation of transparency measures.

Dupree, S.A.; Mangan, D.L.; Sanders, T.L; Sellers, T.A.

1999-04-20T23:59:59.000Z

139

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Modifications correct changes to the composition of Senior DOE Management organizations, name change from DOE Cyber Incident Response Capability to Joint Cybersecurity Coordination Center and transfer of responsibility for communications security and TEMPEST to the Office of Health, Safety and Security.

2012-12-06T23:59:59.000Z

140

SECURITY FOR WIRELESS NETWORKS AND DEVICES  

E-Print Network [OSTI]

connections. Users of handheld devices such as personal digital assis tants (PDAs) and cell phones can synMarch 2003 SECURITY FOR WIRELESS NETWORKS AND DEVICES Shirley Radack, Editor, Computer Security organizations and users have found that wireless communications and devices are convenient, flexible, and easy

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

142

2010-11 Princeton Global Scholar Giacomo Luciani  

E-Print Network [OSTI]

the rest of the world. He currently leads research on security of oil supplies within the SECURE project on the security of gas supplies. In addition, he organized a joint conference titled "Caspian Oil and Gas about the Gulf region through scholarly research on political, economic, social and security issues. He

143

Brokering strategic partnerships between Asian and western biopharmaceutical companies in the global biologics market : assessment of capabilities of Asian participants in the biologics contract manufacturing organization marketplace  

E-Print Network [OSTI]

It has become increasingly important for companies in the biopharmaceutical industry to maximize the clinical, commercial and economic impact of their products on a global scale. In this context, both Western and Asian ...

Chun, Soo Jin, S.M. Massachusetts Institute of Technology

2009-01-01T23:59:59.000Z

144

Comparing local vs. global visible and near-infrared (VisNIR) diffuse reflectance spectroscopy (DRS) calibrations for the prediction of soil clay, organic C  

E-Print Network [OSTI]

Comparing local vs. global visible and near-infrared (VisNIR) diffuse reflectance spectroscopy (DRS Elsevier B.V. All rights reserved. 1. Introduction Visible and near-infrared (VisNIR) diffuse reflectance

Lawrence, Rick L.

145

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

2011-07-21T23:59:59.000Z

146

IT Security Plan for Flight Simulation Program  

E-Print Network [OSTI]

Information security is one of the most important aspects of technology, we cannot protect the best interests of our organizations' assets (be that personnel, data, or other resources), without ensuring that these assetsare protected to the best of their ability. Within the Defense Department, this is vital to the security of not just those assets but also the national security of the United States. Compromise insecurity could lead severe consequences. However, technology changes so rapidly that change has to be made to reflect these changes with security in mind. This article outlines a growing technological change (virtualization and cloud computing), and how to properly address IT security concerns within an operating environment. By leveraging a series of encrypted physical and virtual systems, andnetwork isolation measures, this paper delivered a secured high performance computing environment that efficiently utilized computing resources, reduced overall computer processing costs, and ensures confidentia...

Hood, David; 10.5121/ijcsea.2011.1510

2011-01-01T23:59:59.000Z

147

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

148

Security Cases  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from the Gridwise Global1WasteRecoveryAwards SECTION B SUPPLIESSecuring the

149

High-Performance Secure Database Access Technologies for HEP Grids  

SciTech Connect (OSTI)

The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicists computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications. There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure authorization is pushed into the database engine will eliminate inefficient data transfer bottlenecks. Furthermore, traditionally separated database and security layers provide an extra vulnerability, leaving a weak clear-text password authorization as the only protection on the database core systems. Due to the legacy limitations of the systems security models, the allowed passwords often can not even comply with the DOE password guideline requirements. We see an opportunity for the tight integration of the secure authorization layer with the database server engine resulting in both improved performance and improved security. Phase I has focused on the development of a proof-of-concept prototype using Argonne National Laboratorys (ANL) Argonne Tandem-Linac Accelerator System (ATLAS) project as a test scenario. By developing a grid-security enabled version of the ATLAS projects current relation database solution, MySQL, PIOCON Technologies aims to offer a more efficient solution to secure database access.

Matthew Vranicar; John Weicher

2006-04-17T23:59:59.000Z

150

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

151

Security guide for subcontractors  

SciTech Connect (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

152

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

153

Security guide for subcontractors  

SciTech Connect (OSTI)

This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

Adams, R.C.

1993-06-01T23:59:59.000Z

154

National Hispanic engineering organization names Sandia manager...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Hispanic engineering organization names Sandia manager Engineer of the Year | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing...

155

DOE Issues Energy Sector Cyber Organization NOI  

Broader source: Energy.gov (indexed) [DOE]

sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. The cyber organization is...

156

Cyber Security and Resilient Systems  

SciTech Connect (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nations cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

157

Global Biodiversity Conservation Priorities  

E-Print Network [OSTI]

Global Biodiversity Conservation Priorities T. M. Brooks,1,2,3 * R. A. Mittermeier,1 G. A. B. da is essential to minimize biodiversity loss. To address this need, biodiversity conservation organizations have conservation funding. H uman actions are causing a biodiversity crisis, with species extinction rates up

Wilmers, Chris

158

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

159

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

160

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Visualizing Cyber Security: Usable Workspaces  

SciTech Connect (OSTI)

An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

2009-10-11T23:59:59.000Z

162

The Global Energy Challenge  

ScienceCinema (OSTI)

The expected doubling of global energy demand by 2050 challenges our traditional patterns of energy production, distribution and use. The continued use of fossil fuels raises concerns about supply, security, environment and climate. New routes are needed for the efficient conversion of energy from chemical fuel, sunlight, and heat to electricity or hydrogen as an energy carrier and finally to end uses like transportation, lighting, and heating. Opportunities for efficient new energy conversion routes based on nanoscale materials will be presented, with emphasis on the sustainable energy technologies they enable.

George Crabtree

2010-01-08T23:59:59.000Z

163

Sandia National Laboratories: Global  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLS Exhibit at ExploraGlobal Sandia Co-Hosts "Climate Risk

164

Sandia National Laboratories: Global  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLS Exhibit at ExploraGlobal Sandia Co-Hosts "Climate

165

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

166

National Security Technology Center | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNationalLos AlamosGlobal

167

Welcome to Los Alamos National Laboratory: A premier national security science laboratory  

SciTech Connect (OSTI)

Dr Wallace presents visitors with an overview of LANL's national security science mission: stockpile stewardship, protecting against the nuclear threat, and energy security & emerging threats, which are underpinned by excellence in science/technology/engineering capabilities. He shows visitors a general Lab overview of budget, staff, and facilities before providing a more in-depth look at recent Global Security accomplishments and current programs.

Wallace, Terry [Los Alamos National Laboratory

2012-06-25T23:59:59.000Z

168

A common language for computer security incidents  

SciTech Connect (OSTI)

Much of the computer security information regularly gathered and disseminated by individuals and organizations cannot currently be combined or compared because a common language has yet to emerge in the field of computer security. A common language consists of terms and taxonomies (principles of classification) which enable the gathering, exchange and comparison of information. This paper presents the results of a project to develop such a common language for computer security incidents. This project results from cooperation between the Security and Networking Research Group at the Sandia National Laboratories, Livermore, CA, and the CERT{reg_sign} Coordination Center at Carnegie Mellon University, Pittsburgh, PA. This Common Language Project was not an effort to develop a comprehensive dictionary of terms used in the field of computer security. Instead, the authors developed a minimum set of high-level terms, along with a structure indicating their relationship (a taxonomy), which can be used to classify and understand computer security incident information. They hope these high-level terms and their structure will gain wide acceptance, be useful, and most importantly, enable the exchange and comparison of computer security incident information. They anticipate, however, that individuals and organizations will continue to use their own terms, which may be more specific both in meaning and use. They designed the common language to enable these lower-level terms to be classified within the common language structure.

John D. Howard; Thomas A Longstaff

1998-10-01T23:59:59.000Z

169

Cyber Security | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FY 2012 FYCustomer-Comments SignCyanideCYBERCyber

170

A quantitative man-machine model for cyber security efficiency analysis  

E-Print Network [OSTI]

The analysis of security defense processes is of utmost importance in the management of various cyber-security attacks, which are increasing in scope and rapidity. Organizations need to optimize their resources based on a sound understanding...

Jung, Sung-Oh

2007-04-25T23:59:59.000Z

171

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNationalLos AlamosGlobal

172

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

173

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

174

GLOBAL THREAT REDUCTION INITIATIVE REACTOR CONVERSION PROGRAM: STATUS AND CURRENT PLANS  

SciTech Connect (OSTI)

The U.S. Department of Energys National Nuclear Security Administration (NNSA) Reactor Conversion Program supports the minimization, and to the extent possible, elimination of the use of high enriched uranium (HEU) in civilian nuclear applications by working to convert research and test reactors and radioisotope production processes to the use of low enriched uranium (LEU). The Reactor Conversion Program is a technical pillar of the NNSA Global Threat Reduction Initiative (GTRI) which is a key organization for implementing U.S. HEU minimization policy and works to reduce and protect vulnerable nuclear and radiological material domestically and abroad.

Staples, Parrish A.; Leach, Wayne; Lacey, Jennifer M.

2009-10-07T23:59:59.000Z

175

China's Global Oil Strategy  

E-Print Network [OSTI]

capability to secure oil transport security. Additionally,international oil agreements: 1) ensuring energy security;security, and many argue that as the second-largest consumer of oil

Thomas, Bryan G

2009-01-01T23:59:59.000Z

176

Information Security Group IY5512 Computer Security  

E-Print Network [OSTI]

for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

Mitchell, Chris

177

INFRASTRUCTURE SECURITY & ENERGY  

E-Print Network [OSTI]

price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

Schrijver, Karel

178

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

179

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

180

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Security system signal supervision  

SciTech Connect (OSTI)

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

182

ITL BULLETIN FOR MAY 2013 ITL PUBLISHES SECURITY AND PRIVACY CONTROLS FOR FEDERAL AGENCIES  

E-Print Network [OSTI]

The selection and implementation of security and privacy controls for information systems and organizations systems and organizations. Controls are also designed to satisfy a set of defined security requirements for federal information systems and organizations. It describes a process for selecting controls to protect

183

Lemnos interoperable security project.  

