Powered by Deep Web Technologies
Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

nonpartisan organization with a mission to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological, and chemical weapons and to...

2

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

3

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

4

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

5

Principal Associate Director - Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

6

Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

7

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

8

Global Security 2009  

Broader source: Energy.gov (indexed) [DOE]

23744 23744 This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract DE-AC52-07NA27344. Lawrence Livermore National Security, LLC DOE OCIO Open Government Technology Summit January 25, 2012 Lawrence Livermore National Laboratory LLNL-PRES-523744 2 1. Conceptualize  Define Problem  Frame Question  Identify Incentives 2. Develop  Develop Messaging  Build Website  Review & Release 3. Engage  Launch Communication  Idea Moderation  Adjust by KPIs 4. Close  Idea Evaluation  Debrief with Sponsor  Communicate Impacts Target Impacts  Program Development  Cost Reduction  Operational Improvement Value Propositions  Speed Collaboration

9

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network [OSTI]

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

10

11 - Security Issues and Global Warming  

Science Journals Connector (OSTI)

Abstract This chapter begins with a discussion of the increasing empowerment of nonstate actors to challenge nation-states for commerce and security. One of the central trends is the operational coordination of organized crime and terrorist entities. They tend to share the same pipelines and at times some of the same personnel since both have a need for similar specialized skills. We witness the emergence of the third generation of guerillas, described as leaderless or horizontal in structure, global, and highly adaptable to urban areas. Crevalds position on guerilla wars is discussedhe asserted that states can never effectively combat guerilla wars. We then discuss the many ways in which transnational criminal organizations and terrorists are working together in the current era. From there, we assess the roles of criminalized states and black holes, geographical areas not controlled by state-based security entities. We discuss how global warming works to enhance the strengths of nonstate actors, while at the same time undermining or limiting state security. This chapter closes with a discussion of the security changes likely to be associated with an ice-free Arctic Ocean. We look at changes already occurring, and assess the roles played by the United States, Canada, Russia, and China. All are in exploration stages for previously inaccessible resources, and most are increasing their military presence across the region.

John P. Crank; Linda S. Jacoby

2015-01-01T23:59:59.000Z

11

New Security Challenges in the Global Era: Environmental Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

12

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Director Defense Advanced Research Projects Agency Programs, Global Security Directorate Oak Ridge National Laboratory Post Office Box 2008, MS-6138 Oak Ridge, Tennessee...

13

Global Food Security Programme Exploring public views  

E-Print Network [OSTI]

Global Food Security Programme ­ Exploring public views #12;©TNS June 2012 -1- Executive Summary significant public policy issues of this century. This scoping study for the Global Food Security programme. The project involved a total of 44 people in a two stage workshop process in London, Edinburgh and Aberystwyth

14

Global Climate Change and National Security  

E-Print Network [OSTI]

5/16/2014 1 Global Climate Change and National Security RADM Jon White Oceanographer and Navigator months. · Oil, gas, and mineral resource exploitation expected to continue · Production/transportatio n

Howat, Ian M.

15

Global Threat Reduction Initiative | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Threat Reduction Initiative | National Nuclear Security Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Global Threat Reduction Initiative Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative Global Threat Reduction Initiative The mission of the Global Threat Reduction Initiative (GTRI) is to reduce

16

Global Threat Reduction Initiative | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Threat Reduction Initiative | National Nuclear Security Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Global Threat Reduction Initiative Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative Global Threat Reduction Initiative The mission of the Global Threat Reduction Initiative (GTRI) is to reduce

17

Securing the Sustainability of Global Medical Nuclear Supply Chains  

E-Print Network [OSTI]

Securing the Sustainability of Global Medical Nuclear Supply Chains Through Economic Cost Recovery University of Massachusetts Amherst Securing the Sustainability of Medical Nuclear Supply Chains #12 of Massachusetts Amherst Securing the Sustainability of Medical Nuclear Supply Chains #12;This presentation

Nagurney, Anna

18

Global Food Security | Data.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Food Security Global Food Security aWhere aWhere transforms how global development initiatives are managed and monitored. aWhere's location intelligence data management platform enables integration of complex agricultural, environmental and public health data into local, actionable insight. Application URL: http://www.awhere.com/en-us Read more about aWhere 0 comment(s) | Food Frequency Method Online A fast, low cost, effective method to assess micro-nutrient deficiencies in a developing country on a household basis, while also allowing for an aggregation to a community or regional basis quickly and effectively. Application URL: http://www.foodfrequencyonline.org/index Read more about Food Frequency Method Online 0 comment(s) | e-Afghan AG e-Afghan Ag provides credible relevant information to those helping farmers

19

Facility will focus on bioenergy, global food security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Facility will focus on bioenergy, global food security Facility will focus on bioenergy, global food security The New Mexico Consortium expects to complete the 27,000 square foot...

20

Cooperative global security programs modeling & simulation.  

SciTech Connect (OSTI)

The national laboratories global security programs implement sustainable technical solutions for cooperative nonproliferation, arms control, and physical security systems worldwide. To help in the development and execution of these programs, a wide range of analytical tools are used to model, for example, synthetic tactical environments for assessing infrastructure protection initiatives and tactics, systematic approaches for prioritizing nuclear and biological threat reduction opportunities worldwide, and nuclear fuel cycle enrichment and spent fuel management for nuclear power countries. This presentation will describe how these models are used in analyses to support the Obama Administration's agenda and bilateral/multinational treaties, and ultimately, to reduce weapons of mass destruction and terrorism threats through international technical cooperation.

Briand, Daniel

2010-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

22

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

23

Global Security, Medical Isotopes, and Nuclear Science  

SciTech Connect (OSTI)

Over the past century basic nuclear science research has led to the use of radioactive isotopes into a wide variety of applications that touch our lives everyday. Some are obvious, such as isotopes for medical diagnostics and treatment. Others are less so, such as National/Global security issues. And some we take for granted, like the small amount of 241Am that is in every smoke detector. At the beginning of this century, we are in a position where the prevalence and importance of some applications of nuclear science are pushing the basic nuclear science community for improved models and nuclear data. Yet, at the same time, the push by the basic nuclear science community to study nuclei that are farther and farther away from stability also offer new opportunities for many applications. This talk will look at several global security applications of nuclear science, summarizing current R&D and need for improved nuclear data It will also look at how applications of nuclear science, such as to medicine, will benefit from the push for more and more powerful radioactive ion beam facilities.

Ahle, L E

2007-09-17T23:59:59.000Z

24

National Security Campus design team wins global award | National Nuclear  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Campus design team wins global award | National Nuclear Security Campus design team wins global award | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > National Security Campus design team wins global award National Security Campus design team wins global award Posted By Office of Public Affairs The National Security Campus design team has been named a global winner of

25

National Security Campus design team wins global award | National Nuclear  

National Nuclear Security Administration (NNSA)

Security Campus design team wins global award | National Nuclear Security Campus design team wins global award | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > National Security Campus design team wins global award National Security Campus design team wins global award Posted By Office of Public Affairs The National Security Campus design team has been named a global winner of

26

Information security knowledge sharing inorganizations: Investigating the effect ofbehavioral information security governance andnational culture  

Science Journals Connector (OSTI)

Abstract This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries namely, USA and Sweden allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledge sharing differs based on national culture. The study followed a mixed methods research design, wherein qualitative data was collected to both establish the study's research model and develop a survey instrument that was distributed to 578 information security executives. The results suggest that processes to coordinate implemented security knowledge sharing mechanisms have a major direct influence on the establishment of security knowledge sharing in organizations; the effect of organizational structure (e.g., centralized security function to develop and deploy uniform firm-wide policies, and use of steering committees to facilitate information security planning) is slightly weaker, while business-based information security management has no significant direct effect on security knowledge sharing. A mediation analysis revealed that the reason for the nonsignificant direct relation between business-based information security management and security knowledge sharing is the fully mediating effect of coordinating information security processes. Thus, the results disentangles the interrelated influences of behavioral information security governance factors on security knowledge sharing by showing that information security governance sets the platform to establish security knowledge sharing, and coordinating processes realize the effect of both the structure of the information security function and the alignment of information security management with business needs. A multigroup analysis identified that national culture had a significant moderating effect on the association between four of the six proposed relations. In Sweden which is seen as a less individualist, feminine country managers tend to focus their efforts on implementing controls that are aligned with business activities and employees' need; monitoring the effectiveness of the implemented controls, and assuring that the controls are not too obtrusive to the end-user. On the contrary, US organizations establish security knowledge sharing in their organization through formal arrangements and structures. These results imply that Swedish managers perceive it to be important to involve, or at least know how their employees cope with the decisions that have been made, thus favoring local participation in information security management, while US managers may feel the need to have more central control when running their information security function. The findings suggest that national culture should be taken into consideration in future studies in particular when investigating organizations operating in a global environment and understand how it affects behaviors and decision-making.

Waldo Rocha Flores; Egil Antonsen; Mathias Ekstedt

2014-01-01T23:59:59.000Z

27

Securing the Sustainability of Global Medical Nuclear Supply Chains  

E-Print Network [OSTI]

Securing the Sustainability of Global Medical Nuclear Supply Chains Through Economic Cost Recovery-17, 2012 University of Massachusetts Amherst Securing the Sustainability of Medical Nuclear Supply Chains-2013. University of Massachusetts Amherst Securing the Sustainability of Medical Nuclear Supply Chains #12;This

Nagurney, Anna

28

Standards for secure data sharing across organizations  

Science Journals Connector (OSTI)

This paper discusses standards-based approaches for secure data sharing across organizations. In particular, current standards as well as standardization trends for data integration, multimedia data management, active real-time data management, data ... Keywords: Data sharing, Real-time data management, Standards-based approaches

Douglas Harris; Latifur Khan; Raymond Paul; Bhavani Thuraisingham

2007-01-01T23:59:59.000Z

29

Event:Second Global Conference on Agriculture, Food Security and Climate  

Open Energy Info (EERE)

Conference on Agriculture, Food Security and Climate Conference on Agriculture, Food Security and Climate Change Jump to: navigation, search Calendar.png Second Global Conference on Agriculture, Food Security and Climate Change: on 2012/09/03 "Co-organized by Viet Nam and the Netherlands, in close collaboration with other partners, including FAO and the World Bank, the conference will allow global leaders, practitioners, scientists, civil society and the private sector to share experiences and demonstrate how early action on how Climate-Smart Agriculture can act as a driver of green growth." Event Details Name Second Global Conference on Agriculture, Food Security and Climate Change Date 2012/09/03 Location Hanoi, Vietnam Tags LEDS, training, CLEAN Website Event Website Ret LikeLike UnlikeLike You like this.Sign Up to see what your friends like.

30

Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS  

E-Print Network [OSTI]

2011- 2012 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS of aviation safety. Endings signal new beginnings and new beginnings mean evolving challenges for safety. This was the world in which the USC Aviation Safety and Security Program was born in 1952 and this is the world

Wang, Hai

31

Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS  

E-Print Network [OSTI]

2010- 2011 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS Relevance and currency -- that is what drives the Aviation Safety and Security Program of the USC Viterbi that our core course, Aviation Safety Management Systems, is so necessary in ensuring the safety

Wang, Hai

32

Advancing Global Nuclear Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

OF THE NUCLEAR ENERGY AND NUCLEAR SECURITY WORKING GROUP OF THE BILATERAL U.S. - RUSSIA PRESIDENTIAL COMMISSION Secretary Moniz's Remarks at the 2014 IAEA General Conference...

33

Securing the global, remote, mobile user  

Science Journals Connector (OSTI)

Electronic commerce is inevitable and will reshape our lives, but before true electronic commerce environments can be realized, it will be necessary to secure your enterprise against outside attacks on its electronic information and provide controls ...

Walt Curtis; Lori Sinton

1999-03-01T23:59:59.000Z

34

Staff Listing - Office for Oil and Gas Global Security and Supply...  

Broader source: Energy.gov (indexed) [DOE]

Staff Listing - Office for Oil and Gas Global Security and Supply Staff Listing - Office for Oil and Gas Global Security and Supply Director of the Office for Oil and Gas Global...

35

Climate Change Impacts on Global Food Security  

Science Journals Connector (OSTI)

...America's Climate Choices; National Research Council, Americas Climate Choices (National Academies Press, Washington...Food security: The challenge of feeding 9 billion people . Science 327...of biofuels or other renewable fuels for transport...66 U.S. Congress, Energy Policy Act of 2005...

Tim Wheeler; Joachim von Braun

2013-08-02T23:59:59.000Z

36

Facility will focus on bioenergy, global food security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Facility will focus on bioenergy, global food security Facility will focus on bioenergy, global food security Facility will focus on bioenergy, global food security The New Mexico Consortium expects to complete the 27,000 square foot laboratory and office facility next spring. May 22, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email Los Alamos, N.M., May 22, 2012 - U.S. Senator Tom Udall (D-NM) spoke at the groundbreaking ceremony marking the start of construction on the New Mexico Consortium's (NMC) biological research facility last Friday afternoon. Senator Udall noted New Mexico's novel and extensive contributions to our nation's renewable energy efforts and congratulated LANL, the NMC, and Richard Sayre on their commitment to advancing the nations goals for energy

37

Creating security applications based on The Global Certificate Management System  

Science Journals Connector (OSTI)

The Certificate Management System (CMS) is a global network system whose primary services are generation, distribution, storage and verification of certificates. It supports various security applications which use public key cryptography by providing the means for the administration of certificates. This paper describes the interface between security enhanced application and the CMS. The interface layer with which the security applications are extended is named CMS Client. The CMS Client comprises a set of functions that enable the certification of users of security applications, retrieval of certificates and verification of retrieved certificates. The paper gives a short description of the CMS system and a detailed description of the CMS Client functions. Furthermore it describes how to extend the existing or create new security applications based on the CMS system.

Nada Kapidzic

1998-01-01T23:59:59.000Z

38

Global Threat Reduction Initiative | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Threat Reduction Global Threat Reduction ... Global Threat Reduction Initiative The Global Threat Reduction Initiative's Alarm Response Training provides training in the area of response for radiological events and provides an opportunity for the security forces, health and safety personnel, and other responsible parties such as the supporting local law enforcement to develop, discuss, and exercise their own tactics, techniques, procedures, and protocols when responding to a theft and/or sabotage event involving radioactive materials of significance. This voluntary program is free, and all expenses (travel, meals, etc.), other than the trainee's training time, will be paid by the GTRI Domestic Threat Reduction Program. Facilities participating in the Domestic Security Program are scheduled for

39

Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid  

E-Print Network [OSTI]

Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid R and subsequently manage secure virtual organisations (VO) is one of the key challenges facing the Grid community in the education domain. We believe that this federated VO security model for fine grained access to Grid services

Kent, University of

40

Climate Change Impacts on Global Food Security  

Science Journals Connector (OSTI)

...pressures on food prices, economic...will have many effects on the global...recent data are averages for the period...burning of fossil fuels, with smaller...Goldberg R. , The effect of changes in...other renewable fuels for transport...surging food prices . Agric. Econ...osterdal, Effects of food price...

Tim Wheeler; Joachim von Braun

2013-08-02T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Global Climate Change Adaptation Priorities for Biodiversity and Food Security  

E-Print Network [OSTI]

Global Climate Change Adaptation Priorities for Biodiversity and Food Security Lee Hannah 1,2* , Makihiko Ikegami 3 , David G. Hole 1,4 , Changwan Seo 5 , Stuart H. M. Butchart 6 , A. Townsend Peterson 7 , Patrick R. Roehrdanz 2 1 The Betty...72590. doi:10.1371/journal.pone.0072590 Editor: Alex J Cannon, Pacific Climate Impacts Consortium, Canada Received November 13, 2012; Accepted July 14, 2013; Published August 21, 2013 Copyright: 2013 Hannah et al. This is an open-access article...

Hannah, Lee; Ikegami, Makihiko; Hole, David G.; Seo, Changwan; Butchart, Stuart H. M.; Peterson, A. Townsend; Roehrdanz, Patrick

2013-08-21T23:59:59.000Z

42

LANL | Physics | Nuclear Weapons and Global Security Data Analysis  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Weapons and Global Security Data Analysis Nuclear Weapons and Global Security Data Analysis Physics Division applies advanced imaging techniques to many applications, from brain imaging to neutron imaging in inertial fusion to threat detection from airborne cameras. A particular strength is the quantitative analysis of penetrating radiography using techniques such as the Bayesian Inference Engine (BIE). An example from the Nuclear Event Analysis Team shows a test object (Figure 1) that is subsequently radiographed using the Dual-Axis Radiography Hydrodynamic Test (DARHT) facility. Figures 2 and 3 show the radiograph and the inferred density of the object using the BIE, which can be compared to the known object to determine accurate error estimation. Test object Figure 1. The test object consists of a 1 cm-radius cavity void surrounded by a 4.5 cm radius surrogate fissile material of tungsten, tantalum, or depleted uranium. This sphere is surrounded by a 6.5 cm-radius copper sphere. At is thickest point, the tantalum test object has an areal density of 180 g/cm2, equivalent to 9" of steel.

43

Securing Offshore Infrastructures Through a Global Alert and Graded Response System  

E-Print Network [OSTI]

1 « SARGOS » Securing Offshore Infrastructures Through a Global Alert and Graded Response System and graded response system to answer the recent but strong need for securing critical civilian offshore of their 2009 global safety program (CSOSG). 1. Introduction Offshore oil installations are critical energy

Paris-Sud XI, Université de

44

Global food security, biodiversity conservation and the future of agricultural intensification  

E-Print Network [OSTI]

Global food security, biodiversity conservation and the future of agricultural intensification Teja increase, achieving efficient and productive agri- cultural land use while conserving biodiversity. In conclusion, linking agricultural intensifi- cation with biodiversity conservation and hunger reduction

45

Special feature: Creating security applications based on The Global Certificate Management System  

Science Journals Connector (OSTI)

The Certificate Management System (CMS) is a global network system whose primary services are generation, distribution, storage and verification of certificates. It supports various security applications which use public key cryptography by providing ...

Nada Kapidzic

1998-01-01T23:59:59.000Z

46

Work distribution in global product development organizations  

E-Print Network [OSTI]

The evolution of the internet, digital design tools, and more importantly, increasing access to global markets and workforce, has increased the interest of firms in offshoring their engineering and product development ...

Tripathy, Anshuman

2010-01-01T23:59:59.000Z

47

Using Virtual Organizations Membership System with EDG's Grid Security and Database Access  

E-Print Network [OSTI]

Using Virtual Organizations Membership System with EDG's Grid Security and Database Access Marko University of Technology March 17, 2004 Keywords: Grid security, virtual organizations, Grid use case. This paper describes the European Data Grid's (EDG's) java security system and Spitfire database access

Haak, Hein

48

On-the-y Dynamic Virtual Organizations in a Secured Grid Environment  

E-Print Network [OSTI]

On-the-y Dynamic Virtual Organizations in a Secured Grid Environment Sylvain Jeuland, Christine built dynamic Virtual Organizations. They manage the security congurations on behalf of grid users their security credentials and upload grid resources for sharing. This work about DVOs is a rst step to manage

Paris-Sud XI, Université de

49

Global Food Security Programme A survey of public attitudes  

E-Print Network [OSTI]

security is not an issue that affects me rather it's more a problem for people in developing countries' (55 by climate change (59%) and the price of food (47%). Similarly, when asked what would have the most effect on food security in the future, respondents stated increasing population (34%), climate change (19

50

Fact Sheet: U.S-Turkey Cooperation in Global Energy Security | Department  

Broader source: Energy.gov (indexed) [DOE]

S-Turkey Cooperation in Global Energy Security S-Turkey Cooperation in Global Energy Security Fact Sheet: U.S-Turkey Cooperation in Global Energy Security October 30, 2008 - 4:14pm Addthis The U.S. is committed to assisting Turkey with its energy security, as Turkey is a key component of a larger regional strategy for increased energy production and diversification of oil and gas transit routes. The U.S. is collaborating with our Turkish partners on the energy projects they identify as a priority - for the development, financing, and insurance of energy projects such as pipelines, power plants, and electricity distribution systems. In collaboration with Turkish counterparts, we can work to deploy renewable energy and clean coal technologies, increase the reliability and efficiency of electricity generation and delivery, and decrease Turkey's

51

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

52

A European vision for addressing global security threats  

Science Journals Connector (OSTI)

There is a robust consensus among EU Member States about the need to identify the complex links between the threats and challenges to the EUs security. ... and instruments required to effectively respond to secu...

Gerhard Sabathil

2010-06-01T23:59:59.000Z

53

Water security, global change and landatmosphere feedbacks  

Science Journals Connector (OSTI)

...on a 0.5 grid [28...fraction of the renewable flow of the...physically based energy balance models...Grand Science Challenges-covering...enhanced integration of models...e.g. national parks. Using...food and energy security...grand_challenges_7-2012...tile and grid box mean...

