Powered by Deep Web Technologies
Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Recommendations to Address Power Reliability Concerns Raised...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Recommendations to Address Power Reliability Concerns Raised as a...

2

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

3

Chapter_11_Incidents_of_Security_Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 Incidents of Security Concern This chapter covers the DOE HQ implementation of DOE Order 470.4B, Safeguards and Security Program, Attachment 5, Incidents of Security Concern. HS-91 manages the HQ Security Incidents Program. Incidents of Security Concern (henceforth referred to as Incidents) are actions, inactions, or events that are believed to: * Pose threats to national security interests and/or DOE assets * Create potentially serious or dangerous security situations * Significantly affect the safeguards and security program's capability to protect DOE safeguards and security interests * Indicate failure to adhere to security procedures * Reveal that the system is not functioning properly, by identifying and/or mitigating potential threats (e.g., detecting suspicious activity, hostile acts, etc.).

4

Employee Concerns Reporting Form | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

subcontractor fulfilling the DOENNSA's mission have the right and responsibility to report concerns relating to the environment, safety, health, security, fraud, waste, abuse or...

5

Environment/Health/Safety/Security Concerns  

NLE Websites -- All DOE Office Websites (Extended Search)

hardhat EnvironmentHealthSafetySecurity Concerns construction workers If you have a life-threatening emergency, please dial 7-911 or 911 from Lab phones and 911 from a cell...

6

Employee Concerns Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

About Us > Our Operations > Management and Budget > Human Resources About Us > Our Operations > Management and Budget > Human Resources > Employee Concerns Program Employee Concerns Program The National Nuclear Security Administration Service Center (NNSA/SC) Employee Concerns Program (ECP) is a formalized alternative means for DOE/NNSA federal, contractor, and subcontractor employees to report concerns as supported by the DOE Secretary Bodman's Program Statement (pdf, 66kb) and the NNSA Administrator's Statement (doc, 22kb). The concerns may be associated with the: Environment Safety Health Security Fraud Waste Abuse Mismanagement of DOE/NNSA and contractor managed activities or Reprisal for having reported such issues The program encourages employees to use their own organization's established means for reporting issues. If resolution cannot be achieved,

7

Employee Concerns Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Livermore Field Office > Employee Livermore Field Office > Employee Concerns Program Employee Concerns Program STATEMENT OF POLICY The Livermore Field Office (LFO) Employee Concerns Program (ECP) is established as part of the Department of Energy's whistleblower reform initiatives. These initiatives aim to streamline and improve the effectiveness of existing processes for resolving employee concerns, and make the Department's "zero tolerance for reprisal" a reality. It is the policy of the Department that: Employees in the Department of Energy, its contractors and subcontractors must be free to raise concerns, without fear of reprisal, about policies and practices that adversely affect the Department's ability to accomplish its mission in a safe and efficient manner; Management at all levels appreciate the value of employee concerns,

8

Recommendations to Address Power Reliability Concerns Raised as a Result of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to Address Power Reliability Concerns Raised as a to Address Power Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Recommendations to Address Power Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Memorandum from the Electricity Advisory Committee to Secretary Chu and Assistant Secretary Patricia Hoffman on recommendations to address power reliability concerns raised as a result of pending environmental regulations for electric generation stations. Recommendations to Address Power Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations More Documents & Publications DOE Response to EAC Recommendations - March 2012 Interdependence of Electricity System Infrastructure and Natural Gas

9

Employee Concerns Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

at NNSA Blog Employee Concerns Program Home > About Us > Our Operations > Management and Budget > Human Resources > Employee Concerns Program Employee Concerns Program The...

10

Employee Concerns Reporting Form | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Reporting Form | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing...

11

Concern for the Environment | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

link to skip to the main content Facebook Flickr RSS Twitter YouTube Concern for the Environment | National Nuclear Security Administration Our Mission Managing the Stockpile...

12

Employee Concerns Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Employee Los Alamos Field Office > Employee Concerns Program Employee Concerns Program Employee Concerns Program The Employee Concerns Program provides an informal avenue for federal, contractor, or sub-contractor employees to report concerns, without fear of retaliation. Concerns can be reported anonymously or otherwise, and can cover anything from fraud waste and abuse, to safety issues, to unresolved interpersonal conflicts in the workplace. The goal of the Employee Concerns Program is to address and resolve a concern at the lowest possible level, before it escalates into a formal complaint. The LASO Point of Contact for the Employee Concerns Program is Cynthia Casalina. If you have a concern, you may contact Cynthia at 665-6369, or the ECP 24-hour Hotline number at 1-800-688-5713. You may also contact Eva

13

Employee Concerns Reporting Form | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reporting Form | National Nuclear Security Administration Reporting Form | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our Operations > Management and Budget > Human Resources > Employee Concerns Program > How Do You Report A Concern? > Employee Concerns Reporting Form Employee Concerns Reporting Form Employee Concerns Program Policy Statement

14

How Do You Report A Concern? | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Report A Concern? | National Nuclear Security Administration Report A Concern? | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog How Do You Report A Concern? Home > About Us > Our Operations > Management and Budget > Human Resources > Employee Concerns Program > How Do You Report A Concern? How Do You Report A Concern? DOE/NNSA Federal, contractor and subcontractor employees may report their

15

IT Security Concerns During a Consolidation (Merger) - Forum ...  

Science Conference Proceedings (OSTI)

... 1 Jim McLaughlin, CISSP Manager, Security Policy & Risk Management ... 37 Jim McLaughlin, CISSP Manager, Security Policy & Risk Management ...

2013-06-04T23:59:59.000Z

16

How Do You Report A Concern? | National Nuclear Security Administratio...  

National Nuclear Security Administration (NNSA)

NNSA Blog How Do You Report A Concern? Home > About Us > Our Operations > Management and Budget > Human Resources > Employee Concerns Program > How Do You Report A Concern? How Do...

17

The association between income smoothing and job security concerns in New Zealand.  

E-Print Network (OSTI)

??This study tests for a relationship between income smoothing, proxied by discretionary accruals, and job security concerns, proxied by product durability, capital intensity, and leverage, (more)

Tauch, Sothyda

18

Security concerns of a plug-in vehicle  

Science Conference Proceedings (OSTI)

Electric vehicles, no doubt, will bring in many benefits to the economy and to the stakeholders concerned; however these will come at certain costs. Modern vehicles already have several intelligent electronic components, also known as electronic control ...

Hina Chaudhry; Theodore Bohn

2012-01-01T23:59:59.000Z

19

UMS-dev-sec: a proposed framework to address security concerns of UMS devices  

Science Conference Proceedings (OSTI)

USB Mass Storage (UMS) devices are affordable, convenient, practical, and have the ability to interface easily with a number of operating systems, and various hardware systems. UMS devices are found among virtually any person in the workplace today. ... Keywords: UMS, USB, information loss, information security, information theft, malware, security awareness, security framework

Kegomoditswe Molotsi, Bobby L. Tait

2013-10-01T23:59:59.000Z

20

Android and iOS users' differences concerning security and privacy  

Science Conference Proceedings (OSTI)

We compare Android and iOS users according to their demographic differences, security and privacy awareness, and reported behavior when installing apps. We present an exploratory study based on an online survey with more than 700 German students and ... Keywords: android, ios, iphone, personal data, privacy awareness, security awareness, smartphone

Zinaida Benenson; Freya Gassmann; Lena Reinfelder

2013-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Advanced Metering Infrastructure Security Management Guidelines  

Science Conference Proceedings (OSTI)

Advanced Metering Infrastructure (AMI) systems have raised many security concerns since they connect traditionally self-contained power system operations with widely dispersed, un-trustable customer sites. Many different groups are identifying the security requirements for AMI systems, including the NIST Smart Grid Security Guidelines and the ASAP-SG AMI Security Profile v2.0. Vendors are applying security technologies to their products in an effort to meet those security requirements. However, AMI netwo...

2010-12-31T23:59:59.000Z

22

Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk  

Science Conference Proceedings (OSTI)

This study integrates cognitive and affective attitudes as the primary factors of influence to formulate a Ubiquitous Computing Acceptance Model (UCAM), which is intended to predict whether potential users will accept ubiquitous computing (u-computing). ... Keywords: UCAM, behavioural intention, mobile communications, perceived ease of use, perceived risk, pervasive computing, privacy, security, trust, ubiquitous city, ubiquitous computing acceptance model, ubiquitous u-city, usefulness, user attitudes, user intentions

Dong-Hee Shin

2010-02-01T23:59:59.000Z

23

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

24

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 5, 2013 March 5, 2013 PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated March 5, 2013 PSH-12-0131 - In the Matter of: Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which he

25

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 1, 2012 November 1, 2012 PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that October 26, 2012 PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she

26

Raising Caterpillars  

NLE Websites -- All DOE Office Websites (Extended Search)

Raising Caterpillars Raising Caterpillars Name: PALS II Classroom Location: N/A Country: N/A Date: N/A Question: We were wondering if we could catch caterpillars in jars, provide some kind of food source, and watch them turn into butterflies. I know you can order those kits, but there are lots of caterpillars everywhere right now! PLEASE answer our questions. Thanks Replies: Hi PALS II When I catch catterpillars I put them in shoeboxes with some leaves from the tree that I got them from. I change the leaves avery day and check on them twice a day to make sure that they are OK (because when they turn into butterflies they have to be let go so that they can go and find a mate). I poke holes inthe top of the shoebox with a pair of scissors so that the catterpillars have plenty of air.

27

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

28

Best Practices Guide to Securing Wireless Substation Applications  

Science Conference Proceedings (OSTI)

The use of wireless communications in substations raises a number of security concerns. This report, an updated version of EPRI report 1013810) identifies wireless security best practices for electric substation applications, giving special consideration to a defense-in-depth approach to wireless security. The emphasis is on technical, administrative, and operational security controls. In addition to discussing the defense-in-depth concept, the report also examines training activities and rogue device de...

2009-02-18T23:59:59.000Z

29

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 11, 2012 October 11, 2012 PSH-12-0081 - In the Matter of Personnel Security Hearing On October 11, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for providing false information on a Questionnaire for National Security Positions and failing to comply with rules regarding the handling of classified information and conduct within simited access areas. This behavior raised security concerns under Criteria F, G, and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer fo October 2, 2012 PSH-12-0052 - In the Matter of Personnel Security Hearing On October 2, 2012, an OHA Hearing Officer issued a decision in which he

30

PSH-12-0076 - Personnel Security Hearing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 - Personnel Security Hearing 6 - Personnel Security Hearing PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted . A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's falsification and financial irresponsibility. His behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that the requisite element of "deliberateness" was met under Criterion F. She further found that

31

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2012 14, 2012 PSH-12-0083 - In the Matter of In the Matter of Personnel Security Hearing On November 14, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for failing to comply with rules regarding the handling of classified information and conduct within limited access areas and for failing to report such non-compliance. This behavior raised security concerns under Criteria G and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented su November 13, 2012 PSH-12-0092 - In the Matter of Personnel Security Hearing On September 24, 2012, an OHA Hearing Officer issued a decision in which he

32

PSH-13-0013 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - In the Matter of Personnel Security 3 - In the Matter of Personnel Security PSH-13-0013 - In the Matter of Personnel Security On May 30, 2013, an OHA Hearing Officer issued a Decision in which she determined that an Individual's access authorization should not be restored. In reaching this determination, the Hearing Officer found that the Individual had not resolved the security concerns arising from his alcohol use. A DOE psychologist diagnosed the Individual as suffering from alcohol abuse. In addition, the Individual had a number of alcohol-related arrests. The Local Security Office (LSO) raised security concerns related to the diagnosis and arrests under Criteria H and J of the Part 710 regulations. It also raised security concerns related to the arrests under Criterion L of the regulations. The Individual showed that

33

PSH-12-0021 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21 - In the Matter of Personnel Security Hearing 21 - In the Matter of Personnel Security Hearing PSH-12-0021 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility. The Local Security Office (LSO) received information that the Individual had not filed a state income tax return for the year 2007. Exhibit (Ex.) 3 at 1. Consequently, LSO conducted a personnel security interview (PSI) with the Individual in October 2011. Ex. 7. Because the 2011 PSI failed to resolve the security concerns raised by the Individual's failure to file tax returns, the LSO informed the Individual, in a February 2012 notification letter (Notification Letter), that derogatory information existed which raised security concerns under 10 C.F.R. § 710.8 (l) (Criterion L) and that her security clearance was suspended. Ex. 1. The Notification Letter

34

PSH-12-0003 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - In the Matter of Personnel Security Hearing 3 - In the Matter of Personnel Security Hearing PSH-12-0003 - In the Matter of Personnel Security Hearing In September 2011, the Individual, a security clearance holder, was arrested for Driving While Intoxicated (DWI) and subsequently reported the arrest to the Local Security Office (LSO) at the DOE Facility where he worked. DOE Exhibit (Ex.) 19. Neither a September 2011 personnel security interview (PSI) nor a DOE-Contractor Psychologist's (DOE Psychologist) examination and evaluative report of the Individual resolved the security concerns raised by his 2011 DWI arrest. Consequently, the LSO informed the Individual, in a January 2011 notification letter (Notification Letter), that derogatory information existed which raised security concerns under 10

35

PSH-13-0020 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 - In the Matter of Personnel Security 0 - In the Matter of Personnel Security PSH-13-0020 - In the Matter of Personnel Security On May 31, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In August 2012, the individual attempted to commit suicide, and was subsequently admitted to a local hospital for treatment and observation. Because these events raised security concerns, the local security office (LSO) summoned the individual for a Personnel Security Interview (PSI). During that PSI, the individual was referred to a DOE consultant psychologist (DOE psychologist) for an agency-sponsored evaluation. The individual's behavior raised security concerns under the Bond Amendment and Criteria H, J, K and L. After conducting a hearing and evaluating the

36

PSH-13-0020 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20 - In the Matter of Personnel Security 20 - In the Matter of Personnel Security PSH-13-0020 - In the Matter of Personnel Security On May 31, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In August 2012, the individual attempted to commit suicide, and was subsequently admitted to a local hospital for treatment and observation. Because these events raised security concerns, the local security office (LSO) summoned the individual for a Personnel Security Interview (PSI). During that PSI, the individual was referred to a DOE consultant psychologist (DOE psychologist) for an agency-sponsored evaluation. The individual's behavior raised security concerns under the Bond Amendment and Criteria H, J, K and L. After conducting a hearing and evaluating the

37

PSH-12-0003 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - In the Matter of Personnel Security Hearing 3 - In the Matter of Personnel Security Hearing PSH-12-0003 - In the Matter of Personnel Security Hearing In September 2011, the Individual, a security clearance holder, was arrested for Driving While Intoxicated (DWI) and subsequently reported the arrest to the Local Security Office (LSO) at the DOE Facility where he worked. DOE Exhibit (Ex.) 19. Neither a September 2011 personnel security interview (PSI) nor a DOE-Contractor Psychologist's (DOE Psychologist) examination and evaluative report of the Individual resolved the security concerns raised by his 2011 DWI arrest. Consequently, the LSO informed the Individual, in a January 2011 notification letter (Notification Letter), that derogatory information existed which raised security concerns under 10

38

PSH-13-0040 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 - In the Matter of Personnel Security 0 - In the Matter of Personnel Security PSH-13-0040 - In the Matter of Personnel Security On July 25, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In January 2013, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual' falsifications and drug use. The individual's behavior raised security concerns under Criteria F, K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve the security concerns associated with her falsifications on three security forms as well

39

PSH-12-0120 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0120 - In the Matter of Personnel Security Hearing PSH-12-0120 - In the Matter of Personnel Security Hearing PSH-12-0120 - In the Matter of Personnel Security Hearing On February 4, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about falsification and drug use. The individual's behavior raised security concerns under Criteria F, K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve these security concerns. Specifically, with respect to the individual's omissions on security forms, she found that the requisite element of "deliberateness" was