SciTech Connect (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

184

Next Generation National Security Leaders  

SciTech Connect (OSTI)

It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had right-sized the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community or it may lie in more effectively using our existing resources and training programs.

Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

2012-07-19T23:59:59.000Z

185

Chinas Rise as a Global S&T Powerand ChinaEU Cooperation  

E-Print Network [OSTI]

is a researcher in the China and Global Security Program ofChinese foreign and security policy, primarily on ChinaEUrelations and Chinas international science and technology

Bruner, Oliver

2011-01-01T23:59:59.000Z

186

National Security Technology Incubator Operations Plan  

SciTech Connect (OSTI)

This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

None

2008-04-30T23:59:59.000Z

187

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

188

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

189

Secure Storage | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage

190

A Secure Processor Architecture for Encrypted Computation on Untrusted Programs  

E-Print Network [OSTI]

A Secure Processor Architecture for Encrypted Computation on Untrusted Programs Christopher Descriptors C.1.0 [Computer Systems Organization]: Processor architectures--General; C.0 [Computer Systems Organiza- tion]: General--Modeling of computer architecture; E.3 [Data]: Data Encryption Keywords Secure

Gifford, David K.

191

Microsoft Word - Security TG Work Plan 8-7-06.doc  

Broader source: Energy.gov (indexed) [DOE]

on training in handling of sensitive and classified information, especially command and control between organizations. Security Practices: the STG is examining operational...

192

IBM Global Services A Strategic Approach to Protecting  

E-Print Network [OSTI]

IBM Global Services July 2007 A Strategic Approach to Protecting SCADA and Process Control Systems 2007 IBM Internet Security Systems, Inc. #12;A Strategic Approach to Protecting SCADA and Process Control Systems Page No.2 Abstract This document provides an overview of the security weaknesses present

193

Office of Heath, Safety and Security Now Two New Offices  

Broader source: Energy.gov [DOE]

To serve you better, DOE has structured the former HSS into to new organizations: the Office Independent Enterprise Assessment (IEA); and Office of Environment, Health, Safety and Security (EHSS).

194

Finance, IT Operations & Information Security Dear Colleagues,  

E-Print Network [OSTI]

1 Finance, IT Operations & Information Security Dear Colleagues, It is hard not to be mindful with the guidance of their senior administrators. The re-organization in some of the finance offices continues the intranet site. #12;2 Harry Dumay, PhD MBA Chief Financial Officer/ Associate Dean for Finance

195

Securing Internet Routing Securing Internet Routing  

E-Print Network [OSTI]

Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths

Goldberg, Sharon

196

Thinking Globally: How ISO 50001 - Energy Management can make industrial energy efficiency standard practice  

E-Print Network [OSTI]

Thinking Globally: How ISO 50001 Energy Management canThinking Globally: How ISO 50001 Energy Management canOrganization for Standardization (ISO) has identified energy

McKane, Aimee

2010-01-01T23:59:59.000Z

197

Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop  

SciTech Connect (OSTI)

The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

2006-01-01T23:59:59.000Z

198

Report on a Working Session on Security in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Report on a Working Session on Security in Wireless Ad Hoc Networks Levente Butty´an Jean organized a working session de- voted to the topic of security in wireless ad hoc networks. This event took setting. Securing wireless ad hoc networks is particularly diffi- cult for many reasons including

Chen, Yuanzhu Peter

199

Towards Efficient Collaboration in Cyber Security Peter Hui Joe Bruce Glenn Fink  

E-Print Network [OSTI]

. INTRODUCTION Although distributed geographically and often across different organizations, cyber-securityTowards Efficient Collaboration in Cyber Security Peter Hui Joe Bruce Glenn Fink Michelle Gregory University aendert@cs.vt.edu ABSTRACT Cyber security analysts in different geographical and organizational

200

Global Warming  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Big Sky LearningGet Assistance GetGiantOn The VergeGlobal Threat1 Global

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

-- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft...

202

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

203

Control Systems Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems within the nation's critical infrastructure. The CSSP assists control systems vendors and asset ownersoperators in identifying security vulnerabilities and developing...

204

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

205

Nevada National Security Site  

Broader source: Energy.gov [DOE]

HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities. In support of national defense initiatives...

206

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

207

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

208

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

209

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

210

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Reviews, etc., except those specifically reserved for the Administrator for the National Nuclear Security Administration and the Deputy Secretary. cc: Mike Hickman. NA-Stl...

211

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

212

Hazardous Material Security (Maryland)  

Broader source: Energy.gov [DOE]

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

213

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

214

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

215

LONDON'S GLOBAL UNIVERSITY THE GRAND CHALLENGE OF  

E-Print Network [OSTI]

is under threat from social tension, pollution and climate change. The prospect of global peace and Capacity-Building 11 ­ 14 / Health Effects of Climate Change 15 ­ 16 / Maternal and Child Health 17 ­ 22 security to health informatics and environmental law ­ our world-leading researchers apply their insight

Saunders, Mark

216

Help for the Developers of Control System Cyber Security Standards  

SciTech Connect (OSTI)

A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

Robert P. Evans

2008-05-01T23:59:59.000Z

217

Enhance your Cyber Security Knowledge  

E-Print Network [OSTI]

Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

218

Operational Security (OPSEC) Reminder | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

219

Foiling the Flu Bug Global Partnerships for Nuclear Energy  

E-Print Network [OSTI]

1 1663 Foiling the Flu Bug Global Partnerships for Nuclear Energy Dark Universe Mysteries WILL NOT NEED TESTING Expanding Nuclear Energy the Right Way GLOBAL PARTNERSHIPS AND AN ADVANCED FUEL CYCLE sense.The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy

220

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.Secure Manufacturing

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

222

December 2003 SECURITY CONSIDERATIONS  

E-Print Network [OSTI]

December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

Perkins, Richard A.

223

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

224

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

225

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

226

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

227

December 2007 SECURING EXTERNAL  

E-Print Network [OSTI]

devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

228

Indirection and computer security.  

SciTech Connect (OSTI)

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

229

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

230

Office of Departmental Personnel Security  

Broader source: Energy.gov [DOE]

The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

231

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

232

Global Health Research | 2 Global Health Research  

E-Print Network [OSTI]

Global Health Research | 2 Global Health Research Supporting researchers in low- and middle-income countries to carry out health- related research within their own countries. Gl bal Health #12;3 | Global Health Research #12;Global Health Research | 4 We are a global charitable foundation dedicated

Rambaut, Andrew

233

The Resilient Economy: Integrating Competitiveness and Security  

SciTech Connect (OSTI)

Globalization, technological complexity, interdependence, terrorism, climate and energy volatility, and pandemic potential are increasing the level of risk that societies and organizations now face. Risks also are increasingly interrelated; disruptions in one area can cascade in multiple directions. The ability to manage emerging risks, anticipate the interactions between different types of risk, and bounce back from disruption will be a competitive differentiator for companies and countries alike in the 21st century. What Policymakers Should Know The national objective is not just homeland protection, but economic resilience: the ability to mitigate and recover quickly from disruption. Businesses must root the case for investment in resilience strategies to manage a spectrum of risks, not just catastrophic ones. Making a business case for investment in defenses against low-probability events (even those with high impact) is difficult. However, making a business case for investments that assure business continuity and shareholder value is not a heavy lift. There are an infinite number of disruption scenarios, but only a finite number of outcomes. Leading organizations do not manage specific scenarios, rather they create the agility and flexibility to cope with turbulent situations. The investments and contingency plans these leading companies make to manage a spectrum of risk create a capability to respond to high-impact disasters as well. Government regulations tend to stovepipe different types of risk, which impedes companies abilities to manage risk in an integrated way. Policies to strengthen risk management capabilities would serve both security and competitiveness goals. What CEOs and Boards Should Know Operational risks are growing rapidly and outpacing many companies abilities to manage them. Corporate leadership has historically viewed operational risk management as a back office control function. But managing operational risks increasingly affects real-time financial performance. The 835 companies that announced a supply chain disruption between 1989 and 2000 experienced 33 percent to 40 percent lower stock returns than their industry peers. Twenty-five percent of companies that experienced an IT outage of two to six days went bankrupt immediately. Ninety-three percent of companies that lost their data center for 10 days or more filed for bankruptcy within a year.

Debbie van Opstal

2009-01-07T23:59:59.000Z

234

Headquarters Facilities Master Security Plan  

Energy Savers [EERE]

Security Briefing. Failure of any employee to complete the SF-312 results in the termination of hisher security clearance and denial of access to classified matter. The badge...

235

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

236

Smart-Grid Security Issues  

SciTech Connect (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

237

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

238

Design tools for complex dynamic security systems.  

SciTech Connect (OSTI)

The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

2007-01-01T23:59:59.000Z

239

Promoting India's development: energy security and climate security are convergent goals  

SciTech Connect (OSTI)

This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

Rajan, Gupta [Los Alamos National Laboratory; Shankar, Harihar [Los Alamos National Laboratory; Joshi, Sunjoy [INDIA

2009-01-01T23:59:59.000Z

240

Understanding Global Capitalism  

E-Print Network [OSTI]

sociology; globalization; political economy; development;economy fueled through 700 billion dollars injected into globalizationGlobalization Studies, also called CGS. I would economy and

Robinson, William I.

