Powered by Deep Web Technologies
Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Related Links Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Related Links Related Links NNSA Lab Directed Research and Development (LDRD) Lab Directed Research and Development Collaborations DOE Adanced Scientific Computing Research DTRA (Defense Threat Reduction Agency) NAS (National Academy of Sciences) NSF (National Science Foundation) DOD (Department of Defense) NASA Exascale Activities NNSA Exascale Environment Planning Workshop ASCR Co-Design Centers Supercomputing Top 500 List ASC at Supercomputing Conference Printer-friendly version Printer-friendly version Facebook

2

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

3

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Livermore Field Office > Related Links Related Links NNSA FOIA DOENNSA Telephone Directory U.S. Department of Energy Lawrence Livermore National Laboratory Printer-friendly...

4

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

& Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Related Links Related Links NNSA Lab Directed Research and Development...

5

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Related Links Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing Institutional Research...

6

Office of Security Policy - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Acquisition Regulation (DEAR) 952.204-2 Security Requirements Department of Energy Directives System Guidance for Contracting Officers DoD directive, Access to and Dissemination...

7

Homeland Security Presidential Directive 12 - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

8

Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security  

Science Conference Proceedings (OSTI)

SCADA (Supervisory Control and Data Acquisition), these are systems based on real-time processing, control and design for real time infrastructure such as water pumping stations, oil purification plants and rail control centers etc. In the initial structure ... Keywords: SCADA attacks, cryptography hybrid algorithm, data flow and distribution, distributed network protocole, hybrid algorithms, prevention system, secure simulation model, security issues, security services, simulation base experimentation and results, supervisory control and data acquisition (SCADA)

Shahrulniza Musa; AAmir Shahzad; Abdulaziz Aborujilah

2013-01-01T23:59:59.000Z

9

BSL-3 Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Links | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

10

Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > Field Offices > Welcome to the NNSA Production Office > Links Home > Field Offices > Welcome to the NNSA Production Office > Links Links NNSA HQ National Nuclear Security Administration Advanced Simulation & Computing NNSA Graduate Program NNSA Small Business Program Office of Defense Nuclear Nonproliferation Field Offices NNSA Albuquerque Complex Kansas City Field Office Livermore Field Office Los Alamos Field Office Naval Reactors Idaho Branch Office Nevada Field Office Sandia Field Office DOE Oak Ridge Sites Oak Ridge Office Oak Ridge National Laboratory UCOR Oak Ridge Institute for Science and Education Oak Ridge Site Specific Advisory Board American Museum of Science and Energy City of Oak Ridge Plants Laboratories Bechtel Nevada Bettis Laboratory Kansas City Plant Knolls Atomic Power Laboratory Lawrence Livermore National Laboratory

11

Standard-Related Links  

Science Conference Proceedings (OSTI)

... Standard-Related Links. ... Association for Clinical Chemistry ACS - American Chemical Society ANSI - American National Standards Institute AOAC ...

2013-06-28T23:59:59.000Z

12

NREL: News - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Feature News News Releases Events Awards Research Support Facility Energy Systems Integration Facility Related Links NREL is a national laboratory of the U.S....

13

Geothermal: Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

GEOTHERMAL TECHNOLOGIES LEGACY COLLECTION - Related Links Geothermal Technologies Legacy Collection HelpFAQ | Site Map | Contact Us | Admin Log On HomeBasic Search About...

14

Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Chapter Albuquerque, NM > Links Links "Promoting Equal Opportunity and Cultural Diversity for APAs in Government" FAPAC, Washington DC Printer-friendly version...

15

Demo Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Demo Links | National Nuclear Security Administration Demo Links | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Demo Links Home > About Us > Our Operations > Management and Budget > Human Resources > Pay-banding > Demo Links Demo Links Federal Register Notices July 31, 2008: Federal Register Notice This is a link to a PDF document.

16

EEO Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Links | National Nuclear Security Administration Links | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog EEO Links Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > EEO Links EEO Links DOE Office of Civil Rights (weblink) Department Of Justice Civil Rights Division (weblink) Department of Veterans Affairs (weblink)

17

Pages that link to "Center for Environment and National Security...  

Open Energy Info (EERE)

Share this page on Facebook icon Twitter icon Pages that link to "Center for Environment and National Security at Scripps" Center for Environment and National Security...

18

Hydrology Group - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

links to relevant web pages within the Pacific Northwest National Laboratory and the Hanford Site. . Battelle Environmental Molecular Sciences Laboratory (EMSL) Energy and...

19

Related Sites | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Sites Related Sites Related Sites Links to the following sources of information are provided as resources. Listings are obtained from government, industry and trade organizations and from other resources. B&W Corporate B&W Corporate The Babcock & Wilcox Company is a leading international provider of energy products and services. B&W Lawrence Livermore Lawrence Livermore National Laboratory helps reduce and counter threats to national and global security through the advancement and application of science and technology. B&W Pantex Located in Amarillo, Texas, the Pantex Plant supports stockpile stewardship, nonproliferation, and safeguards and security. Government System for Award Management The System for Award Management (SAM) (formerly Central Contractor

20

Energy Education and Workforce Development: Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Links to someone by E-mail Share Energy Education and Workforce Development: Related Links on Facebook Tweet about Energy Education and Workforce Development: Related Links...

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Related Links | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Related Links Related Links Related Links November 1, 2013 - 11:40am Addthis Need additional help or more information? DOE's CHP Technical Assistance Partnerships (CHP TAPs) provide local, individualized solutions to customers on specific combined heat and power (CHP) projects. Partners of DOE's CHP Program include federal and state agencies, non-governmental organizations, international entities, private clean energy companies, technology developers, and commercial builders and developers. Partners American Council for an Energy-Efficient Economy (ACEEE) Argonne National Laboratory (ANL) CHP Association International District Energy Association (IDEA) International Energy Agency (IEA) National Energy Technology Laboratory (NETL) New York State Energy Research and Development Authority (NYSERDA)

22

NREL: Energy Analysis - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Links Related Links Here you'll find links to other programs, organizations, and information resources concerning other analysis capabilities, energy-modeling, and technology expertise related to renewable energy. International Applications NREL's International Program in its effort to promote the use of renewable energy as a tool for sustainable development, applies world-class expertise in technology development and deployment, economic analysis, resource assessment, project design and implementation, and policy formulation. Assisting State and Local Governments Using renewable energy and being energy efficient is smart. Not only does it protect the environment, it benefits the economy. Many mayors, governors, city/county commissioners, state legislators, state energy

23

Pages that link to "Center for Environment and National Security...  

Open Energy Info (EERE)

Share this page on Facebook icon Twitter icon Pages that link to "Center for Environment and National Security at Scripps Feed" Center for Environment and National...

24

Background Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

25

Related Links | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Related Links Related Links Related Links Private, public, and nonprofit organizations around the country offer a wide range of courses and other services to help you either improve your current skills or learn new ones. The sites featured here can help you find courses of specific interest as well as other information about training requirements for certain energy jobs. DOE Related Advanced Manufacturing Office: Training Find training sessions in your area and learn how to save energy in your manufacturing plant or commercial building. American Museum of Science & Energy Learn more about the American Museum of Science & Energy (AMSE), a DOE-sponsored museum in Oak Ridge, TN, that provides cultural, educational, and scientific programs and exhibits, as well as summer camps for kids.

26

EIA - Related Links for Transportation  

U.S. Energy Information Administration (EIA) Indexed Site

Transportation Related Links Transportation Related Links Transportation Related Links government reports, data, and web sites (sorted alphabetically by primary agency) Date Last Updated/Reviewed: December 2006 Next Update/Review: April 2007 Federal and International Agencies and Institutes International Energy Agency (IEA) Dealing with Climate Change The International Energy Agency's »Dealing with Climate Change« database of policies and measures now features 2005 revisions and developments. The database has expanded to include more than 1400 records of the climate policy process in the IEA's 26 Member Countries since 1999. Member country governments have reviewed and endorsed the policies listed, reinforcing the informative value and authority of the database. The database is freely accessible online.

27

EEO Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Jobs Working at NNSA Blog EEO Links Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > EEO Links EEO Links DOE Office of Civil Rights (weblink)...

28

Alternative Fuels Data Center: Electricity Related Links  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Electricity Electricity Printable Version Share this resource Send a link to Alternative Fuels Data Center: Electricity Related Links to someone by E-mail Share Alternative Fuels Data Center: Electricity Related Links on Facebook Tweet about Alternative Fuels Data Center: Electricity Related Links on Twitter Bookmark Alternative Fuels Data Center: Electricity Related Links on Google Bookmark Alternative Fuels Data Center: Electricity Related Links on Delicious Rank Alternative Fuels Data Center: Electricity Related Links on Digg Find More places to share Alternative Fuels Data Center: Electricity Related Links on AddThis.com... More in this section... Electricity Basics Production & Distribution Research & Development Related Links Benefits & Considerations Stations

29

Alternative Fuels Data Center: Biodiesel Related Links  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Biodiesel Biodiesel Printable Version Share this resource Send a link to Alternative Fuels Data Center: Biodiesel Related Links to someone by E-mail Share Alternative Fuels Data Center: Biodiesel Related Links on Facebook Tweet about Alternative Fuels Data Center: Biodiesel Related Links on Twitter Bookmark Alternative Fuels Data Center: Biodiesel Related Links on Google Bookmark Alternative Fuels Data Center: Biodiesel Related Links on Delicious Rank Alternative Fuels Data Center: Biodiesel Related Links on Digg Find More places to share Alternative Fuels Data Center: Biodiesel Related Links on AddThis.com... More in this section... Biodiesel Basics Blends Production & Distribution Specifications Related Links Benefits & Considerations Stations Vehicles Laws & Incentives

30

Alternative Fuels Data Center: Hydrogen Related Links  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Hydrogen Hydrogen Printable Version Share this resource Send a link to Alternative Fuels Data Center: Hydrogen Related Links to someone by E-mail Share Alternative Fuels Data Center: Hydrogen Related Links on Facebook Tweet about Alternative Fuels Data Center: Hydrogen Related Links on Twitter Bookmark Alternative Fuels Data Center: Hydrogen Related Links on Google Bookmark Alternative Fuels Data Center: Hydrogen Related Links on Delicious Rank Alternative Fuels Data Center: Hydrogen Related Links on Digg Find More places to share Alternative Fuels Data Center: Hydrogen Related Links on AddThis.com... More in this section... Hydrogen Basics Production & Distribution Research & Development Related Links Benefits & Considerations Stations Vehicles Laws & Incentives

31

Alternative Fuels Data Center: Ethanol Related Links  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Ethanol Ethanol Printable Version Share this resource Send a link to Alternative Fuels Data Center: Ethanol Related Links to someone by E-mail Share Alternative Fuels Data Center: Ethanol Related Links on Facebook Tweet about Alternative Fuels Data Center: Ethanol Related Links on Twitter Bookmark Alternative Fuels Data Center: Ethanol Related Links on Google Bookmark Alternative Fuels Data Center: Ethanol Related Links on Delicious Rank Alternative Fuels Data Center: Ethanol Related Links on Digg Find More places to share Alternative Fuels Data Center: Ethanol Related Links on AddThis.com... More in this section... Ethanol Basics Blends Specifications Production & Distribution Feedstocks Related Links Benefits & Considerations Stations Vehicles Laws & Incentives

32

Background Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Background Links Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing Institutional Research...