2013-01-01T23:59:59.000Z

54

Staff Listing - Office for Oil and Gas Global Security and Supply |  

Broader source: Energy.gov (indexed) [DOE]

Staff Listing - Office for Staff Listing - Office for Oil and Gas Global Security and Supply Staff Listing - Office for Oil and Gas Global Security and Supply Director of the Office for Oil and Gas Global Security and Supply (Vacant) Natural Gas Regulatory Activities Division John A. Anderson, Director Room 3E-042 Lisa Craig Room 3E-042 Telephone (202)586-9484 FAX (202) 586-6050 Case Management Beverly Howard Room 3E-042 Telephone (202) 586-9387 FAX (202) 586-6050 Lisa Tracy Room 3E-052 Telephone (202) 586-4523 FAX (202) 586-6050 Marc Talbert Room 3E-042 Telephone (202) 586-7991 FAX (202) 586-6050 Office of Natural Gas Docket Room Larine Moore Docket Room Manager Room 3E-042 Telephone (202) 586-9478 FAX (202) 586-6050 International Activities Division Sally Kornfeld, Director Room 3E-042 Telephone (202) 586-3814

55

Open Data for Agriculture Offers Lift-Off for Global Food Security |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for Agriculture Offers Lift-Off for Global Food Security for Agriculture Offers Lift-Off for Global Food Security Open Data for Agriculture Offers Lift-Off for Global Food Security Submitted by Data.gov Administrator on Mon, 04/29/2013 - 3:54pm Log in to vote 0 Posted by Dr. Catherine Woteki, USDA's Chief Scientist and Under Secretary for Research, Education and Economics, on April 29, 2013 at 2:45 PM. The opening day of the G-8 International Conference on Open Data for Agriculture was action-packed and inspiring. From the moment the doors opened at 7:30 am, the air was punctuated with the sound of languages from across the globe. Scientists, policy makers, and leaders from the non-profit and development community all shared a day of discovery and connection around the unlimited opportunity in open data for agriculture.

56

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

57

Global Biofuel Production and Food Security: Implications for Asia Pacific  

E-Print Network [OSTI]

commodity prices --Key facts about biofuels --How important to energy markets and agriculture? --Factors facts about biofuels: small role in energy markets Biofuels Remaining a Miniscule Share of Global costs of commercializing conversion of cellulosic biomass to ethanol and other biofuels, including drop

58

U.S. national security through global technical engagement presentation to composite group A : homeland and international operations.  

SciTech Connect (OSTI)

This talk will discuss Sandia's Global Security Program focused on reducing proliferation and terrorism threats to U.S. national security through global technical engagement. Elements include nuclear and radiological risks, biological and chemical risks, and multi-threat risk reduction. Also, recent work addressing the need to better integrate nonproliferation, arms control, counterterrorism, and nuclear deterrent objectives will be discussed.

Abeyta, Henry J.

2010-05-01T23:59:59.000Z

59

Secure collaboration in global design and supply chain environment: Problem analysis and literature review  

Science Journals Connector (OSTI)

Increasing global competition has led to massive outsourcing of manufacturing businesses. Such outsourcing practices require effective collaborations between focal manufacturers and their suppliers by sharing a large amount of information. In the meantime, ... Keywords: Collaborative product development, Design and supply chain management, Environment Based Design, Information sharing and protection, Secure collaboration

Yong Zeng; Lingyu Wang; Xiaoguang Deng; Xinlin Cao; Nafisa Khundker

2012-08-01T23:59:59.000Z

60

Secure collaboration in global design and supply chain environment: Problem analysis and literature review  

E-Print Network [OSTI]

Secure collaboration in global design and supply chain environment: Problem analysis and literature for Information Systems Engineering, Faculty of Engineering and Computer Science, Concordia University, Montreal to make a rapid response to customer needs and technology changes, collaborative and distributed product

Wang, Lingyu

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Oak Ridge partners: Global security and fuel development | Y-12 National  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Oak Ridge partners: Global ... Oak Ridge partners: Global ... Oak Ridge partners: Global security and fuel development Posted: July 18, 2012 - 10:00am | Y-12 Report | Volume 9, Issue 1 | 2012 Additive manufacturing builds metal parts, layer by layer, such as this titanium piece ORNL fabricated for Y-12. Y-12 is evaluating the technology for tooling and manufacturing applications. In 2011 the two DOE facilities shared 178 projects worth $12.5 million. In the 1940s Bear Creek and Bethel valleys cradled newly constructed facilities filled with people on a common mission that ended World War II. Today, the Y-12 National Security Complex and Oak Ridge National Laboratory thrive in those transformed valleys and collaborate daily. In 2011 they shared 178 projects worth $12.5 million. "With just a few miles separating our nationally renowned institutions,

62

Resilient and Self-Organizing Overlay of Collaborative Security Monitors  

E-Print Network [OSTI]

, destructive and widespread, especially those distributed attacks that exploit multiple launching sites, security systems that are deployed in isolation within administrative domains and do not exchange infor

Li, Jun

63

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

64

The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration, OAS-L-12-01  

Broader source: Energy.gov (indexed) [DOE]

Audit and Inspections Audit and Inspections Audit Report The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration OAS-L-12-01 October 2011 Department of Energy Washington, DC 20585 October 25, 2011 MEMORANDUM FOR THE DEPUTY ADMINISTRATOR FOR DEFENSE NUCLEAR NONPROLIFERATION FROM: David Sedillo Director Western Audits Division SUBJECT: INFORMATION: Audit Report on "The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration" BACKGROUND The National Nuclear Security Administration's (NNSA) Office of Defense Nuclear Nonproliferation established the Global Threat Reduction Initiative (GTRI) in May 2004, as a vital part of the efforts to combat nuclear and radiological terrorism. GTRI's mission is to reduce

65

Global environmental security: Research and policy strategies for the 1990s  

SciTech Connect (OSTI)

The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

Lazaro, M.A.; Wang, Hua

1992-09-01T23:59:59.000Z

66

Global environmental security: Research and policy strategies for the 1990s  

SciTech Connect (OSTI)

The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

Lazaro, M.A.; Wang, Hua.

1992-01-01T23:59:59.000Z

67

Security decision-making among interdependent organizations R. Ann Miura-Ko, Benjamin Yolken, John Mitchell, and Nicholas Bambos  

E-Print Network [OSTI]

the same passwords at several independent web sites, security deci- sions by one organization may have- ments of others. We apply this framework to investigate three examples: web site security with shared

Mitchell, John C.

68

RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS  

E-Print Network [OSTI]

organizational managers in making informed decisions regarding the security of their information systems. NIST agencies implementing risk-based planning and management also must consider effectiveness, efficiency for their information and information systems with the gains in capabilities and improved support of organizational

69

Agroecology to the rescue of food security and germplasm conservation in a global market economy  

Science Journals Connector (OSTI)

The chronic crisis affecting modern agriculture is indicating that the present paradigm of food production may not be viable in the long term to insure food security on a global scale, despite the brilliant outcomes achieved through the last several decades. Dwindling fossil fuel resources are exacerbating an ongoing crisis that has been lingering since the early 1970s. A recent enthusiasm to revamp agriculture in the mid-west region of the USA is focusing on ethanol production from corn (Zea mays) to suffice for the need of biofuels but this trend has significantly affected food costs. A presentation of the latest review in agroecological research is offered in this work in order to persuade stakeholders in agriculture about the viability of agroecology to serve as a vehicle for achieving food security and sustainability.

Bruno Borsari

2011-01-01T23:59:59.000Z

70

Global energy gradients and size in colonial organisms: Worker mass and worker number  

E-Print Network [OSTI]

Global energy gradients and size in colonial organisms: Worker mass and worker number in ant size varies globally is a key challenge to ecology. Solar energy may shape gradients of body size by its effects on local temperature and net primary productivity (16­20). Rising global temperatures (21

Kaspari, Mike

71

How America can look within to achieve energy security and reduce global warming.  

SciTech Connect (OSTI)

Making major gains in energy efficiency is one of the most economical and effective ways our nation can wean itself off its dependence on foreign oil and reduce its emissions of greenhouse gases. Transportation and buildings, which account for two thirds of American energy usage, consume far more than they need to, but even though there are many affordable energy efficient technologies that can save consumers money, market imperfections inhibit their adoption. To overcome the barriers, the federal government must adopt policies that will transform the investments into economic and societal benefit. And the federal government must invest in research and development programs that target energy efficiency. Energy efficiency is one of America's great hidden energy reserves. We should begin tapping it now. Whether you want the United States to achieve greater energy security by weaning itself off foreign oil, sustain strong economic growth in the face of worldwide competition or reduce global warming by decreasing carbon emissions, energy efficiency is where you need to start. Thirty-five years ago the U.S. adopted national strategies, implemented policies and developed technologies that significantly improved energy efficiency. More than three decades have passed since then, and science and technology have progressed considerably, but U.S. energy policy has not. It is time to revisit the issue. In this report we examine the scientific and technological opportunities and policy actions that can make the United States more energy efficient, increase its security and reduce its impact on global warming. We believe the findings and recommendations will help Congress and the next administration to realize these goals. Our focus is on the transportation and buildings sectors of the economy. The opportunities are huge and the costs are small.

Richter, B.; Goldston, D.; Crabtree, G.; Glicksman, L.; Goldstein, D.; Greene, D.; Kammen, D.; Levin, M.; Lubell, M.; Savitz, M.; Sperling, D.; Schlachter, F.; Scofield, J.; Dawson, J. (Materials Science Division); (Massachusetts Inst. of Tech.); (National Resources Defense Council); (Harvard Univ.); (ORNL); (Univ. of California at Berkeley); (LBNL); (American Physical Society); (City Coll. of CUNY); (Stanford Linear Accelerator Center); (Stanford Univ.); (The Advisory Group); (Univ. of California at Davis)

2008-12-01T23:59:59.000Z

72

National Nuclear Security Administration | Department of Energy  

Office of Environmental Management (EM)

National Nuclear Security Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction...

73

Estimation of organ and effective dose due to Compton backscatter security scans  

SciTech Connect (OSTI)

Purpose: To estimate organ and effective radiation doses due to backscatter security scanners using Monte Carlo simulations and a voxelized phantom set. Methods: Voxelized phantoms of male and female adults and children were used with the GEANT4 toolkit to simulate a backscatter security scan. The backscatter system was modeled based on specifications available in the literature. The simulations modeled a 50 kVp spectrum with 1.0 mm-aluminum-equivalent filtration and a previously measured exposure of approximately 4.6 {mu}R at 30 cm from the source. Photons and secondary interactions were tracked from the source until they reached zero kinetic energy or exited from the simulation's boundaries. The energy deposited in the phantoms' respective organs was tallied and used to calculate total organ dose and total effective dose for frontal, rear, and full scans with subjects located 30 and 75 cm from the source. Results: For a full screen, all phantoms' total effective doses were below the established 0.25 {mu}Sv standard, with an estimated maximum total effective dose of 0.07 {mu}Sv for full screen of a male child. The estimated maximum organ dose due to a full screen was 1.03 {mu}Gy, deposited in the adipose tissue of the male child phantom when located 30 cm from the source. All organ dose estimates had a coefficient of variation of less than 3% for a frontal scan and less than 11% for a rear scan. Conclusions: Backscatter security scanners deposit dose in organs beyond the skin. The effective dose is below recommended standards set by the Health Physics Society (HPS) and the American National Standards Institute (ANSI) assuming the system provides a maximum exposure of approximately 4.6 {mu}R at 30 cm.

Hoppe, Michael E.; Schmidt, Taly Gilat [Department of Biomedical Engineering, Marquette University, P.O. Box 1881, Milwaukee, Wisconsin 53201 (United States)

2012-06-15T23:59:59.000Z

74

Enterprise transformation & lean implementation in a globally dispersed organization  

E-Print Network [OSTI]

In July 2007, the Supply Planning Organization (SPO) decided to begin its Lean journey. Through some analysis the decision was made to take a culture first approach and then follow with the use of Lean tools. The time had ...

Katyal, Abhishek

2010-01-01T23:59:59.000Z

75

Sandia National Laboratories: National Security Missions: Internationa...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security casks We reduce proliferation and terrorism threats to U.S. national security through global technical engagement. Enhance security of vulnerable nuclear weapons...

76

Graduate Research Assistant Program for Professional Development at Oak Ridge National Laboratory (ORNL) Global Nuclear Security Technology Division (GNSTD)  

SciTech Connect (OSTI)

The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) was established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.

Eipeldauer, Mary D [ORNL; Shelander Jr, Bruce R [ORNL

2012-01-01T23:59:59.000Z

77

A policy-oriented language for expressing security specifications Carlos Ribeiro and Paulo Ferreira  

E-Print Network [OSTI]

A policy-oriented language for expressing security specifications by Carlos Ribeiro and Paulo Fax: +351 213145843 email: Carlos.Ribeiro@inesc.pt Abstract Organizations' authorization policies the organization. Having a single global security policy specification would promote both security clarity

Ferreira, Paulo

78

Mapping the Impact of Security Threats on Safety-Critical Global Navigation Satellite Systems Chris W. Johnson (1), A. Atencia Yepez (2)  

E-Print Network [OSTI]

Mapping the Impact of Security Threats on Safety-Critical Global Navigation Satellite Systems Chris of attack scenarios can be used to assess the resilience of safety cases to the impact of external security accident advocated the development of safety argumentation across the oil and gas industry (US Presidential

Johnson, Chris

79

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network [OSTI]

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

80

Soil Organic Carbon Sequestration by Tillage and Crop Rotation: A Global  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Tillage and Crop Rotation Tillage and Crop Rotation Soil Organic Carbon Sequestration by Tillage and Crop Rotation: A Global Data Analysis DOI: 10.3334/CDIAC/tcm.002 PDF file Full text Soil Science Society of America Journal 66:1930-1946 (2002) CSITE image Tristram O. West and Wilfred M. Post DOE Center for Carbon Sequestration in Terrestrial Ecosystems (CSiTE) Environmental Sciences Division Oak Ridge National Laboratory P.O. Box 2008 Oak Ridge, TN 37831-6290 U.S.A. Sponsor: U.S. Department of Energy's Office of Science, Biological and Environmental Research Program Abstract Global map Changes in agricultural management can potentially increase the accumulation rate of soil organic carbon (SOC), thereby sequestering CO2 from the atmosphere. This study was conducted to quantify potential soil

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Global climate policy impacts on livestock, land use, livelihoods, and food security  

Science Journals Connector (OSTI)

...households, the effect of rising food prices on food consumption...of changing prices and consumption...the spending effect). When this...nutrition profile, average per capita...tax on fossil fuel CO2 emissions...paper. The net effect on abatement...global carbon price of $27/tCO2eq...

Alla A. Golub; Benjamin B. Henderson; Thomas W. Hertel; Pierre J. Gerber; Steven K. Rose; Brent Sohngen

2013-01-01T23:59:59.000Z

82

Global distribution and climate forcing of marine organic aerosol: 1. Model improvements and evaluation  

SciTech Connect (OSTI)

Marine organic aerosol emissions have been implemented and evaluated within the National Center of Atmospheric Research (NCAR)'s Community Atmosphere Model (CAM5) with the Pacific Northwest National Laboratory's 7-mode Modal Aerosol Module (MAM-7). Emissions of marine primary organic aerosols (POA), phytoplanktonproduced isoprene- and monoterpenes-derived secondary organic aerosols (SOA) and methane sulfonate (MS{sup -}) are shown to affect surface concentrations of organic aerosols in remote marine regions. Global emissions of submicron marine POA is estimated to be 7.9 and 9.4 Tg yr{sup -1}, for the Gantt et al. (2011) and Vignati et al. (2010) emission parameterizations, respectively. Marine sources of SOA and particulate MS{sup -} (containing both sulfur and carbon atoms) contribute an additional 0.2 and 5.1 Tg yr{sup -1}, respectively. Widespread areas over productive waters of the Northern Atlantic, Northern Pacific, and the Southern Ocean show marine-source submicron organic aerosol surface concentrations of 100 ngm{sup -3}, with values up to 400 ngm{sup -3} over biologically productive areas. Comparison of long-term surface observations of water insoluble organic matter (WIOM) with POA concentrations from the two emission parameterizations shows that despite revealed discrepancies (often more than a factor of 2), both Gantt et al. (2011) and Vignati et al. (2010) formulations are able to capture the magnitude of marine organic aerosol concentrations, with the Gantt et al. (2011) parameterization attaining better seasonality. Model simulations show that the mixing state of the marine POA can impact the surface number concentration of cloud condensation nuclei (CCN). The largest increases (up to 20 %) in CCN (at a supersaturation (S) of 0.2 %) number concentration are obtained over biologically productive ocean waters when marine organic aerosol is assumed to be externally mixed with sea-salt. Assuming marine organics are internally-mixed with sea-salt provides diverse results with increases and decreases in the concentration of CCN over different parts of the ocean. The sign of the CCN change due to the addition of marine organics to seasalt aerosol is determined by the relative significance of the increase in mean modal diameter due to addition of mass, and the decrease in particle hygroscopicity due to compositional changes in marine aerosol. Based on emerging evidence for increased CCN concentration over biologically active surface ocean areas/periods, our study suggests that treatment of sea spray in global climate models (GCMs) as an internal mixture of marine organic aerosols and sea-salt will likely lead to an underestimation in CCN number concentration.

Meskhidze, N.; Xu, J.; Gantt, Brett; Zhang, Yang; Nenes, Athanasios; Ghan, Steven J.; Liu, Xiaohong; Easter, Richard C.; Zaveri, Rahul A.

2011-11-23T23:59:59.000Z

83

Tag: GTRI | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

84

Predicted change in global secondary organic aerosol concentrations in response to future climate, emissions, and land use change  

E-Print Network [OSTI]

The sensitivity of secondary organic aerosol (SOA) concentration to changes in climate and emissions is investigated using a coupled global atmosphere-land model driven by the year 2100 IPCC A1B scenario predictions. The ...

Heald, C. L.; Henze, D. K.; Horowitz, L. W.; Feddema, Johannes J.; Lamarque, J. F.; Guenther, A.; Hess, P. G.; Vitt, F.; Seinfeld, J. H.; Goldstein, A. H.; Fung, I.

2008-03-01T23:59:59.000Z

85

Elites and the Global Warming Conflict: Directors of Pro-Environmental and Anti-Global Warming Organizations.  

E-Print Network [OSTI]

??The longstanding policy conflict over global warming directly affects the interests of elite groups in the United States. This study investigates the nature of elite (more)

Hein, James Everett

2007-01-01T23:59:59.000Z

86

External > Programs > National Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security The National Security mission in Oak Ridge is carried out at the National Nuclear Security Administration's (NNSA) Y-12 National Security Complex, formerly known as the Oak Ridge Y-12 Plant. Programs at Y-12 include manufacturing and reworking nuclear weapon components, dismantling nuclear weapon components returned from the national arsenal, serving as the nation's safe, secure storehouse of special nuclear materials, reducing the global threat from terrorism and weapons of mass destruction, and providing the U.S. Navy with safe, militarily effective nuclear propulsion systems. Y-12 is operated by B&W Y-12 LLC. ORO provides a variety of services to the NNSA's Y-12 Site Office as part of a service agreement between the two organizations.

87

Safety, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

88

The AeroCom Evaluation and Intercomparison of Organic Aerosol in Global Models  

DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

This paper evaluates the current status of global modeling of the organic aerosol (OA) occurrence in the troposphere and analyzes the differences calculated between models as well as between models and observations. Thirty-one global chemistry/transport and general circulation models have participated in this intercomparison, in the framework of AeroCom phase II. The simulation of OA varies greatly between models in terms of the magnitude of primary emissions, secondary OA (SOA) formation, the number of OA species used (2 to 62), the complexity of OA parameterizations (gas-particle partitioning, chemical aging, multiphase chemistry, aerosol microphysics), and the OA physical, chemical and optical properties. The diversity of the global OA simulation results has increased since earlier AeroCom experiments, mainly due to the increasing complexity of the SOA parameterization in models, and the implementation of new, highly uncertain, OA sources. Diversity of over an order of magnitude exists in the modeled vertical distribution of OA that deserves a dedicated future study. Furthermore, although the OA/OC ratio depends on OA sources and atmospheric processing and is important for model evaluation against OA and OC observations, it is resolved only by few global models. The median global primary OA source strength is 56 Tg a 1 (range 34 - 144 Tg a-1) and the median secondary OA source strength (natural and anthropogenic) is 19 Tg a-1 (range 13-121 Tg a-1). Among the models that take into account the semi-volatile SOA nature, the median source is calculated to be 51 Tg a-1 (range 16-121 Tg a-1), much larger than the median value of the models that calculate SOA in a more simplistic way (19 Tg a-1; range 13-20 Tg a-1, with one model at 37 Tg a-1). The median atmospheric burden of OA is 1.4 Tg (24 models in the range of 0.6-2.0 Tg and 4 between 2.4-3.8 Tg) with a median OA lifetime of 5.4 days (range 3.8-9.6 days). In models that reported both OA and sulfate burdens, the median value of the OA/sulfate burden ratio of is calculated to be 0.77; 13 models calculate a ratio lower than 1, and 9 models higher than 1. For 26 models that reported OA deposition fluxes, the median wet removal is 70 Tg a-1 (range 28-209 Tg a-1), which is on average 85% of the total OA deposition.