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Review: Global Climate Change  

E-Print Network [OSTI]

introduction to global climate change, the greenhouseReview: Global Climate Change: A Primer By Orrin H PilkeyPilkey, Keith C. Global Climate Change: a primer. Durham,

Smith, Jennifer

2013-01-01T23:59:59.000Z

242

Global Proteomics Reveal An Atypical Strategy for Carbon/Nitrogen...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

crucial to global oxygen production and worldwide carbon and nitrogen cycles. These microalgae are robust organisms capable carbon neutral biofuel production. Synechocystis sp....

243

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurity

244

Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program  

SciTech Connect (OSTI)

The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

2009-10-19T23:59:59.000Z

245

March 24, 2008 Databases: Security 1 Database Security and Authorization  

E-Print Network [OSTI]

to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

Adam, Salah

246

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-Print Network [OSTI]

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

247

The climate change and energy security nexus  

SciTech Connect (OSTI)

The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategic Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.

King, Marcus Dubois [George Washington University; Gulledge, Jay [ORNL

2013-01-01T23:59:59.000Z

248

Academy for Global Engagement  

E-Print Network [OSTI]

Academy for Global Engagement 2013-2014 Global Fellows #12;Meredith Gore and Wildlife #12;Global Research Interests · risk percepHon and public support and Agricultural Engineering #12;Global Research Interests · catalyHc conversion of biomass

249

global warming's six indias  

E-Print Network [OSTI]

global warming's six indias: An Audience Segmentation Analysis #12;Global Warming's Six Indias 1............................................................................................................................................20 2. Global Warming Beliefs and Attitudes................................................................................ 21 Knowledge about global warming varies widely by group

Haller, Gary L.

250

AMALGAMATED SECURITY COMMUNITIES  

E-Print Network [OSTI]

This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

Harvey, Andrew Stephen

2011-08-31T23:59:59.000Z

251

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

252

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

253

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

254

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

255

Engineering secure software  

E-Print Network [OSTI]

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after...

Jetly, Prateek

2001-01-01T23:59:59.000Z

256

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

257

Copyright 2009 IBM Global Business Services Preparing for IFRS  

E-Print Network [OSTI]

International Financial Reporting Standards (IFRS), as approved by the International Accounting Standards Board technology for IFRS International Financial Reporting Standards (IFRS) projects typically start into an Integrated Finance Organization (IFO) while the larger organization moves towards a Globally Integrated

258

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

259

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

260

Deconstructive Globalization: Universalism, Globality, Diversity+  

E-Print Network [OSTI]

University Press, 2000). Double Process Since the late 1980ies, two major processes have been transforming Nations Organization. Korea, Japan and Taiwan were under US control and military protection economy. The deconstruction of the USSR in the late 1980ies and of the 1945 world order since the late

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

262

physical security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions Program LANL TRU

263

safeguards and security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -

264

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear Science

265

Nuclear Security Enterprise | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear

266

International Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEMInterlibrary LoanExercises |Security

267

Defense Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security | National Nuclear

268

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxfordVeteransAdministrationPhysical Security Systems |

269

Global Safeguards and Security Educational Center Course Offerings  

E-Print Network [OSTI]

@ornl.gov Transportation DOE/NNSA SG100, Packaging and Offsite Transportation of Nu clear Material ­ Workshop (4­5 days) POC: Matt Feldman, 865.946.1291, feldmanmr@ornl.gov DOE/NNSA SG600, Test Guide for Type B Packages ­ Workshop (1 day) POC: Matt Feldman, 865.946.1291, feldmanmr@ornl.gov DOE/NNSA Packaging Workshop

270

100% container scanning : security policy implications for global supply chains  

E-Print Network [OSTI]

On August 3, 2007, President George Bush signed into law HR1 the "Implementing Recommendations of the 9/11 Commission Act of 2007." The 9/11 Act requires 100% scanning of US-bound containers at foreign seaports by 2012 ...

Bennett, Allison C. (Allison Christine)

2008-01-01T23:59:59.000Z

271

Plant genetics, sustainable agriculture and global food security.  

E-Print Network [OSTI]

are particularly appar- ent in Kazakhstan where local foodday, 94% of households in Kazakhstan use iodized salt, and

Ronald, Pamela

2011-01-01T23:59:59.000Z

272

Global Institute for Water Security National Hydrology Research Centre  

E-Print Network [OSTI]

for Environment and Sustainability (SENS) at the University of Saskatchewan is seeking a MES (Master in Environmental Sustainability) candidate with experience to help carry out the following project: Widespread to the College of Graduate Studies and Research In addition, the candidate should have: Ability to work

Saskatchewan, University of

273

Global Institute for Water Security National Hydrology Research Centre  

E-Print Network [OSTI]

) and the School for Environment and Sustainability (SENS) at the University of Saskatchewan is seeking a MES (Master of Environment and Sustainability) candidate with relevant experience to help carry out a large Familiarity with exploratory data analysis and statistical methods Successful application to the College

Saskatchewan, University of

274

Deputy Secretary Sell Highlights Cooperation in Global Energy Security and  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehiclesTanklessDOJ Title StandardsEngineers Renewin Texas |SelectedSummit

275

NNSA Computers Lead Global List | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffreyKeyAdministration

276

National Security Campus design team wins global award | National Nuclear  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclearhas 'Natitude' | NationalADR services areAmerica TreatyCompetition

277

Facility will focus on bioenergy, global food security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial ThinFOR IMMEDIATE5FacilitiesFacility will focus on

278

Security and Cyber Guidance | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from the Gridwise Global1WasteRecoveryAwards SECTION BNew EmployeeSecurity

279

Governing Economic Globalization: The Pioneering Experience of the OECD  

E-Print Network [OSTI]

importance to the governance of the global economy. The General Agreement on Tariffs and Trade (GATT) and WTOGoverning Economic Globalization: The Pioneering Experience of the OECD Robert T. KUDRLE * The Organization for Economic Co-operation and Development (OECD) has pioneered global governance in three areas

Levinson, David M.

280

Sandia National Laboratories: Global Climate & Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLS Exhibit at ExploraGlobal Sandia Co-HostsTheGlobal Climate

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and

282

SecuritySmart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March 2009

283

Safety, Security & Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for

284

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

285

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

286

Security enhanced with increased vehicle inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

287

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

Amin, Saurabh

2011-01-01T23:59:59.000Z

288

QUESTIONS ABOUT GLOBAL WARMING  

E-Print Network [OSTI]

QUESTIONS ABOUT GLOBAL WARMING ¥IS IT REAL? ¥IS IT IMPORTANT? ¥WHAT IS IT DUE TO? ¥HOW MUCH MORE in the atmosphere, giving Earth its temperate climate. Global Atmosphere, Global Warming GLOBAL TEMPERATURE TREND?t a cure for global warming! Aerosols only last a short while in the atmosphere, they would have

289

ata security feature: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

290

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

291

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

292

Globalization and standards : the liberalization of trade and the potential for a regulatory race to the top  

E-Print Network [OSTI]

Globalization is changing the way in which the world is organized. The world trade regime is increasingly the dominant mode of organizing international relations. Within this context of globalization and liberalization of ...

Cameron, Diane (Melissa Jessica Diane)

2007-01-01T23:59:59.000Z

293

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

294

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

295

September 2004 INFORMATION SECURITY  

E-Print Network [OSTI]

September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

296

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

297

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

298

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

299

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

2005-08-26T23:59:59.000Z

300

A network security monitor  

SciTech Connect (OSTI)

The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

1989-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

ARMY Energy Security Considerations  

E-Print Network [OSTI]

ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2 Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11

302

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

303

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

304

Database Security: A Historical Perspective  

E-Print Network [OSTI]

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

Lesov, Paul

2010-01-01T23:59:59.000Z

305

System security Dr Len Hamey  

E-Print Network [OSTI]

, firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

Hamey, Len

306

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

307

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

308

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

309

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

310

The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation  

SciTech Connect (OSTI)

After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a dirty bomb. In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRIs Russia Orphan Source Recovery Project, managed at the Nevada National Security Sites North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company Isotope has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.

Russell, J. W. [NSTec; Ahumada, A. D. [NSTec; Blanchard, T. A. [NNSA

2012-06-04T23:59:59.000Z

311

Oak Ridge Metrology Center | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the ContributionsArmsSpeedingSpeeding accessand TechnicalTheGlobal Security /

312

January 2005 INTEGRATING IT SECURITY  

E-Print Network [OSTI]

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS technology (IT) security and capital planning and investment control (CPIC) processes have been performed taining appropriate security controls, both at the enterprise-wide and system level, commensurate

313

August 2003 IT SECURITY METRICS  

E-Print Network [OSTI]

, efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

314

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

315

MIT Joint Program on the Science and Policy of Global Change  

E-Print Network [OSTI]

MIT Joint Program on the Science and Policy of Global Change Future United States Energy Security paper #12;1 Future United States Energy Security Concerns John Deutch Department of Chemistry on fossil fuels and a substantial and growing amount of oil imports. In this paper I will address

316

Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program  

SciTech Connect (OSTI)

The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the human factor. Gen. Eugene Habiger, a former Assistant Secretary for Safeguards and Security at the U.S. Department of Energys (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that good security is 20% equipment and 80% people.1 Although eliminating the human factor is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

Crawford, Cary E.; de Boer, Gloria; De Castro, Kara; Landers, John; Rogers, Erin

2010-10-01T23:59:59.000Z

317

Line Management Perspective: National Nuclear Security Administration...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

318

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

319

Secretary Richardson Accepts Recommendations for Improving Security...  

National Nuclear Security Administration (NNSA)

Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

320

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

FOILFEST :community enabled security.  