33

Alternative Fuels Data Center: Propane Related Links  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Propane Propane Printable Version Share this resource Send a link to Alternative Fuels Data Center: Propane Related Links to someone by E-mail Share Alternative Fuels Data Center: Propane Related Links on Facebook Tweet about Alternative Fuels Data Center: Propane Related Links on Twitter Bookmark Alternative Fuels Data Center: Propane Related Links on Google Bookmark Alternative Fuels Data Center: Propane Related Links on Delicious Rank Alternative Fuels Data Center: Propane Related Links on Digg Find More places to share Alternative Fuels Data Center: Propane Related Links on AddThis.com... More in this section... Propane Basics Production & Distribution Related Links Benefits & Considerations Stations Vehicles Laws & Incentives Propane Related Links This list includes links related to propane. The Alternative Fuels Data

34

Alternative Fuels Data Center: Related Links  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Related Links to Related Links to someone by E-mail Share Alternative Fuels Data Center: Related Links on Facebook Tweet about Alternative Fuels Data Center: Related Links on Twitter Bookmark Alternative Fuels Data Center: Related Links on Google Bookmark Alternative Fuels Data Center: Related Links on Delicious Rank Alternative Fuels Data Center: Related Links on Digg Find More places to share Alternative Fuels Data Center: Related Links on AddThis.com... Related Links For a list of additional resources about alternative fuels and advanced vehicles, select one or more categories below. All organizations are provided as suggested resources. The Alternative Fuels Data Center does not endorse these companies or the products and services listed on their websites (see disclaimer).

35

EIA Energy Kids - Related Links  

U.S. Energy Information Administration (EIA)

Find free or low-cost resources with our database of Energy Education Resources: K-12th grade. Plus, find links to other helpful energy sites.

36

Disentangling the relations between safety and security  

Science Conference Proceedings (OSTI)

This article aims at a finer apprehension of the relations between safety and security, which are intrinsically and increasingly intricate. We introduce a new conceptual framework to better capture their moving perimeters. Then, we present our on-going ... Keywords: SIS, computer security, dependability, industrial control systems, safety, safety systems, security

Ludovic Pietre-Cambacedes; Claude Chaudet

2009-08-01T23:59:59.000Z

37

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

38

Related Links on High-Performance Schools  

Energy.gov (U.S. Department of Energy (DOE))

Below are related links to resources for incorporating energy efficiency and renewable energy into building or renovating high-performance schools.

39

Related Links on High-Performance Buildings  

Energy.gov (U.S. Department of Energy (DOE))

Below are related links to resources for incorporating energy efficiency and renewable energy into high-performance commercial and residential buildings.

40

Central Internet Database (CID) Related Links  

Office of Environmental Management (EM)

Related Links Related Links Central Internet Database CID Photo Banner Links to Waste and Materials Disposition Information Below is a collection of reports and links to various documents that provide information related to waste and material disposition. While most of these are directly related to the Department of Energy's waste management activities, some links include information from the commercial sector. Some of the information provides an historical context for current waste disposition alternatives. To view PDF documents, please ensure Adobe Reader is installed on your computer, it is available to download here Exit CID Website . Waste Volume Related Databases For DOE/EM waste and material stream data: Waste Information Management System (WIMS) provided by Florida International University Exit CID Website

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

NREL: Financing Geothermal Power Projects - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Links Related Links View these websites for more information on geothermal power project financing. NREL Geothermal Policymakers' Guidebooks NREL Geothermal Policymakers' Guidebooks Learn the five key steps for creating effective policy and increasing the deployment of geothermal electricity generation technologies. California Energy Commission's Geothermal Program Here you'll find information on the California Energy Commission's geothermal program, including geothermal energy, funding opportunities, and contacts. Database of State Incentives for Renewables and Energy Efficiency This database of state, local, utility, and federal incentives and policies that promote renewable energy and energy efficiency can help you find financing incentives and opportunities in your state.

42

Related Links on Hawaii | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hawaii Hawaii Related Links on Hawaii Below are related links to resources specifically for implementing energy efficiency and renewable energy technologies in Hawaii. Learn more about deployment efforts in Hawaii. Department of Economic Development, Business, and Tourism The state's Department of Business, Economic Development and Tourism works closely with DOE and the National Renewable Energy Laboratory (NREL) to implement deployment efforts from Hawaii Clean Energy Initiative activities. Find resources for economic and statistical data, business development opportunities, energy and conservation information, and foreign trade advantages. Electric Vehicles in Hawaii The state of Hawaii sees the use of electric vehicles (EVs) as one solution to reducing the state's petroleum consumption and provides information on

43

Changes related to "Center for Environment and National Security...  

Open Energy Info (EERE)

Share this page on Facebook icon Twitter icon Changes related to "Center for Environment and National Security at Scripps" Center for Environment and National Security...

44

Overview: Office of the Chief Privacy Officer Security-Related ...  

Science Conference Proceedings (OSTI)

... Security Policy in Some Key Health Related Regulations Other than HIPAA DRAFT 4 ... 5 Security in Medicare Medicaid EHR Incentives Program ...

2012-06-05T23:59:59.000Z

45

Related Links | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Links Related Links Regional Energy Efficiency Organizations MEEA NEEP NEEA SEEA SWEEP SPEER Midwest Energy Efficiency Alliance (MEEA) IL, IN, IA, KS, KY, ND, NE, MI, MN, MO, OH, SD, WI The Midwest Energy Efficiency Alliance (MEEA) is a collaborative network advancing energy efficiency in the Midwest to support sustainable economic development and environmental preservation. MEEA raises awareness, facilitates energy efficiency programs and strengthens policy across the nine-state region. MEEA brings together a respected network of members, partners, board and staff, and inspires others to create new technologies, new products and new ways of thinking when it comes to energy efficiency. Codes Contact Isaac Elnecave Senior Policy Manager ielnecave@mwalliance.org phone: (312)784-7253

46

NREL: State and Local Activities - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Links Related Links Find information about U.S. Department of Energy (DOE) and other state and local clean energy technical assistance and deployment programs and activities. State and Local Technical Assistance Programs NREL provides technical assistance to state and local energy projects through the following initiatives and programs. DOE Green Power Network DOE Weatherization & Intergovernmental Program U.S. Department of Agriculture Rural Energy for America Program For more information about NREL's role, contact Dave Peterson. State and Local Deployment Programs NREL strives to increase the scale of clean energy technology deployment in U.S. states and localities by supporting these technology deployment projects and initiatives. DOE Biomass Program DOE Builders Challenge

47

Procurement-Related Forms | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Procurement-Related Forms Procurement-Related Forms Procurement-Related Forms The following procurement-related forms are provided in PDF fillable and/or Word format. Click the link in the "Format" column to open a copy of the form or right-click to download. To sort the table by UCN number or title, click the associated column heading. Number* Title/Description Format** UCN-04452S B&W Y-12 Subcontractor Personnel Exit Checklist PDF-fil UCN-6573 Subcontractor's Invoice for Travel and/or Services PDF-fil UCN-13816B Request for Waiver or Deviation Word UCN-13816C Request for Waiver or Deviation (Continued) Word UCN-20087A Suspect/Counterfeit Part Headmark List PDF UCN-20856 Nonpossessing Security Plan PDF-fil, Word UCN-21329 Subcontract Technical Representative (STR) Change Notice PDF-fil

48

CHINA-AFRICA RELATIONS GOVERNANCE, PEACE AND SECURITY  

E-Print Network (OSTI)

CHINA-AFRICA RELATIONS GOVERNANCE, PEACE AND SECURITY Editors Mulugeta Gebrehiwot Berhe and Liu Hongwu #12;CHINA-AFRICA RELATIONS GOVERNANCE, PEACE AND SECURITY Editors Mulugeta Gebrehiwot Berhe of China China's Evolving Policy towards Peace and Security in Africa: Constructing a new paradigm

Recanati, Catherine

49

Los Alamos lab director to link science education, national security in  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab director to link science education, national security in talk Lab director to link science education, national security in talk Los Alamos lab director to link science education, national security in TEDxABQ talk McMillan will describe the events that led to his career in science and share suggestions on how non-scientists can inspire young people to STEM careers and scientific literacy. September 5, 2013 Los Alamos National Laboratory Director Charlie McMillan Los Alamos National Laboratory Director Charlie McMillan Contact Fred deSousa Communications Office (505) 665-3430 Email "Finding young people with the scientific and technical capabilities to carry on the Laboratory's national security missions will be critical, but the linkage to national security goes beyond that," McMillan said. Watch live stream at home or at Bradbury Science Museum

50

Alternative Fuels Data Center: Natural Gas Related Links  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Natural Gas Natural Gas Printable Version Share this resource Send a link to Alternative Fuels Data Center: Natural Gas Related Links to someone by E-mail Share Alternative Fuels Data Center: Natural Gas Related Links on Facebook Tweet about Alternative Fuels Data Center: Natural Gas Related Links on Twitter Bookmark Alternative Fuels Data Center: Natural Gas Related Links on Google Bookmark Alternative Fuels Data Center: Natural Gas Related Links on Delicious Rank Alternative Fuels Data Center: Natural Gas Related Links on Digg Find More places to share Alternative Fuels Data Center: Natural Gas Related Links on AddThis.com... More in this section... Natural Gas Basics Production & Distribution Related Links Benefits & Considerations Stations Vehicles Laws & Incentives

51

Alternative Fuels Data Center: Idle Reduction Related Links  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Conserve Fuel Conserve Fuel Printable Version Share this resource Send a link to Alternative Fuels Data Center: Idle Reduction Related Links to someone by E-mail Share Alternative Fuels Data Center: Idle Reduction Related Links on Facebook Tweet about Alternative Fuels Data Center: Idle Reduction Related Links on Twitter Bookmark Alternative Fuels Data Center: Idle Reduction Related Links on Google Bookmark Alternative Fuels Data Center: Idle Reduction Related Links on Delicious Rank Alternative Fuels Data Center: Idle Reduction Related Links on Digg Find More places to share Alternative Fuels Data Center: Idle Reduction Related Links on AddThis.com... More in this section... Biodiesel Electricity Ethanol Hydrogen Natural Gas Propane Emerging Fuels Fuel Prices Idle Reduction Related Links

52

Changes related to "Center for Environment and National Security...  

Open Energy Info (EERE)

Share this page on Facebook icon Twitter icon Changes related to "Center for Environment and National Security at Scripps Feed" Center for Environment and National...

53

Links to Muon Collider Related Web Pages  

NLE Websites -- All DOE Office Websites (Extended Search)

useful nu-factory related web pages: Nu-FactoryMuon Collider Studies at Fermilab Neutrino Factory Design Study MUCOOL Collaboration: Ionization Cooling R&D Brookhaven Muon...

54

Links to Muon Collider Related Web Pages  

NLE Websites -- All DOE Office Websites (Extended Search)

Muon Collider related web pages: Muon Collider Feasibility Study ... Fermilab Page MUCOOL Collaboration: Ionization Cooling R&D Snowmass 1996 Feasibility Study Book Brookhaven Muon...

55

NREL: Vehicle Systems Analysis - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

information related to NREL's vehicle systems analysis capabilities and R&D activities, including: Models and tools National laboratories Models and Tools NREL's vehicle system...