40

PSH-12-0122 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0122 - In the Matter of Personnel Security Hearing PSH-12-0122 - In the Matter of Personnel Security Hearing PSH-12-0122 - In the Matter of Personnel Security Hearing On February 15, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about falsification and drug use. The individual's behavior raised security concerns under Criteria F, K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve the security concerns associated with his marijuana use while in high school. However, she found that the individual had not sufficiently mitigated the security

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

PSH-13-0057 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 - In the Matter of Personnel Security 7 - In the Matter of Personnel Security PSH-13-0057 - In the Matter of Personnel Security On August 28, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security clearance because the individual had been diagnosed with alcohol dependence, opioid abuse, and major depression. His behavior-taking as many as 12 hydrocodone pills with 18 to 24 beers on weekend days to cope with his depression-raised security concerns under Criteria H (mental conditions that cause or may cause a significant defect in judgment or reliability), J (alcohol dependence) and K (misuse of a controlled substance), as well as raising the concern that he was an unlawful user of

42

PSH-13-0060 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60 - In the Matter of Personnel Security 60 - In the Matter of Personnel Security PSH-13-0060 - In the Matter of Personnel Security On August 22, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In January and March 2013, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's pattern of criminal conduct. The individual's behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented adequate evidence to mitigate the security concerns associated with his two charges of Driving Under the Influence and his involvement in

43

PSH-12-0074 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that the individual's recent efforts to resolve his debt have not yet withstood the test of time. Given the

44

PSH-12-0101 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

01 - In the Matter of Personnel Security Hearing 01 - In the Matter of Personnel Security Hearing PSH-12-0101 - In the Matter of Personnel Security Hearing On November 21, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that it was too early to determine whether the individual had demonstrated a sustained pattern of financial responsibility for a

45

PSH-12-0104 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

104 - In the Matter of Personnel Security Hearing 104 - In the Matter of Personnel Security Hearing PSH-12-0104 - In the Matter of Personnel Security Hearing On December 13, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's alcohol use. A DOE psychiatrist examined the individual and concluded that the individual suffers from Alcohol Dependence. His behavior raised security concerns under Criteria H and J. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that the individual had

46

PSH-13-0060 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60 - In the Matter of Personnel Security 60 - In the Matter of Personnel Security PSH-13-0060 - In the Matter of Personnel Security On August 22, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In January and March 2013, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's pattern of criminal conduct. The individual's behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented adequate evidence to mitigate the security concerns associated with his two charges of Driving Under the Influence and his involvement in

47

PSH-12-0133 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33 - In the Matter of Personnel Security Hearing 33 - In the Matter of Personnel Security Hearing PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated with his misuse of information technology. However, she found that the individual had not sufficiently mitigated the

48

PSH-12-0073 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73 - In the Matter of Personnel Security Hearing 73 - In the Matter of Personnel Security Hearing PSH-12-0073 - In the Matter of Personnel Security Hearing On November 8, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. A Local Security Office (LSO) conducted a Personnel Security Interview of the individual to address concerns about the individual's alcohol use. A DOE consultant psychologist found that the individual suffers from Alcohol Dependence, in early full remission. His behavior raised security concerns under Criteria H, J and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual demonstrated adequate evidence of rehabilitation and thus mitigated the security concerns under Criteria H and J. She

49

PSH-13-0044 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-13-0044 - In the Matter of Personnel Security Hearing On July 26 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. In November and December 2012, as part of a background investigation, the local security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's pattern of criminal conduct. The individual's behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate the security concerns associated with his three charges of Driving

50

PSH-12-0081 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0081 - In the Matter of Personnel Security Hearing PSH-12-0081 - In the Matter of Personnel Security Hearing PSH-12-0081 - In the Matter of Personnel Security Hearing On October 11, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for providing false information on a Questionnaire for National Security Positions and failing to comply with rules regarding the handling of classified information and conduct within simited access areas. This behavior raised security concerns under Criteria F, G, and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve these security concerns. Specifically, he

51

PSH-12-0085 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

85 - In the Matter of Personnel Security Hearing 85 - In the Matter of Personnel Security Hearing PSH-12-0085 - In the Matter of Personnel Security Hearing On November 8, 2012, an OHA Hearing Officer issued a decision in which he concluded the DOE should not grant an individual an access authorization. A Local Security Office (LSO) raised certain concerns regarding (1) false statements by the individual during the security clearance process; (2) the individual's problematic use of alcohol; (3) his use past use of illegal drugs. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to mitigate the security concerns raised by his use of illegal drugs, but not those stemming from his false statements and problematic use of alcohol.

52

PSH-12-0059 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

59 - In the Matter of Personnel Security Hearing 59 - In the Matter of Personnel Security Hearing PSH-12-0059 - In the Matter of Personnel Security Hearing On September 13, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. The Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about the individual's falsifications and financial irresponsibility. The individual's behavior raised concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate these security concerns. Specifically, she found that despite the individual's acknowledgment of his financially

53

PSH-12-0048 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

48 - In the Matter of Personnel Security Hearing 48 - In the Matter of Personnel Security Hearing PSH-12-0048 - In the Matter of Personnel Security Hearing On August 17, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security clearance because the individual drank to intoxication once a week and had been diagnosed as suffering from Alcohol Disorder, Not Otherwise Specified, which raised security concerns under Criteria H and J. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, he found that the individual's continued use of alcohol, in particular, his consumption

54

PSH-12-0053 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53 - In the Matter of Personnel Security Hearing 53 - In the Matter of Personnel Security Hearing PSH-12-0053 - In the Matter of Personnel Security Hearing The Individual is employed by a DOE contractor and has held a DOE access authorization since 1980. DOE Exhibit (Ex.) 6. In October 2006, after reviewing the Individual's credit report during a routine reinvestigation in connection with her security clearance, the Local Security Office (LSO) requested that the Individual participate in a Personnel Security Interview (PSI) in order to discuss concerns raised by the Individual's finances. DOE Ex. 14. The Individual's security clearance was continued at that time. DOE Ex. 6. During a subsequent routine reinvestigation of the Individual's security clearance in 2011, concerns regarding the Individual's delinquent accounts and outstanding judgments surfaced. The

55

TSO-1105 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

105 - In the Matter of Personnel Security Hearing 105 - In the Matter of Personnel Security Hearing TSO-1105 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and has held a DOE security clearance for several years. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in June 2011. PSI, DOE Ex. 6. In August 2011, the LSO suspended the individual's DOE security clearance and issued her a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about the individual's eligibility to hold a DOE security clearance. (DOE Ex. 1). Specifically, the LSO alleges that the individual has raised a concern under 10 C.F.R. § 710.8(f) (Criterion F)

56

TSO-1104 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1104 - In the Matter of Personnel Security Hearing TSO-1104 - In the Matter of Personnel Security Hearing TSO-1104 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. During the process of applying for a higherlevel security clearance, the individual provided information to the DOE that is inconsistent with information that he previously provided. Because these inconsistencies raised security concerns, the local security office (LSO) summoned the individual for an interview with a personnel security specialist in March 2011. After this Personnel Security Interview (PSI), the LSO referred the individual to a local psychiatrist (hereinafter referred to as "the DOE

57

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29, 2012 29, 2012 PSH-12-0097 - In the Matter of Personnel Security Hearing On November 29, 2012, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be restored. The Individual had been charged with committing a sexual battery. Although the Individual had testified that a jury had acquitted him of this charge, the Individual did not provide any documentation that he had been acquitted. Nor had the Individual presented sufficient evidence to resolve the concerns raised by his conduct. The Individual had also intentionally provided misleading information during a personnel security interview. November 29, 2012 PSH-12-0080 - In the Matter of Personnel Security Hearing On November 29, 2012, an OHA Hearing Officer issued a Decision in which she

58

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 23, 2013 May 23, 2013 PSH-13-0018 - In the Matter of Personnel Security Hearing On May 23, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be granted. The Individual had a history of six arrests, five of which were alcohol-related and two of which were marijuana-related. In addition, A DOE Psychologist diagnosed the individual with Alcohol Dependence. The Hearing Officer found that the Individual had not mitigated any the security concerns raised by his alcohol abuse and history of criminal conduct at the hearing, because he was only in the early stages of his recovery from his alcohol d May 22, 2013 PSH-13-0022 - In the Matter of Personnel Security On May 22, 2013, an OHA Hearing Officer issued a decision in which he

59

PSH-13-0071 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 - In the Matter of Personnel Security Hearing 1 - In the Matter of Personnel Security Hearing PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. During that PSI, the individual was referred to a DOE consultant psychologist (DOE psychologist) for an agency-sponsored evaluation who concluded that the individual suffers from Alcohol Abuse. The individual's behavior raised security concerns Criteria H, J and L. After conducting a hearing and evaluating the documentary and testimonial

60

PSH-12-0130 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 - In the Matter of Personnel Security Hearing 0 - In the Matter of Personnel Security Hearing PSH-12-0130 - In the Matter of Personnel Security Hearing On April 1, 2013, an OHA Hearing Officer issued a decision in which he determined that the DOE should not grant an individual access authorization. As security concerns under 10 CFR Part 710, a Local Security Office (LSO) cited the individual's 2001 indictment for violation of a federal criminal statute governing conduct of federal employees, and security infractions that she committed in 2010 and 2011, while in her current position, when she brought a cell phone into a Controlled Access Area. The Hearing Officer found that the individual had resolved the concern raised by the 2010 and 2011 security infractions, given her lack of intent, the isolated nature of the events, the fact that she received

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

PSH-13-0094 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-13-0094 - In the Matter of Personnel Security Hearing On November 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. In April 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use. During that PSI, the individual was referred to a DOE consultant psychologist (DOE psychologist) for an agency-sponsored evaluation who concluded that the individual suffers from Alcohol Dependence. The individual's behavior raised security concerns under Criteria H and J. After conducting a hearing and evaluating the documentary and testimonial evidence, the

62

PSH-13-0069 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 - In the Matter of Personnel Security Hearing 9 - In the Matter of Personnel Security Hearing PSH-13-0069 - In the Matter of Personnel Security Hearing On October 11, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In April 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his positive drug test. The individual's behavior raised security concerns under the Bond Amendment and Criteria K and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer concluded the individual's use of his wife's prescription medication happened under unusual circumstances that are unlikely to recur in the future, and to the

63

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

64

PSH-12-0083 - In the Matter of In the Matter of Personnel Security Hearing  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

83 - In the Matter of In the Matter of Personnel Security 83 - In the Matter of In the Matter of Personnel Security Hearing PSH-12-0083 - In the Matter of In the Matter of Personnel Security Hearing On November 14, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for failing to comply with rules regarding the handling of classified information and conduct within limited access areas and for failing to report such non-compliance. This behavior raised security concerns under Criteria G and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented sufficient evidence to resolve these security

65

PSH-12-0134 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0134 - In the Matter of Personnel Security Hearing PSH-12-0134 - In the Matter of Personnel Security Hearing PSH-12-0134 - In the Matter of Personnel Security Hearing On April 2, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security clearance because the individual demonstrated financial irresponsibility through his two bankruptcies within ten years, his current debts, and his inability or unwillingness to live within his means. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security

66

PSH-12-0134 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-12-0134 - In the Matter of Personnel Security Hearing On April 2, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security clearance because the individual demonstrated financial irresponsibility through his two bankruptcies within ten years, his current debts, and his inability or unwillingness to live within his means. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security

67

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

68

PSH-12-0088 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2-0088 - In the Matter of Personnel Security Hearing 2-0088 - In the Matter of Personnel Security Hearing PSH-12-0088 - In the Matter of Personnel Security Hearing On November 15, 2012, an OHA Hearing Officer issued a Decision in which she determined that an Individual's access authorization should be restored. In reaching this determination, the Hearing Officer found that the Individual had resolved the security concerns arising from his alcohol use. The Individual was diagnosed by a DOE psychologist with Alcohol-Related Disorder, Not Otherwise Specified. In addition, the Individual had five alcohol-related incidents in his past, including a positive Breath Alchol Test (BAT) in March 2012. The hearing officer found that the Local Security Office (LSO) properly raised security concerns under Criteria H, J, and L.

69

PSH-13-0038 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 - In the Matter of Personnel Security Hearing 8 - In the Matter of Personnel Security Hearing PSH-13-0038 - In the Matter of Personnel Security Hearing On June 26, 2013, an OHA Hearing Officer issued a Decision in which she determined that an Individual's access authorization should not be granted. In reaching this determination, the Hearing Officer found that the Individual had not resolved the security concerns arising from an opinion of a licensed medical professional that he has a mental condition which causes or may cause a significant defect in judgment and reliability and the Individual's past unreliable behavior. A DOE psychologist opined that the Individual has a mental trait that makes him unreliable. The Local Security Office (LSO) raised the DOE psychologist's opinion as a security concern under Criterion H of the Part 710 regulations. The LSO

70

PSH-13-0064 - In the matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the matter of Personnel Security Hearing 4 - In the matter of Personnel Security Hearing PSH-13-0064 - In the matter of Personnel Security Hearing On October 11, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) cited concerns raised by the individual's use of alcohol habitually to excess and an opinion of a DOE consultant psychologist (DOE psychologist) that the individual's lack of maturity leaves significant questions as to his judgment and reliability. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer did not find that the individual had an "illness or mental condition" that would raise a concern under the DOE regulations, but concluded that the individual had

71

PSH-11-0037 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0037 - In the Matter of Personnel Security Hearing 1-0037 - In the Matter of Personnel Security Hearing PSH-11-0037 - In the Matter of Personnel Security Hearing This case involves an Individual with a pattern of failing to meet his financial obligations dating back to 1993. A Local Security Office (LSO) has been monitoring the Individual's financial situation since his original application for a security clearance in 2000. In 2006, the LSO received information indicating that the Individual had a large number of delinquent debts. The LSO subsequently conducted a series of five Personal Security Interviews (PSI) of the Individual, the most recent on September 29, 2011. Unable to resolve the security concerns raised by the Individual's continuing financial issues, and by the sometimes inconsistent and contradictory information provided by the Individual, the

72

PSH-12-0063 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63 - In the Matter of Personnel Security Hearing 63 - In the Matter of Personnel Security Hearing PSH-12-0063 - In the Matter of Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office (LSO) suspended the individual's security clearance because (1) a DOE consultant psychiatrist diagnosed the individual as suffering from Alcohol Abuse/Dependence, (2) the individual had been arrested four times on alcohol-related charges and had received substance abuse treatment, and (3) the individual had a history of criminal behavior, of financial irresponsibility, and of failing to keep commitments made to the LSO. This derogatory information raised security concerns under Criteria H, J, and L. After conducting a hearing and evaluating the

73

PSH-13-0097 - In the matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 - In the matter of Personnel Security Hearing 7 - In the matter of Personnel Security Hearing PSH-13-0097 - In the matter of Personnel Security Hearing The individual is an employee of a DOE contractor and holds a suspended access authorization. A Local Security Office (LSO) summoned the individual for a Personnel Security Interview (PSI), with a personnel security specialist on June 4, 2013, in order to address issues raised by an information report that he had failed to meet his income tax obligations and had his wages garnished by the Internal Revenue Service (IRS) as a result. Exhibits 5, 8. After the PSI, the LSO determined that derogatory information existed that cast into doubt the individual's eligibility for access authorization. The LSO informed the individual of this determination in a letter that set forth the DOE's security concerns

74

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

75

PSH-13-0107 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 - In the Matter of Personnel Security 7 - In the Matter of Personnel Security PSH-13-0107 - In the Matter of Personnel Security On November 29, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) cited concerns raised by the individual's use of alcohol habitually to excess and an opinion by a DOE consultant psychologist (DOE psychologist) that the individual's excessive use of alcohol was an illness or mental conditions that causes or may cause a significant defect in judgment and reliability. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate these security concerns. The individual

76

PSH-13-0006 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-13-0006 - In the Matter of Personnel Security Hearing PSH-13-0006 - In the Matter of Personnel Security Hearing PSH-13-0006 - In the Matter of Personnel Security Hearing DOE should not grant an individual access authorization. As security concerns under 10 CFR Part 710, a Local Security Office (LSO) cited the individual's history of criminal conduct, financial problems, and past use of alcohol habitually to excess. The LSO also cited the report of a DOE Psychologist, in which he identified the individual's lack of control over his spending and use of alcohol as a mental condition that causes a significant defect in his judgment and reliability. The Hearing Officer found that (1) the individual had not resolved the concerns raised by his problematic use of alcohol, as he had received no treatment in the six

77

PSH-13-0006 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 - In the Matter of Personnel Security Hearing 6 - In the Matter of Personnel Security Hearing PSH-13-0006 - In the Matter of Personnel Security Hearing DOE should not grant an individual access authorization. As security concerns under 10 CFR Part 710, a Local Security Office (LSO) cited the individual's history of criminal conduct, financial problems, and past use of alcohol habitually to excess. The LSO also cited the report of a DOE Psychologist, in which he identified the individual's lack of control over his spending and use of alcohol as a mental condition that causes a significant defect in his judgment and reliability. The Hearing Officer found that (1) the individual had not resolved the concerns raised by his problematic use of alcohol, as he had received no treatment in the six months since being arrested for DWI, and had previously relapsed after

78

PSH-12-0100 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

100 - In the Matter of Personnel Security Hearing 100 - In the Matter of Personnel Security Hearing PSH-12-0100 - In the Matter of Personnel Security Hearing On November 15, 2012, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) raised certain concerns regarding the individual's use of alcohol, citing a recent arrest for Aggravated Driving Under the Influence (DUI) and a diagnosis by a DOE consultant psychologist (DOE Psychologist) that the individual suffered from Alcohol Dependence. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate these security concerns. The individual had abstained from the use of alcohol in the

79

PSH-12-0097 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 - In the Matter of Personnel Security Hearing 7 - In the Matter of Personnel Security Hearing PSH-12-0097 - In the Matter of Personnel Security Hearing On November 29, 2012, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be restored. The Individual had been charged with committing a sexual battery. Although the Individual had testified that a jury had acquitted him of this charge, the Individual did not provide any documentation that he had been acquitted. Nor had the Individual presented sufficient evidence to resolve the concerns raised by his conduct. The Individual had also intentionally provided misleading information during a personnel security interview. The Hearing Officer found that the Individual had not mitigated any of these security concerns at the hearing.