SciTech Connect (OSTI)

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

322

Recommended Practices Guide Securing WLANs using 802.11i  

SciTech Connect (OSTI)

This paper addresses design principles and best practices regarding the implementation and operation of Wireless LAN (WLAN) communication networks based on the 802.11i security standard. First, a general overview of WLAN technology and standards is provided in order to ground the discussion in the evolution of WLAN standards and security approaches. This is followed by a detailed explanation of the 802.11i standard for securing WLAN networks. Principles for designing secure WLAN networks are then presented, followed by a list of specific best practices that can be used as a guideline for organizations considering the deployment of WLAN networks for non-critical control and monitoring applications. Finally, a section on technical issues and considerations for deploying WLAN networks in critical environments is presented.

Masica, K

2006-10-16T23:59:59.000Z

323

Security seal. [Patent application  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17T23:59:59.000Z

324

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministration

325

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear Forensics Bioinformatics

326

Security Clearances; Limitations  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC. 1072.

327

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Page 13 of 20 NNSA Facility Representative, the Development organization implemented a Conduct of Operations (ConOps) Improvement Plan to improve development facilities. This...

328

Global Health Seminar Series  

E-Print Network [OSTI]

Bay Area Global Health Seminar Series Moving beyond millennium targets in global health: The challenges of investing in health and universal health coverage Although targets can help to focus global health efforts, they can also detract attention from deeper underlying challenges in global health

Klein, Ophir

329

Global Warming Observations  

E-Print Network [OSTI]

Global Warming Observations: 1. Global temperature has been gradually rising in recent years #15 in range 8000 12000 nm { CFC's, methane and N 2 O important for global warming even though concentra- tions in concentration of \\greenhouse gases" like CO 2 What determines global temperature? Energy budget of earth: 1

Schofield, Jeremy

330

Nevada National Security Site Groundwater Program Welcomes Peer Review Team  

Broader source: Energy.gov [DOE]

Recently, an independent peer review team was invited to assess the groundwater characterization program at the Nevada National Security Site (NNSS). This nationally recognized group of experts, from various external organizations, will examine the computer modeling approach developed to better understand how historic underground nuclear testing in Yucca Flat affected the groundwater.

331

Global Talent Program Explore High technology in Japan  

E-Print Network [OSTI]

, . 2011 GTP #12;: 11 #12;12 2011 Global Talent Program Fujitsu, Sony, Hitachi, SoftBank, Nikko , , , . " " , , . , . Nikko Cordial Securities Inc. . , . #12;: 21 08 Sony Corporation SONY IT , , , . SONY 3D , , , SONY . SONY NGP(Next Generation Portable; PSP2) Portable Network

Sung, Wokyung

332

Global Computing in a Dynamic Network of Tuple Spaces  

E-Print Network [OSTI]

and management of global computational environments and their application. On the linguistic side, we believe operations (like asynchronous remote communications). On the foundational side, the demand, security, privacy, failures, etc. in a setting where demands and guarantees can be very different

Gorla, Daniele

333

UIA: A Global Connectivity Architecture for Mobile Personal Devices  

E-Print Network [OSTI]

UIA: A Global Connectivity Architecture for Mobile Personal Devices by Bryan Alexander Ford B Architecture for Mobile Personal Devices by Bryan Alexander Ford Submitted to the Department of Electrical multiple personal devices, many of them mobile, and need to share information securely among them using

Ford, Bryan

334

SLU-Global Report 2013:2 The SLU Global Food Security Research  

E-Print Network [OSTI]

management of resources and soil fertility Soil and water management in agricultural production of agroforestry systems Soil carbon, water infiltration and root competition: implications for management-urban areas in Uganda Manure management 7 Table of contents 12 3. Innovative crop protection in eastern Africa

335

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

336

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

337

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

Ragsdale, G.

338

Paid for by Obama for America BARACK OBAMA'S PLAN TO MAKE AMERICA A GLOBAL ENERGY LEADER  

E-Print Network [OSTI]

Paid for by Obama for America BARACK OBAMA'S PLAN TO MAKE AMERICA A GLOBAL ENERGY LEADER Our nation plan to combat global warming and achieve energy security will: Implement an economy-wide cap impacts. Invest $150 billion over the next ten years to develop and deploy climate friendly energy

Ford, Andrew

339

Dye filled security seal  

DOE Patents [OSTI]

A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

Wilson, Dennis C. W. (Tijeras, NM)

1982-04-27T23:59:59.000Z

340

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScience National

342

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScienceScience »

343

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

344

Security | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0

345

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Ashby Photo Dr.1999alt=Search

346

Energy Security Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing Zirconia Nanoparticles asSecondCareerFebruaryEnergySecurity Overview We are

347

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The National

348

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The NationalWashington. DC

349

Natlonal Nuclear Security Admlnlstratlon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy2015 | JeffersonNations

350

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

351

Technology Transfer Success Stories, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

352

Climate Change and National Security  

E-Print Network [OSTI]

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

353

David Telles wins NNSA Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

354

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

355

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

356

Task team approach to safeguards and security designs  

SciTech Connect (OSTI)

In 1987, a US Department of Energy (DOE) supported task team was organized at the request of the DOE Idaho Field Office (DOE-ID) to provide support for safeguards and security (S S) designs of the Special Isotope Separation (SIS) facility. Prior to deferral of the project, the SIS facility was to be constructed at the Idaho National Engineering Laboratory (INEL) to produce weapons grade plutonium from DOE owned fuel grade plutonium. The task team was assembled to provide the resources necessary to assure that safeguards and security considerations were included as an integral part of the design of the facility, and that SIS designs would take advantage of available technology in the areas of physical security, measurements, accountability, and material and personnel tracking. The task team included personnel from DOE/Office of Safeguards and Security (DOE-OSS), DOE-ID, DOE contractors, and the national laboratories providing a wide range of expertise and experience. The team reviewed proposed designs and provided recommendations for safeguards and security features in each stage of the design process. The value of this approach to safeguards and security designs will be discussed with respect to benefits, lessons learned, and recommendations for future applications. 5 refs.

Zack, N.R. (Los Alamos National Lab., NM (United States)); Wilkey, D.D. (USDOE Idaho Operations Office, Idaho Falls, ID (United States))

1991-01-01T23:59:59.000Z

357

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

1995-09-28T23:59:59.000Z

358

Security classification of information  

SciTech Connect (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

359

Electronic security device  

DOE Patents [OSTI]

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

360

Ideas for Security Assurance in Security Critical Software using Modelica  

E-Print Network [OSTI]

Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

Zhao, Yuxiao

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Security Assessment Simulation Toolkit (SAST) Final Report  

SciTech Connect (OSTI)

The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

2009-11-15T23:59:59.000Z

362

Globalization of biopharmaceutical manufacturing  

E-Print Network [OSTI]

The biomanufacturing industry is changing due to increasing globalization. However, it is changing differently from other high tech industries like software/ semiconductor/ automobiles. In this study we use global ...

Pande, Rachna

2011-01-01T23:59:59.000Z

363

Nonsingular static global string  

E-Print Network [OSTI]

A new solution for the spacetime outside the core of a U(1) static global string has been presented which is nonsingular. This is the first example of a nonsingular spacetime around a static global string.}}

A. A. Sen; N. Banerjee

2000-04-12T23:59:59.000Z

364

Review: Globalization of Water  

E-Print Network [OSTI]

Review: Globalization of Water: Sharing the PlanetsAshok K. Globalization of Water: Sharing the Planets140) liters of virtual water (p. 15). This is one of the

Tennant, Matthew Aaron

2009-01-01T23:59:59.000Z

365

Global Environmental Course Title  

E-Print Network [OSTI]

Department Global Environmental Studies Room Course Title Frontier of Sustainability Science Instructor Akihisa MORI, Global Environmental Studies Satoshi KONISHI, Institute of Advanced consisting from a variety of academic field, including philosophy, politics, economics, energy, architecture

Takada, Shoji

366

Cows Causing Global Warming  

E-Print Network [OSTI]

Broadcast Transcript: Remember when President Reagan blamed trees for air pollution? Well now the Japanese are blaming cows for global warming. Apparently, the methane emissions from burping cows account for 5% of all global greenhouse gases. Simple...

Hacker, Randi

2008-08-06T23:59:59.000Z

367

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Office of Environmental Management (EM)

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

368

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Office of Environmental Management (EM)

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

369

2014 Headquarters Facilities Master Security Plan - Chapter 1...  

Office of Environmental Management (EM)

, Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

370

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Office of Environmental Management (EM)

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

371

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Office of Environmental Management (EM)

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

372

2006 U.S. Department of Energy Strategic Plan: Discovering the Solutions to Power and Secure Americas Future  

SciTech Connect (OSTI)

The Department of Energy Organization Act, which created DOE, was enacted in 1977 and DOE officially came into existence in October of that year. That law brought together for the first time, not only most of the governments energy programs, but also science and technology programs and defense responsibilities that included the design, construction, and testing of nuclear weapons. Over its history, DOE has shifted its emphasis and focus as the energy and security needs of the Nation have changed. Today, DOE stands at the forefront of helping the Nation meet our energy, scientific, environmental, and national security goals. These include developing and deploying new energy technologies, reducing our dependence on foreign energy sources, protecting our nuclear weapons stockpile, and ensuring that America remains competitive in the global marketplace. To help achieve these goals, President Bush has launched two key initiatives: the American Competitiveness Initiative (ACI) and the Advanced Energy Initiative (AEI). The President launched these initiatives recognizing that science, technology, and engineering hold the answers to many of the critical challenges our world faces. These new initiatives to spur scientific innovation and technology development expand DOEs continuing support for the competitive energy markets, both domestically and internationally, and of policies that facilitate continued private investment in the energy sector. In addition, DOE supports the demonstration and deployment of energy technologies through collaborative efforts with the private sector and public sector entities.