56

Energy Education & Workforce Development: Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

specific interest as well as other information about training requirements for certain energy jobs. DOE Related Advanced Manufacturing Office: Training Find training sessions in...

57

Former Worker Medical Screening Program Related Documents & Links |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Former Former Worker Medical Screening Program Related Documents & Links Former Worker Medical Screening Program Related Documents & Links Related Documents & Links Beryllium Information-ORISE Chronic Beryllium Disease Information-National Jewish Health Department of Energy Human Subjects Protection Program DOE Covered Facilities Database Department of Labor Energy Employees Occupational Illness Compensation Program (EEOICP) Department of Labor EEOICP - Upcoming Events Department of Labor Office of the Ombudsman for EEOICPA NIOSH Advisory Board and Public Meetings NIOSH Division of Compensation Analysis and Support Project Websites Building Trades National Medical Screening Program Medical Exam Program for Former Workers at Los Alamos National Laboratory

58

Employment at EERE Related Links | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Employment at EERE Related Links Employment at EERE Related Links Employment at EERE Related Links If you are considering employment with the U.S. Department of Energy (DOE) Office of Energy Efficiency and Renewable Energy (EERE), and even if you already are an EERE employee, you may find the following links helpful: Veterans' Employment Resources The American's Veteran site includes information to help you understand veterans' preference, how federal jobs are filled, and unique veteran appointing authorities designed to help you find a job. Persons with Disabilities The U.S. Office of Personnel Management (OPM) explains how federal agencies such as DOE fill jobs in relation to those with disabilities. Federal Executive Institute The Federal Executive Institute (FEI) helps senior government leaders

59

Related Links on Renewable Energy | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Related Links on Renewable Energy Related Links on Renewable Energy Related Links on Renewable Energy Below are related links to resources that provide information to help communities incorporate renewable energy into rebuilding efforts. American Solar Energy Society A non-profit organization that offers general information about solar energy, practical suggestions, success stories, and more. Geothermal Energy Association Trade association that provides geothermal resource maps and a listing of U.S. geothermal plants by state. Renewable Energy for Consumers, Businesses, and Students Learn about renewable energy at the National Renewable Energy Laboratory's renewable energy basics site for consumers, business owners, and students. Solar Energy Industries Association Solar trade association that provides general information about solar

60

Privacy Act Links to Relates Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Proposed Rules, and Notices of Federal agencies and organizations, as well as Executive Orders and other Presidential Documents. The Privacy Act Issuances Compilation contains...

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Privacy Act Links to Relates Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

on individuals and rules agencies follow to assist individuals who request information about their records. DOE Office of Hearings and Appeals. The Department of Justice...

62

NREL: U.S. Life Cycle Inventory Database - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Links Related Links Below are links to life cycle inventory (LCI) databases, life cycle assessment (LCA) information, LCA tools, research institutes utilizing LCA, labeling initiatives and organizations, international LCA initiatives, LCA online forums. Life Cycle Inventory Data Ecoinvent: Swiss Centre for Life Cycle Inventories IVAM LCA Data 4: Dutch LCA Database KITECH (Korea Institute of Industrial Technology): Korea National Cleaner Production Center LCI Database Life Cycle Assessment Information IERE (The Institute for Environmental Research and Education): The American Center for Life Cycle Assessment SETAC (Society of Environmental Toxicology and Chemistry): SETAC Life Cycle Assessment SPOLD (Society for Promotion of Life-cycle Assessment Development): 2.0 LCA Consultants homepage

63

Related Links | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Links Advanced Scientific Computing Research (ASCR) ASCR Home About Research Facilities Science Highlights Benefits of ASCR Funding Opportunities Advanced Scientific Computing Advisory Committee (ASCAC) News & Resources ASCR Discovery Monthly News Roundup News Archives ASCR Program Documents ASCR Workshops and Conferences ASCR Presentations 100Gbps Science Network Related Links Contact Information Advanced Scientific Computing Research U.S. Department of Energy SC-21/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-7486 F: (301) 903-4846 E: sc.ascr@science.doe.gov More Information » News & Resources Related Links Print Text Size: A A A RSS Feeds FeedbackShare Page The White House External link U.S. Department of Energy Office of Science

64

Uniform Methods Project Related Links | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Related Links Related Links Uniform Methods Project Related Links The websites and publications listed below provide supporting information for the Uniform Methods Project and for evaluation, measurement, and verification (EM&V) of energy efficiency programs. Glossaries of EM&V Terms Federal EM&V Resources International Resources Related Standards Glossaries of EM&V Terms The following glossaries provide definitions of technical language and EM&V terms. Appendix A: Glossary of Terms, Energy Efficiency Program Impact Evaluation Guide Appendix A has a glossary of EM&V terms; published by the EM&V SEE Action Working Group. Federal EM&V Resources SEE Action Evaluation, Measurement, and Verification Working Group The State and Local Energy Efficiency Action Network (SEE Action)

65

DOE Hydrogen and Fuel Cells Program: Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Plans, Roadmaps, and Vision Documents Program Plans, Roadmaps, and Vision Documents Program Records Annual Progress Reports Annual Merit Review and Peer Evaluation Reports to Congress Policies and Acts Financial Opportunities Related Links U.S. Department of Energy Search help Home > Library > Related Links Printable Version Related Links Visit these websites to learn about federal agencies, national laboratories, international agencies, and partnerships that are working to advance hydrogen and fuel cell technologies. Federal Agency Sites DOE Hydrogen and Fuel Cells Program Offices Office of Energy Efficiency and Renewable Energy Office of Fossil Energy Office of Nuclear Energy Office of Science Alternative Fuels Data Center: Fuel Cell Vehicles - The Alternative Fuels Data Center provides information on alternative fuel and vehicle

66

Related Links on Greensburg, Kansas | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Greensburg, Kansas Greensburg, Kansas Related Links on Greensburg, Kansas Below are related links to resources specifically for Kansas on building with energy efficiency and renewable energy technologies. Learn more about deployment efforts in Greensburg, Kansas. Efficiency Kansas Efficiency Kansas is a loan program from the State Energy Office at the Kansas Corporation Commission that helps homes and businesses access low-interest financing through partner lenders and utilities, identify and implement energy-efficiency improvements, and save on monthly utility bills. Greensburg Sustainable Building Database The Greensburg Sustainable Building Database showcases green building projects in Greensburg, Kansas. The case studies in this database offer ideas for rebuilding energy efficiently and include detailed information

67

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

68

Thermodynamics and Relativity: Possible Consequences of their Close Link  

E-Print Network (OSTI)

The first part of this paper is a summary of a hypothesis previously advanced, suggesting the existence of a close link between thermodynamics and relativity. The second part is a preliminary comment about some possible consequences in the fields of physics, astronomy and biology.

Jean-Louis Tane

2008-05-25T23:59:59.000Z

69

Related Links on Energy Planning | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Planning Planning Related Links on Energy Planning Below are related links to energy planning resources. EPA State and Local Climate and Energy Program Access information on technical assistance, analytical tools, and outreach support available for state, local, and tribal governments through the EPA State and Local Climate and Energy Program. View case studies of state and local projects and see examples of greenhouse gas inventories and climate action plans. Local Energy Planning in Practice: A Review of Recent Experiences This American Council for an Energy Efficient Economy (ACEEE) research report reviews the energy-related plans in 30 U.S. locations. The report summarizes progress made in planning processes and choices made by community leaders, and identifies both advantages and difficulties

70

Related Links on Energy Efficiency | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Efficiency Efficiency Related Links on Energy Efficiency Below are related links to resources on incorporating energy efficiency into buildings and homes. Alternative Fuels and Advanced Vehicles Data Center Search the U.S. Department of Energy (DOE) Alternative Fuels and Advanced Vehicles Data Center database for federal and state transportation incentives and laws on alternative fuels and vehicles, air quality, fuel efficiency, and more. Daylighting Strategically place windows to maximize light and minimize glare to save money and energy on electric lighting. Designing and Remodeling Your Home How to reduce energy use and save money when designing or remodeling a home. Energy Savers A DOE website with information about how to save energy and money. ENERGY STAR® Information about choosing energy-efficient products and designing an

71

Related Links on Financial Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Financial Assistance Financial Assistance Related Links on Financial Assistance Below are related links to resources on financial assistance programs, grants, and incentives for using energy efficiency and renewable energy technologies. American Recovery and Reinvestment Act of 2009 Signed into law by President Obama on February 17, 2009, the Recovery Act contains provisions that financially benefit individuals, businesses, organizations, and the renewable energy industry as a whole. Learn more by visiting the following Web pages: Office of Energy Efficiency and Renewable Energy, U.S. Department of Energy (DOE), and Recovery.gov. Database of State Incentives for Renewables and Efficiency Access the Database of State Incentives for Renewables and Efficiency to find what state, local, utility, and federal incentives and policies are

72

Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness  

Science Conference Proceedings (OSTI)

Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security. Since employees who comply with the information ... Keywords: behavioral issues of information security, compliance, information security awareness, information security management, information security policy, theory of planned behavior

Burcu Bulgurcu; Hasan Cavusoglu; Izak Benbasat

2010-09-01T23:59:59.000Z

73

Related Links on Community Renewable Energy Deployment | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Community Renewable Energy Deployment Community Renewable Energy Deployment Related Links on Community Renewable Energy Deployment The following publications and websites provide helpful information for communities planning or implementing renewable energy and energy efficiency projects. Publications The U.S. Department of Energy (DOE) and its National Renewable Energy Laboratory (NREL) publish numerous community guides, resources, and examples, as well as publications geared toward organizations that provide technical assistance to communities. Community Guides, Resources, and Examples These documents provide how-to information, steps, and resources for community-wide projects, as well as lessons learned from other communities. A Guide to Community Solar: Utility, Private, and Non-Profit Project

74

Detection of Multiple-Duty-Related Security Leakage in ...  

Science Conference Proceedings (OSTI)

... ARCHON is a digital library that federates physics ... on Software Engineering (ICSE 2005), pages ... formation Security Conference (ISC 2005), pages ...

2009-11-16T23:59:59.000Z

75

Office of Enforcement - Safety and Security Enforcement-Related...  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Enforcement Enforcement Home Worker Safety and Health Enforcement Office of Nuclear Safety Enforcement Security Enforcement Notices of Violation Consent Orders ...

76

EIA Energy Kids - Related Links - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

Find free or low-cost resources with our database of Energy Education Resources: K-12th grade. Plus, find links to other helpful energy sites.

77

Using equivalence relations for corrective enforcement of security policies  

Science Conference Proceedings (OSTI)

In this paper, we present a new framework of runtime security policy enforcement. Building on previous studies, we examine the enforcement power of monitors able to transform their target's execution, rather than simply accepting it if it is valid, or ... Keywords: inlined reference monitors, monitoring, program transformation, security policy enforcement

Raphal Khoury; Nadia Tawbi

2010-09-01T23:59:59.000Z

78

The EU's external energy security policy : A comparative analysis of the EU's external energy relations.  

E-Print Network (OSTI)

??This thesis analyses the EUs external energy security policy through a comparative analysis of the energy relations between the EU and important producers of natural (more)

Cook, Hanne

2011-01-01T23:59:59.000Z

79

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

80

Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links: Anderson County Government Emergency Management Anderson County Local Emergency Planning Committee (LEPC) City of Oak Ridge Fire Department Knoxville-Knox County Emergency...