80

PSH-13-0073 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - In the Matter of Personnel Security 3 - In the Matter of Personnel Security PSH-13-0073 - In the Matter of Personnel Security On September 27, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) cited concerns raised by the individual's use of alcohol habitually to excess and a diagnosis by a DOE consultant psychologist (DOE psychologist) that the individual met criteria found in the Diagnostic and Statistical Manual of Mental Disorders IV-TR (DSM-IV-TR) for Posttraumatic Stress Disorder (PTSD). After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate these security concerns. The individual

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Enhancing NASA Cyber Security Awareness From the C-Suite ...  

Science Conference Proceedings (OSTI)

... Leadership concerns with IT security impacts ? Cyber Security Summit Full day of workshops / panel sessions on transformation of IT / IT security ...

2013-03-28T23:59:59.000Z

82

PSH-12-0093 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - In the Matter of Personnel Security Hearing 3 - In the Matter of Personnel Security Hearing PSH-12-0093 - In the Matter of Personnel Security Hearing On November 15, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual should be granted authorization access. A Local Security Office denied the individual a security clearance because (1) during the five-year period that the individual attended a university his use of alcohol regularly resulted in his intoxication, including at least 100 instances in which the individual either passed-out or blacked-out and two instances in which law enforcement officers were involved and (2) the individual had been diagnosed with Alcohol-Related Disorder, Not Otherwise Specified, by a DOE psychologist. The individual's behavior raised security concerns under Criteria H and J.

83

PSH-12-0046 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 - In the Matter of Personnel Security Hearing 6 - In the Matter of Personnel Security Hearing PSH-12-0046 - In the Matter of Personnel Security Hearing The individual works for a Department of Energy (DOE) contractor and holds a DOE access authorization, now in suspension. During 2009 through 2011, the individual used hydrocodone other than as directed and was consuming increasing amounts of alcohol. In October 2011, he voluntarily admitted himself into a substance abuse program at a local hospital. Upon discharge from the hospital, a psychologist diagnosed the individual with alcohol and opioid dependence. Because this information raised concerns about the individual's continued eligibility for access authorization, the local security office (LSO) called him in for an interview with a personnel security specialist. After the Personnel Security Interview (PSI) failed to

84

PSH-13-0039 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 - In the Matter of Personnel Security 9 - In the Matter of Personnel Security PSH-13-0039 - In the Matter of Personnel Security On July 3, 2013, an OHA Hearing Officer issued a Decision in which she determined that an Individual's access authorization should not be restored. In reaching this determination, the Hearing Officer found that the Individual had not resolved the security concerns raised by the Local Security Office (LSO) under Criterion L arising from his six alcohol-related arrests, multiple traffic citations, and false statement during a Personnel Security Interview (PSI). The most recent alcohol-related arrest was Aggravated Driving While Intoxicated arrest, which occurred in October 2012. At the hearing, the Individual denied having consumed alcohol prior to the arrest, yet he refused to take a

85

PSH-11-0036 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0036 - In the Matter of Personnel Security Hearing 1-0036 - In the Matter of Personnel Security Hearing PSH-11-0036 - In the Matter of Personnel Security Hearing The Individual is employed by a DOE contractor and has held an access authorization for several years. DOE Exhibit (Ex.) 6 at 1. Pursuant to an investigation, it was discovered that the Individual, for a second period of time, had not filed state or federal tax returns. Ex. 4 at 1-2. This discovery prompted the Local Security Office (LSO) to conduct a Personnel Security Interview (PSI) with the Individual in October 2011. Ex. 5. After conducting the October 2011 PSI with the Individual, the LSO informed the Individual in a November 2011 notification letter (Notification Letter) that derogatory information existed that raised security concerns under 10

86

PSH-12-0042 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42 - In the Matter of Personnel Security Hearing 42 - In the Matter of Personnel Security Hearing PSH-12-0042 - In the Matter of Personnel Security Hearing This case involves an Individual who failed to meet his financial obligations during the final years of his first marriage. The Individual reported the repossession of his motor vehicle and a home foreclosure to the Local Security Office (LSO) in 2008. The LSO subsequently conducted a series of three Personal Security Interviews (PSI) of the Individual, the most recent on February 1, 2012. Unable to resolve the security concerns raised by the Individual's failure to resolve his financial issues, the LSO initiated administrative review proceedings by issuing a letter (Notification Letter) advising the Individual that it possessed reliable information that created a substantial doubt regarding his eligibility to

87

TEC Working Group Topic Groups Security  

Energy.gov (U.S. Department of Energy (DOE))

The Security Topic group is comprised of regulators, law enforcement officials, labor and industry representatives and other subject matter experts concerned with secure transport of spent nuclear...

88

Sandia National Laboratories: National Security Missions: Internationa...  

NLE Websites -- All DOE Office Websites (Extended Search)

national security through global technical engagement. Enhance security of vulnerable nuclear weapons stockpiles and weapons-usable nuclear material in countries of concern and...

89

Future United States Energy Security Concerns  

E-Print Network (OSTI)

Without energy, the economy can neither function nor grow. However, for at least the next half-century, the U.S. will not have an inexhaustible supply of inexpensive, clean energy. Dependence on energy imports, vulnerability ...

Deutch, John M.

90

Secure Communication for Advanced Metering that Preserves User ...  

a much greater concern as power information is shared over Internet connections. While conventional encryption techniques can address security concerns, ...

91

A Survey on Cloud Provider Security  

E-Print Network (OSTI)

A Survey on Cloud Provider Security Measures Alex Pucher, Stratos Dimopoulos Abstract Cloud take advantage of this model already, but security and privacy concerns limit the further adoption agencies and start offering security certifications and separate tightly controlled "government" cloud

92

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

93

Towards evaluating security implementations using the Information Security Maturity Model (ISMM).  

E-Print Network (OSTI)

??Information security is a common and ever-present concern for both private and public sector organizations. Information security protects information from a wide range of threats, (more)

Alaboodi, Saad Saleh

2007-01-01T23:59:59.000Z

94

PSH-12-0103 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0103 - In the Matter of Personnel Security Hearing PSH-12-0103 - In the Matter of Personnel Security Hearing PSH-12-0103 - In the Matter of Personnel Security Hearing On November 5, 2012, an OHA Hearing Officer issued a decision in which he concluded that access authorization should not be granted to an individual. A Local Security Office denied access authorization to the individual because she demonstrated financial irresponsibility through (1) failing to file federal and state income taxes for seven years, Tax Year (TY) 2004 through TY 2010; (2) accruing unpaid federal tax liability of $37,619.37 and unpaid state tax liability of $6,885.00; and (3) claiming nine tax withholding allowances when she knew she should only claim one. Her behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the

95

PSH-12-0136 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0136 - In the Matter of Personnel Security Hearing PSH-12-0136 - In the Matter of Personnel Security Hearing PSH-12-0136 - In the Matter of Personnel Security Hearing The individual is an employee of a DOE contractor and holds a suspended access authorization. In June 2012, the individual was arrested and charged with Aggravated Driving While Intoxicated (DWI). Exhibits 7, 8. Because of the concern this arrest raised, a Local Security Office (LSO) summoned the individual for an interview (PSI) with a personnel security specialist on July 30, 2012. Exhibit 16 (PSI Transcript). After the PSI, the LSO referred the individual to a local psychologist (hereinafter referred to as "the DOE Psychologist") for an agency-sponsored evaluation. The DOE Psychologist prepared a written report, setting forth the results of that

96

PSH-12-0077 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

77 - In the Matter of Personnel Security Hearing 77 - In the Matter of Personnel Security Hearing PSH-12-0077 - In the Matter of Personnel Security Hearing On October 25, 2012, an OHA Hearing Officer issued a decision in which he concluded the DOE should not grant an individual an access authorization. A Local Security Office (LSO) raised certain concerns regarding (1) diagnoses by a DOE consultant psychologist (DOE Psychologist) that the individual suffered from Alcohol Dependence and Personality Disorder NOS; (2) the individual's history of problematic alcohol use; (3) prior criminal conduct of the individual; (4) evidence of the individual's financial irresponsibility; and (5) inconsistent information provided to DOE during the security clearance process. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer

97

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

98

Low cutter load raise head  

SciTech Connect

A raise head having a multiplicity of cutters for enlarging a pilot hole into a larger diameter hole by disintegrating the earth formations that surround the pilot hole is provided that will require lower cutter loads to penetrate the formations being bored by directing the rock fracture planes toward the pilot hole forcing the rock to yield with less input energy. The cutters are positioned on the raise head to provide an earth formation contact profile with a major portion of said earth formation contact profile extending outward and upward from said pilot hole. The included angle between the major portion of the earth formation contact profile and the axis of the pilot hole is less than 90/sup 0/.

Saxman, W.C.

1981-03-31T23:59:59.000Z

99

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

100

Superposition, Entanglement, and Raising Schrodinger's Cat  

Science Conference Proceedings (OSTI)

Superposition, Entanglement, and Raising Schrodinger's Cat. Purpose: Research on precise control of quantum systems ...

2013-03-20T23:59:59.000Z

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

102

Reporting Employee Concerns | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Reporting Employee Concerns Reporting Employee Concerns Reporting Employee Concerns Reporting Employee Concerns is an important part of our work. Energy Department employees and any contractor or subcontractor fulfilling DOE's mission have the right and responsibility to report concerns relating to the environment, safety, health, or management of Department operations. Free and open expression of Energy Department Federal and contractor and subcontractor employee concerns is essential to safe and efficient accomplishment of the Energy Department's missions. The Employee Concerns Program is designed to- Encourage open communication; Inform employees of the proper forum for consideration of their concerns; Ensure employees can raise issues without fearing reprisal; Address employee concerns in a timely and objective manner; and

103

PSH-13-0088 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 - In the Matter of Personnel Security 8 - In the Matter of Personnel Security PSH-13-0088 - In the Matter of Personnel Security On October 10, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be restored. The Record showed that the individual had a DWI, an arrest for an outstanding warrant for arrest, and an alcohol-related termination of employment. A DOE Psychologist also diagnosed the individual with Alcohol-Abuse. The Hearing Officer found that the Individual had not shown that he was reformed or rehabilitated from his Alcohol-Abuse. Nor had the individual mitigated the security concerns raised by his criminal activity since that activity was symptomatic of his Alcohol Abuse. The Hearing officer also found that the LSO's allegation that the individual

104

PSH-13-0086 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 - In the Matter of Personnel Security Hearing 6 - In the Matter of Personnel Security Hearing PSH-13-0086 - In the Matter of Personnel Security Hearing On October 29, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should be restored. The Record showed that the individual had two DUIs and that a DOE Psychologist also diagnosed him with Alcohol-Abuse. After hearing the testimony of a DOE Psychiatrist that, in his expert opinion, the Individual was far enough along in his recovery to be reformed or rehabilitated from his Alcohol Abuse, the Hearing Officer found that the Individual had shown that he was reformed or rehabilitated from his Alcohol-Abuse, and had therefore mitigated the security concerns raised by his Alcohol Abuse and criminal activity since that activity was symptomatic

105

PSH-13-0063 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - In the Matter of Personnel Security Hearing 3 - In the Matter of Personnel Security Hearing PSH-13-0063 - In the Matter of Personnel Security Hearing On September 12, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) raised certain concerns regarding the individual's use of alcohol, citing a diagnosis by a DOE consultant psychologist (DOE psychologist) that the individual had suffered from Alcohol Dependence, which since had attenuated to Alcohol Abuse; the recommendation of the individual's primary care physician that the individual stop consuming alcohol and the physician's diagnoses of alcoholism, alcoholic hepatitis, liver damage, and type 2 diabetes; and statements by the individual regarding his use of alcohol and efforts at

106

PSH-13-0065 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 - In the Matter of Personnel Security Hearing 5 - In the Matter of Personnel Security Hearing PSH-13-0065 - In the Matter of Personnel Security Hearing On September 12, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) raised certain concerns regarding the individual's use of alcohol, citing a diagnosis by a DOE consultant psychologist (DOE psychologist) that the individual had suffered from Alcohol Dependence, which since had attenuated to Alcohol Abuse; the recommendation of the individual's primary care physician that the individual stop consuming alcohol and the physician's diagnoses of alcoholism, alcoholic hepatitis, liver damage, and type 2 diabetes; and statements by the individual regarding his use of alcohol and efforts at

107

PSH-13-0108 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-13-0108 - In the Matter of Personnel Security PSH-13-0108 - In the Matter of Personnel Security PSH-13-0108 - In the Matter of Personnel Security On December 6, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) cited concerns raised by the individual's use of alcohol and an opinion by a DOE consultant psychiatrist (DOE psychiatrist) that the individual met criteria for a diagnosis of Alcohol Abuse under the Diagnostic and Statistical Manual of Mental Disorders (DSM), Fourth Edition, Text Revision, and Alcohol Use Disorder, Mild, under the DSM, Fifth Edition, and that both disorders are illnesses or mental conditions that cause or may cause a significant defect in judgment and reliability. After conducting a hearing and evaluating

108

PSH-13-0018 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 - In the Matter of Personnel Security Hearing 8 - In the Matter of Personnel Security Hearing PSH-13-0018 - In the Matter of Personnel Security Hearing On May 23, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be granted. The Individual had a history of six arrests, five of which were alcohol-related and two of which were marijuana-related. In addition, A DOE Psychologist diagnosed the individual with Alcohol Dependence. The Hearing Officer found that the Individual had not mitigated any the security concerns raised by his alcohol abuse and history of criminal conduct at the hearing, because he was only in the early stages of his recovery from his alcohol dependence, and his alcohol dependence was a contributing factor to much of his criminal conduct. The Hearing Officer