None,

2006-10-11T23:59:59.000Z

373

GLOBAL MONITORING OF URANIUM HEXIFLORIDE CYLINDERS NEXT STEPS IN DEVELOPMENT OF AN ACTION PLAN  

SciTech Connect (OSTI)

Over 40 industrial facilities world-wide use standardized uranium hexafluoride (UF{sub 6}) cylinders for transport, storage and in-process receiving in support of uranium conversion, enrichment and fuel fabrication processes. UF{sub 6} is processed and stored in the cylinders, with over 50,000 tU of UF{sub 6} transported each year in these International Organization for Standardization (ISO) qualified containers. Although each cylinder is manufactured to an ISO standard that calls for a nameplate with the manufacturer's identification number (ID) and the owner's serial number engraved on it, these can be quite small and difficult to read. Recognizing that each facility seems to use a different ID, a cylinder can have several different numbers recorded on it by means of metal plates, sticky labels, paint or even marker pen as it travels among facilities around the world. The idea of monitoring movements of UF{sub 6} cylinders throughout the global uranium fuel cycle has become a significant issue among industrial and safeguarding stakeholders. Global monitoring would provide the locations, movements, and uses of cylinders in commercial nuclear transport around the world, improving the efficiency of industrial operations while increasing the assurance that growing nuclear commerce does not result in the loss or misuse of cylinders. It should be noted that a unique ID (UID) attached to a cylinder in a verifiable manner is necessary for safeguarding needs and ensuring positive ID, but not sufficient for an effective global monitoring system. Modern technologies for tracking and inventory control can pair the UID with sensors and secure data storage for content information and complete continuity of knowledge over the cylinder. This paper will describe how the next steps in development of an action plan for employing a global UF{sub 6} cylinder monitoring network could be cultivated using four primary UID functions - identification, tracking, controlling, and accounting.

Hanks, D.

2010-06-09T23:59:59.000Z

374

Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes  

E-Print Network [OSTI]

of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

Bishop, Matt

375

Pricing Security L. Jean Camp  

E-Print Network [OSTI]

documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

Camp, L. Jean

376

Fluid Mechanics and Homeland Security  

E-Print Network [OSTI]

Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department. 2006. 38:87­110 The Annual Review of Fluid Mechanics is online at fluid.annualreviews.org doi: 10 security involves many applications of fluid mechanics and offers many opportunities for research

Settles, Gary S.

377

Reporting Incidents Of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

378

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

379

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

380

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network [OSTI]

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Between adaptation and resistance : labor responses to globalization in France  

E-Print Network [OSTI]

This dissertation aims at accounting for labor responses to globalization in France. It addresses this issue through a comparative study of two labor organizations-the French Democratic Labor Confederation (CFDT) and the ...

Ancelovici, Marcos, 1971-

2008-01-01T23:59:59.000Z

382

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

1995-09-28T23:59:59.000Z

383

Office of Headquarters Personnel Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

384

Departmental Personnel Security- Policy and Procedures  

Broader source: Energy.gov [DOE]

Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

385

Evaluation Report on "The Department's Unclassified Cyber Security Program"  

SciTech Connect (OSTI)

Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

None

2009-10-01T23:59:59.000Z

386

Sandia National Laboratories: Global Climate & Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLS Exhibit at ExploraGlobal Sandia Co-Hosts "ClimateMapping

387

Sandia National Laboratories: Global Climate & Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLS Exhibit at ExploraGlobal Sandia Co-Hosts

388

Sandia National Laboratories: Global Climate & Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLS Exhibit at ExploraGlobal Sandia Co-HostsThe Energy-Water

389

Sandia National Laboratories: Global Climate & Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLS Exhibit at ExploraGlobal Sandia Co-HostsThe

390

Management Principles for Nonproliferation Organizations  

SciTech Connect (OSTI)

This paper identifies business models and six management principles that can be applied by a nonproliferation organization to maximize the value and effectiveness of its products. The organizations responsible for reducing the nuclear proliferation threat have experienced a substantial growth in responsibility and visibility since the September 11 attacks. Since then, the international community has witnessed revelations of clandestine nuclear facilities, nuclear black markets, periodic nuclear tests, and a resurgence of interest by countries worldwide in developing nuclear capabilities. The security environment will likely continue to evolve in unexpected ways since most of the proliferation threats with which the world will be forced to contend remain unforeseen. To better prepare for and respond to this evolving security environment, many nonproliferation organizations are interested in finding new or better ways to increase the effectiveness and efficiency of their operations. Of course, all organizations, whether they are market driven or non-profit, must operate effectively and efficiently if they are to succeed. Indeed, as this study demonstrates, many of the management principles that this study recommends can help all organizations succeed. However, this study pays particular attention to nonproliferation organizations because of the mission they are responsible for fulfilling. Nonproliferation organizations, including nonproliferation programs that operate within a larger national security organization, are responsible for reducing the threat of nuclear, chemical and biological weapons. These organizations have an enduring mandate from the public and the international community not to fail in the completion of their mission for failure could have detrimental impacts on international security, public health and the environment. Moreover, the public expects nonproliferation organizations and programs to fulfill their mission, even when resources are limited. They are expected to anticipate and react quickly to prevent a potential threat while staying accountable to their public stakeholders, many of whom remain unaware of the very threats the organization is trying to address. When budgets are flush, it is easy to believe that money will solve all problems; but during times of economic hardship, managers must rely on creative and cost-effective management approaches to implement their missions. Fortunately, managers of nonproliferation organizations can draw on a wealth of research on organizational design and culture to help them identify the management strategies most appropriate for them. Such research can help nonproliferation managers think about their own organizational structures and cultures and adapt accepted management principles to their unique organizational mission. This analytical process is not straight forward, as some managers may find themselves taking risks that others might not take, such as making ostensibly risky investments for the common good, or supporting creative thinking to help mission accomplishment. Some management principles that are relatively straightforward for other organizations may be difficult to envision and implement in a nonproliferation organization. Therefore, the goal of this study is to help nonproliferation managers identify management principles that can be implemented in a nonproliferation organization and, in the process, help maximize the value of the organization's products and effectiveness of its mission.

Frazar, Sarah L.; Hund, Gretchen

2012-03-06T23:59:59.000Z

391

SECURE MANAGEMENT OF KEYS IN CRYPTOGRAPHIC APPLICATIONS: GUIDANCE FOR ORGANIZATIONS  

E-Print Network [OSTI]

into the IT system development life cycle, and rigorously select the products, algorithms, and protocols that meet

392

Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid  

E-Print Network [OSTI]

Sinnott,R.O. Watt,J. Koetsier,J. Chadwick,D.W. Otenko,O. Nguyen,T. Proceedings of 2nd IEEE International Conference on e-Science and Grid Computing, Amsterdam, December 2006

Sinnott, R.O.

393

Climate Change and National Security  

E-Print Network [OSTI]

Global surface warming (0C) Assumes that the GHG concentration is stabilized at 2000 levelswarming over a long period would melt all of Greenlands ice sheet, raising the global sea level

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

394

Independent Activity Report, Office of Secure Transportation...  

Broader source: Energy.gov (indexed) [DOE]

Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

395

Independent Oversight Evaluation, Office of Secure Transportation...  

Office of Environmental Management (EM)

Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

396

Independent Oversight Inspection, Office of Secure Transportation...  

Office of Environmental Management (EM)

Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

397

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

398

Homeland Security and Emergency Management Coordination (HSEMC...  

National Nuclear Security Administration (NNSA)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

399

Preliminary Notice of Violation, National Security Technologies...  

Office of Environmental Management (EM)

Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

400

Safety and Security Enforcement Process Overview  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Safety and Security Enforcement Coordinator Handbook  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT COORDINATOR HANDBOOK August 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy AUGUST 2012 DOE...

402

Harold Washington Social Security Administration (SSA) Center...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

403

National Securities Technologies _NSTec_ Livermore Operations...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

404

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

405

National Nuclear Security Administration Appropriation and Program...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

406

Independent Oversight Review, Nevada National Security Site,...  

Broader source: Energy.gov (indexed) [DOE]

and Special Door Interlock systems at the Nevada National Security Site (NNSS) Device Assembly Facility (DAF). The NNSS DAF is operated by National Security Technologies, LLC...

407

Automated Security Compliance Tool for the Cloud.  

E-Print Network [OSTI]

?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business (more)

Ullah, Kazi Wali

2012-01-01T23:59:59.000Z

408

Independent Oversight Activity Report, Nevada National Security...  

Office of Environmental Management (EM)

Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

409

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

COUNTRIES More Documents & Publications 2014 Headquarters Facilities Master Security Plan - Chapter 6, Foreign Interaction PSH-12-0117 - In the matter of Personnel Security...

410

Extension of DOE Directive on Cyber Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

2003-06-04T23:59:59.000Z

411

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

Amin, Saurabh

2011-01-01T23:59:59.000Z

412

ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...  

Broader source: Energy.gov (indexed) [DOE]

8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the...

413

Enforcement Letter, Consolidated Nuclear Security, LLC | Department...  

Energy Savers [EERE]

security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

414

Design Editorial Globalization and Internationalism  

E-Print Network [OSTI]

; especially, the development of an increasingly integrated global economy marked especially by free tradeJournal of Mechanical Design Editorial Globalization and Internationalism There has always been and Strabo, but to Friedman's empirical observations of globalization. According to Wikipedia, "globalization

Papalambros, Panos

415

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

416

National Security Science July 2014  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurityJuly

417

INTERNATIONAL RELATIONS &INTERNATIONAL RELATIONS &INTERNATIONAL RELATIONS & THE GLOBAL ECONOMYTHE GLOBAL ECONOMYTHE GLOBAL ECONOMY  

E-Print Network [OSTI]

GLOBAL ECONOMYTHE GLOBAL ECONOMY This major offers students rigorous interdisciplinary training 331: The Global Economy 2030 -- Examination of key ideas from economics, demography and technology. Guest lecturers illuminate possible conditions of the global economy in 2030. IR 454: International

Krylov, Anna I.