Tsigaridis, Kostas; Daskalakis, N.; Kanakidou, M.; Adams, P. J.; Artaxo, Paulo; Bahadur, R.; Balkanski, Y.; Bauer, S.; Bellouin, N.; Benedetti, Angela; Bergman, T.; Berntsen, T.; Beukes, J. P.; Bian, Huisheng; Carslaw, K. S.; Chin, M.; Curci, Gabriele; Diehl, Thomas; Easter, Richard C.; Ghan, Steven J.; Gong, S.; Hodzic, Alma; Hoyle, Christopher R.; Iversen, T.; Jathar, S.; Jimenez, J. L.; Kaiser, J. W.; Kirkevag, A.; Koch, Dorothy; Kokkola, H.; Lee, Y. H.; Lin, G.; Liu, Xiaohong; Luo, Gan; Ma, Xiaoyan; Mann, G. W.; Mihalopoulos, Nikos; Morcrette, J. -J.; Muller, J. F.; Myhre, G.; Myriokefalitakis, S.; Ng, Nga L.; O'Donell, D.; Penner, J. E.; Pozzoli, L.; Pringle, K. J.; Russell, Lynn; Schulz, M.; Sciare, J.; Seland, O.; Shindell, Drew; Sillman, S.; Skeie, R. B.; Spracklen, D. V.; Stavrakou, T.; Steenrod, Stephen D.; Takemura, T.; Tiitta, P.; Tilmes, S.; Tost, H.; van Noije, T.; van Zyl, P. G.; von Salzen, Knut; Yu, Fangqun; Wang, Zaizi; Wang, Zhilli; Zaveri, Rahul A.; Zhang, Hua; Zhang, Kai; Zhang, Qi; Zhang, Xiaoye

2014-10-15T23:59:59.000Z

89

There is an increasing order in digitized technology. This increasing order requires high qualitative document management system which can be used in secure fashion especially for organization with  

E-Print Network [OSTI]

qualitative document management system which can be used in secure fashion especially for organization. The proposed framework provides the necessary options for creating an effective document management system document management system, the end product will be suitable for organization and guaranteed to satisfy

90

About SRNL - Directorates - National Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Technical Partnerships Global...

91

Tag: global security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

49all en Alarm Response Training ribbon cutting http:www.y12.doe.govnewspress-releasesalarm-response-training-ribbon-cutting

92

Energy Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

93

Countering Hybrid Eco-threats to Global Security Under International Law: The Need for an Comprehensive Legal Approach  

Science Journals Connector (OSTI)

Threats to environmental security (eco-threats) face not only shortcomings of environmental ... of Armed Conflict. Considering the new Hybrid Threat concept, which had recently been discussed ... for adopting...

Joachim Sanden; Sascha-Dominik Bachmann

2013-11-01T23:59:59.000Z

94

Investigation of the cold condensation of persistent organic pollutants with a global multimedia fate model  

SciTech Connect (OSTI)

In this paper, the authors present a new global multimedia fate model that considers the influence of temperature on the environmental transport, degradation, and partitioning of persistent organic pollutants. The model consists of a variable number of latitudinal zones with specific annual temperature courses; each zone contains soil, oceanic surface water, and tropospheric air. The chemicals' degradation rates and Henry's law constants (H) are implemented as functions of temperature and the concentrations in the soil, water, and air compartments of each latitudinal zone are calculated as functions of time. The resulting temporal and spatial concentrations patterns are characterized by persistence and spatial range. Model calculations are carried out for tetrachloromethane, {alpha}-hexachlorocyclohexane ({alpha}-HCH), and murex, and the specific distribution patterns of these three chemicals are discussed. The model results show that the soil and water concentrations of the polar zones are strongly sensitive to changes of the latitudinal gradient of H and of washout ratios, adsorption to aerosol particles, and deposition rates.

Scheringer, M.; Wegmann, F.; Fenner, K.; Hungerbuehler, K.

2000-05-01T23:59:59.000Z

95

Safeguards and Security Systems | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safeguards and Security Systems SHARE Safeguards and Security Systems Safeguards training class. ORNL is a leader in providing technologies and services for the global safeguards...

96

Science Organizations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Organizations Science Organizations National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place...

97

Message Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

98

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

99

Civil and environmental engineers are a critical component in supporting the global economy, securing the health and welfare of  

E-Print Network [OSTI]

, securing the health and welfare of diverse communities, improving the quality of life, and maintaining and supply chain solutions; Wind, wave and tidal energy; Solar power using hydrodynamics; Microbial fuel. ENVIRONMENT & HEALTH Water quality and treatment; Wastewater reclamation and reuse; Health effects of air

Jacobs, Laurence J.

100

Office of Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

T E C H N I C A L A D V A N C E Soil organic carbon dust emission: an omitted global  

E-Print Network [OSTI]

T E C H N I C A L A D V A N C E Soil organic carbon dust emission: an omitted global source emission, soil organic carbon Received 16 April 2013 and accepted 21 May 2013 Introduction Uncertainty, Gunnedah, NSW 2380, Australia Abstract Soil erosion redistributes soil organic carbon (SOC) within

102

Global niche markets and local development : clientelism and fairtrade farmer organizations in Paraguay's sugar industry  

E-Print Network [OSTI]

Globalization has transformed the markets in which agricultural goods are traded, placing new demands on farmers around the world. In developing countries, smallholder and peasant farmers lack many of the resources needed ...

Setrini, Gustavo

2011-01-01T23:59:59.000Z

103

Implementing Advances in Transport Security Technologies | Department...  

Office of Environmental Management (EM)

More Documents & Publications U.S. Global Threat Reduction InitiativeU.S.-Origin Nuclear Fuel Removals National Nuclear Security Administration Global Threat Reduction...

104

Global Distribution and Climate Forcing of Marine Organic Aerosol - Part 2: Effects on Cloud Properties and Radiative Forcing  

SciTech Connect (OSTI)

A series of simulations with the Community Atmosphere Model version 5 (CAM5) with a 7-mode Modal Aerosol Model were conducted to assess the changes in cloud microphysical properties and radiative forcing resulting from marine organic aerosols. Model simulations show that the anthropogenic aerosol indirect forcing (AIF) predicted by CAM5 is decreased in absolute magnitude by up to 0.09 Wm{sup -2} (7 %) when marine organic aerosols are included. Changes in the AIF from marine organic aerosols are associated with small global increases in low-level incloud droplet number concentration and liquid water path of 1.3 cm{sup -3} (1.5 %) and 0.22 gm{sup -2} (0.5 %), respectively. Areas especially sensitive to changes in cloud properties due to marine organic aerosol include the Southern Ocean, North Pacific Ocean, and North Atlantic Ocean, all of which are characterized by high marine organic emission rates. As climate models are particularly sensitive to the background aerosol concentration, this small but non-negligible change in the AIF due to marine organic aerosols provides a notable link for ocean-ecosystem marine low-level cloud interactions and may be a candidate for consideration in future earth system models.

Gantt, Brett; Xu, Jun; Meskhidze, N.; Zhang, Yang; Nenes, Athanasios; Ghan, Steven J.; Liu, Xiaohong; Easter, Richard C.; Zaveri, Rahul A.

2012-07-25T23:59:59.000Z

105

Related Sites | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Related Sites Related Sites Related Sites Links to the following sources of information are provided as resources. Listings are obtained from government, industry and trade organizations and from other resources. B&W Corporate B&W Corporate The Babcock & Wilcox Company is a leading international provider of energy products and services. B&W Lawrence Livermore Lawrence Livermore National Laboratory helps reduce and counter threats to national and global security through the advancement and application of science and technology. B&W Pantex Located in Amarillo, Texas, the Pantex Plant supports stockpile stewardship, nonproliferation, and safeguards and security. Government System for Award Management The System for Award Management (SAM) (formerly Central Contractor

106

Confronting Water and Food Dilemmas A conference for mee ng the challenges for global water and food security.  

E-Print Network [OSTI]

Confronting Water and Food Dilemmas A conference for mee ng the challenges for global water University professors, researchers, and graduate students working in the fields of water and food in the area of Water and Food. The conference features a keynote presenta- on by Tony Allan, head

107

FLUIDIZED BED STEAM REFORMING MINERALIZATION FOR HIGH ORGANIC AND NITRATE WASTE STREAMS FOR THE GLOBAL NUCLEAR ENERGY PARTNERSHIP  

SciTech Connect (OSTI)

Waste streams that may be generated by the Global Nuclear Energy Partnership (GNEP) Advanced Energy Initiative may contain significant quantities of organics (0-53 wt%) and/or nitrates (0-56 wt%). Decomposition of high nitrate streams requires reducing conditions, e.g. organic additives such as sugar or coal, to reduce the NO{sub x} in the off-gas to N{sub 2} to meet the Clean Air Act (CAA) standards during processing. Thus, organics will be present during waste form stabilization regardless of which GNEP processes are chosen, e.g. organics in the feed or organics for nitrate destruction. High organic containing wastes cannot be stabilized with the existing HLW Best Developed Available Technology (BDAT) which is HLW vitrification (HLVIT) unless the organics are removed by preprocessing. Alternative waste stabilization processes such as Fluidized Bed Steam Reforming (FBSR) operate at moderate temperatures (650-750 C) compared to vitrification (1150-1300 C). FBSR converts organics to CAA compliant gases, creates no secondary liquid waste streams, and creates a stable mineral waste form that is as durable as glass. For application to the high Cs-137 and Sr-90 containing GNEP waste streams a single phase mineralized Cs-mica phase was made by co-reacting illite clay and GNEP simulated waste. The Cs-mica accommodates up to 30% wt% Cs{sub 2}O and all the GNEP waste species, Ba, Sr, Rb including the Cs-137 transmutation to Ba-137. For reference, the cesium mineral pollucite (CsAlSi{sub 2}O{sub 6}), currently being studied for GNEP applications, can only be fabricated at {ge} 1000 C. Pollucite mineralization creates secondary aqueous waste streams and NO{sub x}. Pollucite is not tolerant of high concentrations of Ba, Sr or Rb and forces the divalent species into different mineral host phases. The pollucite can accommodate up to 33% wt% Cs{sub 2}O.

Jantzen, C; Michael Williams, M

2008-01-11T23:59:59.000Z

108

Recommended Security Controls for Federal Information Systems...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NIST 800-53 Revision 3 + Draft Revision 4 Recommended Security Controls for Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines...

109

Protecting grids from cross-domain attacks using security alert sharing mechanisms  

Science Journals Connector (OSTI)

In single administrative domain networks there is only one security policy which can be evaluated by the IT security manager, thanks to monitoring and reporting tools. Grid networks are often composed of different administrative domains owned by different organizations dispersed globally. Such networks are referred to as multi-administrative domain networks. Each domain might have its own security policy and may not want to share its security data with less-protected networks, making it more complex to ensure the security of such networks and protecting them from cross-domain attacks. We propose a Security Event Manager (SEM) called the Grid Security Operation Center (GSOC), which facilitates IT security managers in giving a view of the security of the whole grid network without compromising confidentiality of security data. To do so, GSOC provides a security evaluation of each administrative domain (AD) and a parametric security alert sharing scheme. Alert sharing can then be tuned in order to meet local security policy rules.

Raheel Hassan Syed; Maxime Syrame; Julien Bourgeois

2013-01-01T23:59:59.000Z

110

Effect of Terrestrial and Marine Organic Aerosol on Regional and Global Climate: Model Development, Application, and Verification with Satellite Data  

SciTech Connect (OSTI)

In this DOE project the improvements to parameterization of marine primary organic matter (POM) emissions, hygroscopic properties of marine POM, marine isoprene derived secondary organic aerosol (SOA) emissions, surfactant effects, new cloud droplet activation parameterization have been implemented into Community Atmosphere Model (CAM 5.0), with a seven mode aerosol module from the Pacific Northwest National Laboratory (PNNL)???¢????????s Modal Aerosol Model (MAM7). The effects of marine aerosols derived from sea spray and ocean emitted biogenic volatile organic compounds (BVOCs) on microphysical properties of clouds were explored by conducting 10 year CAM5.0-MAM7 model simulations at a grid resolution 1.9???????°????????2.5???????° with 30 vertical layers. Model-predicted relationship between ocean physical and biological systems and the abundance of CCN in remote marine atmosphere was compared to data from the A-Train satellites (MODIS, CALIPSO, AMSR-E). Model simulations show that on average, primary and secondary organic aerosol emissions from the ocean can yield up to 20% increase in Cloud Condensation Nuclei (CCN) at 0.2% Supersaturation, and up to 5% increases in droplet number concentration of global maritime shallow clouds. Marine organics were treated as internally or externally mixed with sea salt. Changes associated with cloud properties reduced (absolute value) the model-predicted short wave cloud forcing from -1.35 Wm-2 to -0.25 Wm-2. By using different emission scenarios, and droplet activation parameterizations, this study suggests that addition of marine primary aerosols and biologically generated reactive gases makes an important difference in radiative forcing assessments. All baseline and sensitivity simulations for 2001 and 2050 using global-through-urban WRF/Chem (GU-WRF) were completed. The main objective of these simulations was to evaluate the capability of GU-WRF for an accurate representation of the global atmosphere by exploring the most accurate configuration of physics options in GWRF for global scale modeling in 2001 at a horizontal grid resolution of 1???????° x 1???????°. GU-WRF model output was evaluated using observational datasets from a variety of sources including surface based observations (NCDC and BSRN), model reanalysis (NCEP/ NCAR Reanalysis and CMAP), and remotely-sensed data (TRMM) to evaluate the ability of GU-WRF to simulate atmospheric variables at the surface as well as aloft. Explicit treatment of nanoparticles produced from new particle formation in GU-WRF/Chem-MADRID was achieved by expanding particle size sections from 8 to 12 to cover particles with the size range of 1.16 nm to 11.6 ???????µm. Simulations with two different nucleation parameterizations were conducted for August 2002 over a global domain at a 4???????º by 5???????º horizontal resolution. The results are evaluated against field measurement data from the 2002 Aerosol Nucleation and Real Time Characterization Experiment (ANARChE) in Atlanta, Georgia, as well as satellite and reanalysis data. We have also explored the relationship between ???¢????????clean marine???¢??????? aerosol optical properties and ocean surface wind speed using remotely sensed data from the Cloud-Aerosol Lidar with Orthogonal Polarization (CALIOP) on board the CALIPSO satellite and the Advanced Microwave Scanning Radiometer (AMSR-E) on board the AQUA satellite. Detailed data analyses

Meskhidze, Nicholas; Zhang, Yang; Kamykowski, Daniel

2012-03-28T23:59:59.000Z

111

Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

112

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

113

Energy Security Through Hydrogen  

Science Journals Connector (OSTI)

Energy and environmental security are major problems facing our global economy. Fossil fuels, particularly crude oil, are ... energy sources. In the long term, a hydrogen-based economy will have an impact on all ...

Professor John W. Sheffield

2007-01-01T23:59:59.000Z

114

Potential responses of soil organic carbon to global environmental?change  

Science Journals Connector (OSTI)

...this organic matter fraction. The Bomb 14 C Tracer. The incorporation of 14 C produced in the early 1960s by atmospheric thermonuclear weapons testing (bomb 14 C) into SOM during the past 30 years provides a direct measure of the amount of fast-cycling...

Susan E. Trumbore

1997-01-01T23:59:59.000Z

115

A framework model for grid security  

Science Journals Connector (OSTI)

Computational grids can be considered as tiered objects; following a widespread terminology, cluster grids may be grouped into enterprise grids, that in turn may belong to global grids. Therefore, computing grid security has to be tiered too, with the ground level remaining the OS one. In this work, we introduce a sort of unified approach, an overall architectural framework for access control to grid resources, and one that adheres as much as possible to current security principles. Current grid security implementations are viewed in the light of this model, their main drawbacks are described, and we show how our proposal is able to avoid them. We believe that a main strategy could be to adopt both PKI and PMI infrastructures at the grid layer, ensuring that an adequate transfer of authentication and authorization will be made between the Virtual Organization and Resource Provider layers. This can be achieved by extending those features at the OS layer as system applications and services.

G. Laccetti; G. Schmid

2007-01-01T23:59:59.000Z

116

Office of Security Operations: Headquarters Security Officers (HSO) Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

117

The size distribution, scaling properties and spatial organization of urban clusters: a global and regional perspective  

E-Print Network [OSTI]

Human development has far-reaching impacts on the surface of the globe. The transformation of natural land cover occurs in different forms and urban growth is one of the most eminent transformative processes. We analyze global land cover data and extract cities as defined by maximally connected urban clusters. The analysis of the city size distribution for all cities on the globe confirms Zipf's law. Moreover, by investigating the percolation properties of the clustering of urban areas we assess the closeness to criticality for various countries. At the critical thresholds, the urban land cover of the countries undergoes a transition from separated clusters to a gigantic component on the country scale. We study the Zipf-exponents as a function of the closeness to percolation and find a systematic decrease with increasing scale, which could be the reason for deviating exponents reported in literature. Moreover, we investigate the average size of the clusters as a function of the proximity to percolation and fi...

Fluschnik, Till; Ros, Anselmo Garca Cant; Zhou, Bin; Reusser, Dominik E; Kropp, Jrgen P; Rybski, Diego

2014-01-01T23:59:59.000Z

118

06 DEC 2013 1 Information Security Guideline  

E-Print Network [OSTI]

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

119

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

120

An exploratory investigation of organizational security climate in a highly regulated environment.  

E-Print Network [OSTI]

??Security professionals, particularly those working in the field of nuclear security, have become increasingly interested in organizational characteristics which might influence an organization's security performance. (more)

Bitzer, Edward George

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

An exploratory investigation of organizational security climate in a highly regulated environment.  

E-Print Network [OSTI]

?? Security professionals, particularly those working in the field of nuclear security, have become increasingly interested in organizational characteristics which might influence an organization's security (more)

Bitzer, Edward George, III

2011-01-01T23:59:59.000Z

122

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

123

Continental energy security: Energy security in the North American context1  

E-Print Network [OSTI]

, commissioned reports, and signed legislation in an effort to stem crude oil imports and improve energy securityERG/201101 Continental energy security: Energy security in the North American context1 Larry Hughes, Canada 24 January 2011 1 A textbox for the Global Energy Assessment's Knowledge Module 5: Energy Security

Hughes, Larry

124

INSPECTION REPORT Allegations Regarding Personnel Security Concerns...  

Energy Savers [EERE]

re-justification was premised upon the casual employee, who has expertise in high performance computing, participating as a member of the ORNL Global Security Directorate's...

125

NNSA: Securing Domestic Radioactive Material | National Nuclear...  

National Nuclear Security Administration (NNSA)

established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible, identify, secure, remove andor...

126

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

127

A model for the contribution of macrophyte-derived organic carbon in harvested tidal freshwater marshes to surrounding estuarine and oceanic ecosystems and its response to global warming  

Science Journals Connector (OSTI)

Abstract The tidal freshwater marshes dominated by Phragmites australis (common reed) in the Chongxi Wetland are important components of the Yangtze River estuary in China. The litter from P. australis is exported to the surrounding estuarine area and the sea with the tidal flushing in the form of plant residue, particulate organic matter, and dissolved organic matter and is an important organic carbon resource of the East China Sea. A model was constructed using STELLA software (version 9.1.3) to simulate the contribution of macrophyte-derived organic carbon to surrounding estuary and ocean ecosystems. The model is based on the monitoring and observational data from field surveys and published information on the Chongxi Wetland from 2008 to 2011, and the response of the total organic carbon flowing out of the wetland to global changes was also predicted in conditions of plant shoots that were annually harvested in winter. The results demonstrate the following: (1) the annual contributed organic carbon is 891gCm?2, of which 612gCm?2 flows out of the wetland directly as plant residue; (2) total organic carbon continually increases after a short decrease at the start of April of 2010, retains a high value from mid-July to mid-November and rapidly decreases to approximately zero during the harvest of the aboveground plant organs; and (3) accumulated annual organic carbon contributions to the surrounding estuarine and oceanic ecosystems are predicted to increase as the global average temperature rises, and the sea level increases.