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links Links Dedicated links pages are available for the following topics: Diesel Vehicles and Fuels Electric Vehicles Fuel Cell Vehicles Hybrids Plug-in Hybrids Exit Fueleconomy.gov The links below are to pages that are not part of the fueleconomy.gov Web site. We offer these external links for your convenience in accessing additional information that may be useful or interesting to you. Auto Manufacturers Acura Aston Martin Audi Bentley BMW Bugatti Buick Cadillac Chevrolet Chrysler Dodge Ferrari Fiat Ford GMC Honda Hyundai Infiniti Jaguar Jeep Kia Lamborghini Land Rover Lexus Lincoln Lotus Maserati Maybach Mazda McLaren Automotive Mercedes-Benz MINI Mitsubishi Nissan Porsche Ram Rolls Royce Roush Performance Scion smart Spyker Subaru Suzuki Toyota Volkswagen Volvo VPG Buying Guides ACEEE's Green Book Aol Autos

82

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

83

Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links Links Public Outreach Clint Sprott's Wonders of Physics from University of Wisconsin, Madison Clint Sprott's Physics Demo Manual Phun Physics shows from University of Virginia Physics Van from Universitiy of Illinois, Urbana-Champaign How Does A Thing Like That Work from University of Pittsburgh Physics on the Road from Purdue University The Mad Science Group University Catalogues of Demonstrations Boston Univeristy's physics demonstrations University of Victoria physics demonstrations Wesleyan University physics demonstrations University of Minnesota, The Origin of the DCS Physics Demonstrations at the University of Texas at Austin University of Maryland University of Wisconsin University of Guelph University of Oregon Brown Physics Lecture Demonstrations University of California, Berkeley

84

Low Dose Radiation Program: Links - Radiation Research Related...  

NLE Websites -- All DOE Office Websites (Extended Search)

Research Related Databases Comprehensive Epidemiologic Data Resource (CEDR) U.S. Department of Energy (DOE) The European Radiobiology Archives Genomics: GTL - Systems Biology for...

85

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

86

EIA- Energy Efficiency Related Links: EIA Reports and Analyses  

U.S. Energy Information Administration (EIA) Indexed Site

Reports Reports Energy-Efficiency Related: EIA Reports and Analyses Released Release Date: October 1999 Last Updated: August 2010 End Users: Commercial Buildings / Manufacturing / Residential / Transportation Energy Source: Coal / Electricity / Natural Gas / Nuclear / Petroleum / Renewable / All Sectors Commercial Buildings 2003 CBECS Detailed Tables, most recent data on building characteristics and consumption expenditures 2003 Building Characteristics Overview, the Commercial Buildings Energy Consumption Survey (CBECS) estimates that there were nearly 4.9 million commercial buildings and more than 71.6 billion square feet of commercial floorspace in the U. S. in 2003 1999 Building Characteristics Overview, the 1999 CBECS collected information about HVAC (heating, ventilation, and air-conditioning) system, building shell, and lighting conservation features and practices plus information on off-hour reduction of end-use equipment. In general, commercial buildings that were larger than average were more likely to have used these conservation features or measures (May 2002)

87

Homeland Security Presidential Directive 12  

NLE Websites -- All DOE Office Websites (Extended Search)

HSPD-12 Home HSPD-12 FAQs About the DOE HSPD-12 Badge HSPD-12 Reporting Metrics for OMB HSPD-12 Implementation Progress Guidance Related Links HSS Logo Homeland Security...

88

EIA Energy Efficiency-Energy Related Greenhouse Gas Emissions Links for the  

U.S. Energy Information Administration (EIA) Indexed Site

Related Greenhouse Gas Emissions Links Related Greenhouse Gas Emissions Links Energy Related Greenhouse Gas Emissions Links Posted Date: May 2007 Page Last Modified: September 2010 EIA Links Disclaimer: These pages contain hypertext links to information created and maintained by other public and private organizations. These links provide additional information that may be useful or interesting and are being provided consistent with the intended purpose of the EIA website. EIA does not control or guarantee the accuracy, relevance, timeliness, or completeness of this outside information. EIA does not endorse the organizations sponsoring linked websites, the views they express, or the products and services they offer. Government Agencies / Associations Energy Information Administration - Annual Energy Outlook: Carbon Dioxide Emissions, CO2 emissions from the combustion of fossil fuels are proportional to fuel consumption. Among fossil fuel types, coal has the highest carbon content, natural gas the lowest, and petroleum in between. In the AEO2006 reference case, the shares of these fuels change slightly from 2004 to 2030, with more coal and less petroleum and natural gas. The combined share of carbon-neutral renewable and nuclear energy is stable from 2004 to 2030 at 14 percent

89

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: ModSecurity Multipart Message Parsing Security Bypass 5: ModSecurity Multipart Message Parsing Security Bypass Vulnerability V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability October 18, 2012 - 6:00am Addthis PROBLEM: ModSecurity Multipart Message Parsing Security Bypass Vulnerability PLATFORM: Modsecurity Versions prior to 2.70 ABSTRACT: SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions REFERENCE LINKS: SEC Consult Secunia Advisory SA49853 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when parsing multipart requests and can be exploited to bypass certain filtering rules. IMPACT: Remote Security Bypass SOLUTION: Update to version 2.70. Addthis Related Articles V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities

90

The Emergence of Weather-Related Testbeds Linking Research and Forecasting Operations  

Science Conference Proceedings (OSTI)

Testbeds have emerged as a critical mechanism linking weather research with forecasting operations. The U.S. Weather Research Program (USWRP) was formed in the 1990s to help identify key gaps in research related to major weather prediction problems and ...

F. Martin Ralph; Janet Intrieri; David Andra; Jr.; Robert Atlas; Sid Boukabara; David Bright; Paula Davidson; Bruce Entwistle; John Gaynor; Steve Goodman; Jiann-Gwo Jiing; Amy Harless; Jin Huang; Gary Jedlovec; John Kain; Steven Koch; Bill Kuo; Jason Levit; Shirley Murillo; Lars Peter Riishojgaard; Timothy Schneider; Russell Schneider; Travis Smith; Steven Weiss

91

The Emergence of Weather-Related Test Beds Linking Research and Forecasting Operations  

Science Conference Proceedings (OSTI)

Test beds have emerged as a critical mechanism linking weather research with forecasting operations. The U.S. Weather Research Program (USWRP) was formed in the 1990s to help identify key gaps in research related to major weather prediction problems and ...

F. Martin Ralph; Janet Intrieri; David Andra Jr.; Robert Atlas; Sid Boukabara; David Bright; Paula Davidson; Bruce Entwistle; John Gaynor; Steve Goodman; Jiann-Gwo Jiing; Amy Harless; Jin Huang; Gary Jedlovec; John Kain; Steven Koch; Bill Kuo; Jason Levit; Shirley Murillo; Lars Peter Riishojgaard; Timothy Schneider; Russell Schneider; Travis Smith; Steven Weiss

2013-08-01T23:59:59.000Z

92

Related Links | OSTI, US Dept of Energy, Office of Scientific and Technical  

Office of Scientific and Technical Information (OSTI)

Related Links Related Links Research Diffusion Accelerator Research Team OSTI has assembled a research team of epidemiological modelers and science diffusion experts, including: Luís Bettencourt, Theoretical Division, T-7, Los Alamos National Laboratory David Kaiser exit federal site , Massachusetts Institute of Technology Carlos Castillo-Chavez exit federal site , Arizona State University The team is coordinated by David Wojick, consultant. General Critical Properties of the Dynamics of Scientific Discovery (994-KB PDF) by Luís M.A. Bettencourt and David I. Kaiser The dynamics of scientific discovery: the spread of ideas and structural transitions in collaboration networks (759-KB PDF) by Luís M. A. Bettencourt, et al. The Digital Road to Scientific Knowledge Diffusion: A Faster, Better

93

Related Links on New Orleans and Hot-Humid Climates | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

New Orleans and Hot-Humid Climates New Orleans and Hot-Humid Climates Related Links on New Orleans and Hot-Humid Climates Below are related links to resources specifically for New Orleans, Louisiana, and other hot-humid climates on building with energy efficiency and renewable energy technologies. Learn more about deployment efforts in New Orleans. Building a Durable and Energy Efficient Home in Post-Katrina New Orleans This report from Building Science examines designing homes with key sustainability concepts, durability, and energy efficiency that can provide insurance to people in the event of a hurricane. Designing and Building Hurricane-Resistant Homes This article from the Consortium for Advanced Residential Buildings details a production builder's efforts to identify better wall systems to use in

94

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

95

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

96

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

97

Security and Other Issues Related to Out-Processing of Employees...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of the Department of Energy's (DOE's) Los AND OBJECTIVES Alamos National Laboratory (LANL) is to enhance global security, develop technical solutions to reduce the weapons of...

98

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

99

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

100

Security Policy: Target, Content, & Links  

Science Conference Proceedings (OSTI)

... Sometimes called by its classic term TEMPEST, EMSEC prevents exploiting intercepted electromagnetic energy radiated from equipment that ...

1998-10-28T23:59:59.000Z

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

102

Climatologically Tuned Reflectivity-Rain Rate Relations and Links to Area-Time Integrals  

Science Conference Proceedings (OSTI)

Relations between either the point- or beam-averaged effective reflectivity, Ze, and surface rain rate, R, are determined by a probability matching method similar to that of Calheiros and Zawadzki, and Rosenfeld. The cumulative density functions (...

David Atlas; Daniel Rosenfeld; David B. Wolff

1990-11-01T23:59:59.000Z

103

Current-phase relation of a Bose-Einstein condensate flowing through a weak link  

Science Conference Proceedings (OSTI)

We study the current-phase relation of a Bose-Einstein condensate flowing through a repulsive square barrier by solving analytically the one-dimensional Gross-Pitaevskii equation. The barrier height and width fix the current-phase relation j({delta}{phi}), which tends to j{approx}cos({delta}{phi}/2) for weak barriers and to the Josephson sinusoidal relation j{approx}sin({delta}{phi}) for strong barriers. Between these two limits, the current-phase relation depends on the barrier width. In particular, for wide-enough barriers, we observe two families of multivalued current-phase relations. Diagrams belonging to the first family, already known in the literature, can have two different positive values of the current at the same phase difference. The second family, new to our knowledge, can instead allow for three different positive currents still corresponding to the same phase difference. Finally, we show that the multivalued behavior arises from the competition between hydrodynamic and nonlinear-dispersive components of the flow, the latter due to the presence of a soliton inside the barrier region.

Piazza, F.; Smerzi, A. [CNR-INFM BEC center and Dipartimento di Fisica, Universita di Trento, I-38050 Povo (Italy); Collins, L. A. [Theoretical Division, Mail Stop B214, Los Alamos National Laboratory, Los Alamos, New Mexico 87545 (United States)

2010-03-15T23:59:59.000Z

104

Current-Phase Relation of a Bose-Einstein Condensate Flowing Through a Weak Link  

E-Print Network (OSTI)

We study the current-phase relation of a Bose-Einstein condensate flowing through a repulsive square barrier by solving analytically the one dimensional Gross-Pitaevskii equation. The barrier height and width fix the current-phase relation $j(\\delta\\phi)$, which tends to $j\\sim\\cos(\\delta\\phi/2)$ for weak barriers and to the Josephson sinusoidal relation $j\\sim\\sin(\\delta\\phi)$ for strong barriers. Between these two limits, the current-phase relation depends on the barrier width. In particular, for wide enough barriers, we observe two families of multivalued current-phase relations. Diagrams belonging to the first family, already known in the literature, can have two different positive values of the current at the same phase difference. The second family, new to our knowledge, can instead allow for three different positive currents still corresponding to the same phase difference. Finally, we show that the multivalued behavior arises from the competition between hydrodynamic and nonlinear-dispersive components of the flow, the latter due to the presence of a soliton inside the barrier region.