418

DF-479 SD-11 Directory Security: Mechanisms and Practicality  

E-Print Network [OSTI]

This document reviews security issues and identifies some of the specific measures required to achieve security.

North American Directory

419

updated 6/7/2007 Aerospace Security Certificate (21 Hours)  

E-Print Network [OSTI]

Technologies AVED 5413* Landside Security Technologies AVED 5423* Security Planning, Audits, and NIMS AVED 5433

Veiga, Pedro Manuel Barbosa

420

CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS  

E-Print Network [OSTI]

Security service is currently handled through a private security guard service contract, which provides

Olsen, Stephen L.

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Integrating Safeguards and Security with Safety into Design  

SciTech Connect (OSTI)

There is a need to minimize security risks, proliferation hazards, and safety risks in the design of new nuclear facilities in a global environment of nuclear power expansion, while improving the synergy of major design features and raising operational efficiency. In 2008, the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA) launched the Next Generation Safeguards Initiative (NGSI) covering many safeguards areas. One of these, launched by NNSA with support of the DOE Office of Nuclear Energy, was a multi-laboratory project, led by the Idaho National Laboratory (INL), to develop safeguards by design. The proposed Safeguards-by-Design (SBD) process has been developed as a structured approach to ensure the timely, efficient, and cost effective integration of international safeguards and other nonproliferation barriers with national material control and accountability, physical security, and safety objectives into the overall design process for the nuclear facility lifecycle. A graded, iterative process was developed to integrate these areas throughout the project phases. It identified activities, deliverables, interfaces, and hold points covering both domestic regulatory requirements and international safeguards using the DOE regulatory environment as exemplar to provide a framework and guidance for project management and integration of safety with security during design. Further work, reported in this paper, created a generalized SBD process which could also be employed within the licensed nuclear industry and internationally for design of new facilities. Several tools for integrating safeguards, safety, and security into design are discussed here. SBD appears complementary to the EFCOG TROSSI process for security and safety integration created in 2006, which focuses on standardized upgrades to enable existing DOE facilities to meet a more severe design basis threat. A collaborative approach is suggested.

Robert S. Bean; John W. Hockert; David J. Hebditch

2009-05-01T23:59:59.000Z

422

Cryptography and Data Security  

E-Print Network [OSTI]

The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and subsequently whmh data sets an active user may read or wrote. Flow controls regulate the dissemination of values among the data sets accessible to a user. Inference controls protect statistical databases by preventing questioners from deducing confidential information by posing carefully designed sequences of statistical queries and correlating the responses. Statlstmal data banks are much less secure than most people beheve. Data encryption attempts to prevent unauthorized disclosure of confidential information in transit or m storage. This paper describes the general nature of controls of each type, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses. The paper is intended for a general audience with little background in the area.

Dorothy E. Denning; Peter; J. Denning

1982-01-01T23:59:59.000Z

423

Security incidents on the Internet, 1989--1995  

SciTech Connect (OSTI)

This paper presents an analysis of trends in Internet security based on an investigation of 4,299 Internet security-related incidents reported to the CERT{reg_sign} Coordination Center (CERT{reg_sign}/CC) from 1989 through 1995. Prior to this research, knowledge of actual Internet security incidents was limited and primarily anecdotal. This research: (1) developed a taxonomy to classify Internet attacks and incidents, (2) organized, classified, and analyzed CERT{reg_sign}/CC incident records, (3) summarized the relative frequency of the use of tools and vulnerabilities, success in achieving access, and results of attacks, (4) estimated total Internet incident activity, (5) developed recommendations for Internet users and suppliers, and (6) developed recommendations for future research. With the exception of denial-of-service attacks, security incidents were found to be increasing at a rate less than Internet growth. Estimates showed that most, if not all, severe incidents were reported to the CERT{reg_sign}/CC, and that more than one out of three above average incidents (in terms of duration and number of sites) were reported. Estimates also indicated that a typical Internet site was involved in, at most, around one incident (of any kind) per year, and a typical Internet host in, at most, around one incident in 45 years. The probability of unauthorized privileged access was around an order of magnitude less likely. As a result, simple and reasonable security precautions should be sufficient for most Internet users.

Howard, J.D.

1995-12-31T23:59:59.000Z

424

Engineering the global ecosystem  

E-Print Network [OSTI]

of humans deliberately engineering agricultural landscapes.010-0302-8 EDITORIAL Engineering the global ecosystemtale about human explorers engineering the ecosystem of Mars

Stringfellow, William T.; Jain, Ravi

2010-01-01T23:59:59.000Z

425

Subsidizing Global Solar Power.  

E-Print Network [OSTI]

?? With national cuts on solar PV subsidies and the current oversupply of panels, the global solar market is clearly threatened by a contraction. Yet, (more)

Arnesson, Daniel

2013-01-01T23:59:59.000Z

426

Port security and information technology  

E-Print Network [OSTI]

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

427

Meeting Federal Energy Security Requirements  

Broader source: Energy.gov [DOE]

Presentationgiven at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meetingdiscusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

428

Utility Security & Resiliency: Working Together  

Broader source: Energy.gov [DOE]

Presentationgiven at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meetingdiscusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

429

Intrusion detection using secure signatures  

DOE Patents [OSTI]

A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

Nelson, Trent Darnel; Haile, Jedediah

2014-09-30T23:59:59.000Z

430

Securities trading of concepts (STOC)  

E-Print Network [OSTI]

Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a securities trading ...

Dahan, Ely

431

Italy | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryItaly and the United States of America are pleased...

432

Belgium | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Elio Di Rupo of Belgium on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryBelgium and the United States of America are pleased...

433

Forrestal Security and Safety Procedures  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

1983-02-02T23:59:59.000Z

434

INL@Work Cyber Security  

SciTech Connect (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

435

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

436

Security Area Vouching and Piggybacking  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

2000-06-05T23:59:59.000Z

437

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z

438

Master Safeguards and Security Agreements  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

1988-02-03T23:59:59.000Z

439

Cognitive Security for Personal Devices  

E-Print Network [OSTI]

Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...

Greenstadt, Rachel

2008-03-17T23:59:59.000Z

440

National Electric Sector Cybersecurity Organization Resource (NESCOR)  

SciTech Connect (OSTI)

The goal of the National Electric Sector Cybersecurity Organization Resource (NESCOR) project was to address cyber security issues for the electric sector, particularly in the near and mid-term. The following table identifies the strategies from the DOE Roadmap to Achieve Energy Delivery Systems Cybersecurity published in September 2011 that are applicable to the NESCOR project.

None, None

2014-06-30T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Office of Headquarters Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

442

Homeland Security Issues for Facilities  

E-Print Network [OSTI]

efficiency filters typically cause greater static pressure drop. Replacing air handling units to accept higher efficiency filters can be a major undertaking and expense. Besides offering some protection from biological and radiological agents, efficient..., security, surveillance, ventilation and filtration, and maintenance and training. The remainder of this discussion will focus primarily on occupant protection through HVAC system readiness and additional security measures. The aftermath of natural...

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

443

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

444

April 11, 2005 --Lecture 31 Computer Security  

E-Print Network [OSTI]

Science Policy Ancillaries #12;Security Planning Team Must represent all stakeholders, typically: Hardware

Jones, Douglas W.

445

Decision Support for Choice of Security  

E-Print Network [OSTI]

Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o analysis and trade-o tool BBN topology. (6) Rule set for how

Langseth, Helge

446

Cooperative monitoring and its role in regional security  

SciTech Connect (OSTI)

Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technical expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.

Biringer, K.; Olsen, J.; Lincoln, R.; Wehling, F. [and others

1997-03-01T23:59:59.000Z

447

CYBER SECURITY THREATS TO SAFETY-CRITICAL, SPACE-BASED INFRASTRUCTURES  

E-Print Network [OSTI]

role in national critical infrastructures. The certification of Global Navigation Satellite SystemsCYBER SECURITY THREATS TO SAFETY-CRITICAL, SPACE-BASED INFRASTRUCTURES C.W. Johnson (1) , A-based systems play an important role within national critical infrastructures. They are being integrated

Johnson, Chris

448

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?  

E-Print Network [OSTI]

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

Qin, Xiao

449

Cyber Security Companies, governments, and consumers depend on secure and reliable  

E-Print Network [OSTI]

Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

Hill, Wendell T.

450

Global Development Our Responsibility  

E-Print Network [OSTI]

of expertise cover urgent global issues such as food production, energy supply, climate change, biodiversity e ort to address urgent global issues particularly a ecting developing countries e.g. climate change of Communication, 2012 · Project Leader: Karin Nilsson · Graphic Design: Viktor Wrange & Michael Kvick Cover Photo

451

CHILLING CONSIDERATIONS GLOBAL WARMING  

E-Print Network [OSTI]

(millionsofsquarekilometers) 30 20 10 MELTING OF GREENLAND ICE CAP Satellite determination of maximum extent of glacial melt Complete melt of the Greenland ice sheet would raise the level of the global ocean 23 feet. ASAN Steffen IS INCREASING Global carbon dioxide concentration over the last thousand years Polar ice cores #12;Mann et al

Schwartz, Stephen E.