Jiarui Zhang; Sven E. Jrgensen; Jianjian Lu; Sren N. Nielsen; Qiang Wang

2014-01-01T23:59:59.000Z

128

Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

129

Delegation of Authority for Safeguards and Security (EM) - DOE...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Authority for Safeguards and Security (EM) by goodwin Delegation-AuthorityforSafeguards-SecurityEM.pdf -- PDF Document, 63 KB ID: NA Type: Organizations' Assignment of...

130

Global Threat Reduction Initiative  

Broader source: Energy.gov (indexed) [DOE]

Nonproliferation Nonproliferation U.S. DEPARTMENT OF ENERGY 1 The Current Status of Gap and U.S.-Origin Nuclear Fuel Removals 2011 Jeff Galan, Deputy Project Manager U.S.-Origin Nuclear Remove Program National Nuclear Security Administration Global Threat Reduction Initiative Defense Nuclear Nonproliferation U.S. DEPARTMENT OF ENERGY 2 GTRI Mission and Goals GTRI is: A part of President Obama's comprehensive strategy to prevent nuclear terrorism; and The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other

131

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

132

Organization  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Organization Print Organization Print 2012-12 org chart A complete ALS organization chart (June 2013) is available in PDF. Appointed and elected members of advisory panels provide guidance to Berkeley Lab and ALS management in developing the ALS scientific and user programs. ALS Staff Photo staff photo thumb Click on the image to see a recent photo of ALS staff in front of the dome. The photo was taken on May 14, 2013. ALS Management and Advisory Team Steve Kevan, Deputy Division Director, Science Michael J. Banda, Deputy Division Director, Operations Robert W. Schoenlein, Senior Staff Scientist, Next Generation Light Source Initiative Janos Kirz, Scientific Advisor Paul Adams, Division Deputy for Biosciences ALS Scientific, Technical, and User Support Groups Accelerator Physics

133

Enterprise Security Planning using Zachman Framework: Designer's Perspective  

E-Print Network [OSTI]

Enterprise Security Planning using Zachman Framework: Designer's Perspective Abstract planning point of view. Index Terms - Enterprise Architecture, Zachman Framework, Enterprise Security security planning. This paper has been organized as follows. Section 2, describes the enterprise

Ertaull, Levent

134

Global governance and diplomacy solutions for counterfeit medicines  

E-Print Network [OSTI]

Interpol. INTERPOL and pharmaceutical industry launch globalInterpol. INTERPOL and pharmaceutical industry launch globalorganization of pharmaceutical industry security directors

Mackey, Timothy Ken

135

National Nuclear Security Administration Overview  

Broader source: Energy.gov (indexed) [DOE]

1, 2011 - 1, 2011 - Page 1 National Transportation Stakeholders Forum Denver, Colorado May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2 National Transportation Stakeholders Forum (NTSF) * Introduction * NNSA Certifying Official Role * Offsite Source Recovery Project * Waste Shipments * Nuclear Materials Management Planning * Summary May 11, 2011 - Page 3 NNSA Plays a Critical Role: Ensuring our Nation's Security * Maintaining the safety, security and effectiveness of the nuclear weapons stockpile without nuclear testing * Reducing the global danger from the proliferation of nuclear weapons and materials * Provide safe and effective nuclear propulsion for the

136

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using a Graphical  

E-Print Network [OSTI]

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using of California, Davis {hoagland,pandey,levitt}@cs.ucdavis.edu Technical Report CSE-98-3 A security policy states for organizations to declare their security policies, even informal state- ments would be better than the current

California at Davis, University of

137

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

138

Status of the National Security Workforce  

SciTech Connect (OSTI)

This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

None

2008-03-31T23:59:59.000Z

139

World Bank eAtlas of Global Development | Open Energy Information  

Open Energy Info (EERE)

World Bank eAtlas of Global Development World Bank eAtlas of Global Development Jump to: navigation, search Tool Summary Name: World Bank eAtlas of Global Development Agency/Company /Organization: World Bank Topics: Co-benefits assessment, - Macroeconomic, - Energy Access, - Energy Security, - Environmental and Biodiversity, - Health Resource Type: Dataset Website: www.app.collinsindicate.com/worldbankatlas-global/en World Bank eAtlas of Global Development Screenshot References: World Bank eAtlas of Global Development[1] "This eAtlas, a new online companion to Atlas of Global Development, third edition, builds on the Atlas topics, allowing you to visualize and analyze a wider variety of data in greater depth, over a longer time period. You can: Map more than 175 World Bank indicators worldwide

140

Security Cases  

Broader source: Energy.gov (indexed) [DOE]

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity...

142

Enterprise Information Security Management Framework [EISMF  

E-Print Network [OSTI]

There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

143

National Security Photo Gallery | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Defense, Department of Homeland Security, state and local government agencies, private sector companies. Research for international organizations has involved the World...

144

A PKI-Based Scalable Security Infrastructure for Scalable Grid  

Science Journals Connector (OSTI)

Scalable security is a vital important issue for scalable Grid. There are several issues to be solved for scalable Grid security such as mapping from global subjects to ... center, large number of users, many het...

Lican Huang; Zhaohui Wu

2004-01-01T23:59:59.000Z

145

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

146

Analysis of the optical coupling of wavelength-shifting fibers to organic liquid scintillator filled fluoropolymer tubes for industrial and nuclear security applications  

E-Print Network [OSTI]

Industrial and nuclear security applications continue to push radiation detection development into new and exciting frontiers. In this work, an innovative detection module is developed and tested for use in a cosmic ray ...

Schools, Chad C

2014-01-01T23:59:59.000Z

147

Cyber Security | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

148

Security for Grid Services Frank Siebenlist2  

E-Print Network [OSTI]

Security for Grid Services Von Welch1 Frank Siebenlist2 Ian Foster1,2 John Bresnahan2 Karl organizations. #12;Grid computing research has produced security technologies based not on direct-API [23]. The Grid Security Infrastructure (GSI) is the name given to the portion of the Globus Toolkit

Wiseman, Yair

149

Independent Oversight Evaluation, Office of Secure Transportation -  

Broader source: Energy.gov (indexed) [DOE]

Evaluation, Office of Secure Transportation - Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office of Secure Transportation Emergency Management Program The Secretary of Energy's Office of Independent Oversight and Performance Assurance (OA) conducted an inspection of emergency management programs at the National Nuclear Security Administration's (NNSA) Office of Secure Transportation (OST) in October 2003. Inspection activities included the observation of the OST annual emergency exercise and reviews of selected emergency management program elements. The exercise demonstrated that the OST emergency response organization could effectively provide for prompt event categorization, DOE and NNSA

150

Lab announces security changes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

151

Oak Ridge Metrology Center | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Manufacturing and Technical Services Oak Ridge Metrology Center Oak Ridge Metrology Center Oak Ridge Metrology Center has an international reputation for...

152

Y-12 and the National Nuclear Security Administration make continuing...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the safety, security and performance of the U.S. nuclear weapons stockpile without nuclear testing; reduces the global danger from weapons of mass destruction; provides the...

153

Welcome to the Los Alamos Field Office | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

security, reliability and performance of the U.S. nuclear weapons stockpile without nuclear testing; works to reduce global danger from weapons of mass destruction; provides...

154

Climate-derived tensions in Arctic security.  

SciTech Connect (OSTI)

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

155

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

156

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

157

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

158

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

159

Innovations for a secure nation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Innovations for a Secure Nation Innovations for a Secure Nation /about/_assets/images/icon-70th.jpg Innovations for a Secure Nation LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. image description Plasma technology for textile finishing applications gets a boost from LANL APJeT received a $100,000 Venture Acceleration Fund award from LANS helping to complete design and engineering of a commercial-scale production unit. - 4/3/12 One of several active projects, LANL and Chevron co-developed INFICOMM(tm), a wireless technology used to collect real-time temperature and pressure information from sensors in oil and gas wells, including very deep wells already producing oil and gas and drilling operations for new wells.

160

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

162

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

163

Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

164

Office of Security Policy - Safeguards and Security Frequently Asked  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safeguards and Security Safeguards and Security New Frequently Asked Questions The following frequently asked questions (FAQs) are organized by the topical areas and offer answers to recurring questions or policy clarification requests. These entries represent the newest additions to the collection of S&S FAQs. 1. General 2. Program Planning and Management 3. Protection Program Operations 4. Information Security 5. Nuclear Material Control and Accountability General Q: Where can I find the national policies that may affect security programs I am responsible for? A: The national policies affecting DOE's safeguards and security programs are located on the Policy Information Resource tool at http://pir.pnl.gov. This collection is comprised of the most current version of each policy

165

ENERGY SECURITY  

Broader source: Energy.gov (indexed) [DOE]

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

166

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

167

Security Rulemaking  

Broader source: Energy.gov (indexed) [DOE]

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

168

Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology  

Science Journals Connector (OSTI)

A critical problem for grid security is how to gain secure solution for Grid virtual organization (VO). In Grid practice at present, issues of VO security rely on non-distributed policy management and ... as a st...

Fei Yan; Weizhong Qiang; Zhidong Shen; Chunrun Chen

2006-01-01T23:59:59.000Z

169

Security for Radioactive Sources: Fact Sheet | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for Radioactive Sources: Fact Sheet | National Nuclear Security for Radioactive Sources: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Security for Radioactive Sources: Fact Sheet Fact Sheet Security for Radioactive Sources: Fact Sheet Mar 23, 2012 Radioactive materials are a critical and beneficial component of global

170

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

171

National Security Studies Program | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

National Security Studies Program National Security Studies Program National Security Studies Program Objective The National Security Studies Program (NSSP) is designed to prepare future leaders of civilian agencies for high-level policy, command, and staff responsibilities. The NSSP focuses on international environments and commercial partnerships. All students successfully completing the program are awarded a Master's degree. The program does not involve a promotion or a change in position. Benefits to the Organization The program prepares federal civilian employees for high-level policy, command, and staff responsibilities. Participants will gain valuable experience in leadership, information strategy, national security studies, military strategy, logistics, economics, industry studies, and more. The

172

Information security: where computer science, economics and psychology meet  

Science Journals Connector (OSTI)

...Gilbert 2006). Since 2004, computer crime has become organized...Commemoration Commission and by NSF grant DGE-0636782 (T.M...In Proc. Seventeenth Annual Computer Security Applications Conf...Schechter, S. E. 2004 Computer security strength and risk...

2009-01-01T23:59:59.000Z

173

An improved grid security infrastructure by trusted computing  

Science Journals Connector (OSTI)

Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, ... treated...

Yan Fei; Zhang Huanguo; Sun Qi; Shen Zhidong

2006-11-01T23:59:59.000Z

174

G-PASS: Security Infrastructure for Grid Travelers  

Science Journals Connector (OSTI)

Grid travelers are special mobile processes responsible for ... virtual organizations (VOs). We propose a security infrastructure called G-PASS to provide security support for grid travelers during their trip and...

Tianchi Ma; Lin Chen; Cho-Li Wang

2004-01-01T23:59:59.000Z

175

Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages

About About Careers Community Employees & Retirees Library Suppliers Contact Us Y-12 Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | B&W Y-12 donates $75,000 to Emory Valley Center Facebook Twitter YouTube Flickr RSS Feature Stories Expertise Our NRFTC trainers have many years of operational experience at Y-12 as well as on numerous international missions. Nuclear Detection and Forensics A strong technical nuclear detection and forensics capability is important to the nation's security. "Cook"ing at Y-12 for 70 years We have an enduring mission. Y-12 plays a key role in it. And a nuclear deterrent remains the ultimate insurance policy for America. Young Innovators' Society Awesome Eyeballs visit Y-12

176

Army Energy Security and Independence  

Broader source: Energy.gov (indexed) [DOE]

ARMY ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership Energy Costs Driven by Global Situation OIL & GAS LIQUIDS Army Utilities Energy Use * 35% of DoD consumption * 21% of Fed government use * 11% of installations' budget * Commodity Prices increasing 8 - 20% annually Consumption Climbs as new sources decrease Oil production is primarily OCONUS and decreasing Our consumption is out of balance with our Reserves New Sources Dwindling - Forcing our reliance on Unstable governments 3 ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership Oil Field Forecasts Peak Year Oil Expert

177

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

178

SP 800-128. Guide for Security-Focused Configuration Management of Information Systems  

Science Journals Connector (OSTI)

The purpose of Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems, is to provide guidelines for organizations responsible for managing and administering the security of federal information systems ... Keywords: Configuration management, SecCM, control, information systems, monitoring, risk management framework, security content automation protocol (SCAP), security program, security-focused continuous monitoring

L. Arnold Johnson; Kelley L. Dempsey; Ronald S. Ross; Sarbari Gupta; Dennis Bailey

2011-08-01T23:59:59.000Z

179

Energy Security Council  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Watkins...

180

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Model checking grid security  

Science Journals Connector (OSTI)

Grid computing is one of the leading forms of high performance computing. Security in the grid environment is a challenging issue that can be characterized as a complex system involving many subtleties that may lead designers into error. This is similar to what happens with security protocols where automatic verification techniques (specially model checking) have been proved to be very useful at design time. This paper proposes a formal verification methodology based on model checking that can be applied to host security verification for grid systems. The proposed methodology must take into account that a grid system can be described as a parameterized model, and security requirements can be described as hyperproperties. Unfortunately, both parameterized model checking and hyperproperty verification are, in general, undecidable. However, it has been proved that this problem becomes decidable when jobs have some regularities in their organization. Therefore, this paper presents a verification methodology that reduces a given grid system model to a model to which it is possible to apply a cutoff theorem (i.e., a requirement is satisfied by a system with an arbitrary number of jobs if and only if it is satisfied by a system with a finite number of jobs up to a cutoff size). This methodology is supported by a set of theorems, whose proofs are presented in this paper. The methodology is explained by means of a case study: the Condor system.

F. Pagliarecci; L. Spalazzi; F. Spegni

2013-01-01T23:59:59.000Z

182

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

183

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

184

Stumbling Toward Capitalism: The State, Global Production Networks, and the Unexpected Emergence of China's Independent Auto Industry  

E-Print Network [OSTI]

To increase the security of Chinese oil tankers throughChinas Oil Diplomacy: Is it a Global Security Threat? ?s energy security concerns over rapidly growing oil demand

Chang, Crystal Whai-ku

2011-01-01T23:59:59.000Z

185

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

186

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Tags Tag: Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website,...

187

Integrated Safeguards and Security Management (ISSM) Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of this Policy is to formalize an Integrated Safeguards and Security Management (ISSM) framework. Safeguards and security management systems provide a formal, organized process for planning, performing, assessing, and improving the secure conduct of work in accordance with risk-based protection strategies. These systems are institutionalized through Department of Energy (DOE) directives and contracts. Does not cancel other directives. Canceled by DOE P 470.1A.

2001-05-08T23:59:59.000Z

188

Improved wireless security for GMSK-based devices using RF fingerprinting  

Science Journals Connector (OSTI)

Gaussian minimum shift keying (GMSK) is employed in current global system for mobile (GSM) networks and remains a viable option for future wireless systems. Physical layer (PHY) security is demonstrated using RF fingerprints from ... Keywords: GMSK, GSM networks, Gaussian minimum shift keying, MDA, PHY security, RF fingerprinting, SEI, authentication, electronic security, multiple discriminant analysis, physical layer, specific emitter identification, wireless networks, wireless security

Donald R. Reising; Michael A. Temple; Michael J. Mendenhall

2010-03-01T23:59:59.000Z

189

Table of Contents Division Organization 2  

E-Print Network [OSTI]

National Initiative for Cybersecurity Education (NICE) 12 Smart Grid Cyber Security 13 Supply Chain Risk Security and Forensics 33 NIST Cloud Computing Project 34 Policy Machine 35 Security for Grid#12;2002 Table of Contents Welcome 1 Division Organization 2 The Computer Security Division

190

Security rethink  

Science Journals Connector (OSTI)

......breaches or heightening the risks. One of my clients...business to the socio-political situation of particular...based on the return on investment in keeping a high standard...times that security risks are at their highest...lay-offs. The return on investment must consider the positive......

Michael Chua

2002-09-01T23:59:59.000Z

191

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

192

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

193

Physical Security Systems | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

194

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

195

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

196

Climate Change Impacts on Global Food Security  

Science Journals Connector (OSTI)

...A recent systematic review of changes in the yields of the major...instance, when aggressive bioenergy subsidies and quota policies...Despite a burgeoning literature over the past 5 years...research emerge from our review: (i) gathering evidence...A. Miller M. A. , Review of reported cholera...

Tim Wheeler; Joachim von Braun

2013-08-02T23:59:59.000Z

197

Climate Change Impacts on Global Food Security  

Science Journals Connector (OSTI)

...recent systematic review of changes in the yields of...change on the health environment. Little research...flooding or drought in environments where sound sanitation...when aggressive bioenergy subsidies and quota...Despite a burgeoning literature over the past...emerge from our review: (i) gathering...

Tim Wheeler; Joachim von Braun

2013-08-02T23:59:59.000Z

198

Global food security under climate change  

Science Journals Connector (OSTI)

...additional people at risk of hunger by 2080) strongly...individuals who are at high risk of temporarily or permanently...savings, would be at high risk of losing their access...they cannot take out insurance against illness. The...command given the legal, political, economic, and social...

Josef Schmidhuber; Francesco N. Tubiello

2007-01-01T23:59:59.000Z

199

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the proliferation of nuclear weapons, technologies that make America safer are among Oak Ridge National Laboratory's top research priorities. The Laboratory provides federal,...

200

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Intelligence Point of Contact: JD Stauffer Intelligence Oak Ridge National Laboratory Post Office Box 2008, MS-6242 Oak Ridge, Tennessee 37831-6242 Telephone: (865) 241-6580...

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

A Uniform Framework of Global Nuclear Materials Management  

SciTech Connect (OSTI)

Global Nuclear Materials Management (GNMM) anticipates and supports a growing international recognition of the importance of uniform, effective management of civilian, excess defense, and nuclear weapons materials. We expect thereto be a continuing increase in both the number of international agreements and conventions on safety, security, and transparency of nuclear materials, and the number of U.S.-Russian agreements for the safety, protection, and transparency of weapons and excess defense materials. This inventory of agreements and conventions may soon expand into broad, mandatory, international programs that will include provisions for inspection, verification, and transparency, To meet such demand the community must build on the resources we have, including State agencies, the IAEA and regional organizations. By these measures we will meet the future expectations for monitoring and inspection of materials, maintenance of safety and security, and implementation of transparency measures.

Dupree, S.A.; Mangan, D.L.; Sanders, T.L; Sellers, T.A.

1999-04-20T23:59:59.000Z

202

Interpreting Deep Structures of Information Systems Security  

Science Journals Connector (OSTI)

......network, infrastructure and regulatory) of the organization...adopting stringent regulatory review of the security policies...present ways to deal with regulatory actions such as developing contingency plans (disaster recovery in......

Manoj Thomas; Gurpreet Dhillon

2012-10-01T23:59:59.000Z

203

Security and Certification Issues in Grid Computing  

Science Journals Connector (OSTI)

Grid computing is concerned with the sharing and ... virtual organizations. The dynamic nature of Grid environments introduces challenging security concerns that demand new technical approaches. In this brief o...

Ian Foster; Frank Siebenlist; Steven Tuecke

2003-01-01T23:59:59.000Z

204

Chapter 5 - Who Is Responsible for Security?  

Science Journals Connector (OSTI)

Abstract No matter what their role in the organization, everyone is responsible for security. From the CEO to the mailroom, all users are at risk and can be targeted by social engineers in both technical and nontechnical attacks.

Bill Gardner

2014-01-01T23:59:59.000Z

205

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

206

Nonproliferation & International Security | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

207

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

208

Chapter 5 - Security Models for SCADA, ICS, and Smart Grid  

Science Journals Connector (OSTI)

Abstract This chapter describes security models for different Smart Grid protocols, including SCADA and ICS protocols. Many protocols are explained, along with their security models, interoperability, and methods and models of organizing them within an integrated system. Security methodologies are compared in order to create a working model for Smart Grid systems.