F. Piazza; L. A. Collins; A. Smerzi

2009-12-16T23:59:59.000Z

105

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

106

Cybercrime and cyber-security issues associated with China: some economic and institutional considerations  

Science Conference Proceedings (OSTI)

China is linked to cybercrimes of diverse types, scales, motivations and objectives. The Chinese cyberspace thus provides an interesting setting for the study of cybercrimes. In this paper, we first develop typology, classification and characterization ... Keywords: China, Cyber-security, Cyber-security related alliances, Cybercrime, International relations, International trade, Intrinsic and extrinsic motivations

Nir Kshetri

2013-03-01T23:59:59.000Z

107

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

108

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

109

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... link to document, the document will open in a blank browser window and this ... USB Flash Drive Security - (Office of Government Ethics), 05/04/06. ...

110

T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat May Ignore @ServletSecurity Annotation 0: Apache Tomcat May Ignore @ServletSecurity Annotation Protections T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections March 16, 2011 - 3:05pm Addthis PROBLEM: Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by an error related to ignoring @ServletSecurity annotations. An attacker could exploit this vulnerability to bypass security restrictions and launch further attacks on the system. PLATFORM: Apache Tomcat versions 7.0.0 through 7.0.10. ABSTRACT: Apache Tomcat May Ignore @ServletSecurity Annotation Protections. A remote user may be able to bypass @ServletSecurity annotation protections. reference LINKS: Apache Tomcat Advisory: Apache Tomcat 7.0.11 CVE-2011-1088 Security Tracker Alert ID:1025215 OSVDB ID: 71027

111

Improved Formulations for Air-Surface Exchanges Related to National Security Needs: Dry Deposition Models  

Science Conference Proceedings (OSTI)

The Department of Homeland Security and others rely on results from atmospheric dispersion models for threat evaluation, event management, and post-event analyses. The ability to simulate dry deposition rates is a crucial part of our emergency preparedness capabilities. Deposited materials pose potential hazards from radioactive shine, inhalation, and ingestion pathways. A reliable characterization of these potential exposures is critical for management and mitigation of these hazards. A review of the current status of dry deposition formulations used in these atmospheric dispersion models was conducted. The formulations for dry deposition of particulate materials from am event such as a radiological attack involving a Radiological Detonation Device (RDD) is considered. The results of this effort are applicable to current emergency preparedness capabilities such as are deployed in the Interagency Modeling and Atmospheric Assessment Center (IMAAC), other similar national/regional emergency response systems, and standalone emergency response models. The review concludes that dry deposition formulations need to consider the full range of particle sizes including: 1) the accumulation mode range (0.1 to 1 micron diameter) and its minimum in deposition velocity, 2) smaller particles (less than .01 micron diameter) deposited mainly by molecular diffusion, 3) 10 to 50 micron diameter particles deposited mainly by impaction and gravitational settling, and 4) larger particles (greater than 100 micron diameter) deposited mainly by gravitational settling. The effects of the local turbulence intensity, particle characteristics, and surface element properties must also be addressed in the formulations. Specific areas for improvements in the dry deposition formulations are 1) capability of simulating near-field dry deposition patterns, 2) capability of addressing the full range of potential particle properties, 3) incorporation of particle surface retention/rebound processes, and. 4) development of dry deposition formulations applicable to urban areas. Also to improve dry deposition modeling capabilities, atmospheric dispersion models in which the dry deposition formulations are imbedded need better source-term plume initialization and improved in-plume treatment of particle growth processes. Dry deposition formulations used in current models are largely inapplicable to the complex urban environment. An improved capability is urgently needed to provide surface-specific information to assess local exposure hazard levels in both urban and non-urban areas on roads, buildings, crops, rivers, etc. A model improvement plan is developed with a near-term and far-term component. Despite some conceptual limitations, the current formulations for particle deposition based on a resistance approach have proven to provide reasonable dry deposition simulations. For many models with inadequate dry deposition formulations, adding or improving a resistance approach will be the desirable near-term update. Resistance models however are inapplicable aerodynamically very rough surfaces such as urban areas. In the longer term an improved parameterization of dry deposition needs to be developed that will be applicable to all surfaces, and in particular urban surfaces.

Droppo, James G.

2006-07-01T23:59:59.000Z

112

SNAP Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

main page The NASA EPO program at Sonoma State University NASA Imagine the Universe Dark Energy feature Astronomy Notes, an introductory primer to astronomy The Universe...

113

WIPP - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

- Headquarters Nuclear Waste Partnership LLC Los Alamos National Laboratory Sandia National Laboratories Portage - Carlsbad Field Office Technical Assistance Contractor Skylla...

114

AFRD - Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links Links Home Organization Diversity Research Highlights Safety Links Intramural Links Accelerators are built, operated, and used by a large and diverse worldwide community. These links will take you to pages elsewhere that are related to AFRD’ work. The U.S. Department of Energy, Office of Science, is the principal supporter of our activities (and many other R&D endeavors). For information on the Joint Accelerator Conferences go to JACoW. The International Committee for Future Accelerators and the American Physical Society’ Division of Physics of Beams are among the organizations that advance, encourage, and communicate accelerator and beam science. The Laboratory's 50th Anniversary magazine gives an overview of the early and middle history of LBNL. Two of its authors later published the

115

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

116

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

117

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

118

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

119

Diesel Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links Links Exit Fueleconomy.gov The links below are to pages that are not part of the fueleconomy.gov Web site. We offer these external links for your convenience in accessing additional information that may be useful or interesting to you. Diesel Vehicles and Manufacturers Audi A3 (TDI models) A6 (TDI models) A7 (TDI models) A8 L (TDI model) Q5 (TDI models) Q7 (TDI models) BMW 328d Sedan 328d xDrive Sedan 328d xDrive Sports Wagon 535d Sedan 535d xDrive Sedan Chevrolet Cruze Turbo Diesel Jeep Grand Cherokee EcoDiesel Mercedes-Benz E250 BlueTEC GL350 BlueTEC GLK250 BlueTEC ML350 BlueTEC Porsche Cayenne Diesel Volkswagen Beetle (TDI models) Beetle Convertible (TDI models) Golf (TDI models) Jetta (TDI models) Jetta Sportwagen (TDI models) Passat (TDI models) Touareg (TDI models) Diesel-Related Information

120

Energy Independence and Security Act of 2007 | Open Energy Information  

Open Energy Info (EERE)

Links Energy Independence and Security Act of 2007 Retrieved from "http:en.openei.orgwindex.php?titleEnergyIndependenceandSecurityActof2007&oldid255460" Category: Stubs...

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

122

Security and Other Issues Related to Out-Processing of Employees at Los Alamos National Laboratory, IG-0677  

Energy.gov (U.S. Department of Energy (DOE))

The core mission of the Department of Energys (DOEs) Los AND OBJECTIVES Alamos National Laboratory (LANL) is to enhance global security, develop technical solutions to reduce the weapons of mass...

123

T-642: RSA SecurID update to Customers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

124

News: IBM launches security offensive  

Science Conference Proceedings (OSTI)

IBM has announced a major security push, representing a US$1.5 billion investment in security-related projects next year. It will partner with other security vendors to offer a set of security services targeting information assets. The services will ...

2007-11-01T23:59:59.000Z

125

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

126

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

127

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

128

Cyber Security Awareness Training in the Age of Mobile ...  

Science Conference Proceedings (OSTI)

... Page 24. Property of Titan Info Security Group, LLC ? Instead of clicking on links in email, go to the site like Facebook, LinkedIn, etc. ...

2013-03-28T23:59:59.000Z

129

ITL Bulletin Security Of Bluetooth Systems And Devices ...  

Science Conference Proceedings (OSTI)

... hopping spread spectrum (FHSS) technology for transmissions. ... but provides for minimal transmission security. ... for radio link power control, which ...

2013-04-16T23:59:59.000Z

130

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

131

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

132

Contact Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Follow this link to skip to the main content Facebook Flickr RSS Twitter YouTube Contact Information | National Nuclear Security Administration Our Mission Managing the Stockpile...

133

Program Requirements | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Follow this link to skip to the main content Facebook Flickr RSS Twitter YouTube Program Requirements | National Nuclear Security Administration Our Mission Managing the Stockpile...

134

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

United States. The partnership of Oak Ridge National Laboratory, the Y-12 National Security Complex and the Savannah River National Laboratory are all tightly linked to the...

135

Contact Us | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Us Contact Us Home > Field Offices > Welcome to the Los Alamos Field Office > Contact Us Contact Us Contact the NNSA Los Alamos Field Office NNSA Los Alamos Field Office (NA-00-LA) 3747 West Jemez Road Los Alamos, NM 87544 (505) 667-6691 Please send any comments, questions, or feedback to Toni Chiri Featured Links LANL Phonebook National Nuclear Security Administration Los Alamos National Laboratory Los Alamos County USA Gov Department of Energy (DOE) New Mexico Environmental Department - LANL U.S. Department of Homeland Security Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program LANS Contract Los Alamos Field Office Emergency Public Information Related Links

136

Chaotic iterations versus Spread-spectrum: topological-security and stego-security  

E-Print Network (OSTI)

A new framework for information hiding security, called topological-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks. It has been proven that spread-spectrum techniques, a well-known stego-secure scheme, are topologically-secure too. In this paper, the links between the two notions of security is deepened and the usability of topological-security is clarified, by presenting a novel data hiding scheme that is twice stego and topological-secure. This last scheme has better scores than spread-spectrum when evaluating qualitative and quantitative topological-security properties. Incidentally, this result shows that the new framework for security tends to improve the ability to compare data hiding scheme.

Guyeux, Christophe; Bahi, Jacques M

2011-01-01T23:59:59.000Z

137

V-186: Drupal Login Security Module Security Bypass and Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Drupal Login Security Module Security Bypass and Denial of 6: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June 26, 2013 - 1:28am Addthis PROBLEM: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability PLATFORM: Login Security 6.x-1.x versions prior to 6.x-1.2. Login Security 7.x-1.x versions prior to 7.x-1.2. ABSTRACT: A security issue and a vulnerability have been reported in the Login Security module for Drupal REFERENCE LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2013-053 Secunia Advisory SA53717 CVE-2013-2197 CVE-2013-2198 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The security issue is caused due to an unspecified error and can be exploited to bypass the module features. Successful exploitation requires the "soft blocking" feature to be

138

Security metrics for source code structures  

Science Conference Proceedings (OSTI)

Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been proposed. However, all the perspectives of a software system have not ... Keywords: code quality and security., metrics, security metrics

Istehad Chowdhury; Brian Chan; Mohammad Zulkernine

2008-05-01T23:59:59.000Z

139

Energy Citations Database (ECD) - Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take you to non-federal websites. Their policies may differ from this site....