109

PSH-13-0083 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - In the Matter of Personnel Security Hearing 3 - In the Matter of Personnel Security Hearing PSH-13-0083 - In the Matter of Personnel Security Hearing On October 21, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be restored. The Record showed that the individual had a history of three alcohol-related arrests. A DOE Psychologist also diagnosed the individual with Alcohol-Abuse. The Hearing Officer found that the Individual had not shown that he was reformed or rehabilitated from his Alcohol-Abuse. Nor had the individual mitigated the security concerns raised by his criminal activity since that activity was symptomatic of his Alcohol Abuse. Steven Fine - Hearing Officer PSH-13-0083.pdf More Documents & Publications

110

PSH-13-0063 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-13-0063 - In the Matter of Personnel Security Hearing PSH-13-0063 - In the Matter of Personnel Security Hearing PSH-13-0063 - In the Matter of Personnel Security Hearing On September 12, 2013, an OHA Hearing Officer issued a decision in which he concluded the DOE should not restore an individual's access authorization. A Local Security Office (LSO) raised certain concerns regarding the individual's use of alcohol, citing a diagnosis by a DOE consultant psychologist (DOE psychologist) that the individual had suffered from Alcohol Dependence, which since had attenuated to Alcohol Abuse; the recommendation of the individual's primary care physician that the individual stop consuming alcohol and the physician's diagnoses of alcoholism, alcoholic hepatitis, liver damage, and type 2 diabetes; and statements by the individual regarding his use of alcohol and efforts at

111

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

112

Security Enforcement Reporting Criteria | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Classified information security noncompliances are categorized according to the disclosure or potential disclosure of DOE classified information placed at risk. There are two categories of noncompliances that are based on the relative severity of a classified information security incident. The categories are identified by an event category and type. Each of the two categories is further subdivided into three types based on the type of interest (security interest, management interest, and procedural interest). Security Enforcement Reporting Criteria More Documents & Publications Safety and Security Enforcement Coordinator Handbook DOE-STD-1210-2012 HQFMSP Chapter 11, Incidents of Security Concern

113

Lesson 8 - Concerns | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 - Concerns 8 - Concerns Lesson 8 - Concerns Nuclear energy is one of our three largest sources of electricity. It is important for us to make sure nuclear power plants are safe and reliable. In decisions to build and operate a nuclear power plant, safety and security are essential concerns. Learning from past accidents, understanding this energy source, and protecting against risk are important in our energy mix. This lesson covers concerns that people have about nuclear power plants: Safety at nuclear power plants Design features Engineered safety Barriers and backups Regulations Security Accidents Three Mile Island Chernobyl Fukashima Learning from accidents Lesson 8 - Concerns.pptx More Documents & Publications Safety Bulletin 2011-01, Events Beyond Design Safety Basis Analysis

114

Employee Concerns Related Documents | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Employee Concerns Related Documents Employee Concerns Related Documents Employee Concerns Related Documents The documents on this page are related to the Department of Energy's Reporting Employee Concerns Program, which you can find information about here. The DOE Order on Employee Concerns 442.1A establishes a Department of Energy (DOE) Employee Concerns Program (ECP) that ensures employee concerns related to such issues as the environment, safety, health, and management of DOE and the National Nuclear Security Administration (NNSA) programs and facilities are addressed through- a. prompt identification, reporting, and resolution of employee concerns regarding DOE facilities or operations in a manner that provides the highest degree of safe operations; b. free and open expression of employee

115

Y-12 team raises more than $20,000 for Light the Night event | Y-12  

NLE Websites -- All DOE Office Websites (Extended Search)

team raises more than ... team raises more than ... Y-12 team raises more than $20,000 for Light the Night event Posted: November 8, 2013 - 12:00pm More than 86 Y-12 employees and family members participated at this year's Leukemia and Lymphoma Society's Light the Night walk held Oct. 24 at the University of Tennessee. The B&W Y 12 team, recognized as the largest corporate team at the event, raised more than $20,000. Participating in the Leukemia and Lymphoma Society's Light The Night Walk funds therapies and treatment advances for blood cancer patients. Follow Y-12 on Facebook, Twitter, YouTube and Flickr. B&W Y-12, a limited liability enterprise of The Babcock and Wilcox Company and Bechtel National Inc., operates the Y-12 National Security Complex for the National Nuclear Security Administration.

116

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

117

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

118

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

119

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

120

The ghost of OPEC in energy security policy  

Science Conference Proceedings (OSTI)

Energy security policy continues to be haunted - at least within the halls of government - by fears of OPEC`s potential ability to curb oil supplies to the United States or to unexpectedly raise prices to economy-damaging levels. OPEC continues to exert (mainly psychological) influence in excess of its market role. Becaue OPEC`s continued existence skews the energy policy debate in the United States and in other oil-consuming countries, and because it complicates otherwise constructive relations between the US and the Arab world, the Clinton administration should confront OPEC and America`s energy security concerns directly. In its forthcoming energy-policy plan, the administration could declare the abolition of OPEC to be a goal of US foreign and trade policy. As a countermeasure, US energy policymakers should abandon the inflammatory frame of reference of energy security. No practical purpose has been served domestically or internationally by adherence to a policy that in the end has simply raised the economic cost of a vital commodity.

Stagliano, V.A.

1995-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 30, 2013 August 30, 2013 PSH-13-0049 - In the Matter of Personnel Security On August 30, 2013, a Hearing Officer issued a Decision in which he determined that an individual's access authorization should not be granted. In reaching this determination, the Hearing Officer found that the individual had not resolved security concerns under Criterion L regarding the Individual's failure to report an arrest for failure to appear at an arraignment concerning traffic tickets and a citation for failing to have a controlled prescription medication in its proper container. August 29, 2013 PSH-13-0057 - In the Matter of Personnel Security On August 28, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security

122

Chief Medical Officer: Occupational Medicine in Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Security requirements provide for the medical assessment of employees to identify potential threats against the nuclear information, materials, and weapons over which DOE holds jurisdiction. When effectively integrated with the services of personnel security, counterintelligence, and other allied security professionals, medical services contribute directly to national security. In addition, workplace violence has increasingly been recognized as safety and security concern which warrants organizational planning and response. The following policy, guidance, and additional resources may apply. 1. Access Authorization Programs 2. Human Reliability Programs 3. Physical Protection Programs 4. Workplace Violence Programs 5. Counterintelligence Programs

123

Confidentiality Concerns Raised by DNA-Based Tests in the Market-Driven Managed Care Setting  

SciTech Connect

In a policy climate where incentives to cherry pick are minimized, Managed Care Organizations can implement practices that safeguard medical privacy to the extent that data is protected from falling into the hands of third parties who could misuse it to discriminate. To the extent that these practices have been codified into the regulatory Network of the Health Insurance Portability and Accountability Act (HIPAA) Consumers may be able to rest easy about their genetic data being revealed to third parties who may discriminate. However, there are limitations to the use of policy instruments to prevent the discrimination of an entire genre of clients by market driven managed care organizations. Policy measures, to assure that knowledge of genetic conditions and their future costs would not be used by market driven managed care organizations to implement institutional policies and products that would implicitly discriminate against a genre of clients with genetic conditions, present difficulties.

Kotval, Jeroo S.

2006-07-28T23:59:59.000Z

124

Revisiting Bluetooth Security (Short Paper)  

Science Conference Proceedings (OSTI)

Bluetooth technology is gaining increasing interest in the research community because of the convenience of exchanging information between wireless devices. As the communication medium is wireless, security is an important concern in this emerging technology. ... Keywords: Authentication, Bluetooth security, Bluetooth technology, Privacy, Wireless communications

Manik Lal Das; Ravi Mukkamala

2008-12-01T23:59:59.000Z

125

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

126

Secure SCADA network technology and methods  

Science Conference Proceedings (OSTI)

The overall security concern facing the designers and operators of SCADA and, more generally, of industrial control systems typically originates either from malicious threat agents attempting to disrupt the control system operation, e.g. to create a ... Keywords: SCADA security, secure SCADA networks

Farkhod Alsiherov; Taihoon Kim

2010-05-01T23:59:59.000Z

127

A metadata calculus for secure information sharing  

Science Conference Proceedings (OSTI)

In both commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information to the concerned actors. Traditional approaches to information sharing that rely on security labels (e.g., Multi-Level Security (MLS)) ... Keywords: access control, information flow, risk management

Mudhakar Srivatsa; Dakshi Agrawal; Steffen Reidt

2009-11-01T23:59:59.000Z

128

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

129

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

130

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 19, 2013 April 19, 2013 PSH-13-0006 - In the Matter of Personnel Security Hearing DOE should not grant an individual access authorization. As security concerns under 10 CFR Part 710, a Local Security Office (LSO) cited the individual's history of criminal conduct, financial problems, and past use of alcohol habitually to excess. The LSO also cited the report of a DOE Psychologist, in which he identified the individual's lack of control over his spending and use of alcohol as a mental condition that causes a significant defect in his judgment and reliability. April 17, 2013 PSH-12-0143 - In the Matter of Personnel Security On April 17, 2013, an OHA Hearing Officer issued a decision in which he determined that the DOE should not restore an individual's access authorization. As security concerns under Criteria H, J, and L of 10 CFR

131

Lawrence Livermore charitable campaign raises $3.3 million for local  

National Nuclear Security Administration (NNSA)

charitable campaign raises $3.3 million for local charitable campaign raises $3.3 million for local organizations | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Lawrence Livermore charitable campaign raises $3.3 million ... Lawrence Livermore charitable campaign raises $3.3 million for local organizations Posted By Office of Public Affairs

132

LANL raises record $3.1 million in contributions | National Nuclear  

National Nuclear Security Administration (NNSA)

raises record $3.1 million in contributions | National Nuclear raises record $3.1 million in contributions | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > LANL raises record $3.1 million in contributions LANL raises record $3.1 million in contributions Posted By Office of Public Affairs NNSA Blog LANL employees pledged a record $2.13 million this year to United Way and

133

Y-12 team raises more than $20,000 for Light the Night event | National  

National Nuclear Security Administration (NNSA)

team raises more than $20,000 for Light the Night event | National team raises more than $20,000 for Light the Night event | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Y-12 team raises more than $20,000 for ... Y-12 team raises more than $20,000 for Light the Night event Posted By Office of Public Affairs More than 86 Y-12 employees and family members participated at this

134

Neutralization: new insights into the problem of employee systems security policy violations  

Science Conference Proceedings (OSTI)

Employees' failure to comply with information systems security policies is a major concern for information technology security managers. In efforts to understand this problem, IS security researchers have traditionally viewed violations of IS security ... Keywords: IS security, IS security policies, compliance, deterrence theory, neutralization theory

Mikko Siponen; Anthony Vance

2010-09-01T23:59:59.000Z

135

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 13, 2013 June 13, 2013 PSH-13-0034 - In the Matter of Personnel Security Hearing On June 13, 2013, a Hearing Officer determined that an individual's security clearance should not be restored. In reaching this determination, the Hearing Officer found that the individual had not successfully addressed the DOE's security concerns regarding her finances under criterion (l). June 11, 2013 PSH-13-0019 - In the Matter of Personnel Security On June 11, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's authorization access should be restored. A Local Security Office suspended the individual's security clearance following the individual contemplating suicide and, subsequently, being diagnosed by a DOE consulting psychologist as meeting the criteria for

136

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 10, 2013 October 10, 2013 PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. October 10, 2013 PSH-13-0070 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. Following the individual's employer receiving garnishment notices from both federal and state tax authorities in January 2013, the

137

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

138

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

139

A model and optimization of alternative fuel vehicle fleet composition with triple bottom line concerns .  

E-Print Network (OSTI)

??Alternative fuel types and technologies are increasingly being advocated for transportation needs to ameliorate concerns around energy security, climate change, and fuel cost. Each fuel (more)

Zullo, Johnathon

2012-01-01T23:59:59.000Z

140

Los Alamos director echoes cyber concerns  

NLE Websites -- All DOE Office Websites (Extended Search)

Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Director Charlie McMillan told a gathering of energy executives that securing the electrical grid is a major concern now and it's only becoming more serious. May 21, 2013 Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Contact Fred deSousa

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

142

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

143

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

144

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

145

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

146

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

147

Energy Security: An Interdisciplinary Approach, 2nd edition  

Science Conference Proceedings (OSTI)

Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing international competition over fossil fuel deposits. Energy Security: An Interdisciplinary Approach gives A comparative ...

Gawdat Bahgat

2011-05-01T23:59:59.000Z

148

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

149

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

150

Safeguards and security progress report, January-December 1983  

SciTech Connect

From January to December 1983, the Los Alamos Safeguards and Security Program was involved in the activities described in the first four parts of this report: Nuclear Facility Support, Security Development and Support, Safeguards Technology Development, and International Safeguards. Part 1 covers efforts of direct assistance to the Department of Energy (DOE) and Nuclear Regulatory Commission (NRC) licensee facilities. This assistance includes consultation on materials accounting problems, development of specialized techniques and instruments, and comprehensive participation in the design and implementation of advanced safeguards systems. In addition, a series of training courses in various aspects of safeguards makes the technology more accessible to those who must apply it. Part 2 treats activities aimed at the security of information and computer systems. Our focus this peiod was on continuing the activities of the Computer Security Center, which provides the basis for encouraging and disseminating this emerging technology, and on the development and demonstration of secure computer systems. Part 3 describes the broad development efforts essential to continuing improvements in the practice of safeguards. Although these projects are properly classified as developmental, they address recognized problems that commonly occur in operating facilities. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Enrichment plant safeguards, especially those concerning the Gas Centrifuge Enrichment Plant, required a significant portion of our resources. These efforts are beginning to provide substantial returns on our investment in technology transfer, not only in raising the level of safeguards effectiveness but also in our benefiting from field experiences in operating environments.

Smith, D.B. (comp.)

1984-09-01T23:59:59.000Z

151

Safeguards and security progress report, January-December 1984  

SciTech Connect

From January to December 1984, the Los Alamos Safeguards and Security Program was involved in the activities described in the first four parts of this report: Nuclear Facility Support, Security Development and Support, Safeguards Technology Development, and International Safeguards. Part 1 covers efforts of direct assistance to the Department of Energy (DOE) and Nuclear Regulatory Commission (NRC) licensee facilities. Part 2 treats activities aimed at the security of information and computer systems. was Part 3 describes the broad development efforts essential to continuing improvements in the practice of safeguards. Although these projects are properly classified as developmental, they address recognized problems that commonly occur in operating facilities. Finally, Part 4 covers international safeguards activities, including both support to the International Atomic Energy Agency and bilateral exchanges. Enrichment plant safeguards, especially those concerning the Gas Centrifuge Enrichment Plant, required a significant portion of our resources. These efforts are beginning to provide substantial returns on our investment in technology transfer, not only in raising the level of safeguards effectiveness but also in benefiting from field experiences in operating environments.

Smith, D.B. (comp.)