Eric D. Knapp; Raj Samani

2013-01-01T23:59:59.000Z

209

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

210

Organization and Functions  

Broader source: Energy.gov (indexed) [DOE]

Working to Ensure the Safety and Security of Hazardous Material Shipments Working to Ensure the Safety and Security of Hazardous Material Shipments Organization and Functions Mission Unit EM-30 Deputy Assistant Secretary/ADAS Waste Management Director Office of Packaging and Transportation EM-33 Regulations & Standards Support * ANSI * ASME/ ASTM * DHS * DOD FEMA * FMCSA * FRA * IAEA * ICAO * IMO * NRC * Orders * PHMSA TSA * UN TDG SCOE Packaging Certification * CoCs for Type B/AF Packages * DOE Exemptions * DOT Special Permits & COCA * QA * RAMPAC * SCALE * Technical Assistance * Training Program & Site Support * ATMS * EFCOG * EIS Reviews * IPT * Load Securement Guide * PMC * RADCALC * RADTRAN * Secure transport * Technical assistance * Tenders * TMC * TRAGIS

211

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

212

Chapter 12 - Security Risk Reviews  

Science Journals Connector (OSTI)

Publisher Summary This chapter discusses the security risk review (SRR). The purpose of the SRR process is to identify areas where one's security standards are not being met. The focus initially should be on applications and supporting infrastructure that are most critical to the organization. This risk analysis process follows five high-level steps: assess resources, generate findings, analyze risk, risk decision, and risk exceptions. The goal with the SRR is to prioritize not only the resources being evaluated but also the importance of the standards themselves. The standard requiring a log of all guest accesses to the data center may be rightly deemed less critical than the requirement to have swipe card access to the data center. Reviews should be performed periodically or whenever new policies/standards are adopted by the organization. A fundamental control for any organization is a collection of security policies and standards that set the tone for how to operate the business securely. Once these are in place, the challenge then becomes how to assess the organization's current alignment with these standards and determine which gaps most urgently need to be addressed. This may sound like an audit function, but there is a very important distinction here: this process is meant to proactively prioritize those areas where a deviation from the standard might be acceptable and recognize the cases where such a divergence cannot be tolerated. Like many risk activities, the result will either be a formal acceptance of the current state or a plan to mitigate the risks. This is one of the fundamental on-going risk assessment activities that will help to gauge the security posture of the organization versus what controls might be documented on paper.

Evan Wheeler

2011-01-01T23:59:59.000Z

213

Transportation Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Transportation Security Transportation Security Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste...

214

THE GLOBAL NUCLEAR ENERGY PARTNERSHIP:  

Broader source: Energy.gov (indexed) [DOE]

GLOBAL NUCLEAR ENERGY PARTNERSHIP: GLOBAL NUCLEAR ENERGY PARTNERSHIP: Greater Energy Security in a Cleaner, Safer World The Global Nuclear Energy Partnership (GNEP) is a comprehensive strategy to increase U.S. and global energy security, encourage clean development around the world, reduce the risk of nuclear proliferation, and improve the environment. A plentiful, reliable supply of energy is the cornerstone of sustained economic growth and prosperity. Nuclear power is the only proven technology that can provide abundant supplies of base load electricity reliably and without air pollution or emissions of greenhouse gasses. In order to help meet growing demand for energy at home and encourage the growth of prosperity around the globe, GNEP provides for the safe, extensive expansion of clean nuclear power.

215

Comparing local vs. global visible and near-infrared (VisNIR) diffuse reflectance spectroscopy (DRS) calibrations for the prediction of soil clay, organic C  

E-Print Network [OSTI]

Comparing local vs. global visible and near-infrared (VisNIR) diffuse reflectance spectroscopy (DRS Elsevier B.V. All rights reserved. 1. Introduction Visible and near-infrared (VisNIR) diffuse reflectance

Lawrence, Rick L.

216

Secure NEPA Documents | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Secure NEPA Documents Secure NEPA Documents Secure NEPA Documents The Department of Energy (DOE) limits electronic access to certain NEPA documents on this website due to the potential security sensitivity of some information these documents may contain. DOE regrets any inconvenience caused by this decision, which reflects an awareness of the need to protect the public. Requesting Secure NEPA Documents You may request copies of documents by e-mail or by leaving a message on our toll-free information line at 1-800-472-2756. Please provide the following information in your request: Title and Number of Document requested First Name: Last Name: Address: City: State: Zip Code: Organization (If Applicable): E-mail: Phone: List of Secure NEPA Documents April 1, 2007 EIS-0376: Final Environmental Impact Statement

217

Secure NEPA Documents | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Secure NEPA Documents Secure NEPA Documents Secure NEPA Documents The Department of Energy (DOE) limits electronic access to certain NEPA documents on this website due to the potential security sensitivity of some information these documents may contain. DOE regrets any inconvenience caused by this decision, which reflects an awareness of the need to protect the public. Requesting Secure NEPA Documents You may request copies of documents by e-mail or by leaving a message on our toll-free information line at 1-800-472-2756. Please provide the following information in your request: Title and Number of Document requested First Name: Last Name: Address: City: State: Zip Code: Organization (If Applicable): E-mail: Phone: List of Secure NEPA Documents May 1, 1984 EIS-0108: Final Environmental Impact Statement

218

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

219

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

220

Security for grids  

SciTech Connect (OSTI)

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

GTRI's Convert program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

program | National Nuclear Security Administration program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog GTRI's Convert program Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative > GTRI's Convert program GTRI's Convert program One of Global Threat Reduction Initiative's (GTRI) three key pillars is

222

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

223

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

224

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

225

The Laws of Vulnerabilities: Which security vulnerabilities really matter?  

Science Journals Connector (OSTI)

New security vulnerabilities are discovered on a daily basis. With each new announcement, the same questions arise. How significant is this vulnerability? How prevalent? How easy is it to exploit? Due to a lack of global vulnerability data, answers are ...

Gerhard Eschelbeck

2005-01-01T23:59:59.000Z

226

Office of Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

227

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

228

Security | Department of Energy  

Energy Savers [EERE]

Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

229

Security & Privacy | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

230

SECURING HARDWARE, SOFTWARE AND DATA  

Broader source: Energy.gov (indexed) [DOE]

of the Cyber Security of the Cyber Security Research Needs for Open Science Workshop July 23-24, 2007 Sponsored by the DOE Office of Science in Cooperation with the Office of Electricity Delivery and Energy Reliability i PNNL-16971 Report of the Cyber Security Research Needs for Open Science Workshop July 23-24, 2007 Sponsored by the DOE Office of Science in Cooperation with the Office of Electricity Delivery and Energy Reliability iii Acknowledgements The workshop chairs wish to thank Joree O'Neal and Rachel Smith for all their help and support with organizing the logistics and registration activities for this workshop; Sue Chin, Ted Tanasse, Barbara Wilson, and Stacy Larsen for their expert help with the assembly, text editing, and graphics for this report; and Lance Baatz for his masterful

231

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

232

MN Office of Energy Security | Open Energy Information  

Open Energy Info (EERE)

MN Office of Energy Security MN Office of Energy Security Jump to: navigation, search Name MN Office of Energy Security Place St. Paul, MN Website http://www.mnofficeofenergysec References MN Office of Energy Security[1] Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building Systems Integration LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! MN Office of Energy Security is a company located in St. Paul, MN. References ↑ "MN Office of Energy Security" Retrieved from "http://en.openei.org/w/index.php?title=MN_Office_of_Energy_Security&oldid=379158" Categories: Clean Energy Organizations Companies Organizations

233

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

234

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

235

Better Security Through Discussion | Department of Energy  

Office of Environmental Management (EM)

Better Security Through Discussion Better Security Through Discussion Better Security Through Discussion More Documents & Publications Indiana Department of Homeland Security -...

236

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

237

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

238

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

239

Visualizing Cyber Security: Usable Workspaces  

SciTech Connect (OSTI)

An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

2009-10-11T23:59:59.000Z

240

NERSC Computer Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Welcome to Los Alamos National Laboratory: A premier national security science laboratory  

SciTech Connect (OSTI)

Dr Wallace presents visitors with an overview of LANL's national security science mission: stockpile stewardship, protecting against the nuclear threat, and energy security & emerging threats, which are underpinned by excellence in science/technology/engineering capabilities. He shows visitors a general Lab overview of budget, staff, and facilities before providing a more in-depth look at recent Global Security accomplishments and current programs.

Wallace, Terry [Los Alamos National Laboratory

2012-06-25T23:59:59.000Z

242

Office of Security Assistance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

243

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

244

March 16, 2010, Safety and Security Reform Roundtable - Agenda  

Broader source: Energy.gov (indexed) [DOE]

Safety and Security Reform Roundtable Safety and Security Reform Roundtable Forrestal Building, Washington, DC March 16 th , 2010 1:00 PM (EST) AGENDA * Introduction of Union Leaders Glenn Podonsky, Chief Health, Safety and Security Officer * Welcome/Introductory Remarks on Reform Goals Dan Poneman, Deputy Secretary * Reform Status and Approach - Oversight, Directives, Mission Support Glenn Podonsky, Chief Health, Safety and Security Officer * Discussion Forum - Union Feedback - Feedback on oversight reform initiatives - Priority safety issues - Experience in collaborative focus group efforts - Recommendations for a path forward * Operating Organization Perspectives 1. Tom D'Agostino Administrator, National Nuclear Security Administration 2. Steven Koonin Under Secretary for Science

245

Basis for an integrated security ontology according to a systematic review of existing proposals  

Science Journals Connector (OSTI)

The use of ontologies to represent knowledge provides us with organization, communication and reusability. The concepts and relations managed by any scientific community need to be formally defined. Since security in information technologies has evolved ... Keywords: Ontologies, Security, Systematic review

Carlos Blanco; Joaqun Lasheras; Eduardo Fernndez-Medina; Rafael Valencia-Garca; Ambrosio Toval

2011-06-01T23:59:59.000Z

246

Our Leadership | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Leadership | National Nuclear Security Administration Leadership | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Our Leadership Home > About Us > Our Leadership Our Leadership The NNSA plays a critical role in ensuring the security of our Nation by maintaining the safety, security, and effectiveness of the U.S. nuclear weapons stockpile without nuclear testing; reducing the global danger from

247

Our Leadership | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Leadership | National Nuclear Security Administration Leadership | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Our Leadership Home > About Us > Our Leadership Our Leadership The NNSA plays a critical role in ensuring the security of our Nation by maintaining the safety, security, and effectiveness of the U.S. nuclear weapons stockpile without nuclear testing; reducing the global danger from

248

The Global Energy Challenge  

ScienceCinema (OSTI)

The expected doubling of global energy demand by 2050 challenges our traditional patterns of energy production, distribution and use. The continued use of fossil fuels raises concerns about supply, security, environment and climate. New routes are needed for the efficient conversion of energy from chemical fuel, sunlight, and heat to electricity or hydrogen as an energy carrier and finally to end uses like transportation, lighting, and heating. Opportunities for efficient new energy conversion routes based on nanoscale materials will be presented, with emphasis on the sustainable energy technologies they enable.

George Crabtree

2010-01-08T23:59:59.000Z

249

The Global Energy Challenge  

SciTech Connect (OSTI)

The expected doubling of global energy demand by 2050 challenges our traditional patterns of energy production, distribution and use. The continued use of fossil fuels raises concerns about supply, security, environment and climate. New routes are needed for the efficient conversion of energy from chemical fuel, sunlight, and heat to electricity or hydrogen as an energy carrier and finally to end uses like transportation, lighting, and heating. Opportunities for efficient new energy conversion routes based on nanoscale materials will be presented, with emphasis on the sustainable energy technologies they enable.

George Crabtree

2007-09-12T23:59:59.000Z

250

Global Biodiversity Conservation Priorities  

E-Print Network [OSTI]

Global Biodiversity Conservation Priorities T. M. Brooks,1,2,3 * R. A. Mittermeier,1 G. A. B. da is essential to minimize biodiversity loss. To address this need, biodiversity conservation organizations have conservation funding. H uman actions are causing a biodiversity crisis, with species extinction rates up

Wilmers, Chris

251

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Broader source: Energy.gov (indexed) [DOE]

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

252

Security Notice | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

253

Chapter 23 - Emerging Security Challenges in Cloud Computing, from Infrastructure-Based Security to Proposed Provisioned Cloud Infrastructure  

Science Journals Connector (OSTI)

In this chapter, we discuss the threats, challenges, and guidance associated with securing an organizations core IT infrastructure at the network, host, and application levels in the cloud. According to the best knowledge of the authors, up to now, there are no research with this perspective on cloud security in the literature. This chapter represents our first discussion of this infrastructure security in the context of SPI service delivery models (SaaS, PaaS, and IaaS). Non-information security professionals are cautioned not to simply equate infrastructure security to infrastructure-as-a-service (IaaS) security. Although infrastructure security is more highly relevant to customers of IaaS, similar consideration should be given to providers platform-as-a-service (PaaS) and software-as-a-service (SaaS) environments, since they have ramifications to customer threat, risk, and compliance management. Another dimension is the cloud business model (public, private, and hybrid clouds), which is orthogonal to the SPI service delivery model; what we highlight is the relevance of discussion points as they apply to public and private clouds. When discussing public clouds, the scope of infrastructure security is limited to the layers of infrastructure that move beyond the organizations control and into the hands of service providers (i.e., when responsibility to a secure infrastructure is transferred to the cloud service provider [CSP], based on the SPI delivery model). Information in this chapter is critical for customers in gaining an understanding of what security a CSP provides and what security the customer is responsible for providing. This chapter discusses conceptual issues, basic requirements, and practical suggestions for designing dynamically configured security infrastructure provisioned on demand as part of the cloud-based infrastructure. We end this chapter by describing general-use cases for provisioning cloud infrastructure that provide bases for defining security infrastructure requirements.

Mohammad Reza Movahedisefat; Seyyed Mohammad Reza Farshchi; Davud Mohammadpur

2014-01-01T23:59:59.000Z

254

FY 2005 Control Table by Organization  

Broader source: Energy.gov (indexed) [DOE]

Organization Organization (dollars in thousands - OMB Scoring) Table of Contents Summary...................................................................................................... 1 Mandatory Funding....................................................................................... 2 National Nuclear Security Administration..................................................... 3 Energy Efficiency and Renewable Energy.................................................... 4 Electric Transmission and Distribution......................................................... 4 Fossil Energy................................................................................................ 5 Nuclear Energy, Science and Technology...................................................

255

GLOBAL THREAT REDUCTION INITIATIVE REACTOR CONVERSION PROGRAM: STATUS AND CURRENT PLANS  

SciTech Connect (OSTI)

The U.S. Department of Energys National Nuclear Security Administration (NNSA) Reactor Conversion Program supports the minimization, and to the extent possible, elimination of the use of high enriched uranium (HEU) in civilian nuclear applications by working to convert research and test reactors and radioisotope production processes to the use of low enriched uranium (LEU). The Reactor Conversion Program is a technical pillar of the NNSA Global Threat Reduction Initiative (GTRI) which is a key organization for implementing U.S. HEU minimization policy and works to reduce and protect vulnerable nuclear and radiological material domestically and abroad.

Staples, Parrish A.; Leach, Wayne; Lacey, Jennifer M.

2009-10-07T23:59:59.000Z

256

Homeland Security Programs | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

257

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

258

Security Policy, Guidance & Reports  

Broader source: Energy.gov [DOE]

Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energys corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that Departmental personnel security programs (including the National Nuclear Security Administration [NNSA]) are consistent and effectively implemented.

259

Global Home File System at NERSC  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Home Home Global Home Filesystem Overview Global home directories (or "global homes") provide a convenient means for a user to have access to source files, input files, configuration files, etc., regardless of the platform the user is logged in to. Wherever possible, you should refer to your home directory using the environment variable $HOME. The absolute path to your home directory (e.g., /u4/elvis/) may change, but the value of $HOME will always be correct. For security reasons, you should never allow "world write" access to your $HOME directory or your $HOME/.ssh directory. NERSC scans for such security weakness, and, if detected, will change the permissions on your directories. Platforms Utilizing Global Home The Global Home file system is available on all NERSC systems except PDSF.

260

National Strategy to Secure Cyberspace (February 2003) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Strategy to Secure Cyberspace (February 2003) Strategy to Secure Cyberspace (February 2003) National Strategy to Secure Cyberspace (February 2003) The National Strategy to Secure Cyberspace outlines an initial framework for both organizing and prioritizing efforts. It provides direction to the federal government departments and agencies that have roles in cyberspace security. It also identifies steps that state and local governments, private companies and organizations, and individual Americans can take to improve our collective cybersecurity. The Strategy highlights the role of public-private engagement. The document provides a framework for the contributions that we all can make to secure our parts of cyberspace. The dynamics of cyberspace will require adjustments and amendments to the Strategy over time.

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Information Security Policy Policy Title Information Security Policy  

E-Print Network [OSTI]

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

262

China's Global Oil Strategy  

E-Print Network [OSTI]

capability to secure oil transport security. Additionally,international oil agreements: 1) ensuring energy security;security, and many argue that as the second-largest consumer of oil

Thomas, Bryan G

2009-01-01T23:59:59.000Z

263

Personal Security Assistance for Secure Internet Commerce  

E-Print Network [OSTI]

Jansson Swedish Institute of Computer Science Box 1263, S-164 28 Kista, Sweden ara@sics.se, sverker visiting your computer. Current agent security approaches are often based on trust in an ex- ternal assigned correct access-restrictions. We argue that a more rewarding security policy is to grant

Janson, Sverker

264

Cyber Security Evaluations - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

265

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

266

Office of Information Security  

Broader source: Energy.gov [DOE]

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

267

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

268

Center for Environment and National Security at Scripps | Open Energy  

Open Energy Info (EERE)

National Security at Scripps National Security at Scripps Jump to: navigation, search Logo: Center for Environment and National Security at Scripps Name Center for Environment and National Security at Scripps Place San Diego, California Website http://sio.ucsd.edu/cens/ References CENS - About[1] LinkedIn Connections Contents 1 Overview 2 Headlines 3 Resources 3.1 CENS Programs 3.2 CENS Tools 4 References Overview Center for Environment and National Security at Scripps is an organization based in San Diego, California. "The Center uses the formidable science and research capacity of Scripps Institution of Oceanography to clarify significant environmental impacts on our national security and international human security, thus bringing information to policy makers for the resolution of society's most pressing

269

Index of Energy Security Risk | Open Energy Information  

Open Energy Info (EERE)

Index of Energy Security Risk Index of Energy Security Risk Jump to: navigation, search Tool Summary Name: Index of Energy Security Risk Agency/Company /Organization: United States Chamber of Commerce, Institute for 21st Century Energy Sector: Energy Focus Area: Non-renewable Energy, Renewable Energy Topics: Co-benefits assessment, - Energy Security Resource Type: Publications Website: www.energyxxi.org/images/Energy_Index_2011_FINAL.pdf Cost: Free Index of Energy Security Risk Screenshot References: Index of Energy Security Risk[1] "This 2011 edition of the Index incorporates the most current energy data, including the Energy Information Administration's (EIA) Annual Energy Outlook 2011 (AEO 2011), to provide an up-to-date assessment of the trends having the greatest impact on energy security since the first Index was

270

US National Nuclear Security Administration NNSA | Open Energy Information  

Open Energy Info (EERE)

Nuclear Security Administration NNSA Nuclear Security Administration NNSA Jump to: navigation, search Name US National Nuclear Security Administration (NNSA) Place Washington, DC Zip 20585 Product Washington D.C.-based nuclear body established by the United States Congress as a separately organized agency within the US Department of Energy. References US National Nuclear Security Administration (NNSA)[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. US National Nuclear Security Administration (NNSA) is a company located in Washington, DC . References ↑ "US National Nuclear Security Administration (NNSA)" Retrieved from "http://en.openei.org/w/index.php?title=US_National_Nuclear_Security_Administration_NNSA&oldid=352617

271

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

272

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

273

Security Scheme in Wireless Grid  

Science Journals Connector (OSTI)

In this paper, we considered the two security services of authorization and data security in wireless Grid. The security issues is related to authorization and security, specific to Grid, the characteristics of t...

Yue Hong Zhang; Li Hao; Zhong Shan Yang

2011-01-01T23:59:59.000Z

274

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

275

Information Security Guide  

E-Print Network [OSTI]

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

276

Chapter_8_Opertions_Security_Program  

Broader source: Energy.gov (indexed) [DOE]

Operations Security Program Operations Security Program This chapter covers the OPSEC Program in place at DOE HQ to fulfill the requirements of DOE Order 471.6, Section 4.f, Information Security Manual. The OPSEC Program seeks to assist HQ Elements in identifying and protecting Critical Information (CI) from inadvertent or unauthorized disclosure and in protecting classified matter. CI includes those classified or sensitive unclassified areas, activities, functions, data, or information about an activity or organization deemed sufficiently important to be protected from an adversary. CI, when disclosed without proper authorization, has detrimental impact on national security and or departmental operations. Examples of CI that must be protected are personnel files, proposal and contract documents, or financial data regarding a project. CI is

277

National Security Technology Incubator Operations Plan  

SciTech Connect (OSTI)

This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

None

2008-04-30T23:59:59.000Z

278

ORAU: National Security and Emergency Management Fact Sheet  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security and Emergency National Security and Emergency Management Services ORAU works with federal, state and local agencies to enhance emergency management planning and integrate their efforts to respond effectively to terrorism, natural disasters and other hazards. Our experienced team helps organizations identify and correct readiness gaps to strengthen their response plans.