140

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

DOE Patents Database - Website Policies and Important Links  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take you to non-federal websites. Their...

142

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

143

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

144

Security Enforcement Reporting Criteria | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Classified information security noncompliances are categorized according to the disclosure or potential disclosure of DOE classified information placed at risk. There are two categories of noncompliances that are based on the relative severity of a classified information security incident. The categories are identified by an event category and type. Each of the two categories is further subdivided into three types based on the type of interest (security interest, management interest, and procedural interest). Security Enforcement Reporting Criteria More Documents & Publications Safety and Security Enforcement Coordinator Handbook DOE-STD-1210-2012 HQFMSP Chapter 11, Incidents of Security Concern

145

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

146

NATO ARW Jun10 CLIMATE SECURITY LINKS (4) SECURITY REFERENCES:  

E-Print Network (OSTI)

Some Some delegations raised doubts regarding Councils s role on the issue, while others, particularly small island states, welcomed Councils consideration

Nobel Peace Prize; Nobel Peace Prize; Peace References

2007-01-01T23:59:59.000Z

147

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

148

Supporting requirements engineers in recognising security issues  

Science Conference Proceedings (OSTI)

Context & motivation: More and more software projects today are security-related in one way or the other. Many environments are initially not considered security-related and no security experts are assigned. Requirements engineers often fail to recognise ... Keywords: empirical study, natural language processing, requirements analysis, secure software engineering

Eric Knauss; Siv Houmb; Kurt Schneider; Shareeful Islam; Jan Jrjens

2011-03-01T23:59:59.000Z

149

Techniques for Enhanced Physical-Layer Security  

E-Print Network (OSTI)

Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems. Within this paradigm, we explore strategies to improve secure connectivity in a wireless network. We first consider the intrinsically secure communications graph (iS-graph), a convenient representation of the links that can be established with information-theoretic security on a large-scale network. We then propose and characterize two techniques--sectorized transmission and eavesdropper neutralization--which are shown to dramatically enhance the connectivity of the iS-graph.

Pinto, Pedro C; Win, Moe Z

2010-01-01T23:59:59.000Z

150

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

151

Security Ontology for Annotating Resources  

E-Print Network (OSTI)

Abstract. Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ontologies in other domains that focus on annotation of functional aspects of resources. Types of security information that could be described include mechanisms, protocols, objectives, algorithms, and credentials in various levels of detail and specificity. The NRL Security Ontology is more comprehensive and better organized than existing security ontologies. It is capable of representing more types of security statements and can be applied to any electronic resource. The class hierarchy of the ontology makes it both easy to use and intuitive to extend. We applied this ontology to a Service Oriented Architecture to annotate security aspects of Web service descriptions and queries. A refined matching algorithm was developed to perform requirement-capability matchmaking that takes into account not only the ontology concepts, but also the properties of the concepts. 1

Anya Kim; Jim Luo; Myong Kang

2005-01-01T23:59:59.000Z

152

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

153

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

154

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

155

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

156

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

157

Feb 4, 2005 --Lecture 8 Computer Security  

E-Print Network (OSTI)

Feb 4, 2005 -- Lecture 8 22C:169 Computer Security Douglas W. Jones Department of Computer Science Program Security #12;Is this program secure? A simple question only if program has no input or output in program Failure Manifestation of fault in behavior Relative to spec assumed correct! #12;Security

Jones, Douglas W.

158

Energy Links Page - EIA  

U.S. Energy Information Administration (EIA) Indexed Site

Publications & Reports > Energy Links Page Publications & Reports > Energy Links Page Related Energy Links Energy Companies Coal & Other Electricity Foreign Integrated Natural Gas Transmission, Distribution, and Marketing News Services and Periodicals Oil & Gas Exploration and Production Petroleum Refining, Marketing, and Transportation State Owned U.S. Integrated Government Agencies Other DOE National Laboratories Federal Energy States Universities Trade Associations & Other Trade Associations Other Associations International Statistics Energy Services Other Energy Sites EIA Links Disclaimer These pages contain hypertext links to information created and maintained by other public and private organizations. These links provide additional information that may be useful or interesting and are being provided consistent with the intended purpose of the EIA Web site. EIA does not control or guarantee the accuracy, relevance, timeliness, or completeness of this outside information. EIA does not endorse the organizations sponsoring linked websites and we do not endorse the views they express or the products/services they offer.

159

Pages that link to "Geothermal/Land Use" | Open Energy Information  

Open Energy Info (EERE)

for Communities Volume 2 - The Community Energy Plan ( links) Embracing Sustainability in Community Plans ( links) Renewable-Based Energy Secure Communities...

160

The Security Content Automation Protocol (SCAP)  

Science Conference Proceedings (OSTI)

... Standard nomenclature and dictionary of security related software flaws ... Product dictionary containing over 18,000 unique ...

2012-10-26T23:59:59.000Z

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

162

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

163

NETL: Related Links and Forms  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Checklist Example (EERE Non-Research) PDF D4600.3 Federal Assistance Milestone Plan WORD PDF D4600.3a Milestone Log WORD PDF D4600.5 Federal Assistance Management...

164

EIA Energy Kids - Related Links  

U.S. Energy Information Administration (EIA)

Recycling; History of Energy. Energy Timelines; Famous People; Calculators & Tools Games & Activities. Riddles; Slang; Puzzles; Science Fair Experiments; Field Trips ...

165

EIA Energy Kids - Related Links  

U.S. Energy Information Administration (EIA)

Using & Saving Energy ... Project. A national network of ... electricity, magnets, and hydrogen are available and often sponsored.Workshops and conferences for ...

166

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

167

Training Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Courses NERSC Training Accounts Request Form Training Links OSF HPC Seminiars Software Accounts & Allocations Policies Data Analytics & Visualization Science Gateways User Surveys...

168

Bridging language-based and process calculi security  

Science Conference Proceedings (OSTI)

Language-based and process calculi-based information security are well developed fields of computer security. Although these fields have much in common, it is somewhat surprising that the literature lacks a comprehensive account of a formal link between ...

Riccardo Focardi; Sabina Rossi; Andrei Sabelfeld

2005-04-01T23:59:59.000Z

169

Office of Security Training Operations - Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Training Operations Please click on this link to go to the National Training Center. Mission The mission of the Office of Security Training Operations is to develop and...

170

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

171

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

172

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

173

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

RESPONSIBILITIES RESPONSIBILITIES FSO Overview FSO Reporting Responsibilities Questions an FSOs at a Non-Possesssing Site Could Be Asked During an Audit Non-Possessing Contractor Security Requirements Plan Training for Facility Security Officers (FSOs) PHY-210DE Facility Security Officer Overview PHY-210DB, Introduction to Facility Security Officer (Self-Study Course ) Duration: 3 days Description: This correspondence course provides an overview of the roles and responsibilities of the DOE or DOE-contractor FSO. The course emphasizes facility clearance requirements, personnel security, information security, incident reporting, and other related programs. The course references the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22-M) and a comprehensive listing of DOE orders, manuals, guides, forms, and notices.

174

Energy Efficiency Links  

U.S. Energy Information Administration (EIA) Indexed Site

Energy Energy Efficiency Organizations Energy Efficiency Organizations Release Date: October 1999 Last Updated: Septembert 2009 EIA Links Disclaimer: These pages contain hypertext links to information created and maintained by other public and private organizations. These links provide additional information that may be useful or interesting and are being provided consistent with the intended purpose of the EIA website. EIA does not control or guarantee the accuracy, relevance, timeliness, or completeness of this outside information. EIA does not endorse the organizations sponsoring linked websites, the views they express, or the products and services they offer. U.S. Federal Government / Regional / U.S. Nonprofit / International U.S. Federal Government and Related Agencies

175

BRC-Systems and Emerging Technologies Security Research ...  

Science Conference Proceedings (OSTI)

... Systems and Emerging Technologies Security Research Group Biometric Standards and Related Technical Developments. ...

2013-08-01T23:59:59.000Z

176

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

177

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

178

Concern for the Environment | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

link to skip to the main content Facebook Flickr RSS Twitter YouTube Concern for the Environment | National Nuclear Security Administration Our Mission Managing the Stockpile...

179

LANL honors three Laboratory Fellows | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Follow this link to skip to the main content Facebook Flickr RSS Twitter YouTube LANL honors three Laboratory Fellows | National Nuclear Security Administration Our Mission...

180

LANL Conducts Watusi Experiment | National Nuclear Security Administra...  

NLE Websites -- All DOE Office Websites (Extended Search)

Follow this link to skip to the main content Facebook Flickr RSS Twitter YouTube LANL Conducts Watusi Experiment | National Nuclear Security Administration Our Mission Managing the...

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Environmental Security in Mindanao: a Case for Comprehensive Methods.  

E-Print Network (OSTI)

??This study contributes to the field of environmental security by exploring the causal mechanisms linking environmental degradation and state insecurity. Emphasising these dynamics as they (more)

Ewing, John Jackson

2010-01-01T23:59:59.000Z

182

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

183

Y-12 National Security Complex - Enforcement Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 National Security Complex Preliminary Notice of Violation issued to Babcock & Wilcox Technical Services Y-12, LLC related to a Uranium Chip Fire at the Y-12 National Security...

184

Security User Studies: Methodologies and Best Practices  

E-Print Network (OSTI)

Interest in usable security-- the research, development, and study of systems that are both usable and secure-- has been growing both in the CHI and information security communities in the past several years. Despite this interest, however, the process of designing and conducting security-related user studies remains extremely difficult. Users deal with security infrequently and irregularly, and most do not notice or care about security until it is missing or broken. Security is rarely a primary goal or task of users, making many traditional HCI evaluation techniques difficult or even impossible to use. This workshop will bring together researchers and practitioners from the HCI and information security communities to explore methodological challenges and best practices for conducting security-related user studies.