452

Global Change Sustainability  

E-Print Network [OSTI]

Global Change and Sustainability Center The GCSC is an inclusionary and interdisciplinary hub that promotes, coordinates, and conducts local to global environmental- and sustainability-related research to complex environmental and sustainability issues and challenges. 2012 Annual Report #12;1GCSC 2012 ANNUAL

Tipple, Brett

453

New Global Research Website | GE Global Research  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of1,Department ofNewof NO2: KeyGE SelectsI Want

454

Organic geochemistry and organic petrography  

SciTech Connect (OSTI)

The Vermillion Creek coals and shales contain dominantly humic organic matter originating from woody plant tissues except for one shale unit above the coals, which contains hydrogen-rich kerogen that is mostly remains of filamentous algae, of likely lacustrine origin. The coals have two unusual features - very low inertinite content and high sulfur content compared to mined western coals. However, neither of these features points to the limnic setting reported for the Vermillion Creek sequence. The vitrinite reflectance of Vermillion Creek shales is markedly lower than that of the coals and is inversely proportional to the H/C ratio of the shales. Rock-Eval pyrolysis results, analyses of H, C, and N, petrographic observations, isotope composition of organic carbon, and amounts and compositions of the CHCl/sub 3/-extractable organic matter all suggest mixtures of two types of organic matter in the Vermillion Creek coals and clay shales: (1) isotopically heavy, hydrogen-deficient, terrestrial organic matter, as was found in the coals, and (2) isotopically light, hydrogen-rich organic matter similar to that found in one of the clay-shale samples. The different compositions of the Vermillion Creek coal, the unnamed Williams Fork Formation coals, and coals from the Middle Pennsylvanian Marmaton and Cherokee Groups are apparently caused by differences in original plant composition, alteration of organic matter related to different pH conditions of the peat swamps, and slightly different organic maturation levels.

Bostick, N.H.; Hatch, J.R.; Daws, T.A.; Love, A.H.; Lubeck, S.C.M.; Threlkeld, C.N.

1987-01-01T23:59:59.000Z

455

Embedding Sustainability into Manufacturing Organizations  

E-Print Network [OSTI]

(14). G4, the latest version of the guidelines, was published in May 2013. An effort is underway to harmonize the reporting process for the CDP and GRI (7), which should ease the burden for companies reporting to both organizations. Table 1 lists... to the 2013 Global Corporate Sustainability Report from the United Nations Global Compact, company size is the most telling indicator of whether a company is pursuing sustainability (48). The report is based on survey results from over 1,700 of the 8...

Tutterow, V.

2014-01-01T23:59:59.000Z

456

Sandia National Laboratories: Global Marine Renewable Energy Con-ference  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLS Exhibit at ExploraGlobal Sandia Co-HostsTheGlobal

457

MIT Joint Program on the Science and Policy of Global Change  

E-Print Network [OSTI]

MIT Joint Program on the Science and Policy of Global Change Russia's Role in the Kyoto Protocol-profit organizations. To inform processes of policy development and implementation, climate change research needs #12;The MIT Joint Program on the Science and Policy of Global Change is an organization for research

458

Organic Superconductors  

SciTech Connect (OSTI)

Intense magnetic fields are an essential tool for understanding layered superconductors. Fundamental electronic properties of organic superconductors are revealed in intense (60 tesla) magnetic fields. Properties such as the topology of the Fermi surface and the nature of the superconducting order parameter are revealed. With modest maximum critical temperatures~13K the charge transfer salt organic superconductors prove to be incredibly valuable materials as their electronically clean nature and layered (highly anisotropic) structures yield insights to the high temperature superconductors. Observation of de Haas-van Alphen and Shubnikov-de Haas quantum oscillatory phenomena, magnetic field induced superconductivity and re-entrant superconductivity are some of the physical phenomena observed in the charge transfer organic superconductors. In this talk, I will discuss the nature of organic superconductors and give an overview of the generation of intense magnetic fields; from the 60 tesla millisecond duration to the extreme 1000 tesla microsecond pulsed magnetic fields.

Charles Mielke

2009-02-27T23:59:59.000Z

459

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY, EUROPEAN SECURITY  

E-Print Network [OSTI]

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY recent developments in European Union (EU) security policy and their implications for Germany's bilateral of a greater EU security capability has significantly affected Germany's bilateral relations with the USA

Sheldon, Nathan D.

460

International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security  

E-Print Network [OSTI]

1 TUDelft International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security Dirk Jan van den Berg President Del2 University of Technology participants, Nuclear security requires highly skilled experts. Professionals, who are familiar

Langendoen, Koen

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Office of Secure Transportation | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002 Wholesale PowerSecurity Office of Oil,ArgonneServices

462

Secure Data Transfer Guidance for Industrial Control and SCADA Systems  

SciTech Connect (OSTI)

This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

2011-09-01T23:59:59.000Z

463

Global warming, bad weather, insurance losses and the global economy  

SciTech Connect (OSTI)

Global warming causes extremely bad weather in the near term. The impact on the insurance industry is described. Why global warming in the near term causes very bad weather is explained. The continuing trend of very bad weather and the future impact on the insurance industry is explored. How very bad weather can affect the global financial market is explained. Taking a historical view of the development of the modern economy, the authors describe in the near term the impact of global warming on the global economy. The long term impact of global warming on the global economy and the human race is explored. Opportunities presented by global warming are described.

Low, N.C. [UOB Life Assurance Ltd., Singapore (Singapore); Shen, S. [Global Warming International Center, Woodridge, IL (United States)

1996-09-01T23:59:59.000Z

464

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

465

Visual analysis of code security  

SciTech Connect (OSTI)

To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated software security analysis tools. These tools analyze software for weaknesses and vulnerabilities, but the individual tools catch different vulnerabilities and produce voluminous data with many false positives. This paper describes a system that brings together the results of disparate software analysis tools into a visual environment to support the triage and exploration of code vulnerabilities. Our system allows software developers to explore vulnerability results to uncover hidden trends, triage the most important code weaknesses, and show who is responsible for introducing software vulnerabilities. By correlating and normalizing multiple software analysis tools' data, the overall vulnerability detection coverage of software is increased. A visual overview and powerful interaction allows the user to focus attention on the most pressing vulnerabilities within huge volumes of data, and streamlines the secure software development workflow through integration with development tools.

Goodall, John R [ORNL] [ORNL; Radwan, Hassan [Applied Visions, Inc.] [Applied Visions, Inc.; Halseth, Lenny [Applied Visions, Inc.] [Applied Visions, Inc.

2010-01-01T23:59:59.000Z

466

Homeland Security and Defense Applications  

SciTech Connect (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2014-11-06T23:59:59.000Z

467

Homeland Security and Defense Applications  

ScienceCinema (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2015-01-09T23:59:59.000Z

468

Security-by-design handbook.  

SciTech Connect (OSTI)

This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

2013-01-01T23:59:59.000Z

469

Climate Change and National Security  

SciTech Connect (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

Malone, Elizabeth L.

2013-02-01T23:59:59.000Z

470

Integrated safeguards and security management plan  

SciTech Connect (OSTI)

Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

Bowen, Sue, editor

2001-04-16T23:59:59.000Z

471

safeguards | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -| National Nuclear Security

472

Nuclear Safeguards and Security Challenge:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the ContributionsArms Control R&D ConsortiumNuclearSafeguards and Security Challenge:

473

Security Cases | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security

474

Security_Walls_VPP_Award  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March

475

Sandia National Laboratories: Climate Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0Energy AdvancedEnergyEnergyMapping WaterMonitoringClimate Security

476

China's Global Oil Strategy  

E-Print Network [OSTI]

nations began to seek out oil reserves around the world. 3on the limited global oil reserves and spiking prices. Manyto the largest proven oil reserves, making up 61 percent of

Thomas, Bryan G

2009-01-01T23:59:59.000Z

477

KRFTWRK Global Human Electricity  

E-Print Network [OSTI]

Power Network 2.1.1 Virtual Power Plants The Global Powernetwork, based on "Virtual Power Plants", called "VPP". A "participant runs a virtual human power plant. Per every "

Prohaska, Rainer

2009-01-01T23:59:59.000Z

478

China's Global Oil Strategy  

E-Print Network [OSTI]

21, 2008. Ying, Wang. China, Venezuela firms to co-developoilfields. China Daily (27 August 2005) http://David and Bi Jianhai. Chinas Global Hunt for Energy.

Thomas, Bryan G

2009-01-01T23:59:59.000Z

479

Global warming elucidated  

SciTech Connect (OSTI)

The meaning of global warming and its relevance to everyday life is explained. Simple thermodynamics is used to predict an oscillatory nature of the change in climate due to global warming. Global warming causes extreme events and bad weather in the near term. In the long term it may cause the earth to transition to another equilibrium state through many oscillation in climatic patterns. The magnitudes of these oscillations could easily exceed the difference between the end points. The author further explains why many no longer fully understands the nature and magnitudes of common phenomena such as storms and wind speeds because of these oscillations, and the absorptive properties of clouds. The author links the increase in duration of the El Nino to global warming, and further predicts public health risks as the earth transitions to another equilibrium state in its young history.

Shen, S. [Global Warming International Center, Woodridge, IL (United States)

1995-03-01T23:59:59.000Z

480

assa security center: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cures All Dumb Ideas in Computer Security 919 Jul 2011 12 147 Annual Security Report October 2013 Materials Science Websites Summary: of Security Field Operations,...

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Office of Environmental Management (EM)

INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

482

2014 Headquarters Facilities Master Security Plan - Chapter 11...  

Office of Environmental Management (EM)

1, Incidents of Security Concern 2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern October 2014 2014 Headquarters Facilities Master...

483

2014 Headquarters Facilities Master Security Plan - Chapter 17...  

Office of Environmental Management (EM)

7, Headquarters Security Officer Program 2014 Headquarters Facilities Master Security Plan - Chapter 17, Headquarters Security Officer Program June 2014 2014 Headquarters...