279

Invited Paper New Frontiers of Network Security: The Threat Within  

E-Print Network [OSTI]

Invited Paper New Frontiers of Network Security: The Threat Within Sugata Sanyal1 , Ajit Shelat2% of information security threats originate from inside the organization. The instances of insider threats have. The Insider threats are generally caused by current or ex-employees, contractors or partners, who have

Sanyal, Sugata

280

A Secure Processor Architecture for Encrypted Computation on Untrusted Programs  

E-Print Network [OSTI]

A Secure Processor Architecture for Encrypted Computation on Untrusted Programs Christopher Descriptors C.1.0 [Computer Systems Organization]: Processor architectures--General; C.0 [Computer Systems Organiza- tion]: General--Modeling of computer architecture; E.3 [Data]: Data Encryption Keywords Secure

Gifford, David K.

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

On Data Provenance in Group-centric Secure Collaboration  

E-Print Network [OSTI]

On Data Provenance in Group-centric Secure Collaboration Jaehong Park, Dang Nguyen and Ravi Sandhu.sandhu@utsa.edu Abstract--In this paper, we explore data provenance in a group-centric secure collaboration environment of their organizations. By utilizing data provenance in group collaboration environment, we can provide the participating

Sandhu, Ravi

282

Next Generation National Security Leaders  

SciTech Connect (OSTI)

It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had right-sized the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community or it may lie in more effectively using our existing resources and training programs.

Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

2012-07-19T23:59:59.000Z

283

Lemnos Interoperable Security Program  

Broader source: Energy.gov (indexed) [DOE]

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

284

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

285

Energy Crossroads: Global Climate Change | Environmental Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Climate Change Global Climate Change Suggest a Listing Best Global Warming Articles Global Warming Articles provides facts about the causes, effects and answers to global warming; the environment; energy conservation, climate change and more. Ecolytics As emissions requirements, climate change, financial markets, and risk management become increasingly interconnected, organizations are left with critical choices regarding greenhouse gas (GHG) emissions management. Ecolytics(tm), a comprehensive web-based software tool, can help organizations in the navigation of this complex area by providing an effective cataloging, strategic planning, economic analysis, and risk management solution. Enviro$en$e Funded by the Environmental Protection Agency and the Strategic

286

5 - Marketing the Security Program to the Business  

Science Journals Connector (OSTI)

This chapter covers marketing a security program within an organization, with special focus on brand recognition, mission statement, policies, and procedures. Coverage also includes the primary business objectives and appropriate practices.

2014-01-01T23:59:59.000Z

287

Office of Heath, Safety and Security Now Two New Offices  

Broader source: Energy.gov [DOE]

To serve you better, DOE has structured the former HSS into to new organizations: the Office Independent Enterprise Assessment (IEA); and Office of Environment, Health, Safety and Security (EHSS).

288

Global Forest Resource Assessment | Open Energy Information  

Open Energy Info (EERE)

Global Forest Resource Assessment Global Forest Resource Assessment Jump to: navigation, search Tool Summary Name: Global Forest Resource Assessment Agency/Company /Organization: Food and Agriculture Organization of the United Nations Sector: Land Focus Area: Forestry Topics: Resource assessment Resource Type: Publications Website: www.fao.org/forestry/fra/fra2010/en/ Global Forest Resource Assessment Screenshot References: Global Forest Research Assessment[1] Overview "FAO, in cooperation with its member countries, has monitored the world's forests at 5 to 10 year intervals since 1946. These global assessments provide valuable information to policy-makers in countries, to international negotiations, arrangements and organizations related to forests and to the general public. The Global Forest Resources Assessment

289

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

290

Global Threat Reduction Initiative  

Broader source: Energy.gov (indexed) [DOE]

comprehensive comprehensive strategy to prevent nuclear terrorism; and  The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other acts of terrorism Protect high priority nuclear and radiological materials from theft and sabotage These efforts result in threat reduction by improving security on the bomb material remaining at civilian sites - each vulnerable building that is protected reduces the risk until a permanent threat reduction solution can be implemented.

291

Safeguards and Security and Cyber Security RM  

Broader source: Energy.gov (indexed) [DOE]

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

292

Space security through the transatlantic partnership  

Science Journals Connector (OSTI)

On 1214 June 2011, a conference was convened in Prague entitled Space Security through the Transatlantic Partnership, co-sponsored by the European Space Policy Institute (ESPI) and the Prague Security Studies Institute (PSSI). It was the first non-governmental transatlantic conference of its kind dedicated to this topic, attended by over 100 senior space policy officials and high-level representatives of multilateral institutions, NGOs, academia, and industry from Europe, the USA, and Japan. The overarching goal of the conference was to solicit and assess both converging and diverging views on the multifaceted subject of space security and to seek to establish an on-going Track II non-governmental process designed to assist with the crafting of a future architecture for the management of this key dimension of space policy on a trilateral, and eventually global, basis. This report summarizes the proceedings.

Jana Robinson

2012-01-01T23:59:59.000Z

293

Report on a Working Session on Security in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Report on a Working Session on Security in Wireless Ad Hoc Networks Levente Butty´an Jean organized a working session de- voted to the topic of security in wireless ad hoc networks. This event took setting. Securing wireless ad hoc networks is particularly diffi- cult for many reasons including

Chen, Yuanzhu Peter

294

Supporting Secure Ad-hoc User Collaboration in Grid Environments Markus Lorch, Dennis Kafura  

E-Print Network [OSTI]

Supporting Secure Ad-hoc User Collaboration in Grid Environments Markus Lorch, Dennis Kafura is a key requirement. Current grid security mechanisms support individual users who are members of well-defined virtual organizations. Recent research seeks to provide manageable grid security services for self

Kafura, Dennis

295

November 2012 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

2 | National Nuclear Security Administration 2 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > November 2012 November 2012 NNSA Blog NNSA's Global Threat Reduction Initiative launches mobile app Posted By Office of Public Affairs NNSA's Global Threat Reduction Initiative (GTRI) recently launched a project management mobile app for both Google's Android and Apple's

296

Global Health: Disease Eradication  

Science Journals Connector (OSTI)

...have been considered as potential candidates for eradication, but the World Health Organization (WHO) has targeted only two other diseases for global eradication after smallpox. In 1986, WHO's policymaking body, the World Health Assembly, adopted the elimination of dracunculiasis (guinea worm disease)... The most cost-effective intervention for certain infectious diseases is to eliminate them entirely. This article reviews the characteristics of potentially eradicable diseases and surveys current eradication methods.

Hopkins D.R.

2013-01-03T23:59:59.000Z

297

Secretary Bodman Travels to Russia to Advance Energy Security | Department  

Broader source: Energy.gov (indexed) [DOE]

Russia to Advance Energy Security Russia to Advance Energy Security Secretary Bodman Travels to Russia to Advance Energy Security March 15, 2006 - 12:20pm Addthis Promotes Transparent Markets and Clean Energy Technologies; Participates in G8 Energy Ministerial and Delivers Remarks on the Global Nuclear Energy Partnership MOSCOW, RUSSIA-U.S. Secretary of Energy Samuel W. Bodman today began a two-day visit to Russia where he will lead the U.S. delegation to the G8 Energy Ministerial. During his visit the Secretary will promote greater energy security through the use of advanced energy technologies, the promotion of stable and transparent investment climates, and increased conservation and energy efficiency. Secretary Bodman will also deliver remarks to the Carnegie Center on the Global Nuclear Energy Partnership

298

Organization of American States (OAS) Feed | Open Energy Information  

Open Energy Info (EERE)

Organization of American States (OAS) Feed Organization of American States (OAS) Feed Jump to: navigation, search Home | About | Inventory | Partnerships | Capacity Building | Webinars | Reports | Events | News | List Serve CLEAN Member Feeds Center for Environment and National Security at Scripps Centro de Energías Renovables (CER) The Children's Investment Fund Foundation (CIFF) Climate and Development Knowledge Network (CDKN) Climate Technology Initiative (CTI) ClimateWorks Foundation Coalition for Rainforest Nations (CfRN) Ecofys Energy Research Centre of the Netherlands (ECN) Energy Sector Management Assistance Program of the World Bank (ESMAP) Environment and Development Action in the Third World (ENDA-TM) German Aerospace Center (DLR) German Agency for International Cooperation (GIZ) Global Village Energy Partnership (GVEP)

299

Latin America Energy Organization Feed | Open Energy Information  

Open Energy Info (EERE)

Latin America Energy Organization Feed Latin America Energy Organization Feed Jump to: navigation, search Home | About | Inventory | Partnerships | Capacity Building | Webinars | Reports | Events | News | List Serve CLEAN Member Feeds Center for Environment and National Security at Scripps Centro de Energías Renovables (CER) The Children's Investment Fund Foundation (CIFF) Climate and Development Knowledge Network (CDKN) Climate Technology Initiative (CTI) ClimateWorks Foundation Coalition for Rainforest Nations (CfRN) Ecofys Energy Research Centre of the Netherlands (ECN) Energy Sector Management Assistance Program of the World Bank (ESMAP) Environment and Development Action in the Third World (ENDA-TM) German Aerospace Center (DLR) German Agency for International Cooperation (GIZ) Global Village Energy Partnership (GVEP)

300

The international security yearbook 1983-1984  

SciTech Connect (OSTI)

A bipartisan study by eight former high-ranking officials including James R. Schlesinger, Edmund Muskie, Maxwell Taylor, and R. James Woolsey, providing an assessment of how global events have affected US defense and foreign policy interests. Topics addressed include the US-Soviet strategic and conventional weapons balance; regional threats to Western security in Latin America, the Persian Gulf, Southern Africa, and the Middle East; and significant scientific developments affecting nuclear proliferation and conventional armaments.

Blechman, B.M.; Luttwak, E.N.

1984-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

302

Waste Isolation Pilot Plant Transportation Security | Department...  

Office of Environmental Management (EM)

Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security More Documents &...

303

SECURITY TERMINATION STATEMENT | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

304

Office of Security Operations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

305

Security and Privacy Notice  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

306

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

307

Security Topic Group  

Broader source: Energy.gov (indexed) [DOE]

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

308

Interactions Between Energy Security and Climate Change: A Focus on  

Open Energy Info (EERE)

Interactions Between Energy Security and Climate Change: A Focus on Interactions Between Energy Security and Climate Change: A Focus on Developing Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Interactions Between Energy Security and Climate Change: A Focus on Developing Countries Agency/Company /Organization: Morgan Bazilian, Benjamin F. Hobbs, Will Blyth, Iain MacGill, Mark Howells Partner: Energy Policy Sector: Energy, Climate Topics: Co-benefits assessment, - Energy Security Resource Type: Publications Website: www.sciencedirect.com/science?_ob=MImg&_imagekey=B6V2W-52SN633-5-1&_cd Cost: Free Interactions Between Energy Security and Climate Change: A Focus on Developing Countries Screenshot References: Interactions Between Energy Security and Climate Change: A Focus on Developing Countries[1]

309

World Institute for Nuclear Security Launch | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

World Institute for Nuclear Security Launch World Institute for Nuclear Security Launch World Institute for Nuclear Security Launch September 29, 2008 - 3:43pm Addthis Remarks as Prepared for Secretary Bodman Thank you. My thanks to Director General El Baradei and Senator Nunn for their opening remarks. I am pleased to be here with you this afternoon. Each nation has the responsibility to assist in the effort to make nuclear materials and facilities secure. This means we need cooperation at every level and every stage of the process: from government, to industry, to non-governmental organizations. As such, the World Institute for Nuclear Security will make an important contribution to the cause of nuclear nonproliferation and nuclear security. By bringing the private, public, and non-governmental sectors together,

310

World Institute for Nuclear Security Launch | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Institute for Nuclear Security Launch Institute for Nuclear Security Launch World Institute for Nuclear Security Launch September 29, 2008 - 3:43pm Addthis Remarks as Prepared for Secretary Bodman Thank you. My thanks to Director General El Baradei and Senator Nunn for their opening remarks. I am pleased to be here with you this afternoon. Each nation has the responsibility to assist in the effort to make nuclear materials and facilities secure. This means we need cooperation at every level and every stage of the process: from government, to industry, to non-governmental organizations. As such, the World Institute for Nuclear Security will make an important contribution to the cause of nuclear nonproliferation and nuclear security. By bringing the private, public, and non-governmental sectors together,

311

Help for the Developers of Control System Cyber Security Standards  

SciTech Connect (OSTI)

A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

Robert P. Evans

2008-05-01T23:59:59.000Z

312

Operational Security (OPSEC) Reminder | Department of Energy  

Office of Environmental Management (EM)

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

313

US, UK, Kazakhstan Secure Radiological Transportation Vehicles...  

National Nuclear Security Administration (NNSA)

place them in secure storage, and improve radiological transportation security and site security. The United Kingdom-funded projects provide an immediate security and safety...

314

College of Safety & Security | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Safety & Security College of Safety & Security College of Safety & Security Mission Through the National Training Center (NTC), the Office of Health, Safety and Security (HSS)...

315

Office of Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Office of Security Mission The Office of Security maintains the Department of Energy's security integrity through the development and promulgation of safeguards and...

316

Safeguards and Security Program - DOE Directives, Delegations...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

70.1A, Safeguards and Security Program by jcowden Functional areas: Safeguards, Security, and Emergency Management, Safety and Security The Safeguards and Security Program ensures...

317

Office of Security Enforcement | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Enforcement Office of Security Enforcement MISSION The Office of Security Enforcement implements the Department's classified information security enforcement program in...

318

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

319

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

320

Industrial and Grid Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial and Grid Security Establishing resilient infrastructures that operate when sensors and physical assets are perturbed is an important national objective. Two related LDRD...

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of...

322

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

323

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

324

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

325

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

326

GTRI commended for work to secure radiological sources | National Nuclear  

National Nuclear Security Administration (NNSA)

GTRI commended for work to secure radiological sources | National Nuclear GTRI commended for work to secure radiological sources | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > GTRI commended for work to secure radiological sources GTRI commended for work to secure radiological sources Posted By Office of Public Affairs Container NNSA's Global Threat Reduction Initiative (GTRI) was recently commended

327

GTRI commended for work to secure radiological sources | National Nuclear  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

GTRI commended for work to secure radiological sources | National Nuclear GTRI commended for work to secure radiological sources | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > GTRI commended for work to secure radiological sources GTRI commended for work to secure radiological sources Posted By Office of Public Affairs Container NNSA's Global Threat Reduction Initiative (GTRI) was recently commended

328

LONDON'S GLOBAL UNIVERSITY THE GRAND CHALLENGE OF  

E-Print Network [OSTI]

is under threat from social tension, pollution and climate change. The prospect of global peace and Capacity-Building 11 ­ 14 / Health Effects of Climate Change 15 ­ 16 / Maternal and Child Health 17 ­ 22 security to health informatics and environmental law ­ our world-leading researchers apply their insight

Saunders, Mark

329

2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

330

Introduction to Global Health IT Strategies and Applications Minitrack  

Science Journals Connector (OSTI)

The global proliferation of information and communication technologies, along with improved mobile computing accessibility, enhanced security and cloud-based data exchanges have germinated interests in those seeking to apply existing and emerging information ... Keywords: global health, healthcare systems, health IT

Joseph Tan; Michael S. Dohan; Sarah Patrick

2014-01-01T23:59:59.000Z

331

Foiling the Flu Bug Global Partnerships for Nuclear Energy  

E-Print Network [OSTI]

1 1663 Foiling the Flu Bug Global Partnerships for Nuclear Energy Dark Universe Mysteries WILL NOT NEED TESTING Expanding Nuclear Energy the Right Way GLOBAL PARTNERSHIPS AND AN ADVANCED FUEL CYCLE sense.The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy

332

Think Green Global Inc | Open Energy Information  

Open Energy Info (EERE)

Think Green Global Inc Think Green Global Inc Jump to: navigation, search Name Think Green Global, Inc. Place New York, New York Zip 10010 Sector Renewable Energy Product New York-based investment bank and strategic development firm that is dedicated to enhancing the growth of renewable energy and clean technology companies. References Think Green Global, Inc.[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Think Green Global, Inc. is a company located in New York, New York . References ↑ "Think Green Global, Inc." Retrieved from "http://en.openei.org/w/index.php?title=Think_Green_Global_Inc&oldid=352225" Categories: Clean Energy Organizations Companies Organizations

333

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

334

Security Assistance | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

335

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

336

A secure mHealth application for EMS: design and implementation  

Science Journals Connector (OSTI)

Healthcare organizations are looking to implement mobile health applications that significantly improve healthcare delivery, yet adhere to existing health information privacy and security rules and regulations. However, these same organizations are struggling ... Keywords: HIPAA, emergency medical services, mHealth, mobile health, security

Abdullah Murad; Benjamin Schooley; Yousef Abed

2013-11-01T23:59:59.000Z

337

SP 800-44 Version 2. Guidelines on Securing Public Web Servers  

Science Journals Connector (OSTI)

Web servers are often the most targeted and attacked hosts on organizations' networks. As a result, it is essential to secure Web servers and the network infrastructure that supports them. This document is intended to assist organizations in installing, ... Keywords: Web server, Web server security

Miles Tracy; Wayne Jansen; Karen A. Scarfone; Theodore Winograd

2007-09-01T23:59:59.000Z

338

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

339

Secure video communications system  

DOE Patents [OSTI]

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

340

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

342

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

343

PRIVACY/SECURITY NOTICE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

344

Securing Control Systems Modems  

Broader source: Energy.gov (indexed) [DOE]

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

345

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

346

Achieving food and environmental security: new approaches to close the gap  

Science Journals Connector (OSTI)

...discourse about global sustainability [10]. Nine interlinked...for humanity. Three of these (biodiversity...addresses all the pillars of food security...1990s, one in three of the population...to agricultural sustainability, by protecting...

2014-01-01T23:59:59.000Z

347

Secretary Bodman Meets with Global Energy Ministers at the International  

Broader source: Energy.gov (indexed) [DOE]

Global Energy Ministers at the Global Energy Ministers at the International Energy Forum in Qatar Secretary Bodman Meets with Global Energy Ministers at the International Energy Forum in Qatar April 24, 2006 - 10:25am Addthis Bodman emphasizes the need for international cooperation to improve global energy security DOHA, QATAR - U.S. Secretary of Energy Samuel W. Bodman attended the 10th International Energy Forum (IEF) in Doha, Qatar, today to discuss the need for international efforts to increase individual and global energy security and encourage market stability. Energy Ministers from the world's major producing and consuming nations were in attendance at the meeting taking place April 23-24, 2006. "In order to sustain the strong global economic growth we've seen in recent years, consumers and producers must work together to encourage transparency

348

Detecting and Mitigating Security Risks  

E-Print Network [OSTI]

______________________________________________________________________________________________________ 2 Introduction IT security threats are multiplying quickly. One reason is that sophisticated hacking. Second, while hacking once largely constituted an intellectual exercise for security enthusiasts, hacking

Fisher, Kathleen

349

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

350

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

351

January 2007 SECURITY CONTROLS FOR  

E-Print Network [OSTI]

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

352

Headquarters Facilities Master Security Plan  

Office of Environmental Management (EM)

Chapter 10-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: Title 32, CFR, Part 2001,...

353

Security and Privacy Notices | NREL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notices Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory...

354

Security Suites | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

355

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SNL SECURITY CONTACTS SNLNM Contacts SNLCA Contacts Function Contact Email Telephone Badge Office 505-284-3626 - Escorting security@sandia.gov 505-845-1321 Classification...