Serge Egelman; Jen King; Robert C. Miller; Nick Ragouzis; Erika Shehan

2006-01-01T23:59:59.000Z

185

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

186

Web Security Standards and Practices Page 1 of 13 Web Security Standard Operating Environment (SOE) V1.doc  

E-Print Network (OSTI)

Web Security Standards and Practices Page 1 of 13 Web Security Standard Operating Environment (SOE) V1.doc Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related

Qian, Ning

187

T-599: Microsoft April 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

99: Microsoft April 2011 Security Bulletin Release 99: Microsoft April 2011 Security Bulletin Release T-599: Microsoft April 2011 Security Bulletin Release April 11, 2011 - 5:24am Addthis PROBLEM: Microsoft April 2011 Security Bulletin Release PLATFORM: Microsoft Windows, Microsoft Office, Microsoft Server Software, and Microsoft Developer Tools and Software ABSTRACT: Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. reference LINKS: Microsoft Security Bulletin Advance Notification for April 2011 Microsoft Security April Affected Software TechNet Webcast: Information About Microsoft April Security Bulletins IMPACT ASSESSMENT: High Discussion:

188

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 10, 2013 October 10, 2013 PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. October 10, 2013 PSH-13-0070 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. Following the individual's employer receiving garnishment notices from both federal and state tax authorities in January 2013, the

189

MIDC: Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links Links Other Data Collection Activities Baseline Surface Radiation Network (BSRN) Clear Sky Forcast for NREL/SRRL (or other locations) Colorado Dept. of Public Health & Environment: Air Quality Index (AQI) Reporting System Colorado State University: USDA UV-B Monitoring and Research Program European Skynet Radiometers network (ESR) Jefferson County, Colorado: Jeffco Weather Station NOAA: Climate Monitoring & Diagnostics Laboratory (CMDL) NREL OTF: Reference Meteorological and Irradiance System (RMIS) NREL RReDC: Cooperative Networks for Renewable Resource Measurements (CONFRRM) NREL RReDC: NASA Remote Sensing Validation Data: Saudi Arabia Rocky Mountain Arsenal (RMA): National Wildlife Refuge Sandia National Laboratories: Photovoltaic Systems Evaluation

190

Fuel Cell Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Fuel Cell Links Fuel Cell Links The links below are provided as additional resources for fuel-cell-related information. Most of the linked sites are not part of, nor affiliated with, fueleconomy.gov. We do not endorse or vouch for the accuracy of the information found on such sites. Fuel Cell Vehicles and Manufacturers Chevrolet General Motors press release about the Chevrolet Fuel Cell Equinox Ford Ford overview of their hydrogen fuel cell vehicles Honda FCX Clarity official site Hyundai Hyundai press release announcing the upcoming Tucson Fuel Cell Mercedes-Benz Ener-G-Force Fuel-cell-powered concept SUV Nissan Nissan TeRRA concept SUV Toyota Overview of Toyota fuel cell technology Hydrogen- and Fuel-Cell-Related Information and Tools Fuel Cell Vehicles Brief overview of fuel cell vehicles provided by DOE's Alternative Fuels Data Center (AFDC)

191

Complete Security Framework for Wireless Sensor Networks  

E-Print Network (OSTI)

Security concern for a Sensor Networks and level of security desired may differ according to application specific needs where the sensor networks are deployed. Till now, most of the security solutions proposed for sensor networks are layer wise i.e a particular solution is applicable to single layer itself. So, to integrate them all is a new research challenge. In this paper we took up the challenge and have proposed an integrated comprehensive security framework that will provide security services for all services of sensor network. We have added one extra component i.e. Intelligent Security Agent (ISA) to assess level of security and cross layer interactions. This framework has many components like Intrusion Detection System, Trust Framework, Key Management scheme and Link layer communication protocol. We have also tested it on three different application scenarios in Castalia and Omnet++ simulator.

Sharma, Kalpana; Kuldeep,

2009-01-01T23:59:59.000Z

192

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

193

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

194

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

195

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

196

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

197

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

198

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

199

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

200

National Security Science  

NLE Websites -- All DOE Office Websites (Extended Search)

NSS cover - april NSS cover - april Read the April 2013 issue: web | interactive| pdf Skip to Content Skip to Search Skip to Utility Navigation Skip to Top Navigation Skip to Content Navigation Los Alamos National Laboratory submit About | Mission | Business | Newsroom | Phonebook Los Alamos National Laboratory links to site home page Science & Innovation Collaboration Careers, Jobs Community, Environment Science & Innovation Home » Science & Engineering Capabilities Accelerators, Electrodynamics Bioscience, Biosecurity, Health Chemical Science Earth, Space Sciences Energy Engineering High Energy Density Plasmas, Fluids Information Science, Computing, Applied Math Materials Science National Security, Weapons Science Nuclear & Particle Physics, Astrophysics, Cosmology

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

202

U.S. Nuclear Command and Control System Support Staff, "Assessment Report: Department of Energy Nuclear Weapons-Related Security Oversight Process," March 1998  

E-Print Network (OSTI)

August 5, 1977 DOE, "Plutonium: The First 50 Years. United States Plutonium Production, Acquisition, and Utilization from 1944 Through 1994 GAO/RCED-92-39, "Nuclear Security: Safeguards and Security Weaknesses at DOE's Weapons Facilities," December 13, 1991 GAO/RCED/AIMD-95-5, "Nuclear Nonproliferation: U.S. International Nuclear Materials Tracking Capabilities are Limited," December 27, 1994 GAO/AIMD-95-165, "Department of Energy: Poor Management of Nuclear Materials Tracking Capabilities Are Limited," August 3, 1995 Classified DOE report.

Gao Rced- Major

1999-01-01T23:59:59.000Z

203

IT issues on homeland security and defense  

Science Conference Proceedings (OSTI)

This paper surveys remarkable incidents that were related to the Homeland Security and Defense such as terrors, disasters and cyber-attacks and overviews the existing projects given by the department of Homeland Security and Defense of the US government. ... Keywords: and cyber threats, emergency readiness, homeland defense, homeland security, terror and disaster control

Kangbin Yim; Ilsun You

2011-08-01T23:59:59.000Z

204

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

205

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

206

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

207

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

208

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

209

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

210

V-001: Mozilla Security vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Mozilla Security vulnerabilities 1: Mozilla Security vulnerabilities V-001: Mozilla Security vulnerabilities October 12, 2012 - 6:00am Addthis PROBLEM: Mozilla Security vulnerabilities PLATFORM: Vulnerabilities are reported in Firefox and Thunderbird versions prior to 16.0.1 and SeaMonkey versions prior to 2.13.1. ABSTRACT: Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities REFERENCE LINKS: Secunia Advisory SA50932 Mozilla Security Blog Mozilla Foundation Security Advisory 2012-88 Mozilla Foundation Security Advisory 2012-89 SecurityTracker Alert ID: 1027653 SecurityTracker Alert ID: 1027652 SecurityTracker Alert ID: 1027651 CVE-2012-4190 CVE-2012-4191 CVE-2012-4192 CVE-2012-4193 IMPACT ASSESSMENT: High DISCUSSION: 1) The protected "location" object is accessible by other domain objects,

211

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

212

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

213

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

214

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

215

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

216

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

217

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

218

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration Finding of No Significant Impact for the Construction and Operation of a New Office Building and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area Office 528 35th Street Los Alamos, N M 8 7 5 4 4 DEPARTMENT OF ENERGY. NATIONAL NUCLEAR SECUIRTY ADMINISTRATION FINDING OF NO SIGNIFICANT INIPACT Construction and Operation of a New Office Building and Related Structures withinTA-3 at Los Alarnos National Laboratory, Los Alamos. New Mexico FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Construction and Operation of a New Office Building and Related Structures within TA-3 at L os Alamos National Laboratory, Los Alamos, New Mexico (DOE/EA- 7 375)

219

Cyber Security Incidents, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

220

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

222

Enforcement Documents - Nevada National Security Site | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Enforcement Documents - Nevada National Security Site November 13, 2007 Enforcement Letter, National Security Technologies LLC,- November 13, 2007 Enforcement Letter issued to National Security Technologies, LLC related to an Unplanned Radiological Exposure during a Borehole Activity at the Nevada Test Site May 21, 2007 Enforcement Letter, National Security Technologies, LLC - May 21, 2007 Enforcement Letter issued to National Security Technologies, LLC related to Nuclear Safety Quality Assurance Requirements Deficiencies at the Nevada Test Site April 1, 2004 Enforcement Letter, Bechtel Nevada - April 1, 2002 Enforcement Letter issued to Bechtel Nevada related to Noncompliances with Occupational Radiation Protection and Quality Assurance Requirements at the

223

Usable Security in Smart Homes  

E-Print Network (OSTI)

AbstractA number of technologies are emerging that enable the creation of Smart Homes, which are households containing numerous networked devices all interacting with each other over the home network. As these Smart Homes become increasingly prevalent and users become more reliant on mobile devices to handle sensitive information, research related to the development of a usable security framework for Smart Homes is increasing in importance. In this paper, we first give some of the motivating use cases for such a security framework. We then describe some of the design challenges presented by the creation of usable Smart Home security frameworks. With an emphasis on usability, we proceed to highlight the hardships users face when interacting with currently available security frameworks and substantiate the need for a significant improvement in this field. Finally, we summarize and conclude. Key words: Smart Home, home networking, security, usability.

Saad Shakhshir; Dimitris Kalofonos

2005-01-01T23:59:59.000Z

224

Fermilab | About FermiLINK  

NLE Websites -- All DOE Office Websites (Extended Search)

About FermiLINK About FermiLINK Fermilab Today September 28, 2009 Mentors wanted for Diversity Office's FermiLINK program Fermilab Today October 5, 2009 Mentors wanted for Diversity Office's FermiLINK program Fermilab Today October 13, 2009 FermiLINK Q&A session Fermilab Today November 9, 2009 FermiLINK calls for mentees FermiLINK is Fermilab’s mentorship system designed to create an organizational network of leaders by providing opportunities for professional development and career management. This support structure creates access to the counsel and institutional knowledge of successful Fermilab professionals independent of the immediate supervisory hierarchy. FermiLINK provides web-based access to a host of mentors for issue-specific work-related challenges and opportunities. The network supports email,

225

Public Safety/Security Programs and Projects  

Science Conference Proceedings (OSTI)

... Sciences Division related to public safety and security ... extreme conditions for areas critical to US ... for the Detection of Special Nuclear Materials Last ...

2010-09-22T23:59:59.000Z

226

Employee Concerns Reporting Form | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

subcontractor fulfilling the DOENNSA's mission have the right and responsibility to report concerns relating to the environment, safety, health, security, fraud, waste, abuse or...

227

Enforcement Letter, National Security Technologies, LLC - May...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 21, 2007 Enforcement Letter issued to National Security Technologies, LLC related to Nuclear Safety Quality Assurance Requirements Deficiencies at the Nevada Test Site The...

228

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

229

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

230

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

231

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

232

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

233

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

234

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

235

Metaphors for cyber security.  

SciTech Connect

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

236

Hydrogen: Helpful Links & Contacts  

Science Conference Proceedings (OSTI)

Helpful Links & Contacts. Helpful Links. Hydrogen Information, Website. ... Contacts for Commercial Hydrogen Measurement. ...

2013-07-31T23:59:59.000Z

237

Security Automation Considered Harmful? W. Keith Edwards Erika Shehan Poole Jennifer Stoll  

E-Print Network (OSTI)

Security Automation Considered Harmful? W. Keith Edwards Erika Shehan Poole Jennifer Stoll School link in information security. Because of this perception, a growing body of research and commercial activity is focused on automated approaches to security. With these approaches, security decisions

Edwards, Keith

238

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

239

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

240

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

242

A Day in The Life | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Day in The Life | National Nuclear Security Administration Day in The Life | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog A Day in The Life Home > Federal Employment > Our Jobs > A Day in The Life A Day in The Life Day in the Life Scenario: The Contract Specialist (HQ & SC) Printer-friendly version Printer-friendly version Related Links

243

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

244

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

245

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

246

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

247

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

248

Framework for SCADA Security Policy (October 2005) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy (October 2005) Framework for SCADA Security Policy (October 2005) Framework for SCADA Security Policy (October 2005) Modern automation systems used in infrastruc-ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc-ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi-tions, responsibilities, references, revision history, enforce-ment, and exceptions for various subjects relevant for system security. It covers topics including the overall security risk management program, data security, platforms,

249

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

250

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

251

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

252

The case for anomalous link discovery  

Science Conference Proceedings (OSTI)

In this paper, we describe the challenges inherent to the task of link prediction, and we analyze one reason why many link prediction models perform poorly. Specifically, we demonstrate the effects of the extremely large class skew associated ... Keywords: anomalous link discovery, link prediction, relational learning

Matthew J. Rattigan; David Jensen

2005-12-01T23:59:59.000Z

253

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

254

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

255

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

256

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

257

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

258

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

259

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

260

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

262

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

263

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

264

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

265

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

266

Climate-derived tensions in Arctic security.  