1986-01-01T23:59:59.000Z

152

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

REPORTING REQUIREMENTS REPORTING REQUIREMENTS Reporting Requirements Matrix Special Message from the Corporate Investigations Office REPORTING PERSONNEL SECURITY CONCERNS If you report an incident of security concern involving yourself or a coworker, you must do so in writing with signature and date. Your report should contain factual and comprehensive information regarding the incident. A good rule of thumb is to ask yourself did I cover the "Who, What, When, Where, and How." If you did, your report will most likely provide all of the necessary information needed by personnel security to render an adjudicative action or decision. FSO Reporting Responsibilities List of company changes that need to be reported by the FSO. SF 2730-NCB, Name Change Request DOE F 5631.29, Security Termination Statement

153

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

154

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 23, 2013 January 23, 2013 PSH-12-0121 - In the Matter of Personnel Security Hearing This Decision concerns the eligibility of XXXXXXXX (hereinafter referred to as "the individual") to hold an access authorization under the Department of Energy's (DOE) regulations set forth at 10 C.F.R. January 17, 2013 PSH-12-0118 - In the Matter of Personnel Security Hearing On January 17, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security clearance after the individual had incurred $20,000 in charges while patronizing a "gentleman's club" on a single evening; approximately $17,000 of that amount was charged to his corporate credit card. His

155

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 19, 2011 July 19, 2011 TSO-1013 - In the Matter of Personnel Security The individual works for a Department of Energy (DOE) contractor and is an applicant for a DOE access authorization. In the report of a background investigation, the Office of Personnel Management noted that the individual had a history of anger, unusual behaviors, animal abuse, illegal drug use, court-ordered anger management, and counseling. The Local Security Office (LSO) interviewed the individual on June 9, 2010, regarding these concerns in a Personnel Security Interview (PSI). July 15, 2011 TSO-1003 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 2010. His employer requested that DOE grant the individual a clearance. The individual completed a Questionnaire for National Security

156

Concerning "Modeling" of Computer Security D. Elliott Bell  

E-Print Network (OSTI)

understanding of atoms fell short. Quantum mechanics was required to deal with atomic and nuclear phenomena

Li, Ninghui

157

Research Challenges for the Security of Control Systems Alvaro A. Cardenas Saurabh Amin  

E-Print Network (OSTI)

analysis attacks. · Modbus security issues: A SCADA protocol of note- worthy concern is the Modbus protocol

Sastry, S. Shankar

158

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

159

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

160

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Office of Health, Safety and Security: Chief Medical Officer  

NLE Websites -- All DOE Office Websites (Extended Search)

CMO CMO Home Occupational Medicine Guiding Principles Occupational Medicine in Health and Safety Occupational Medicine in Security Occupational Medicine in Employee Concerns and...

162

Poland and the European Union's security and defense policy .  

E-Print Network (OSTI)

??This thesis analyzes key factors in Poland's decision-making concerning the European Union's European Security and Defense Policy (ESDP). It reviews the development of Polish policy (more)

Falecki, Tomasz.

2004-01-01T23:59:59.000Z

163

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

164

Security Hearing FAQs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Hearings » Security Hearing FAQs Services » Hearings » Security Hearing FAQs Security Hearing FAQs (1) What is the purpose of the hearing? The purpose of the hearing is to provide you with an opportunity to respond to the DOE's questions concerning your eligibility to hold a security clearance ("security concerns"), as outlined in the Statement of Charges attached to the Notification Letter. During the hearing, you will be able to present evidence to explain, refute or mitigate the derogatory information cited in the Statement of Charges. After the hearing, the Hearing Officer will review the testimonial and documentary evidence in the record, and issue a Decision which contains findings of fact and a determination whether or not to grant or restore your security clearance.

165

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

166

Secure application partitioning for intellectual property protection  

E-Print Network (OSTI)

Intellectual property protection is a major concern for both hardware and software architects today. Recently secure platforms have been proposed to protect the privacy of application code and enforce that an application ...

O'Donnell, Charles W., S.M. Massachusetts Institute of Technology

2005-01-01T23:59:59.000Z

167

Secure transfer of measurement data in open systems  

Science Conference Proceedings (OSTI)

The liberalization of different markets which are liable to legal metrology accelerates the need for transferring measuring data over open networks. This increases the involvement of communication technology in measuring systems and raises new security ... Keywords: Digital signatures, Legal metrology, SELMA, Secure data transfer

Luigi Lo Iacono; Christoph Ruland; Norbert Zisky

2006-01-01T23:59:59.000Z

168

Complete Security Framework for Wireless Sensor Networks  

E-Print Network (OSTI)

Security concern for a Sensor Networks and level of security desired may differ according to application specific needs where the sensor networks are deployed. Till now, most of the security solutions proposed for sensor networks are layer wise i.e a particular solution is applicable to single layer itself. So, to integrate them all is a new research challenge. In this paper we took up the challenge and have proposed an integrated comprehensive security framework that will provide security services for all services of sensor network. We have added one extra component i.e. Intelligent Security Agent (ISA) to assess level of security and cross layer interactions. This framework has many components like Intrusion Detection System, Trust Framework, Key Management scheme and Link layer communication protocol. We have also tested it on three different application scenarios in Castalia and Omnet++ simulator.

Sharma, Kalpana; Kuldeep,

2009-01-01T23:59:59.000Z

169

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

170

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 1, 2013 November 1, 2013 PSH-13-0092 - In the Matter of Personnel Security On November 1, 2013, a Hearing Officer issued a Decision in which he determined that an individual's access authorization should not be restored. In reaching this determination, the Hearing Officer found that the individual had not resolved security concerns regarding the Criterion L concerns arising from his lengthy history of financial irresponsibility and his failure to timely comply with an information request regarding his financial status. October 29, 2013 PSH-13-0086 - In the Matter of Personnel Security Hearing On October 29, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should be restored. The Record showed that the individual had two DUIs and that a

171

Positive perspectives on cloud security  

Science Conference Proceedings (OSTI)

The adoption of cloud computing has faced challenges and there are concerns about the risks, the loss of control of data and the assurance of security and access control. This paper aims to show that these should be viewed as requirements which need ...

Piers Wilson

2011-08-01T23:59:59.000Z

172

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

173

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

174

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

175

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

176

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 14, 2012 February 14, 2012 PSH-11-0002 - In the Matter of Personnel Security Hearing The administrative review proceeding began with the issuance of a Notification Letter to the Individual. See 10 C.F.R. 710.21. The letter informed the Individual that information in the possession of the DOE created a substantial doubt concerning her eligibility for a security clearance. Specifically, the Local Security Office (LSO) characterized this information as indicating that the Individual had engaged in unusual conduct which brought her honesty, trustworthiness, and reliability into question, and been diagnosed by a psychologist with alcohol abuse. February 9, 2012 PSH-11-0015 - In the Matter of Personnel Security Hearing The individual is employed by a DOE contractor in a position that requires

177

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

178

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

179

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

180

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Solar Decathlon 2013: Raising More Than Just Walls | Department...  

NLE Websites -- All DOE Office Websites (Extended Search)

Raising More Than Just Walls Solar Decathlon 2013: Raising More Than Just Walls September 10, 2013 - 1:36pm Addthis Key to the University of North Carolina at Charlotte's...

182

Research trend on secure SCADA network technology and methods  

Science Conference Proceedings (OSTI)

The overall security concern facing the designers and operators of SCADA and, more generally, of industrial control systems typically originates either from malicious threat agents attempting to disrupt the control system operation, e.g. to create a ... Keywords: SCADA security, SCADA systems, secure SCADA networks

Farkhod Alsiherov; Taihoon Kim

2010-08-01T23:59:59.000Z

183

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

184

Three essays concerning information transmission  

E-Print Network (OSTI)

Transmissionas an Information-Transmission Mechanism, American EconomicConcerning Information Transmission A dissertation submitted

Boone, Johnathan

2010-01-01T23:59:59.000Z

185

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

186

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

187

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

188

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

189

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

190

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

191

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

192

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

193

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

194

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

195

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

196

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

197

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

198

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

199

Review of the Hanford Site Employee Concerns Programs, July 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Independent Oversight Review of the Independent Oversight Review of the Hanford Site Employee Concerns Programs May 2011 July 2012 Office of Safety and Emergency Management Evaluations Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose .................................................................................................................................................... 1 2.0 Background ............................................................................................................................................. 1 3.0 Scope ....................................................................................................................................................... 1

200

Review of the Hanford Site Employee Concerns Programs, July 2012  

NLE Websites -- All DOE Office Websites (Extended Search)

Independent Oversight Review of the Independent Oversight Review of the Hanford Site Employee Concerns Programs May 2011 July 2012 Office of Safety and Emergency Management Evaluations Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose .................................................................................................................................................... 1 2.0 Background ............................................................................................................................................. 1 3.0 Scope ....................................................................................................................................................... 1

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

202

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

203

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

204

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

205

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

206

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

207

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

208

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

209

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

210

Office of Departmental Personnel Security - Frequently Asked Questions  

NLE Websites -- All DOE Office Websites (Extended Search)

Frequently Asked Questions (FAQs) Frequently Asked Questions (FAQs) DOE Personnel Security The Personnel Security Program ensures that individuals who are being considered for access to classified information or special nuclear material (SNM) meet national standards of honesty, reliability, and trustworthiness. Because each Federal agency's program is similar, most questions come from personnel who have never had a security clearance (DOE calls it an access authorization) or who are confused because they had clearances at agencies that had requirements that differ slightly from DOE's. Additional information for applicants can be found at "Overview of Access Authorization Process for Applicants". Q: How does drug use impact my ability to get an access authorization? A: Use of illegal drugs, abuse of prescription drugs, and misuse of other substances such as inhalants raise concerns about an individual's eligibility for an access authorization. Such activities call into question the person's willingness to follow rules and requirements, reliability, and good judgment. In general, individuals involved with illegal drugs or substance abuse will not be granted an access authorization if the activity occurred within the year prior to the application for the access authorization. If the activity occurred within two years, the full circumstances surrounding the activity will be evaluated and the individual may qualify for an access authorization, although it is unlikely that he or she will do so. Information pertaining to drug use which occurred more than two years ago will not be automatically disqualifying for an access authorization but will be fully evaluated with all other available information in order to determine whether the individual should be granted an access authorization.

211

City of Longwood - Raising Energy Efficiency Program (Florida) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Longwood - Raising Energy Efficiency Program (Florida) Longwood - Raising Energy Efficiency Program (Florida) City of Longwood - Raising Energy Efficiency Program (Florida) < Back Eligibility Residential Savings Category Home Weatherization Commercial Weatherization Sealing Your Home Design & Remodeling Windows, Doors, & Skylights Insulation Appliances & Electronics Water Heating Solar Buying & Making Electricity Heating & Cooling Swimming Pool Heaters Maximum Rebate $500 a year Program Info Start Date 01/18/2012 State Florida Program Type Local Rebate Program Rebate Amount Varies; 10% of project cost for solar panels or photovoltaic systems (including pools) The City of Longwood offers the Raising Energy Efficiency Program (REEP) to owner occupied residences within the City of Longwood for making energy

212

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

213

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

214

Cyber Security Standards.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

215

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 12, 2012 March 12, 2012 PSH-11-0008 - In the Matter of Personnel Security Hearing On March 12, 2012, an OHA Hearing Officer issued a Decision in which she determined that an Individual=s access authorization should not be granted. In reaching this determination, the Hearing Officer found that the Individual had not resolved the security concerns arising from his illegal drug use, alcohol use, and misrepresentations made during the process regarding his eligibility for access authorization. At the hearing, the Individual did not present any evidence to rebut any of the allegations. March 5, 2012 PSH-11-0010 - In the Matter of Personnel Security Hearing The Individual is employed by a DOE contractor and has held a DOE access authorization for several years. DOE Exhibit (Ex.) 13 at 2. In June 2011,

216

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9, 2013 9, 2013 PSH-13-0052 - In the Matter of Personnel Security Hearing On July 9, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should be restored. A DOE Psychiatrist had found that the individual suffered from alcohol abuse. The Hearing Officer found that the Individual mitigated these security concerns at the hearing by presenting evidence that he had more than fully complied with the DOE Psychiatrist's treatment recommendations and the treatment has been effective. Steven Fine - Hearing Officer July 3, 2013 PSH-13-0048 - In the Matter of Personnel Security Hearing On July 3, 2013, a Hearing Officer issued a Decision in which he determined that an individual's access authorization should be restored. In reaching

217

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

218

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

219

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

220

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Rupp et al. Reply: In his Comment [1], J. E. Moussa (JEM) raises concerns regarding the accuracy of our re-  

E-Print Network (OSTI)

Argonne Leadership Computing Facility Argonne National Laboratory Argonne, Illinois 60439, USA Received 30 Computing Facility at Argonne National Laboratory, and is supported by the U.S. Department of Energy, Basic. Discussions with K. Hansen are greatly acknowledged. This research used resources of the Argonne Leadership

222

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

223

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

224

PSH-13-0068 - In the Matter of Personnel Security | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

individual's access authorization. As security concerns under 10 C.F.R. Part 710, a Local Security Office cited, among other things, the individual's failure to satisfy debts, the...

225

Computational Models of Learning the Raising-Control Distinction  

Science Conference Proceedings (OSTI)

We consider the task of learning three verb classes: raising (e.g., seem), control (e.g., try) and ambiguous verbs that can be used either way (e.g., begin). These verbs occur in sentences with similar surface forms, but have ... Keywords: Bayesian inference, Child language acquisition, Clustering, Control, Raising, Syntax, Unsupervised learning

William Garrett Mitchener; Misha Becker

2010-09-01T23:59:59.000Z

226

Los Alamos Employees' Scholarship Fund raises record amount  

NLE Websites -- All DOE Office Websites (Extended Search)

Los Alamos Employees' Scholarship Fund raises record amount Los Alamos Employees' Scholarship Fund raises record amount Community Connections: Our link to Northern New Mexico Communities Latest Issue:Dec. 2013 - Jan. 2014 All Issues » submit Los Alamos Employees' Scholarship Fund raises record amount $555,625 will fund regional students' post-secondary education July 1, 2013 Students from Valarde Middle School won the video competition in the Best in Show and Middle School categories. They are shown here with sixth-grade teacher Jimmy Lara. Lab Director Charlie McMillan throws out the first pitch at an Isotopes game that helped raise funds for Los Alamos National Laboratory Foundation scholarship program Contact Editor Linda Anderman Email Community Programs Office Kurt Steinhaus Email Los Alamos Employees' Scholarship Fund raises record amount

227

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

228

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

229

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

230

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

231

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

232

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

233

Cyber Security and Resilient Systems  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nations cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

234

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

235

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

236

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

237

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

238

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

239

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

240

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

242

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

243

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

244

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

245

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

246

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

247

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

248

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

249

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

250

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

251

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

252

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

253

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

254

Are Securities Class Actions Supplemental to SEC Enforcement? An Empirical Analysis  

E-Print Network (OSTI)

s quarterly or annual financial statements, or in a pressof earnings in its financial statements or an exaggerationStatement of the Securities and Exchange Commission Concerning Financial

Klausner, Michael

2008-01-01T23:59:59.000Z

255

Lawrence Livermore charitable campaign raises $3.3 million for...  

National Nuclear Security Administration (NNSA)

Lawrence Livermore raises 3.3 million for local organizations Posted on December 12, 2013 at 3:00 pm ET Printer-friendly version Printer-friendly version Facebook Twitter...

256

Moisture Control in Insulated Raised Floor Systems in Southern Louisiana  

E-Print Network (OSTI)

polyisocyanurate foam, open-cell sprayed polyurethane foams of vary- ing vapor permeance, closed-cell sprayed in guidance for insulating raised floors in the hot and humid climate of the Gulf Houses with pier foundations

257

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

258

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

259

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

260

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

262

Navigating computer science research through waves of privacy concerns: discussions among computer scientists at Carnegie Mellon University  

Science Conference Proceedings (OSTI)

Computer Science research and practice are raising growing privacy concerns among the public and government. Computer technology's increasing ability to capture, organize, interpret and share data about individuals raises questions about what privacy ... Keywords: data mining, ethics, face recognition, institutional review board, personal assistants, privacy, privacy technology, surveillance

Latanya Sweeney

2004-03-01T23:59:59.000Z

263

Microgrid cyber security reference architecture.  

SciTech Connect

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

264

Architectural support for secure virtualization under a vulnerable hypervisor  

Science Conference Proceedings (OSTI)

Although cloud computing has emerged as a promising future computing model, security concerns due to malicious tenants have been deterring its fast adoption. In cloud computing, multiple tenants may share physical systems by using virtualization techniques. ...