356

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

357

287 Security Blunders You Should Avoid  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Blunders ! Security Blunders ! You Should Avoid" Jon S. Warner, Ph.D. Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Argonne National Laboratory 630-252-6168 rogerj@anl.gov http://www.ne.anl.gov/capabilities/vat Presentation for the ASIS International Annual Meeting! Anaheim, CA, September 21-24, 2009! Sponsors! *! DHS! *! DoD! *! DOS! *! IAEA! *! Euratom! *! DOE/NNSA! *! private companies! *! intelligence agencies! *! public interest organizations! The VAT has done detailed ! vulnerability assessments on! hundreds of different security! devices, systems, & programs.! Vulnerability Assessment Team (VAT)" The greatest of faults, I should say, is to be conscious of none. -- Thomas Carlyle (1795-1881) A multi-disciplinary team of physicists,

358

Contact List, Security Operations, Laboratory Protection Division,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Homepage Homepage Points of Contact Organization Chart (pdf) Groups Emergency Services Emergency Management Security Operations BNL Site Access Main Gate Access Forms Contact List When Outside the Laboratory: Precede Phone numbers with 631 344-xxxx Description Name Email Ext Division Manager M. Pena mpena@bnl.gov 7759 Security Operations Manager L. Butera lbutera@bnl.gov 4691 Police Chief S. Mc Cune mccune@bnl.gov 5656 Police Group Police Supervisors Police Supervisors@bnl.gov 2235 Senior Administrative Assistant M. Markstaller markstaller@bnl.gov 2280 Personnel and Information Security Group C. Mauro V. Feldman S. Krsnak K. Lucadamo A. Wund cmauro@bnl.gov vfeldman@bnl.gov krsnak@bnl.gov lucadamo@bnl.gov awund@bnl.gov 5524 4271 5690 2596 4656 Visitor Notifications V. Feldman

359

NNSA Timeline | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Timeline | National Nuclear Security Administration Timeline | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NNSA Timeline Home > About Us > Our History > NNSA Timeline NNSA Timeline The NNSA was established by Congress in 2000 as a separately organized agency within the U.S. Department of Energy, responsible for the management and security of the nation's nuclear weapons, nuclear nonproliferation,

360

Our History | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

History | National Nuclear Security Administration History | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Our History Home > About Us > Our History Our History The NNSA was established by Congress in 2000 as a separately organized agency within the U.S. Department of Energy, responsible for the management and security of the nation's nuclear weapons, nuclear nonproliferation,

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Global Paradox  

Science Journals Connector (OSTI)

From the Publisher:In the tradition of his bestselling Megatrends books, John Naisbitt explores the new wave of global economic change predicted as a result of the breaking apart of the Soviet empire--and the opportunities and challenges for nations, ...

John Naisbitt

1994-12-01T23:59:59.000Z

362

The Resilient Economy: Integrating Competitiveness and Security  

SciTech Connect (OSTI)

Globalization, technological complexity, interdependence, terrorism, climate and energy volatility, and pandemic potential are increasing the level of risk that societies and organizations now face. Risks also are increasingly interrelated; disruptions in one area can cascade in multiple directions. The ability to manage emerging risks, anticipate the interactions between different types of risk, and bounce back from disruption will be a competitive differentiator for companies and countries alike in the 21st century. What Policymakers Should Know The national objective is not just homeland protection, but economic resilience: the ability to mitigate and recover quickly from disruption. Businesses must root the case for investment in resilience strategies to manage a spectrum of risks, not just catastrophic ones. Making a business case for investment in defenses against low-probability events (even those with high impact) is difficult. However, making a business case for investments that assure business continuity and shareholder value is not a heavy lift. There are an infinite number of disruption scenarios, but only a finite number of outcomes. Leading organizations do not manage specific scenarios, rather they create the agility and flexibility to cope with turbulent situations. The investments and contingency plans these leading companies make to manage a spectrum of risk create a capability to respond to high-impact disasters as well. Government regulations tend to stovepipe different types of risk, which impedes companies abilities to manage risk in an integrated way. Policies to strengthen risk management capabilities would serve both security and competitiveness goals. What CEOs and Boards Should Know Operational risks are growing rapidly and outpacing many companies abilities to manage them. Corporate leadership has historically viewed operational risk management as a back office control function. But managing operational risks increasingly affects real-time financial performance. The 835 companies that announced a supply chain disruption between 1989 and 2000 experienced 33 percent to 40 percent lower stock returns than their industry peers. Twenty-five percent of companies that experienced an IT outage of two to six days went bankrupt immediately. Ninety-three percent of companies that lost their data center for 10 days or more filed for bankruptcy within a year.

Debbie van Opstal

2009-01-07T23:59:59.000Z

363

Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program  

SciTech Connect (OSTI)

The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

2009-10-19T23:59:59.000Z

364

NNSA Launches Global Threat Reduction Initiative | National Nuclear  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Threat Reduction Initiative | National Nuclear Global Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Launches Global Threat Reduction Initiative NNSA Launches Global Threat Reduction Initiative May 26, 2004 Vienna, Austria NNSA Launches Global Threat Reduction Initiative

365

NNSA Launches Global Threat Reduction Initiative | National Nuclear  

National Nuclear Security Administration (NNSA)

Global Threat Reduction Initiative | National Nuclear Global Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Launches Global Threat Reduction Initiative NNSA Launches Global Threat Reduction Initiative May 26, 2004 Vienna, Austria NNSA Launches Global Threat Reduction Initiative

366

Privacy/Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

367

Joint Global Change Research Institute | Open Energy Information  

Open Energy Info (EERE)

Global Change Research Institute Global Change Research Institute Jump to: navigation, search Logo: Joint Global Change Research Institute Name Joint Global Change Research Institute Agency/Company /Organization Pacific Northwest National Laboratory Sector Energy, Land Focus Area Energy Efficiency Topics Policies/deployment programs, Resource assessment, Pathways analysis Website http://www.globalchange.umd.ed References Global Change Research Institute [1] Abstract The Joint Global Change Research Institute (JGCRI) houses an interdisciplinary team dedicated to understanding the problems of global climate change and their potential solutions. Joint Institute staff bring decades of experience and expertise to bear in science, technology, economics, and policy. "The Joint Global Change Research Institute (JGCRI) houses an

368

The climate change and energy security nexus  

SciTech Connect (OSTI)

The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategic Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.

King, Marcus Dubois [George Washington University; Gulledge, Jay [ORNL

2013-01-01T23:59:59.000Z

369

Security in Service?oriented Grid  

Science Journals Connector (OSTI)

Service?oriented architecture (SOA) is the most common used approach for building architectural decisions of a system. SOA is an architectural model for developing reliable distributed systems which functionality is provided as services. Features from this approach are services interoperability loose?coupling reusability and discoverability. Grid is a new technology for using computers network and devices. The Grid is infrastructure for coordinate use of distributed resources shared by different institutes computational centers and organizations. Grid is dynamic and heterogeneous system beyond any institutional or organization boundaries. Considering this the development and integration of Gird application in such dynamic and heterogeneous environment is a great challenge. Something more developing of Grid application is still tightly related with the underlying middleware and its security. Service?oriented Grids are one step further in integration of Grid application because of the SOA features. These benefits from Grid and SOA however will require and new security approaches for building application. In this article we will briefly describe some known security approaches in SOA and Grid and how they are applied in security models of two well known service?oriented grid architecturesOGSA and EGA.

R. Goranova

2008-01-01T23:59:59.000Z

370

National Security Information Systems (NSIS) -National Security Systems &  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

371

Global Health Research | 2 Global Health Research  

E-Print Network [OSTI]

Global Health Research | 2 Global Health Research Supporting researchers in low- and middle-income countries to carry out health- related research within their own countries. Gl bal Health #12;3 | Global Health Research #12;Global Health Research | 4 We are a global charitable foundation dedicated

Rambaut, Andrew

372

2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

373

2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

374

Information Security: Coordination of Federal Cyber Security Research and  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

375

Global Predictions  

E-Print Network [OSTI]

created every day by the lab and used by the forest service, county commissioners and others. Using computer technology and satellites, the lab currently focuses on three core spatial technologies? GIS, global positioning systems (GPS) and remote...,? said Srinivasan. The lab also uses GPS, a satellite navigation system useful for surveying property boundaries and fields. GPS uses satellites to locate and track any feature on Earth at any given time. The lab is using GPS in identifying the Corps...

Swyden, Courtney

2006-01-01T23:59:59.000Z

376

Office of Headquarters Security Operations | Department of Energy  

Office of Environmental Management (EM)

Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting...

377

Contact Us | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Contact Us Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Institutional Research & Development > Contact Us Contact Us Above Image: Fission neutrons can be distinguished from background radiation using a novel variation of a metal-organic framework (MOF) scintillator that was a new class of scintillator previously patented by Sandia: Crystals of a metal organic framework (left) emit light in the blue (middle) when exposed to ionizing radiation. Infiltrating them with an organometallic compound causes the crystals to emit red light as well (right), creating a new way to differentiate fission neutrons from

378

Headquarters Security Quick Reference Book  

Broader source: Energy.gov [DOE]

This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

379

November 2003 NETWORK SECURITY TESTING  

E-Print Network [OSTI]

November 2003 NETWORK SECURITY TESTING Shirley M. Radack, Editor, Computer Security Division be tempted to neglect or insufficiently develop a comprehensive and systematic opera tional security testing program. This guide stresses the need for an effective security testing program within federal agencies

380

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Bioenergy and Food Security Criteria and Indicators (BEFSCI) Website | Open  

Open Energy Info (EERE)

Bioenergy and Food Security Criteria and Indicators (BEFSCI) Website Bioenergy and Food Security Criteria and Indicators (BEFSCI) Website Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Bioenergy and Food Security Criteria and Indicators (BEFSCI) Website Focus Area: Other Biofuels Topics: Training Material Website: www.fao.org/bioenergy/foodsecurity/befsci/en/ Equivalent URI: cleanenergysolutions.org/content/bioenergy-and-food-security-criteria- Language: English Policies: Deployment Programs DeploymentPrograms: Technical Assistance This website-created by the Bioenergy and food Security project of the Food and Agriculture Organization of the United Nations (FAO)-provides policymakers and practitioners a set of criteria, indicators, good practices, and policy options for sustainable bioenergy production to

382

Renewable-Based Energy Secure Communities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Renewable-Based Energy Secure Communities Renewable-Based Energy Secure Communities Renewable-Based Energy Secure Communities U.S. Department of Energy (DOE) Community Renewable Energy Deployment (CommRE) projects receive financial assistance and support from numerous federal and state agencies and partnering organizations. The University of California at Davis CommRE project is not only being funded by DOE, but also by the California Energy Commission's (CEC) Renewable-Based Energy Secure Communities (RESCO) program. Below are summaries of select RESCO projects and links to additional information. About Renewable-Based Energy Secure Communities RESCO projects are funded by the CEC's Public Interest Energy Research (PIER) Program, which supports public interest energy research, development, and demonstration. The goal of RESCO is to develop and

383

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines |  

Broader source: Energy.gov (indexed) [DOE]

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines September 2, 2010 - 3:15pm Addthis WASHINGTON, D.C. - The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats. The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set

384

National Security, Weapons Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

385

Requirements for security signalling  

SciTech Connect (OSTI)

There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

Pierson, L.G.; Tarman, T.D.

1995-02-05T23:59:59.000Z

386

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, cancels DOE O 470.4B.

2011-07-21T23:59:59.000Z

387

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

388

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

389

GRID Security Review  

Science Journals Connector (OSTI)

A Computational GRID is a collection of heterogeneous computing resources ... computational power of current micro-processors, Computational GRIDs or meta-systems have gradually become more ... a secure environme...

Lazaros Gymnopoulos; Stelios Dritsas; Stefanos Gritzalis

2003-01-01T23:59:59.000Z

390

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

391

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

392

defense nuclear security  

National Nuclear Security Administration (NNSA)

3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

Page...

393

Nuclear Energy & Energy Security  

Science Journals Connector (OSTI)

Safety issues related to use of nuclear energy and secure operation of nuclear installations are mail stones of great importance. Although none of technologies producing energy are absolutely safe it is obvious t...

Jumber Mamasakhlisi

2010-01-01T23:59:59.000Z

394

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

395

Global Power Solutions LLC | Open Energy Information  

Open Energy Info (EERE)

Power Solutions LLC Power Solutions LLC Jump to: navigation, search Name Global Power Solutions LLC Place Colorado Zip CO 80401 Sector Geothermal energy Product String representation "Global Power So ... sition support." is too long. References Global Power Solutions LLC[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Global Power Solutions LLC is a company located in Colorado . References ↑ "Global Power Solutions LLC" Retrieved from "http://en.openei.org/w/index.php?title=Global_Power_Solutions_LLC&oldid=345917" Categories: Clean Energy Organizations Companies Organizations Stubs What links here Related changes Special pages Printable version Permanent link

396

Review: Global Climate Change  

E-Print Network [OSTI]

introduction to global climate change, the greenhouseReview: Global Climate Change: A Primer By Orrin H PilkeyPilkey, Keith C. Global Climate Change: a primer. Durham,

Smith, Jennifer

2013-01-01T23:59:59.000Z

397

Nevada National Security Site - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

398

Framework for SCADA Security Policy  

Broader source: Energy.gov (indexed) [DOE]

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

399

Incidents of Security Concern  

Broader source: Energy.gov (indexed) [DOE]

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

400

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Meeting Energy Needs in Brazil |GE Global Research  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brazil Looking a Decade Ahead: Electrical Power Generation in Brazil Ricardo Hernandez Pereira 2014.11.03 In the Bioenergy Systems Organization at GE Global Research - Rio de...

402

Security systems engineering overview  

SciTech Connect (OSTI)

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

403

Argonne Team Challenges Physical Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

404

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

405

Ant-Based Cyber Security  

SciTech Connect (OSTI)

We describe a swarming-agent-based, mixed-initiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem by sharing insights and solutions without violating proprietary boundaries. The system places human administrators at the appropriate level where they provide system guidance while lower-level agents carry out tasks humans are unable to perform quickly enough to mitigate todays security threats. Cooperative Infrastructure Defense (CID) uses our ant-based approach to enable dialogue between humans and agents to foster a collaborative problem-solving environment, increase human situational awareness and influence using visualization and shared control. We discuss theoretical implementation characteristics along with results from recent proof-of-concept implementations.

Haack, Jereme N.; Fink, Glenn A.; Maiden, Wendy M.; McKinnon, Archibald D.; Templeton, Steven J.; Fulp, Errin W.

2011-07-12T23:59:59.000Z

406

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Broader source: Energy.gov (indexed) [DOE]

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

407

The environment, security and regional cooperation in Central Asia  

Science Journals Connector (OSTI)

Environmental challenges, resulting from either a scarcity of natural resources or environmental degradation, may contribute to security risks in Central Asia. An encouraging sign is the recent attention of the governments of Central Asia, civil society groups and international organizations to these environmental security issues. Their efforts indicate that by working together to prevent conflicts caused by environmental problems, cooperation among the countries of Central Asia may expand. Both short and long-term obstacles must be overcome if these groups are to ensure that environmental stresses do not lead to security concerns.

Douglas L. Tookey

2007-01-01T23:59:59.000Z

408

From Project Sapphire to Today | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

From Project Sapphire to ... From Project Sapphire to ... From Project Sapphire to Today Posted: February 7, 2013 - 6:45pm | Y-12 Report | Volume 9, Issue 2 | 2013 At the 2010 Nuclear Security Summit, President Barack Obama set forth a large-scale effort to aggressively secure the world's vulnerable nuclear material. This effort to reduce the threat of nuclear terrorism was reinforced at the 2012 summit with continued support for the National Nuclear Security Administration's Global Threat Reduction Initiative. But nearly two decades earlier, Y-12 was quietly conducting missions to secure materials from foreign countries with proliferation concerns. In 1994 more than a thousand containers of nuclear material sat in metal racks on the floor in a cold, dilapidated warehouse at the end of a

409

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

410

DOE Issues Energy Sector Cyber Organization NOI  

Broader source: Energy.gov (indexed) [DOE]

Issues National Energy Sector Cyber Organization Notice of Intent Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. The cyber organization is expected to have the knowledge, expertise, capabilities, and capacity, at a minimum to: * Identify and prioritize cyber security research and development issues.

411

global warming's six indias  

E-Print Network [OSTI]

global warming's six indias: An Audience Segmentation Analysis #12;Global Warming's Six Indias 1............................................................................................................................................20 2. Global Warming Beliefs and Attitudes................................................................................ 21 Knowledge about global warming varies widely by group

Haller, Gary L.

412

A systematic review of security requirements engineering  

Science Journals Connector (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

413

Bio-hydrogen production from renewable organic wastes  

SciTech Connect (OSTI)

Methane fermentation has been in practice over a century for the stabilization of high strength organic waste/wastewater. Although methanogenesis is a well established process and methane--the end-product of methanogenesis is a useful energy source; it is a low value end product with relatively less energy content (about 56 kJ energy/g CH{sub 4}). Besides, methane and its combustion by-product are powerful greenhouse gases, and responsible for global climate change. So there is a pressing need to explore alternative environmental technologies that not only stabilize the waste/wastewater but also generate benign high value end products. From this perspective, anaerobic bioconversion of organic wastes to hydrogen gas is an attractive option that achieves both goals. From energy security stand point, generation of hydrogen energy from renewable organic waste/wastewater could substitute non-renewable fossil fuels, over two-third of which is imported from politically unstable countries. Thus, biological hydrogen production from renewable organic waste through dark fermentation represents a critically important area of bioenergy production. This study evaluated both process engineering and microbial physiology of biohydrogen production.

Shihwu Sung

2004-04-30T23:59:59.000Z

414

Deconstructive Globalization: Universalism, Globality, Diversity+  

E-Print Network [OSTI]

University Press, 2000). Double Process Since the late 1980ies, two major processes have been transforming Nations Organization. Korea, Japan and Taiwan were under US control and military protection economy. The deconstruction of the USSR in the late 1980ies and of the 1945 world order since the late

Paris-Sud XI, Université de

415

April 2014 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

416

Sandia National Laboratories: Water Security Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Water Security Program Water Security CustomersPartners Awards Key Publications Staff Biographies Water Security In many areas of the United States and multiple regions of...

417

Integrated safeguards and security management plan  

E-Print Network [OSTI]

LBNL/PUB-3151 INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT76SF00098 iv Integrated Safeguards and Security Managementprovided. Appendix A. Safeguards and Security Plan http://

Bowen editor, Sue

2001-01-01T23:59:59.000Z

418

INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS  

E-Print Network [OSTI]

INFORMATION SECURITY GUIDELINES #12;CONSISTENT, EFFECTIVE INFORMATION SECURITY To respond to societal-to-date information security standards. Should we fail to do so, in the event

Prodiæ, Aleksandar

419

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES Form is used to document travel to sensitive countries. SECURITY...

420

Security, Emergency Planning & Safety Records | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

472.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

422

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

423

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

424

Cyber Security Issues and Requirements  

Broader source: Energy.gov (indexed) [DOE]

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

425

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

426

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

427

Security Clearances; Limitations  

Broader source: Energy.gov (indexed) [DOE]

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

428

The security fallacy: Seven myths about physical security | Argonne  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

429

Security Science: The Theory and Practice of Security  

Science Journals Connector (OSTI)

Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners ...

Clifton Smith; David J Brooks

2012-12-01T23:59:59.000Z

430

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Office of Environmental Management (EM)

can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a...

431

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

432

Our Organization | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Our Organization Our Organization Our Organization Our Organization POWER SYSTEMS ENGINEERING RESEARCH & DEVELOPMENT (PSE R&D) NATIONAL ELECTRICITY DELIVERY DIVISION (NEDD) INFRASTRUCTURE SECURITY & ENERGY RESTORATION (ISER) ENERGY INFRASTRUCTURE MODELING AND ANALYSIS (EIMA) ADVANCED GRID INTEGRATION (AGI) The Power Systems Engineering Research and Development Division is responsible for the development and management of projects for "next generation" electricity delivery technologies and supporting activities to accelerate their introduction to the marketplace. The National Electricity Delivery Division (NEDD) leads the Department's efforts to provide technical assistance to states, regional entities, and tribes to help them develop and improve their programs, policies, and laws that will facilitate the development of reliable and affordable electricity infrastructure. NEDD also authorizes the export of electricity, issues permits for the construction of cross-border transmission lines, and is leading efforts to improve the coordination of Federal transmission permitting on Federal lands. The Infrastructure Security and Energy Restoration Division leads efforts for securing the U.S. energy infrastructure against all hazards, reducing the impact of disruptive events, and responding to and facilitating recovery from energy disruptions, in collaboration with all levels of industry and State and local governments. The Energy Infrastructure Modeling and Analysis Division supports the development of a reliable, secure, resilient, and advanced U.S. energy infrastructure through a range of activities, including electric system modeling, synchrophasor-based tool development, transmission reliability research, reliability assessments, energy security modeling and visualization, and energy infrastructure risk analyses. The Advanced Grid Integration Division leads OE's grid modernization efforts to foster the deployment of smart grid systems and technologies to enhance the reliability, efficiency, and security of the Nation's electric power grid. The Division manages the smart grid investment projects and advances smart grid interoperability and cybersecurity through standards, information exchange and initiatives that increase the efficiency and effectiveness of grid modernization investments.

433

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

434

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

435

Engineering secure software  

E-Print Network [OSTI]

Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style... Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style...