484

Energy and Security in Northeast Asia: Proposals for Nuclear Cooperation  

E-Print Network [OSTI]

The bilateral nuclear and security agreement between theThe bilateral nuclear and security agreement between thein East Asia's security, nuclear energy, and environment. It

Kaneko, Kumao; Suzuki, Atsuyuki; Choi, Jor-Shan; Fei, Edward

1998-01-01T23:59:59.000Z

485

Spatial and Seasonal Trends in Biogenic Secondary Organic Aerosol  

E-Print Network [OSTI]

Spatial and Seasonal Trends in Biogenic Secondary Organic Aerosol Tracers and Water-Soluble Organic biogenic secondary organic aerosol (SOA) tracers via gas chromatography-mass spectrometry (GC natural and anthropogenic sources and is dominated by terrestrial plant foliage (7). The global

Zheng, Mei

486

Museum security and the Thomas Crown Affair.  

SciTech Connect (OSTI)

Over the years, I've daydreamed about stealing a Vermeer, a Picasso, or Rembrandt. It tickles me, as much as watching the reboot of The Thomas Crown Affair. Why is it, do you suppose, so much fun to think about stealing a world renowned piece off the wall of a major metropolitan museum? Is it the romantic thoughts of getting away with it, walking past infrared detectors, and pressure sensors ala Indiana Jones with the sack of sand to remove the idol without triggering the security system? Is it the idea of snatching items with such fantastic prices, where the romance of possessing an item of such value is less intoxicating than selling it to a private collector for it to never be seen again? I suspect others share my daydreams as they watch theater or hear of a brazen daylight heist at museums around the world, or from private collections. Though when reality sets in, the mind of the security professional kicks in. How could one do it, why would one do it, what should you do once it's done? The main issue a thief confronts when acquiring unique goods is how to process or fence them. They become very difficult to sell because they are one-of-a-kind, easy to identify, and could lead to the people involved with the theft. The whole issue of museum security takes up an ironic twist when one considers the secretive British street artist 'Banksy'. Banksy has made a name for himself by brazenly putting up interesting pieces of art in broad daylight (though many critics don't consider his work to be art) on building walls, rooftops, or even museums. I bring him up for a interesting take on what may become a trend in museum security. In March of 2005, Banksy snuck a piece of his called 'Vandalized Oil Painting' into the Brooklyn Museum's Great Historical Painting Wing, plus 3 other pieces into major museums in New York. Within several days, 2 paintings had been torn down, but 2 stayed up much longer. In his home country of the UK, a unauthorized piece he created and placed in the British Museum known as 'Early Man Goes to Market' received different treatment when placed inside the walls. It was adopted into the permanent collection! I like his story because it's so counter-intuitive. Who would have thought that modern museum security might involve preventing people not just from stealing art, but from sneaking 'unauthorized' art into museums? What is next, tampering with the archive records in order to make it look like the piece in question has always been there? To learn more about museum security, I interviewed multiple experts in the field. It turns out that the glamorous lifestyle of Thomas Crown is not particularly relevant. In fact, usually nobody can point to a Mr. Big of the underworld coordinating thefts, though some organized crime families have been known to use stolen art as black market chips to trade. The common consensus among experts in the field of art theft is that, instead of most high-value pieces being stolen by outsiders with a blue print in hand and rappelling from a ceiling skylight, in reality, 80 percent of art thefts involve insiders or accomplices that execute the crime over a period of time while working or volunteering in the museum. Indeed, according to FBI statistics, between 70 and 80 percent of all solved art theft cases involve insider participation of some kind, yet according to Tom Cremers of the Musuem Security Network, 'Having been involved in risk assessments in over hundreds of museums over the past ten years, it is quite astonishing how rarely the risk of insider participation is discussed.' In regards to the insider threat, a museum is not much different from any corporation or other organization. There are directors, employees, interns, and cleaning staff (very often outsourced), security guards (again outsourced, typically with very high turnover rates). Unlike corporations, most museums also have volunteer staff, docents, and authorized visiting scholars. All these people can potentially take advantage of their position, or to be exploited by a clever attacker on the outside or insid

Michaud, E. C. (Nuclear Engineering Division)

2010-01-01T23:59:59.000Z

487

all-weather security surveillance: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

488

Education in Safeguards and Security Technology Meeting Challenges with Technology and Experience  

SciTech Connect (OSTI)

Education and hands-on experience are crucial to ensuring a workforce of safeguards and security professionals who can meet the challenges currently faced in global nuclear safeguards and security. Global demand for nuclear energy and technology, the new Strategic Arms Reduction Treaty (START), and the cleanup of Cold War facilities have resulted in an increased need for trained safeguards and security personnel. At the same time, the global community is facing a growing shortage of experienced workers with hands-on knowledge of nuclear material processing. Limited access to operating facilities has dramatically reduced the opportunities for next-generation practitioners to obtain hands-on training experience. To address these needs, the Safeguards Technology Integration Center (STIC) at Oak Ridge National Laboratory was created as a Department of Energy User Facility to provide access both to the latest technology and to field-experienced professionals. The STIC provides real-world conditions, process equipment mock-ups, and controlled access to encapsulated radioactive materials (including highly enriched uranium and plutonium) for training and technology evaluation encompassing various techniques and skills, such as Radiation Inspection Systems, Containment and Surveillance Systems, Nondestructive Assay, Security System Performance Testing, and System Design and Analysis. The STIC facilities, laboratories, test beds, and training facilities are described along with the more notable aspects of the training program, which has included more than 1000 participants in the last four years.

Paschal, Linda J [ORNL; Chapman, Jeffrey Allen [ORNL; Rowe, Nathan C [ORNL; Stinson, Brad J [ORNL

2011-01-01T23:59:59.000Z

489

GE Global Research News | GE Global Research  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Big Sky Learning Fun with Big SkyDIII-D Performance ToolsGlobal

490

Embedded Controllers Control. Connectivity. Security.  

E-Print Network [OSTI]

Application Summary MCF5282 HVAC and Security Control Panel Application Summary MCF5307 Music Media Player controllers to help get their products to market quickly and cost-effectively. Aggressive price of continuous innovative technology--provides customers with the opportunity to build market share

Grantner, Janos L.

491

International Aviation Security Technology Symposium  

E-Print Network [OSTI]

Laboratory, US Dept. of Homeland Security, William J. Hughes Technical Center; Atlantic City, NJ, USA-wave Mach number as a function of distance from the explosion center. These data then yield a peak. Characterization of an explosive requires understanding of the energy released during detonation. Typically TNT

Settles, Gary S.

492

Cloud Security by Max Garvey  

E-Print Network [OSTI]

Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service Network access Resource pooling Elasticity of Resources Measured Service #12;Cloud Types/Variants Iaa Cloud Public Cloud Hybrid Cloud combination. Private cloud with overflow going to public cloud. #12

Tolmach, Andrew

493

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

494

Secure Symmetrical Multilevel Diversity Coding  

E-Print Network [OSTI]

Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

Li, Shuo

2012-07-16T23:59:59.000Z

495

Security & Sustainability College of Charleston  

E-Print Network [OSTI]

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10@cofc.edu Office: 284 King Street, #206 (Office of Sustainability) Office Hours: by appt or virtual apt Instructor is that if sustained well-being and prosperity of human and ecological systems is the goal of sustainability

Young, Paul Thomas

496

Corporate Security and Conflict Outcomes  

E-Print Network [OSTI]

..................................................................................................... 75 Competition in Security Contracting and Conflict Outcomes .................................. 80 Research Design ....................................................................................................... 88 Dependent Variable... ................................... 16 Table 2 Contracted Service Total by Corporate Structure ............................................... 42 Table 3 The Effects of Public and Individual Firms Operating in Iraq (Part A) .............. 54 Table 4 The Effects of Public...

Tkach, Benjamin K

2013-10-21T23:59:59.000Z

497

KNOWLEDGE: Building, Securing, Sharing & Applying  

E-Print Network [OSTI]

is to educate and provide powerful analytical tools for information sharing, collaboration & decision support against threats to cyber infrastructure and data Data management in emergency situations Risk analysis for challenging problems in data analysis that address present and emerging homeland security threats Our Mission

498

Anticipating the unintended consequences of security dynamics.  

SciTech Connect (OSTI)

In a globalized world, dramatic changes within any one nation causes ripple or even tsunamic effects within neighbor nations and nations geographically far removed. Multinational interventions to prevent or mitigate detrimental changes can easily cause secondary unintended consequences more detrimental and enduring than the feared change instigating the intervention. This LDRD research developed the foundations for a flexible geopolitical and socioeconomic simulation capability that focuses on the dynamic national security implications of natural and man-made trauma for a nation-state and the states linked to it through trade or treaty. The model developed contains a database for simulating all 229 recognized nation-states and sovereignties with the detail of 30 economic sectors including consumers and natural resources. The model explicitly simulates the interactions among the countries and their governments. Decisions among governments and populations is based on expectation formation. In the simulation model, failed expectations are used as a key metric for tension across states, among ethnic groups, and between population factions. This document provides the foundational documentation for the model.

Backus, George A.; Overfelt, James Robert; Malczynski, Leonard A.; Saltiel, David H.; Simon Paul Moulton

2010-01-01T23:59:59.000Z

499

GLOBAL GOVERNANCE FIGHTING POVERTY 26 GLOBAL AGENDA 2003  

E-Print Network [OSTI]

, they would discover a nearly total disparity between global commitments and domestic politics. Bush hasGLOBAL GOVERNANCE FIGHTING POVERTY 26 GLOBAL AGENDA 2003 the world promised to put real resources credible document spelling out the US role in a global war against AIDS. The planned US financial

500

An Operations Research approach to aviation security  

E-Print Network [OSTI]

Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore ...

Martonosi, Susan Elizabeth

2005-01-01T23:59:59.000Z