Seongwook Jin; Jeongseob Ahn; Sanghoon Cha; Jaehyuk Huh

2011-12-01T23:59:59.000Z

265

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

266

Robust and secured image-adaptive data hiding  

Science Conference Proceedings (OSTI)

Rapid growth in the demand and consumption of digital information in past decade has led to valid concerns over issues such as content security, authenticity and digital right management. Imperceptible data hiding in digital images is an excellent example ... Keywords: AET, CDCS, Data hiding, Energy, IQMs, PSNR, Quantization, Robustness, Security, Steganography

Suresh N. Mali; Pradeep M. Patil; Rajesh M. Jalnekar

2012-03-01T23:59:59.000Z

267

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

268

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

269

Allegations Concerning Contracting for Services of Former Employees at Sandia National Laboratories, INS-L-13-04  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Allegations Concerning Contracting Allegations Concerning Contracting for Services of Former Employees at Sandia National Laboratories INS-L-13-04 March 2013 Department of Energy Washington, DC 20585 March 15, 2013 MEMORANDUM FOR THE MANAGER, SANDIA FIELD OFFICE, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: Sandra D. Bruce Assistant Inspector General for Inspections Office of Inspector General SUBJECT: INFORMATION: Inspection Report on "Allegations Concerning Contracting for Services of Former Employees at Sandia National Laboratories" BACKGROUND As part of the National Nuclear Security Administration, Sandia National Laboratories (Sandia) is a multi-program national security laboratory managed and operated under a contract with

270

Enforcement Letter, Lawrence Livermore National Security LLC, - May 15,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security LLC, - May Security LLC, - May 15, 2008 Enforcement Letter, Lawrence Livermore National Security LLC, - May 15, 2008 May 15, 2008 Enforcement Letter issued to Lawrence Livermore National Security, LLC related to the Protection of Classified Information at the Lawrence Livermore National Laboratory In our recent dialogue via televideo with your Deputy, safeguards and security director, and other key managers of your staff, we discussed our reasons for sending this enforcement letter to Lawrence Livermore National Security, LLC; the purpose of this letter; and our concerns about the protection of classified information at the Lawrence Livermore National Laboratory (LLNL). Accordingly, this is not a formal enforcement action and imposes no requirements. Enforcement Letter, Lawrence Livermore National Security LLC- May 15, 2008

271

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

272

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

273

Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System  

E-Print Network (OSTI)

This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

2011-01-01T23:59:59.000Z

274

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

275

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

276

Remarkable Teacher Raises Bar for Building Students | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Remarkable Teacher Raises Bar for Building Students Remarkable Teacher Raises Bar for Building Students Remarkable Teacher Raises Bar for Building Students January 7, 2010 - 2:58pm Addthis Eric Barendsen Energy Technology Program Specialist, Office of Energy Efficiency and Renewable Energy For 13 years, Tony Grahame has inspired students to pursue careers building sustainable, energy-efficient houses or to find other niches in the green-building industry. His Residential Building Technology program at Yavapai College in Prescott, Ariz., gets students out of the classroom and constructing real homes in a nearby subdivision. On the jobsite, they learn the skills and knowledge essential to launch their careers as the next generation of energy-efficient builders. Tony's expertise draws from technologies and strategies in residential efficiency and renewable energy developed through

277

Collaborative prioritization of architectural concerns  

Science Conference Proceedings (OSTI)

Efficient architecture work involves balancing the degree of architecture documentation with attention to needs, costs, agility and other factors. This paper presents a method for prioritizing architectural concerns in the presence of heterogeneous stakeholder ... Keywords: Requirement prioritization, Software architecture documentation, Software architecture evolution

Lars Pareto; Anna BRjesson Sandberg; Peter Eriksson; Staffan Ehnebom

2012-09-01T23:59:59.000Z

278

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

279

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

280

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

282

PortVis: a tool for port-based detection of security events  

Science Conference Proceedings (OSTI)

Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coarsely detailed because of security concerns or other limitations. How can ... Keywords: information visualization, network security, user interfaces

Jonathan McPherson; Kwan-Liu Ma; Paul Krystosk; Tony Bartoletti; Marvin Christensen

2004-10-01T23:59:59.000Z

283

Security and Trust Requirements Engineering Paolo Giorgini, Fabio Massacci, and Nicola Zannone  

E-Print Network (OSTI)

Security and Trust Requirements Engineering Paolo Giorgini, Fabio Massacci, and Nicola Zannone,massacci,zannone}@dit.unitn.it Abstract. Integrating security concerns throughout the whole software develop- ment process is one of today to meet. The major difficulty is that providing security does not only require to solve tech- nical

Massacci, Fabio

284

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

285

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

286

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

287

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

288

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

289

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

291

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

292

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

293

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

294

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

295

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

296

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

297

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

298

Global biofuel drive raises risk of eviction for African farmers  

E-Print Network (OSTI)

Global biofuel drive raises risk of eviction for African farmers African farmers risk being forced from their lands by investors or government projects as global demand for biofuels encourages changes at risk if African farmland is turned over to growing crops for biofuel. With growing pressure to find

299

Higher oil prices: Can OPEC raise prices by cutting production  

Science Conference Proceedings (OSTI)

OPEC's ability to raise prices is evaluated with a model that projects the supply and demand. As part of the model, a new methodology to forecast for the rate of production by non-OPEC nations is developed. A literature review of techniques for estimating oil supply and annual rates of production indicates a new methodology is needed. The new technique incorporates the geological, engineering, and economic aspects of the oil industry by synthesizing curve fitting and econometric techniques. It is used to analyze data for eight regions for non-OPEC oil production: the lower 48 states, Alaska, Canada, Mexico, non-OPEC South America, Western Europe, non-OPEC Africa, and non-OPEC Asia. OPEC's ability to raise prices is examined by tracking the percentage oil US oil demand supplied by imports, the portion of oil demand in Western Europe supplied by local production, the percentage of WOCA oil demand supplied by OPEC and Real OPEC revenues. Results of the model indicate that OPEC can raise oil prices in the early 1990s. OPEC can raise and sustain oil prices near $25 (1982 dollars). Higher oil prices ($35) are not sustainable before 2000 because reduced demand and increased non-OPEC production shrink OPEC revenues below acceptable levels. After 2000, $35 prices are sustainable.

Kaufmann, R.K.

1988-01-01T23:59:59.000Z

300

PSH-12-0079 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

079 - In the Matter of Personnel Security Hearing 079 - In the Matter of Personnel Security Hearing PSH-12-0079 - In the Matter of Personnel Security Hearing On October 12, 2012, an OHA Hearing Officer issued a decision in which he concluded the DOE should grant an individual an access authorization. A Local Security Office suspended the individual's security clearance because of concerns regarding the individual's prior use of heroin and an opinion of a DOE consultant psychologist that the individual suffered from Opiate Dependence and Learning Disorder Not Otherwise Specified. A Local Security Office cited this information as the basis for security concerns under the Bond Amendment and 10 C.F.R. Part 710. The Hearing Officer found that that the individual resolved the concern related to his use of

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

302

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

303

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

304

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

305

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

306

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

307

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

308

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

309

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

310

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

311

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

312

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

313

National Security Agency  

E-Print Network (OSTI)

The governmentattic.org web site (the site) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. NATIONAL SECURITY AGENCY

unknown authors

2011-01-01T23:59:59.000Z

314

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

315

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

316

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

317

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

318

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

319

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

320

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

322

IMPROVEMENTS IN OR RELATING TO STEAM RAISING PLANT  

SciTech Connect

A scheme is given for a dual pressure steam raising plant for reactor power plants, especially those of the Calder Hall type in which heat transfer fluid (CO/sub 2/) can be circulated by steam. In the scheme, the gaseous coolant is passed through the steam raising unit and then is passed back into the reactor via a gas blower. The unit employs a dual pressure cycle in which water is passed into two steel drums connected to evaporators and superheaters in the unit; steam from one drum is high-pressure steam (HP). while steam from the other is low-pressure steam (LP). HP drives the gas blower by means of a back pressure turbine and then is discharged into the LP cycle in the unit. HP and LP from the superheaters are fed into a distant turbo-alternator which comprises two turbines, a small one for HP and a large one for LP. (D.L.C.)

Mitchell, J.M.

1960-08-10T23:59:59.000Z

323

The welfare effects of raising household energy prices in Poland  

Science Conference Proceedings (OSTI)

We examine the welfare effects from increasing household energy prices in Poland. Subsidizing household energy prices, common in the transition economies, is shown to be highly regressive. The wealthy spend a larger portion of their income on energy and consume more energy in absolute terms. We therefore rule out the oft-used social welfare argument for delaying household energy price increases. Raising prices, while targeting relief to the poor through a social assistance program is the first-best response. However, if governments want to ease the adjustment, several options are open, including: in-kind transfers to the poor, vouchers, in-cash transfers, and lifeline pricing for electricity. Our simulations show that if raising prices to efficient levels is not politically feasible at present and social assistance targeting is sufficiently weak, it may be socially better to use lifeline pricing and a large price increase than an overall, but smaller, price increase.

Freund, C.L. [Columbia Univ., New York, NY (United States); Wallich, C.I. [World Bank, Washington, DC (United States)

1996-06-01T23:59:59.000Z

324

Using Environmental Emissions Permit Prices to Raise Electricity Prices: Evidence from the California Electricity Market  

E-Print Network (OSTI)

Permit Prices to Raise Electricity Prices: Evidence from thePermit Prices to Raise Electricity Prices: Evidence from thehigher wholesale electricity prices, during the third and

Kolstad, Jonathan; Wolak, Frank

2003-01-01T23:59:59.000Z

325

Research and Institutional Integrity Office: Employee Concerns  

NLE Websites -- All DOE Office Websites (Extended Search)

by Topic LBNL Employee Concerns Program Contact UC Ethical Values UC Standards of Ethical Conduct EMployee Concerns Employees have the right - and the responsibility - to identify...

326

Information Concerning Reliability Impacts under Various System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Concerning Reliability Impacts under Various System Configurations of the Mirant Potomac River Plant Information Concerning Reliability Impacts under Various System...

327

Concerns Regarding Lead Contamination and Radiological Controls...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Home Concerns Regarding Lead Contamination and Radiological Controls at the Nevada Test Site, INS-O-06-02 Concerns Regarding Lead Contamination and Radiological Controls at...

328

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

329

Microsoft Word - Employee Concerns Program Contacts NEW.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Employee Concerns Program Contacts Employee Concerns Program Contacts ORGANIZATION CONTACT TELEPHONE EMAIL ADDRESS DOE Headquarters Bill Lewis Poli Marmolejos Janet Freimuth (202) 586-6530 (202) 287-1566 (202)287-1439 Bill.lewis@hq.doe.gov Poli.Marmolejos@hq.doe.gov Janet.Freimuth@hq.doe.gov DOE 's Office of Conflict Prevention and Resolution Kathleen Binder Pamela Pontillo (202) 586-6972 (202) 586-4002 Kathleen.Binder@hq.doe.gov Pamela.Pontillo@hq.doe.gov Chicago Kris Winiarski (630) 252-2299 Kris.winiarski@ch.doe.gov Golden, CO Mary Treska (303) 275-6002 Mary.Treska@go.doe.gov Idaho Jan Ogilvie (208) 526-9272 Hotline: (208) 526-7200 ogilvije@id.doe.gov National Nuclear Security Administration (NNSA) Service Center, Albuquerque Eva Glow Brownlow Michelle Rodriguez De

330

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

331

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

332

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

333

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

334

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

335

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

336

Whistleblower Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Whistleblower Program | National Nuclear Security Administration Whistleblower Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Whistleblower Program Home > About Us > Our Operations > Management and Budget > Whistleblower Program Whistleblower Program The DOE National Nuclear Security Administration Employee (NNSA) Concerns Program (ECP) is responsible for the 10 CFR Part 708 Contractor Employee

337

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

338

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

339

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

340

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

342

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

343

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

344

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

345

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

346

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

347

Disclaimer concerning the fundamental constants database  

Science Conference Proceedings (OSTI)

... Uncertainty Constants, Units & Uncertainty home page. Disclaimer concerning the fundamental constants database The ...

348

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

349

Modelling decision making in fund raising management by a fuzzy knowledge system  

Science Conference Proceedings (OSTI)

In fund raising management the employment of a decision support system is crucial for optimising the results of fund raising campaigns. However, the current tools based on database technology are not able to suggest suitable fund raising strategies and ... Keywords: Computational methods, Economic modeling, Fund raising management, Fuzzy expert systems, Knowledge based systems

Luca Barzanti; Mauro Gaspari; Davide Saletti

2009-07-01T23:59:59.000Z

350

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

351

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

352

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

353

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

354

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

355

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

356

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

357

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

358

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

359

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

360

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

362

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

363

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

364

Home is safer than the cloud!: privacy concerns for consumer cloud storage  

Science Conference Proceedings (OSTI)

Several studies ranked security and privacy to be major areas of concern and impediments of cloud adoption for companies, but none have looked into end-users' attitudes and practices. Not much is known about consumers' privacy beliefs and expectations ... Keywords: cloud storage, cross-cultural, privacy, social factors, usability

Iulia Ion; Niharika Sachdeva; Ponnurangam Kumaraguru; Srdjan ?apkun

2011-07-01T23:59:59.000Z

365

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

366

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

367

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

368

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

369

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

370

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

371

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2006-09-01T23:59:59.000Z

372

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

373

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

374

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

375

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

376

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

377

Remote Access to the BNL Network, Cyber Security, Information Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

378

Randomness Quality of CI Chaotic Generators: Applications to Internet Security  

E-Print Network (OSTI)

Due to the rapid development of the Internet in recent years, the need to find new tools to reinforce trust and security through the Internet has became a major concern. The discovery of new pseudo-random number generators with a strong level of security is thus becoming a hot topic, because numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we have described a generator based on chaotic iterations, which behaves chaotically as defined by Devaney. In this paper, the proposal is to improve the speed and the security of this generator, to make its use more relevant in the Internet security context. To do so, a comparative study between various generators is carried out and statistical results are given. Finally, an application in the information hiding framework is presented, to give an illustrative example of the use of such a generator in the Internet security field.

Bahi, Jacques M; Guyeux, Christophe; Wang, Qianxue

2011-01-01T23:59:59.000Z

379

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

380

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

382

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

383

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

384

NETL: News Release - DOE Study Raises Estimates of Coalbed Methane  

NLE Websites -- All DOE Office Websites (Extended Search)

December 16, 2002 December 16, 2002 DOE Study Raises Estimates of Coalbed Methane Potential in Powder River Basin Actual Production Will Hinge on Water Disposal Method WASHINGTON, DC - The Powder River Basin, a vast region of high plains in Wyoming and Montana known for producing low-sulfur coal, is also becoming a primary source of America's fastest growing natural gas resource, coalbed methane. Now, a new Department of Energy report projects that the region may hold more coalbed methane than previously estimated but the amount that will actually be produced will depend largely on the choice of the water disposal method. MORE INFO Download report [7.35MB PDF] The study, Powder River Basin Coalbed Methane Development and Produced Water Management Study, was prepared by Advanced Resources International of

385

PSH-11-0025 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

25 - In the Matter of Personnel Security Hearing 25 - In the Matter of Personnel Security Hearing PSH-11-0025 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview with the individual in August 2011 (the 2011 PSI, DOE Ex. 8). In September 2011, a DOE-consultant psychologist (the DOE-consultant Psychologist) evaluated the individual, and memorialized her findings in a Psychological Evaluation Report (the Report, DOE Ex. 6). In October 2011, the LSO issued a Notification Letter to the individual, together with a Summary of Security Concerns (Enclosure 2) setting forth the information that created a

386

PSH-12-0020 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20 - In the Matter of Personnel Security Hearing 20 - In the Matter of Personnel Security Hearing PSH-12-0020 - In the Matter of Personnel Security Hearing The individual is employed by a DOE contractor, and has held a DOE access authorization for several years. Based on financial issues contained in the individual's security file, the Local Security Office (LSO) issued letters of interrogatory (LOI) to the individual in August 2009 and June 2011. DOE Exs. 18 and 16. The LSO also conducted Personnel Security Interviews (PSIs) with the individual in December 2010, November 2011 and December 2011. DOE Exs. 20, 21 and 22. In January 2012, the LSO issued the individual a Notification Letter, together with a Summary of Security Concerns (Enclosure 2) setting forth the information that created a substantial doubt about his eligibility to hold a DOE security clearance.