Jetly, Prateek

2012-06-07T23:59:59.000Z

436

Quantum-secured imaging  

E-Print Network [OSTI]

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magaa-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

437

Global Health Leadership and Management  

Science Journals Connector (OSTI)

...obvious and do not build particularly well on Foege's excellent foundation perhaps understandably, because this book charts truly new territory. It must have been difficult to organize such an army of prominent explorers and to keep them marching in the same direction. Editing the book must have been... It is a welcome breath of fresh air to read William H. Foege's preface to Global Health Leadership and Management. He zeroes in on the looming crisis in global public health with a tiger's instinct for the jugular vein. Bridging the huge gap between the ...

MacWilliams K.E.

2005-12-29T23:59:59.000Z

438

Global warming: A Northwest perspective  

SciTech Connect (OSTI)

The Northwest Power Planning Council convened a symposium in Olympia, Washington, on the subject of global climate change ( the greenhouse effect'') and its potential for affecting the Pacific Northwest. The symposium was organized in response to a need by the Power Council to understand global climate change and its potential impacts on resource planning and fish and wildlife planning for the region, as well as a need to understand national policy developing toward climate change and the Pacific Northwest's role in it. 40 figs., 15 tabs.

Scott, M.J.; Counts, C.A. (eds.)

1990-02-01T23:59:59.000Z

439

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...? ? Advanced security methods ? Power analysis for key discovery ? Hardware attacks such as ?decapping? chips ? Developing vulnerability exploits ? Security analysis of smart grid systems & communications ? Reverse engineering ? Penetration testing ? Threat...

Ragsdale, G.

440

Global Institute for Water Security National Hydrology Research Centre  

E-Print Network [OSTI]

for Environment and Sustainability (SENS) at the University of Saskatchewan is seeking a MES (Master in Environmental Sustainability) candidate with experience to help carry out the following project: Widespread to the College of Graduate Studies and Research In addition, the candidate should have: Ability to work

Saskatchewan, University of

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Plant genetics, sustainable agriculture and global food security.  

E-Print Network [OSTI]

three pillars of sustainable agriculture (Committee on the Impact of Biotechnology on Farm-Level Economics and Sustainability

Ronald, Pamela

2011-01-01T23:59:59.000Z

442

Global Institute for Water Security National Hydrology Research Centre  

E-Print Network [OSTI]

) and the School for Environment and Sustainability (SENS) at the University of Saskatchewan is seeking a MES (Master of Environment and Sustainability) candidate with relevant experience to help carry out a large communities concerned with management of the water environment and will involve collaboration with a larger

Saskatchewan, University of

443

MST: Organizations: Organic Materials  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Adhesive Bonding Adhesive Bonding Composites Encapsulation Materials Characterization Mechanical Testing Molding, Thermoforming, & Compounding Organizations Organic Materials Composite-to-metal adhesive bond Experimental/analytical study of composit-to-metal adhesive bond. The Organic Materials department in the Advanced Manufacturing and Processing Laboratory provides innovative prototype fabrication, full service small lot production, materials technology, processing expertise, and a broad range of organic material characterization and mechanical testing techniques. We encapsulate, we join and bond, we foam, we analyze and image, we build composite structures. We strive to make you, our customers, successful! We partner with you to find the right combination of materials, processing, and fixturing that will result in the highest value

444

Organic Vegetable Organic Vegetable  

E-Print Network [OSTI]

marketed separately from conventionally grown produce in order to be profitably sold. Because of the amount of organic material include compost, Purdue University · Cooperative Extension Service · Knowledge to Go

445

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

446

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

447

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

448

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

449

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

450

Automated analysis of security APIs  

E-Print Network [OSTI]

Attacks on security systems within the past decade have revealed that security Application Programming Interfaces (APIs) expose a large and real attack surface but remain to be a relatively unexplored problem. In 2000, ...

Lin, Amerson H

2005-01-01T23:59:59.000Z

451

Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes  

Science Journals Connector (OSTI)

With the rapid development of the global information infrastructure, the use of virtual organization (VO) is gaining increasing importance as a model for studying business and organizational structures. The notio...

Kwok-Yan Lam; Xi-Bin Zhao; Siu-Leung Chung; Ming Gu

2004-01-01T23:59:59.000Z

452

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network [OSTI]

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

453

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

454

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

455

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

456

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

457

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

458

The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation  

SciTech Connect (OSTI)

After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a dirty bomb. In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRIs Russia Orphan Source Recovery Project, managed at the Nevada National Security Sites North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company Isotope has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.

Russell, J. W. [NSTec; Ahumada, A. D. [NSTec; Blanchard, T. A. [NNSA

2012-06-04T23:59:59.000Z

459

Transmission Line Security Monitor  

SciTech Connect (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2011-01-01T23:59:59.000Z

460

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

462

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

463

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

464

Mac Security Bible  

Science Journals Connector (OSTI)

Your essential, no-holds-barred guide to Mac security threats and solutions Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely ...

Joe Kissell

2010-01-01T23:59:59.000Z

465

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

466

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

467

MIT Joint Program on the Science and Policy of Global Change  

E-Print Network [OSTI]

MIT Joint Program on the Science and Policy of Global Change Future United States Energy Security paper #12;1 Future United States Energy Security Concerns John Deutch Department of Chemistry on fossil fuels and a substantial and growing amount of oil imports. In this paper I will address

468

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Research Areas Fuel Cycle Science & Technology Fusion Nuclear Science Isotope Development and Production Nuclear Security Science & Technology Border Security Comprehensive...

469

Security Control Assessor | Department of Energy  

Energy Savers [EERE]

Training Worksheet More Documents & Publications Information System Security Manager (ISSM) Cybersecurity Program Manager (CSPM) Information System Security Officer (ISSO)...

470

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

471

Employee Concerns Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

About Us > Our Operations > Management and Budget > Human Resources About Us > Our Operations > Management and Budget > Human Resources > Employee Concerns Program Employee Concerns Program The National Nuclear Security Administration Service Center (NNSA/SC) Employee Concerns Program (ECP) is a formalized alternative means for DOE/NNSA federal, contractor, and subcontractor employees to report concerns as supported by the DOE Secretary Bodman's Program Statement (pdf, 66kb) and the NNSA Administrator's Statement (doc, 22kb). The concerns may be associated with the: Environment Safety Health Security Fraud Waste Abuse Mismanagement of DOE/NNSA and contractor managed activities or Reprisal for having reported such issues The program encourages employees to use their own organization's established means for reporting issues. If resolution cannot be achieved,

472

QUESTIONS ABOUT GLOBAL WARMING  

E-Print Network [OSTI]

QUESTIONS ABOUT GLOBAL WARMING ¥IS IT REAL? ¥IS IT IMPORTANT? ¥WHAT IS IT DUE TO? ¥HOW MUCH MORE in the atmosphere, giving Earth its temperate climate. Global Atmosphere, Global Warming GLOBAL TEMPERATURE TREND?t a cure for global warming! Aerosols only last a short while in the atmosphere, they would have

473

Global Health: Mental Health and the Global Agenda  

Science Journals Connector (OSTI)

When the World Health Organization (WHO) European Ministerial Conference on Mental Health endorsed the statement "No health without mental health" in 2005, it spoke to the intrinsic and indispensable role of mental health care in health care writ large. Yet mental health has long been treated... This article reviews the impact of mental health on overall health on a global level. The authors suggest changes that could lead to improved identification and treatment of mental illness in countries with limited resources.

Becker A.E.; Kleinman A.

2013-07-04T23:59:59.000Z

474

GTZ Global Energy Program | Open Energy Information  

Open Energy Info (EERE)

GTZ Global Energy Program GTZ Global Energy Program Jump to: navigation, search Logo: GTZ Global Energy Program Name GTZ Global Energy Program Agency/Company /Organization GTZ Sector Energy Focus Area Energy Efficiency, Renewable Energy Topics Background analysis Website http://www.gtz.de/en/praxis/95 Program Start 2008 Program End 2012 References GTZ projects [1] GTZ is working globally with countries on supply of energy technologies and services to households, SME and public utility institutions. Key products include access to modern energy services and promotion of new technologies. References ↑ "GTZ projects" Retrieved from "http://en.openei.org/w/index.php?title=GTZ_Global_Energy_Program&oldid=328691" Category: Programs What links here Related changes

475

NNSA: Securing Domestic Radioactive Material | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NNSA: Securing Domestic Radioactive Material | National Nuclear Security NNSA: Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > NNSA: Securing Domestic Radioactive Material Fact Sheet NNSA: Securing Domestic Radioactive Material Apr 12, 2013 The Department of Energy's National Nuclear Security Administration (NNSA),

476

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

477

Statement to the IAEA International Conference on Nuclear Security |  

Broader source: Energy.gov (indexed) [DOE]

to the IAEA International Conference on Nuclear Security to the IAEA International Conference on Nuclear Security Statement to the IAEA International Conference on Nuclear Security July 1, 2013 - 2:19pm Addthis NEWS MEDIA CONTACT (202) 586-4940 AS PREPARED FOR DELIVERY Secretary of Energy Ernest Moniz U.S. Statement to the IAEA International Conference on Nuclear Security Vienna, Austria Monday, July 1, 2013 I want to acknowledge Director General Amano and the President of the Conference, Foreign Minister Martonyi, for their dedicated efforts in organizing this important conference. I also want to express my gratitude to my fellow ministers for their commitment to the issue at hand and for taking the time to engage personally in this serious discussion. In the past two weeks, President Obama has given major speeches on two of

478

Renewable-Based Energy Secure Communities (RESCOs) University of  

Open Energy Info (EERE)

Renewable-Based Energy Secure Communities (RESCOs) University of Renewable-Based Energy Secure Communities (RESCOs) University of California, Merced Jump to: navigation, search Name Renewable-Based Energy Secure Communities (RESCOs) University of California, Merced Agency/Company /Organization California Integrated Renewable Energy Systems Sector Energy Focus Area Buildings, Commercial, Residential, Energy Efficiency, Greenhouse Gas, Land Use, Renewable Energy, Biomass, Biomass - Waste To Energy Phase Create a Vision, Prepare a Plan, Develop Finance and Implement Projects Resource Type Case studies/examples Availability Free - Publicly Available Publication Date 4/13/2010 Website http://cal-ires.ucdavis.edu/fi Locality University of California, Merced References Renewable-Based Energy Secure Communities (RESCOs) University of California, Merced[1]

479

Energy Security Planning for Sustainable Buildings | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Program Areas » Sustainable Buildings & Campuses » Energy Program Areas » Sustainable Buildings & Campuses » Energy Security Planning for Sustainable Buildings Energy Security Planning for Sustainable Buildings October 4, 2013 - 4:56pm Addthis For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to comprehensively and intelligently address all elements of energy security analysis. Given recent blackouts and concerns about vulnerable infrastructure, many public and private organizations are taking steps to ensure reliable power and continuity of operations in the event of future outages. Some government facilities have the capacity to survive short-term power outages, but are now evaluating whether their back-up power capabilities

480

Statement to the IAEA International Conference on Nuclear Security |  

Broader source: Energy.gov (indexed) [DOE]

Statement to the IAEA International Conference on Nuclear Security Statement to the IAEA International Conference on Nuclear Security Statement to the IAEA International Conference on Nuclear Security July 1, 2013 - 2:19pm Addthis NEWS MEDIA CONTACT (202) 586-4940 AS PREPARED FOR DELIVERY Secretary of Energy Ernest Moniz U.S. Statement to the IAEA International Conference on Nuclear Security Vienna, Austria Monday, July 1, 2013 I want to acknowledge Director General Amano and the President of the Conference, Foreign Minister Martonyi, for their dedicated efforts in organizing this important conference. I also want to express my gratitude to my fellow ministers for their commitment to the issue at hand and for taking the time to engage personally in this serious discussion. In the past two weeks, President Obama has given major speeches on two of

Note: This page contains sample records for the topic "organizations global security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Independent Activity Report, Los Alamos National Security - June 2011 |  

Broader source: Energy.gov (indexed) [DOE]

National Security - June National Security - June 2011 Independent Activity Report, Los Alamos National Security - June 2011 June 2011 Review of the Los Alamos National Security Emergency Operations Division Emergency Management Self-assessment Practices [HIAR-LANL-2011-06-08] This review evaluated the establishment and maintenance of specific elements of the ERO, including their responsibilities for initial and ongoing response to and mitigation of an emergency. Additionally, evaluation criteria addressed effective control at the event scene and integration of local agencies and organizations that provide onsite response services. The review also evaluated whether an adequate number of experienced and trained personnel, including designated alternates, are available on demand for timely and effective performance of assigned ERO

482

Federal Energy Management Program: Energy Security Planning for Sustainable  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Planning for Sustainable Buildings Security Planning for Sustainable Buildings For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to comprehensively and intelligently address all elements of energy security analysis. Given recent blackouts and concerns about vulnerable infrastructure, many public and private organizations are taking steps to ensure reliable power and continuity of operations in the event of future outages. Some government facilities have the capacity to survive short-term power outages, but are now evaluating whether their back-up power capabilities are sufficient to serve their most critical needs during a prolonged outage.

483

Technology Applications Center | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Technology Applications Technology Applications ... Technology Applications Center The Y-12 Technology Applications Center, established with more than 20 years of testing and evaluation experience at the Y-12 National Security Complex, provides a dedicated resource to technology providers and groups procuring security technologies. Y-12 TAC helps determine a security technology's value by testing in real-world settings. As an unbiased and independent organization, Y-12 TAC provides a qualitative look at the technology's performance and answers the tough question: "Will the system work effectively when needed?" Our customers can reliably draw upon on Y-12's extensive experience with and expertise in many current security technologies. Both the technology provider and the technology buyer derive significant

484

Security technologies and protocols for Asynchronous Transfer Mode networks  

SciTech Connect (OSTI)

Asynchronous Transfer Mode (ATM) is a new data communications technology that promises to integrate voice, video, and data traffic into a common network infrastructure. In order to fully utilize ATM`s ability to transfer real-time data at high rates, applications will start to access the ATM layer directly. As a result of this trend, security mechanisms at the ATM layer will be required. A number of research programs are currently in progress which seek to better understand the unique issues associated with ATM security. This paper describes some of these issues, and the approaches taken by various organizations in the design of ATM layer security mechanisms. Efforts within the ATM Forum to address the user communities need for ATM security are also described.

Tarman, T.D.

1996-06-01T23:59:59.000Z

485

CONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT  

E-Print Network [OSTI]

and the decision of acceptable risk; · Monitor security controls in the information system on an ongoing1 basis that organization-wide operations remain within an acceptable level of risk when changes are made, and that timelyCONTINUOUS MONITORING OF INFORMATION SECURITY: AN ESSENTIAL COMPONENT OF RISK MANAGEMENT Shirley

486

Globalization and standards : the liberalization of trade and the potential for a regulatory race to the top  

E-Print Network [OSTI]

Globalization is changing the way in which the world is organized. The world trade regime is increasingly the dominant mode of organizing international relations. Within this context of globalization and liberalization of ...

Cameron, Diane (Melissa Jessica Diane)

2007-01-01T23:59:59.000Z

487

5 - Consequences of Global Warming  

Science Journals Connector (OSTI)

Abstract This chapter looks at different areas of risk associated with the onset of global warming. The first risk area refers to pathogens and diseases. We first discuss perspectives on disease spread, and focus on the role played by globalization and the current livestock revolution strongly affected by large-scale processes of urbanization. We then discuss zoonoses, or diseases that are passed between humans and other animals, and identify 11 kinds of zoonoses associated with global warming. Although not a zoonose, malaria is also discussed. Patterns of transmission associated with warming tend to be poleward, and small changes in temperature can produce large changes in disease vectors to higher latitudes. A brief presentation of the history of malaria shows how it has had a substantial effect on conflicts in the past, particularly the US Civil War (18611865) and World War I. It has been famously suggested that World War I ended because of the spread of Swine Flu, decimating the Axis troops and rendering many units unable to continue fighting. AIDS is presented as a contemporary example of the way in which diseases can profoundly undermine the capacity of a country to provide security and state leadership, and undercut international peacekeeping activities.

John P. Crank; Linda S. Jacoby

2015-01-01T23:59:59.000Z

488

Physical and Logical Security Convergence: Powered By Enterprise Security Management: Powered By Enterprise Security Management  

Science Journals Connector (OSTI)

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, ... Keywords: Computer Science, Security

Brian T. Contos; Steve Hunt; Colby Derodeff

2007-04-01T23:59:59.000Z

489

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

U.S. DOE SECURITY CLEARANCES U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance Reinvestigation Clearance Termination Clearance Transfer Sandia National Laboratories sponsors and processes U.S. DOE Security Clearances for contractor personnel working on an authorized contract requiring access to classified information. Clearance Office Functions Contractor Pre-Process Background Review Certification Clearance File Change Drug Testing e-Fingerprinting Enrollment Process Maintaining a DOE Security Clearance During an Extended Absence DOE Personnel Security Reporting Requirements Data Report on Spouse/Cohabitant Name Change Change in Citizenship Contractor Clearance Tools Clearance Action Status Inquiries

490

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

491

Headquarters Facilities Master Security Plan  

Broader source: Energy.gov [DOE]

The purpose of the Headquarters Facilities Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures in place at Department of Energy (DOE) Headquarters (HQ) facilities in the Washington, DC area. The HQFMSP does not establish new security requirements; security requirements are established by various Federal laws and regulations, Executive Orders, and DOE directives. This plan explains how these requirements are implemented at HQ and gives HQ personnel and visitors access to the security policies and procedures that affect them regularly. The HQFMSP does not apply to DOE sites or facilities outside the Washington, DC area.

492

The Global Potential of Bioenergy on Abandoned Agriculture Lands  

Science Journals Connector (OSTI)

The Global Potential of Bioenergy on Abandoned Agriculture Lands ... The global potential for bioenergy from abandoned agriculture lands is determined to be less than 8% of current primary energy demand based on land use data and ecosystem modeling. ... Converting forest lands into bioenergy agriculture could accelerate climate change by emitting carbon stored in forests, while converting food agriculture lands into bioenergy agriculture could threaten food security. ...

J. Elliott Campbell; David B. Lobell; Robert C. Genova; Christopher B. Field

2008-06-25T23:59:59.000Z

493

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

October 11, 2012 October 11, 2012 PSH-12-0081 - In the Matter of Personnel Security Hearing On October 11, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for providing false information on a Questionnaire for National Security Positions and failing to comply with rules regarding the handling of classified information and conduct within simited access areas. This behavior raised security concerns under Criteria F, G, and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer fo October 2, 2012 PSH-12-0052 - In the Matter of Personnel Security Hearing On October 2, 2012, an OHA Hearing Officer issued a decision in which he

494

Chapter_14_Cyber_Security  

Broader source: Energy.gov (indexed) [DOE]

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

495

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 5, 2013 March 5, 2013 PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated March 5, 2013 PSH-12-0131 - In the Matter of: Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which he

496

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

January 11, 2012 January 11, 2012 TSO-01113 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on financial issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in July 2011. PSI, DOE Ex. 13 In August 2011, the LSO issued the individual a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about his eligibility to hold a DOE security clearance. (DOE Ex. 1). December 21, 2011 TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection

497

Chapter_3_Personnel_Security  

Broader source: Energy.gov (indexed) [DOE]

Personnel Security Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is designed to ensure that individuals authorized to access classified information and Special Nuclear Material (SNM) do not pose a threat to national security interests. This assurance is provided by the process for issuing initial and continuing

498

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

November 1, 2012 November 1, 2012 PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that October 26, 2012 PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she

499

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

RESPONSIBILITIES RESPONSIBILITIES FSO Overview FSO Reporting Responsibilities Questions an FSOs at a Non-Possesssing Site Could Be Asked During an Audit Non-Possessing Contractor Security Requirements Plan Training for Facility Security Officers (FSOs) PHY-210DE Facility Security Officer Overview PHY-210DB, Introduction to Facility Security Officer (Self-Study Course ) Duration: 3 days Description: This correspondence course provides an overview of the roles and responsibilities of the DOE or DOE-contractor FSO. The course emphasizes facility clearance requirements, personnel security, information security, incident reporting, and other related programs. The course references the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22-M) and a comprehensive listing of DOE orders, manuals, guides, forms, and notices.

500

A Dynamic Management Framework for Security Policies in Open Grid Computing Environments  

Science Journals Connector (OSTI)

A computational grid is a kind of open and distributed ... dynamic virtual organization (VO) membership. Dynamic security policy management for multiple VOs in grids is challenging due to the heterogeneous nature...

Chiu-Man Yu; Kam-Wing Ng

2004-01-01T23:59:59.000Z