387

PSH-11-0021 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0021 - In the Matter of Personnel Security Hearing 1-0021 - In the Matter of Personnel Security Hearing PSH-11-0021 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview with the individual in May 2011 (the 2011 PSI, DOE Ex. 17). In July 2011, a DOE-consultant psychiatrist evaluated the individual, and memorialized her findings in a Psychological Evaluation Report (the Report, DOE Ex. 6). In October 2011, the LSO issued a Notification Letter to the individual, together with a Summary of Security Concerns (Enclosure 2) setting forth the information

388

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

389

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

390

Aiding evolution with concern-oriented guides  

Science Conference Proceedings (OSTI)

Program documentation is often incomplete and out of date due to its tediousness and perceived low value. This requires evolution tasks to be preceded by time-consuming exploration. In this paper, we explore a concern-oriented approach to documentation ... Keywords: aspect-oriented software development, concern modeling, documentation, separation of concerns, software evolution, user guidance

Barthlmy Dagenais; Harold Ossher

2007-03-01T23:59:59.000Z

391

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

392

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

393

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

394

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

395

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

396

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

397

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

398

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

399

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

400

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

402

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

403

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

404

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

405

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

406

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

407

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

408

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

409

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

410

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

411

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

412

Security Resiliency Testing  

Science Conference Proceedings (OSTI)

An accepted practice within the electric sector is to pre-stage and test equipment before deployment. Verification of functionality, operating parameters, and interoperability of equipment to be deployed can often be incorporated into predeployment testing. This testing may also support the selection of features responsible for the security of the host equipment. However, some security features and many aspects of resiliency testing may require activation, interaction, and interoperability with an ...

2013-12-02T23:59:59.000Z

413

Transportation Security Update  

Science Conference Proceedings (OSTI)

The U.S. Department of Transportation (DOT) final rules issued in 2003 required persons who offer for transportation or transport certain hazardous materials to develop and implement security plans. The Electric Power Research Institute (EPRI) formed a Transportation Security Implementation Working Group, which included representation from the Nuclear Energy Institute (NEI), to identify key projects, which were documented in the original report in 2005. This report updates information in the original rep...

2011-07-27T23:59:59.000Z

414

Data port security lock  

DOE Patents (OSTI)

In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

2008-06-24T23:59:59.000Z

415

Research and Development Concerning Coalbed Natural Gas  

Science Conference Proceedings (OSTI)

The Powder River Basin in northeastern Wyoming is one of the most active areas of coalbed natural gas (CBNG) development in the western United States. This resource provides clean energy but raises environmental concerns. Primary among these is the disposal of water that is co-produced with the gas during depressurization of the coal seam. Beginning with a few producing wells in Wyoming's Powder River Basin (PRB) in 1987, CBNG well numbers in this area increased to over 13,600 in 2004, with projected growth to 20,900 producing wells in the PRB by 2010. CBNG development is continuing apace since 2004, and CBNG is now being produced or evaluated in four other Wyoming coal basins in addition to the PRB, with roughly 3500-4000 new CBNG wells permitted statewide each year since 2004. This is clearly a very valuable source of clean fuel for the nation, and for Wyoming the economic benefits are substantial. For instance, in 2003 alone the total value of Wyoming CBNG production was about $1.5 billion, with tax and royalty income of about $90 million to counties, $140 million to the state, and $27 million to the federal government. In Wyoming, cumulative CBNG water production from 1987 through December 2004 was just over 380,000 acre-feet (2.9 billion barrels), while producing almost 1.5 trillion cubic feet (tcf) of CBNG gas statewide. Annual Wyoming CBNG water production in 2003 was 74,457 acre-feet (577 million barrels). Total production of CBNG water across all Wyoming coal fields could total roughly 7 million acre-feet (55.5 billion barrels), if all of the recoverable CBNG in the projected reserves of 31.7 tcf were produced over the coming decades. Pumping water from coals to produce CBNG has been designated a beneficial water use by the Wyoming State Engineer's Office (SEO), though recently the SEO has limited this beneficial use designation by requiring a certain gas/water production ratio. In the eastern part of the PRB where CBNG water is generally of good quality, most of it is discharged to surface drainages or to soil (for irrigation). CBNG water quality generally declines when moving from the Cheyenne River drainage northwestward to the Belle Fourche, Little Powder, and Powder River drainages and in the central and western part of the PRB, most CBNG water goes to evaporation-infiltration ponds or is discharged directly to surface drainages. Concerns center on the salinity of the water, usually measured as total dissolved solids (TDS), or electrical conductivity (EC) and sodium adsorption ratio (SAR). Other management options currently in use include injection, managed irrigation (with additives to mitigate the effects of high salinity), atomization, and treatment by reverse osmosis or ion exchange. A key water quality issue is the cumulative effect of numerous CBNG water discharges on the overall water quality of basin streams. This leads to one of the most contentious issues in CBNG development in Wyoming's PRB: Montana's concern about the potential downstream effects of water quality degradation on rivers flowing north into Montana. Many of the benefits and costs associated with CBNG development have been debated, but dealing with CBNG water quantity and quality arguably has been the most difficult of all the issues. Given the importance of these issues for continued development of CBNG resources in Wyoming and elsewhere, the DOE-NETL funded project presented here focuses on CBNG co-produced water management. The research was organized around nine separate, but interrelated, technical project tasks and one administrative task (Task 1). The nine technical project tasks were pursued by separate research teams at the University of Wyoming, but all nine tasks were coordinated to the extent possible in order to maximize information gained about CBNG co-produced waters. In addition to project management in Task 1, the key research tasks included: (2) estimating groundwater recharge rates in the PRB; (3) groundwater contamination of trace elements from CBNG disposal ponds; (4) use of environmental tracers in assessing wate

William Ruckelshaus

2008-09-30T23:59:59.000Z

416

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

417

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

418

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

419

Publicly Submitted White Papers - Security  

Science Conference Proceedings (OSTI)

... Security Threats, Exploits, Vulnerabilites, Incidents, and Responses; ... CAHV); Critical Incident Response and Disaster Recovery Assistance; ...

2011-08-02T23:59:59.000Z

420

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

News: IBM launches security offensive  

Science Conference Proceedings (OSTI)

IBM has announced a major security push, representing a US$1.5 billion investment in security-related projects next year. It will partner with other security vendors to offer a set of security services targeting information assets. The services will ...

2007-11-01T23:59:59.000Z

422

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

423

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

424

Security-oriented program transformations  

Science Conference Proceedings (OSTI)

Security experts generally believe that, "security cannot be added on, it must be designed from the beginning" [1]. This is because the typical way of improving system security by patches is ad hoc and has not produced good results. My work shows that ... Keywords: program transformation, security

Munawar Hafiz; Ralph E. Johnson

2009-04-01T23:59:59.000Z

425

Secure Windows Dr. Bernd Borchert  

E-Print Network (OSTI)

Secure Windows Dr. Bernd Borchert WSI für Informatik Univ. Tübingen #12;Problem: Trojans Server Windows" Server (encoding) Internet #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows

Borchert, Bernd

426

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

427

Security Outreach and Integration Group  

Science Conference Proceedings (OSTI)

Security Outreach and Integration Group. Welcome. The US economy, citizens, and government rely on information technology. ...

2013-01-17T23:59:59.000Z

428

UH Mnoa Contacts: Campus Security  

E-Print Network (OSTI)

UH Mnoa Contacts: Campus Security 956-6911 Security Escort Service 956-SAFE Women's Center 956 pauvaw@hawaii.edu University Health Services 956-8965 www.hawaii.edu/shs/ Mlama Pono | www.hawaii.edu/security if you think you have been drugged. Police and Campus Security are trained in assisting with these types

429

Brief No. 9 WATER SECURITY,  

E-Print Network (OSTI)

Brief No. 9 WATER SECURITY, RISK & SOCIETY 1 of 4 Water Security and Federal Rivers March 2012 Australian National University Key messages · Water security in a hydroclimatic risk society. Climate risks interact with rapidly changing social, demographic and economic forces to position water security

New, Mark

430

PSH-12-0052 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

52 - In the Matter of Personnel Security Hearing 52 - In the Matter of Personnel Security Hearing PSH-12-0052 - In the Matter of Personnel Security Hearing On October 2, 2012, an OHA Hearing Officer issued a decision in which he concluded the DOE should not grant an individual an access authorization. A Local Security Office suspended the individual's security clearance because of concerns regarding the individual's use of alcohol and prior criminal activity. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to mitigate these security concerns. Specifically, he cited the fact that the individual had only recently begun receiving counseling with regard to his use of alcohol and had consumed alcohol as recently as four days prior to

431

PSH-12-0066 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

66 - In the Matter of Personnel Security Hearing 66 - In the Matter of Personnel Security Hearing PSH-12-0066 - In the Matter of Personnel Security Hearing A Hearing Officer issued a Decision in which he determined that an individual's access authorization should not be restored. In reaching this determination, the Hearing Officer found that the individual had not resolved security concerns under Criteria H and J associated with a recent Driving Under the Influence arrest and a determination from a DOE-contractor Psychologist that the Individual suffered from Alcohol-Related Disorder, Not Otherwise Specified. Additionally, while finding that the Individual had resolved Criterion L concerns relating to inaccurate answers provided in a background investigation, a Questionnaire for National Security Positions, and a personnel security interview, the

432

PSH-12-0006 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2-0006 - In the Matter of Personnel Security Hearing 2-0006 - In the Matter of Personnel Security Hearing PSH-12-0006 - In the Matter of Personnel Security Hearing The individual is an employee of a DOE contractor and holds a suspended access authorization. A Local Security Office (LSO) summoned the individual for an interview (PSI) with a personnel security specialist on November 9, 2011, Exhibit 4, in order to address issues surrounding his finances. Id. at 12-13. After the PSI, the LSO determined that derogatory information existed that cast into doubt the individual's eligibility for access authorization. The LSO informed the individual of this determination in a letter that set forth the DOE's security concerns and the reasons for those concerns. Exhibit 1. The Notification Letter also informed the

433

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

434

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

435

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

436

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

437

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

438

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

439

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

440

Supplemnental Volume - Independent Oversight Assessment of the Nuclear Safety Culture and Management of Nuclear Safety Concerns at the Hanford Site Waste Treatment and Immobilization Plant, January 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Volume Volume Independent Oversight Assessment of Nuclear Safety Culture and Management of Nuclear Safety Concerns at the Hanford Site Waste Treatment and Immobilization Plant January 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy Office of Health, Safety and Security HSS i Independent Oversight Assessment of Safety Culture and Management of Nuclear Safety Concerns at the Hanford Site Waste Treatment and Immobilization Plant Supplemental Volume Table of Contents Foreword ...................................................................................................................................................... iii Acronyms ...................................................................................................................................................... v

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Implementing a CORBA-Based Architecture for Leveraging the Security Level of Existing Applications  

Science Conference Proceedings (OSTI)

This work presents an implementation technique which exploits separation of concerns and reuse in a CORBA-based, multi-tier architecture to improve the security (availability, integrity, and confidentiality) level of an existing application. Functional ...

Domenico Cotroneo; Antonino Mazzeo; Luigi Romano; Stefano Russo

2002-10-01T23:59:59.000Z

442

PSH-13-0046- In the Matter of Personnel Security Hearing  

Energy.gov (U.S. Department of Energy (DOE))

On July 16, 2013, an OHA Hearing Officer issued a decision in which he determined that the DOE should not restore an individuals access authorization. As security concerns under CriterionL of 10...

443

PSH-12-0132- In the Matter of Personnel Security Hearing  

Energy.gov (U.S. Department of Energy (DOE))

On March 4, 2013, an OHA Hearing Officer issued a decision in which he determined that the DOE should not restore an individuals access authorization. As security concerns under 10 CFR Part 710,...

444

PSH-13-0005- In the Matter of Personnel Security Hearing  

Energy.gov (U.S. Department of Energy (DOE))

On May 16, 2013, an OHA Hearing Officer issued a decision in which he determined that the DOE should not restore an individuals access authorization. As security concerns under 10 CFR Part 710, a...

445

Information Concerning Reliability Impacts under Various System  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Concerning Reliability Impacts under Various System Information Concerning Reliability Impacts under Various System Configurations of the Mirant Potomac River Plant Information Concerning Reliability Impacts under Various System Configurations of the Mirant Potomac River Plant Docket No. EO-05-01: PJM Interconnection, L.L.C. and PEPCO Holdings, Inc. is hereby providing you with additional information concerning reliability impacts under various system conditions associated with the unavailability of the Potomac River Generating Station to serve load in the D.C. area. Also enclosed as part of this submittal is material provided by PEPCO (balance of sentence redacted) In addition, there is a discussion concerning the impacts of demand side response in addressing this situation. Information Concerning Reliability Impacts under Various System

446

Modelling distributed network security in a petri net- and agent-based approach  

Science Conference Proceedings (OSTI)

Distributed network security is an important concern in modern business environments. Access to critical information and areas has to be limited to authorised users. The Herold research project aims to provide a novel way of managing distributed network ... Keywords: agent-oriented methodologies, distributed network security, petri nets, software agents

Simon Adameit; Tobias Betz; Lawrence Cabac; Florian Hars; Marcin Hewelt; Michael Khler-Bumeier; Daniel Moldt; Dimitri Popov; Jos Quenum; Axel Theilmann; Thomas Wagner; Timo Warns; Lars Wstenberg

2010-09-01T23:59:59.000Z

447

Information Concerning Reliability Impacts under Various System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Impacts under Various System Configurations of the Mirant Potomac River Plant Information Concerning Reliability Impacts under Various System Configurations of the Mirant...

448

Disclosure of Permitted Communication Concerning Fossil Fuel...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No....

449

Questions and Answers concerning the Information Retrieval ...  

Science Conference Proceedings (OSTI)

Questions and Answers concerning the Information Retrieval Task. ... Q: What are the file formats used for the SDR99 Information Retrieval Task ? ...

450

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

451

Security Analysis and Improvement Model for Web-based Applications  

E-Print Network (OSTI)

Today the web has become a major conduit for information. As the World Wide Web?s popularity continues to increase, information security on the web has become an increasing concern. Web information security is related to availability, confidentiality, and data integrity. According to the reports from http://www.securityfocus.com in May 2006, operating systems account for 9% vulnerability, web-based software systems account for 61% vulnerability, and other applications account for 30% vulnerability. In this dissertation, I present a security analysis model using the Markov Process Model. Risk analysis is conducted using fuzzy logic method and information entropy theory. In a web-based application system, security risk is most related to the current states in software systems and hardware systems, and independent of web application system states in the past. Therefore, the web-based applications can be approximately modeled by the Markov Process Model. The web-based applications can be conceptually expressed in the discrete states of (web_client_good; web_server_good, web_server_vulnerable, web_server_attacked, web_server_security_failed; database_server_good, database_server_vulnerable, database_server_attacked, database_server_security_failed) as state space in the Markov Chain. The vulnerable behavior and system response in the web-based applications are analyzed in this dissertation. The analyses focus on functional availability-related aspects: the probability of reaching a particular security failed state and the mean time to the security failure of a system. Vulnerability risk index is classified in three levels as an indicator of the level of security (low level, high level, and failed level). An illustrative application example is provided. As the second objective of this dissertation, I propose a security improvement model for the web-based applications using the GeoIP services in the formal methods. In the security improvement model, web access is authenticated in role-based access control using user logins, remote IP addresses, and physical locations as subject credentials to combine with the requested objects and privilege modes. Access control algorithms are developed for subjects, objects, and access privileges. A secure implementation architecture is presented. In summary, the dissertation has developed security analysis and improvement model for the web-based application. Future work will address Markov Process Model validation when security data collection becomes easy. Security improvement model will be evaluated in performance aspect.

Wang, Yong

2008-12-01T23:59:59.000Z

452

A systematic review of security requirements engineering  

Science Conference Proceedings (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

453

Human Errors in Information Security  

E-Print Network (OSTI)

The purpose of the paper is to target audience and stakeholder individuals whom are in charge of securing the assets of their organisations and institutions. This paper starts by providing a brief overview of information security, outlining the main goals and techniques of the discipline. The paper also discusses the role of human factors and how the information security research community has recognised the increasingly crucial role of human behaviour in many security failures. This is followed by a literature review of human errors in information security. Finally, this paper discusses Reason's Generic Error Modelling System (GEMS) as a potential model for explaining human errors in information security [18]. The terms computer security, network security and information security are used interchangeably in this paper.

Munir Ahmed; Lukman Sharif; Muhammad Kabir; Maha Al-maimani

2012-01-01T23:59:59.000Z

454

PSH-12-0027 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27 - In the Matter of Personnel Security Hearing 27 - In the Matter of Personnel Security Hearing PSH-12-0027 - In the Matter of Personnel Security Hearing In October 2011, pursuant to an investigation, the Local Security Office obtained the Individual's credit report. The credit report indicated that the Individual had a number of accounts either in collection or which were charged off. Exhibit (Ex.) 13 at 1-6. Consequently, the DOE facility's Local Security Office (LSO) conducted a personnel security interview (PSI) with the Individual in January 2012. Ex. 19. The 2012 PSI failed to resolve the security concerns due to the Individual's excessive indebtedness. Consequently, the LSO, in a February 2012 notification letter (Notification Letter) informed the Individual as to the derogatory information that

455

TSO-1014 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1014 - In the Matter of Personnel Security TSO-1014 - In the Matter of Personnel Security TSO-1014 - In the Matter of Personnel Security The individual is employed by a Department of Energy (DOE) contractor and has held a security clearance at the request of his employer since 1998. DOE terminated his clearance in 2005, and then reinstated it in 2007 after a favorable psychiatric evaluation. In July 2010, the individual's wife filed a restraining order against him. He reported the incident to the local security office (LSO) and the LSO conducted a personnel security interview (PSI) with the individual in August 2010. The PSI did not resolve the security concerns and the individual agreed to be evaluated by a DOE consultant-psychiatrist. In November 2010, a DOE consultant-psychiatrist (DOE psychiatrist) interviewed the individual and concluded that the

456

PSH-12-0037 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

37 - In the Matter of Personnel Security Hearing 37 - In the Matter of Personnel Security Hearing PSH-12-0037 - In the Matter of Personnel Security Hearing The Individual is employed by a Department of Energy (DOE) contractor in a position that requires a DOE security clearance. Based upon the receipt of derogatory information relating to an unpaid debt, the Local Security Office (LSO) called the Individual in for a Personnel Security Interview (PSI). DOE Ex. 7. After the PSI, the LSO informed the Individual that unresolved derogatory information created a substantial doubt concerning his eligibility for access authorization. Notification Letter dated March 5, 2012; DOE Ex. 1; 10 C.F.R. § 710.8(l) (Criterion L). PSH-12-0037.pdf More Documents & Publications PSH-12-0069 - In the Matter of Personnel Security Hearing

457

TSO-1116 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1116 - In the Matter of Personnel Security Hearing TSO-1116 - In the Matter of Personnel Security Hearing TSO-1116 - In the Matter of Personnel Security Hearing The individual is an employee of a Department of Energy (DOE) contractor who has held a security clearance for several years. During a routine reinvestigation, the local security office (LSO) discovered that the individual had not filed federal taxes for the tax years 2008 and 2009. In July 2011, the LSO interviewed the individual during a Personnel Security Interview (PSI), but that interview did not resolve the security concerns. The LSO suspended his clearance and, in August 2011, the LSO informed the individual that it had received derogatory information that created a doubt regarding his continued eligibility for access authorization. See

458

PSH-12-0065 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2-0065 - In the Matter of Personnel Security Hearing 2-0065 - In the Matter of Personnel Security Hearing PSH-12-0065 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility. Exhibit (Ex.) 10 at 3. The Local Security Office (LSO) discovered that the Individual failed to list a 2004 Driving Under the Influence (DUI) arrest in a Questionnaire for National Security Positions form completed in October 2011. Ex. 10 at 10. The Local Security Office (LSO) conducted a personnel security interview with the Individual in January 2012 (2012 PSI) and, due to concerns arising from the Individual's admission of excessive alcohol use in the 2012 PSI, referred him for an examination by a DOE-contractor psychologist (DOE Psychologist). Ex. 12; Ex. 8 at 1. Because neither the

459

TSO-1007 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1007 - In the Matter of Personnel Security Hearing TSO-1007 - In the Matter of Personnel Security Hearing TSO-1007 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor and has held a security clearance at the request of her employer since 1991. In November 2009, the individual was apprehended after shoplifting at a local store and the local police department gave her a citation for shoplifting. She reported the incident to the local security office (LSO) and the LSO conducted a personnel security interview (PSI) with the individual in December 2009. The individual stated that she did not intentionally steal any items and that she would not repeat her actions. The LSO concluded that the security concern was mitigated because the incident occurred under

460

TSO-1001 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1001 - In the Matter of Personnel Security Hearing TSO-1001 - In the Matter of Personnel Security Hearing TSO-1001 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor and has held a security clearance at the request of his employer since 2008. In August 2010, the individual tested positive for alcohol during an employment-related screening. He admitted consuming 10-12 beers the night before the test. The local security office (LSO) conducted a personnel security interview (PSI) with the individual in October 2010, wherein he admitted consuming at least one six-pack of beer nightly for the previous four years. The PSI did not resolve the security concerns regarding his alcohol use and the individual agreed to be evaluated by a DOE consultant-psychiatrist. In November 2010, a DOE consultant-psychiatrist

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

462

Contact Us | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Us Contact Us Home > Field Offices > Welcome to the Los Alamos Field Office > Contact Us Contact Us Contact the NNSA Los Alamos Field Office NNSA Los Alamos Field Office (NA-00-LA) 3747 West Jemez Road Los Alamos, NM 87544 (505) 667-6691 Please send any comments, questions, or feedback to Toni Chiri Featured Links LANL Phonebook National Nuclear Security Administration Los Alamos National Laboratory Los Alamos County USA Gov Department of Energy (DOE) New Mexico Environmental Department - LANL U.S. Department of Homeland Security Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program LANS Contract Los Alamos Field Office Emergency Public Information Related Links

463

Bank Security Prices and Market Discipline  

E-Print Network (OSTI)

In recent years, policymakers and bank regulators have been warming up to the idea of leveraging market forces to enhance banking supervision.This is partly motivated by the growing complexity of large banking organizations and by concerns about limiting the cost of bank supervision as well as avoiding unduly extending the bank safety net (see Kwan 2002). In order for market discipline to work, the market prices of banking securities must contain accurate and timely information about bank risk. Researchers in banking have been studying this issue for quite some time.This Economic Letter reviews the empirical evidence on the informativeness of bank security prices, focusing on the two most obvious sources of market informationstock and

unknown authors

2002-01-01T23:59:59.000Z

464

Organizing electronic services into security taxonomies - revised  

SciTech Connect

With increasing numbers of commercial and government services being considered for electronic delivery, effective vulnerability analysis will become increasingly critical, Organizing sets of proposed electronic services into security taxonomies will be a key part of this work. However, brute force enumeration of services and risks is inefficient, and ad hoc methods require re-invention with each new set of services. Furthermore, both such approaches fail to communicate effectively the tradeoffs between vulnerabilities and features in a set of electronic services, and fail to scale to large sets of service. From our experience advising players considering electronic delivery, we have developed a general, systematic, and scalable methodology that addresses these concerns. In this paper, we present this methodology, and apply it to the example of electronic services offered via kiosks (since kiosk systems are representative of a wide range of security issues in electronic commerce).

Smith, S.W. [IBM T.J. Watson Research Center, Yorktown Heights, NY (United States); Pedersen, P.S. [Los Alamos National Lab., NM (United States)

1997-01-01T23:59:59.000Z

465

Developing a secure distributed OSGI cloud computing infrastructure for sharing health records  

Science Conference Proceedings (OSTI)

Cloud Computing has become an emerging computing paradigm which brings new opportunities and challenges to overcome. While the cloud provides seemingly limitless scalability and an alternative to expensive data center infrastructure, it raises new issues ... Keywords: cloud computing, cloud security, distributed OSGi, electronic healthcare records

Sabah Mohammed; Daniel Servos; Jinan Fiaidhi

2011-06-01T23:59:59.000Z

466

Enforcement Letter, Los Alamos National Security LLC - May 15, 2008 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

LLC - May 15, 2008 LLC - May 15, 2008 Enforcement Letter, Los Alamos National Security LLC - May 15, 2008 May 15, 2008 Enforcement Letter issued to Los Alamos National Security, LLC related to the Protection of Classified Information at the Los Alamos National Laboratory In our recent dialogue with you and members of your staff, we discussed our reasons for sending this enforcement letter to Los Alamos National Security, LLC (LANS); the purpose of this letter; and our concerns about the protection of classified information at the Los Alamos National Laboratory (LANL). Accordingly, this is not a formal enforcement action and imposes no requirements. We appreciate the laboratory's perspectives and your ongoing efforts to address these concerns. Enforcement Letter , Bechtel BWXT Idaho LLC - March 17, 2008

467

IEC 61850 and IEC 62351 Cyber Security Acceleration Workshop  

Science Conference Proceedings (OSTI)

The purpose of this workshop was to identify and discuss concerns with the use and adoption of IEC 62351 security standard for IEC 61850 compliant control system products. The industry participants discussed performance, interoperability, adoption, challenges, business cases, and future issues.

Clements, Samuel L.; Edgar, Thomas W.; Manz, David O.

2012-04-01T23:59:59.000Z

468

The 21ST Century National Security Mission at BNL  

E-Print Network (OSTI)

/equipment to enable International Atomic Energy Agency · Nonproliferation Treaty · Not members- India, Pakistan Former Soviet Union Nuclear Material and Facilities Fall of Soviet Union in 1991 brought concerns about security of nuclear material and nuclear weapons in new states formed from USSR MPC&A program began in 1992

Homes, Christopher C.

469

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

470

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

471

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

472

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

473

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

474

Energy Security Planning for Sustainable Buildings | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Areas » Sustainable Buildings & Campuses » Energy Program Areas » Sustainable Buildings & Campuses » Energy Security Planning for Sustainable Buildings Energy Security Planning for Sustainable Buildings October 4, 2013 - 4:56pm Addthis For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to comprehensively and intelligently address all elements of energy security analysis. Given recent blackouts and concerns about vulnerable infrastructure, many public and private organizations are taking steps to ensure reliable power and continuity of operations in the event of future outages. Some government facilities have the capacity to survive short-term power outages, but are now evaluating whether their back-up power capabilities

475

From Project Sapphire to Today | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

From Project Sapphire to ... From Project Sapphire to ... From Project Sapphire to Today Posted: February 7, 2013 - 6:45pm | Y-12 Report | Volume 9, Issue 2 | 2013 At the 2010 Nuclear Security Summit, President Barack Obama set forth a large-scale effort to aggressively secure the world's vulnerable nuclear material. This effort to reduce the threat of nuclear terrorism was reinforced at the 2012 summit with continued support for the National Nuclear Security Administration's Global Threat Reduction Initiative. But nearly two decades earlier, Y-12 was quietly conducting missions to secure materials from foreign countries with proliferation concerns. In 1994 more than a thousand containers of nuclear material sat in metal racks on the floor in a cold, dilapidated warehouse at the end of a

476

Federal Energy Management Program: Energy Security Planning for Sustainable  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Planning for Sustainable Buildings Security Planning for Sustainable Buildings For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to comprehensively and intelligently address all elements of energy security analysis. Given recent blackouts and concerns about vulnerable infrastructure, many public and private organizations are taking steps to ensure reliable power and continuity of operations in the event of future outages. Some government facilities have the capacity to survive short-term power outages, but are now evaluating whether their back-up power capabilities are sufficient to serve their most critical needs during a prolonged outage.

477

Process Reform, Security and Suitability - December 17, 2008 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Process Reform, Security and Suitability - December 17, 2008 Process Reform, Security and Suitability - December 17, 2008 Process Reform, Security and Suitability - December 17, 2008 December 17, 2008 This is to report on the progress made to improve the timeliness and effectiveness of our hiring and clearing decisions and the specific plan to reform the process further, in accordance with our initial proposals made in April ofthis year. In response to significant, continuing security clearance timeliness concerns, Congress called for improvements and established specific timeliness goals as part of the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA). Since the enactment of IRTPA, average timeliness for 90 percent of all clearance determinations reported has been substantially improved, from 265 days (in 2005) to 82 days (4th Quarter,

478

Disclosure of Permitted Communication Concerning Regional Standards  

NLE Websites -- All DOE Office Websites (Extended Search)

Disclosure of Permitted Communication Concerning Regional Standards Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077 Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077 This memo provides an overview of communications made to DOE staff on the subject of a policy for providing waivers from new regional furnace efficiency standards. memo_furnace_std_waiver_policy.pdf More Documents & Publications Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Record of Communication Concerning Ceiling Fan and Ceiling Fan Light Kit

479

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

480

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

Note: This page contains sample records for the topic "raise security concerns" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Enforcement Regulations and Directives - Security | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Regulations and Directives - Security Classified Information Security 10 C.F.R Part 824 - Procedural Rules for the Assessment of Civil Penalties for Classified...

482

Network Security Automation Standards: TNC and SCAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 6. ...

2012-10-26T23:59:59.000Z

483

Lemnos Interoperable Security Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Program More Documents & Publications SECURITY CORE FUNCTION AND DEFINITION REPORT Lemnos Interoperable Security DOE National SCADA Test Bed Program Multi-Year Plan...

484

Security Orchestration with IF-MAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 7. ...

2012-10-26T23:59:59.000Z

485

Office of Headquarters Security Operations - Headquarters Facilities...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations HomeIntroduction Physical Security Limited Areas and Vault-Type Rooms Personnel Security Foreign Ownership, Control or Influence; Facility...

486

DOE Headquarters Security Quick Reference Book | Navigation  

NLE Websites -- All DOE Office Websites (Extended Search)

TECH. & INFO. SECURITY TEAM HOME COVER | INTRODUCTION SECURITY ACRONYMS TABLE OF CONTENTS HEADQUARTERS SECURITY OFFICER PROTECTIVE FORCE UNCLASSIFIED FOREIGN VISITS & ASSIGNMENTS...

487

Office of Headquarters Security Operations: Headquarters Access...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

488

Office of Security Operations: Director's Message  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Home Sub Offices HQ Security Officers (HSO) Program Office of Security Operations Office of Information Security Office of...

489

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

490

Security and Cyber Guidance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April...

491

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

9.2.2 Security Interdependence . . . . . . Bounded Control7 Security Constrained Networked Control 7.1Inputs 9 Security Interdependencies for Networked 9.1

Amin, Saurabh

2011-01-01T23:59:59.000Z

492

Global Environmental Change and Human Security  

E-Print Network (OSTI)

with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

Kunnas, Jan

2011-01-01T23:59:59.000Z

493

National Security & Safety Reports | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security & Safety Reports National Security & Safety Reports October 29, 2013 Evaluation Report: IG-0897 The Department of Energy's Unclassified Cyber Security Program -...

494

Security and Performance Considerations in Wireless Networks  

E-Print Network (OSTI)

ACM Workshop on Wireless Security, 2004. [3] ISM Wide-bandTraffic Flows. In Network Security Lab (NSL) Technicalthe Challenges of Security in a Mobile Environment. In

Pelechrinis, Konstantinos

2010-01-01T23:59:59.000Z

495

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO)...

496

Security and United States Immigration Policy  

E-Print Network (OSTI)

Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

Totten, Robbie James

2012-01-01T23:59:59.000Z

497

Visitor_Security_and_Safety_Information  

NLE Websites -- All DOE Office Websites (Extended Search)

in a designated lot near the main lobby and auditorium. Office of Health, Safety and Security Office of Security Operations Office of Headquarters Security Operations United...

498

Security, Emergency Planning & Safety Records | Department of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

499

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

500

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,