Science Conference Proceedings (OSTI)

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

267

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix Secure Gateway Unspecified Vulnerability 6: Citrix Secure Gateway Unspecified Vulnerability T-566: Citrix Secure Gateway Unspecified Vulnerability February 28, 2011 - 11:22pm Addthis PROBLEM: Citrix Secure Gateway Unspecified Vulnerability. PLATFORM: Citrix Secure Gateway version 3.1.4 ABSTRACT: A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia Advisory SA43497 Citrix Support IMPACT ASSESSMENT: High Discussion: This vulnerability only affects Secure Gateway version 3.1.4. Secure Gateway version 3.2.0 is not affected by this vulnerability, but Citrix recommends that customers currently using this version upgrade their deployments to version 3.2.1 in line with the guidance provided in

268

T-687: Microsoft Security Bulletin Advance Notification for August 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

87: Microsoft Security Bulletin Advance Notification for August 87: Microsoft Security Bulletin Advance Notification for August 2011 T-687: Microsoft Security Bulletin Advance Notification for August 2011 August 8, 2011 - 3:50pm Addthis PROBLEM: This is an advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Advance Notification for August 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: An advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. 12 Bulletin updates and two are considered 'Critical'. Impact: This advance notification provides a number as the bulletin identifier,

269

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

270

FOILFEST :community enabled security.  

SciTech Connect

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

271

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

272

V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue 0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue July 2, 2013 - 12:38am Addthis PROBLEM: ASUS RT-N66U Router AiCloud Security Bypass Security Issue PLATFORM: ASUS RT-N66U Router firmware versions 3.0.0.4.270 and 3.0.0.4.354. ABSTRACT: A security issue in ASUS RT-N66U Router has been reported REFERENCE LINKS: Secunia Advisory SA53931 neohapsis IMPACT ASSESSMENT: Medium DISCUSSION: The security issue is caused due to the device not properly restricting access when processing certain HTTPS requests and can be exploited to gain access to otherwise restricted functionality and e.g. disclose the contents of arbitrary files and directories. Successful exploitation requires the AiCloud web service to be enabled.

273

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

274

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

275

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

276

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

277

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

278

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

279

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

280

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

282

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

283

LANL honors five Fellows for 2011 | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Follow this link to skip to the main content Facebook Flickr RSS Twitter YouTube LANL honors five Fellows for 2011 | National Nuclear Security Administration Our Mission Managing...

284

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 23, 2013 May 23, 2013 PSH-13-0018 - In the Matter of Personnel Security Hearing On May 23, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be granted. The Individual had a history of six arrests, five of which were alcohol-related and two of which were marijuana-related. In addition, A DOE Psychologist diagnosed the individual with Alcohol Dependence. The Hearing Officer found that the Individual had not mitigated any the security concerns raised by his alcohol abuse and history of criminal conduct at the hearing, because he was only in the early stages of his recovery from his alcohol d May 22, 2013 PSH-13-0022 - In the Matter of Personnel Security On May 22, 2013, an OHA Hearing Officer issued a decision in which he

285

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

286

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

287

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

288

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

289

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

290

Is RFID technology secure and private?  

Science Conference Proceedings (OSTI)

Radio Frequency Identification (RFID) has been used in a variety of applications, such as inventory management, anti-theft monitoring of consumer merchandise, and the tagging of livestock. With previous applications, it is difficult to link information ... Keywords: RFID security, backend attacks, middleware attacks, nSpeedPass

Rand A. Mahmood; Wasim A. Al-Hamdani

2011-09-01T23:59:59.000Z

291

U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |  

NLE Websites -- All DOE Office Websites (Extended Search)

97: Cisco Adaptive Security Appliances Denial of Service 97: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability is caused due to an unspecified error when handling IPv6 transit traffic and can be exploited to cause a reload of the affected device. reference LINKS: Vendor Advisory Secunia ID 49647 CVE-2012-3058 IMPACT ASSESSMENT: High Discussion: Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) and Cisco

292

T-717: Microsoft Security Bulletin Summary for September 2011 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Microsoft Security Bulletin Summary for September 2011 7: Microsoft Security Bulletin Summary for September 2011 T-717: Microsoft Security Bulletin Summary for September 2011 September 14, 2011 - 9:30am Addthis PROBLEM: Summary of Microsoft security bulletins released on September 13, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Summary for September 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: CVE-2011-1984 - MS11-070 WINS Local Elevation of Privilege Vulnerability CVE-2011-1991 - MS11-071 Windows Components Insecure Library Loading Vulnerability CVE-2011-1986 - MS11-072 Excel Use after Free WriteAV Vulnerability CVE-2011-1987 - MS11-072 Excel Out of Bounds Array Indexing Vulnerability

293

US National Nuclear Security Administration NNSA | Open Energy Information  

Open Energy Info (EERE)

Nuclear Security Administration NNSA Nuclear Security Administration NNSA Jump to: navigation, search Name US National Nuclear Security Administration (NNSA) Place Washington, DC Zip 20585 Product Washington D.C.-based nuclear body established by the United States Congress as a separately organized agency within the US Department of Energy. References US National Nuclear Security Administration (NNSA)[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. US National Nuclear Security Administration (NNSA) is a company located in Washington, DC . References ↑ "US National Nuclear Security Administration (NNSA)" Retrieved from "http://en.openei.org/w/index.php?title=US_National_Nuclear_Security_Administration_NNSA&oldid=352617

294

T-628: Debian APR Library Security Update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update May 23, 2011 - 3:35pm Addthis PROBLEM: Debian APR Library Security Update. PLATFORM: APR packages: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0 ABSTRACT: A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. reference LINKS: Debian Security Advisory DSA-2237-2 Security Database Adviory Security Focus Advisory CVE-2011-1928 CVE-2011-0419 Secunia Advisory SA44574 IMPACT ASSESSMENT: Medium Discussion: A directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack.

295

T-533: Microsoft January 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft January 2011 Security Bulletin Release 3: Microsoft January 2011 Security Bulletin Release T-533: Microsoft January 2011 Security Bulletin Release January 12, 2011 - 2:25pm Addthis PROBLEM: Microsoft January 2011 Security Bulletin Release PLATFORM: Various Windows OS Platforms, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2 ABSTRACT: Microsoft released 2 bulletins to address 3 vulnerabilities involving Microsoft Windows and components in Windows OS, and Windows Server Releases. Only 1 of these bulletins get our maximum severity rating of Critical. reference LINKS: Microsoft Security Bulletin Advance Notification for December 2010 TechNet Webcast: Information About Microsoft January 2011 Security Bulletins Discussion: Microsoft Security Bulletin MS11-001 - Important CVE-2010-3145 - This

296

MN Office of Energy Security | Open Energy Information  

Open Energy Info (EERE)

MN Office of Energy Security MN Office of Energy Security Jump to: navigation, search Name MN Office of Energy Security Place St. Paul, MN Website http://www.mnofficeofenergysec References MN Office of Energy Security[1] Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building Systems Integration LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! MN Office of Energy Security is a company located in St. Paul, MN. References ↑ "MN Office of Energy Security" Retrieved from "http://en.openei.org/w/index.php?title=MN_Office_of_Energy_Security&oldid=379158" Categories: Clean Energy Organizations Companies Organizations

297

Center for Environment and National Security at Scripps | Open Energy  

Open Energy Info (EERE)

National Security at Scripps National Security at Scripps Jump to: navigation, search Logo: Center for Environment and National Security at Scripps Name Center for Environment and National Security at Scripps Place San Diego, California Website http://sio.ucsd.edu/cens/ References CENS - About[1] LinkedIn Connections Contents 1 Overview 2 Headlines 3 Resources 3.1 CENS Programs 3.2 CENS Tools 4 References Overview Center for Environment and National Security at Scripps is an organization based in San Diego, California. "The Center uses the formidable science and research capacity of Scripps Institution of Oceanography to clarify significant environmental impacts on our national security and international human security, thus bringing information to policy makers for the resolution of society's most pressing

298

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

299

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

300

NEWTON's Weather Links  

NLE Websites -- All DOE Office Websites (Extended Search)

References Do you have a great weather reference link? Please click our Ideas page. Featured Reference Links: NOAA Teachers Support Page NOAA Teachers Support Page for Weather and...

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

302

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

303

Security Enforcement Documents | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Documents Security Enforcement Documents Security Enforcement Documents Documents Available for Download May 4, 2012 Enforcement Letter, CH2M Oak Ridge, LLC - SEL-2012-01 Issued to URS CH2M Oak Ridge, LLC, related to a Security Incident involving the Protection and Control of Classified Information at the East Tennessee Technology Park April 18, 2011 Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01 Issued to Battelle Energy Alliance, LLC related to Classified Information Introduced into Unapproved Information Systems at the Idaho National Laboratory March 24, 2011 Settlement Agreement, Sandia Corporation - SSA-2011-01 Settlement Agreement between DOE/NNSA and Sandia Corporation for Adverse Classified Information Security Trend at Sandia National Laboratories

304

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

305

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

306

Cyber Security Standards.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

307

Social Web mining and exploitation for serious applications: Technosocial Predictive Analytics and related technologies for public health, environmental and national security surveillance  

Science Conference Proceedings (OSTI)

This paper explores techno-social predictive analytics (TPA) and related methods for Web data mining where users posts and queries are garnered from Social Web (Web 2.0) tools such as blogs, microblogging and social networking sites to form coherent representations of real-time health events. The paper includes a brief introduction to commonly used Social Web tools such as mashups and aggregators, and maps their exponential growth as an open architecture of participation for the masses and an emerging way to gain insight about peoples collective health status of whole populations. Several health related tool examples are described and demonstrated as practical means through which health professionals might create clear location specific pictures of epidemiological data such as flu outbreaks.

Kamel Boulos, Maged; Sanfilippo, Antonio P.; Corley, Courtney D.; Wheeler, Steve

2010-03-17T23:59:59.000Z

308

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

Science Conference Proceedings (OSTI)

Battelles National Security & Defense objective is, applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratorys (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01T23:59:59.000Z

309

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

310

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

311

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

313

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

314

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

315

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

316

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

317

ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks  

Science Conference Proceedings (OSTI)

Nodes forward data on behalf of each other in mobile ad hoc networks. In a civilian application, nodes are assumed to be selfish and rational, i.e., they pursue their own self-interest. Hence, the ability to accurately measure traffic forwarding is critical ... Keywords: Anonymity, MANET, Monitoring, Packet forwarding, Secure link layer acknowledgment, Secure reporting protocol, Security

Heesook Choi; William Enck; Jaesheung Shin; Patrick D. Mcdaniel; Thomas F. Porta

2009-05-01T23:59:59.000Z

318

Helpful links for materials transport, safety, etc.  

NLE Websites -- All DOE Office Websites (Extended Search)

Helpful links for materials transport, safety, etc. relating to experiment safety at the APS. Internal Reference Material: Transporting Hazardous Materials "Natural" radioactivity...

319

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

320

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

322

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

323

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

324

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

325

A survey of security in multi-agent systems  

Science Conference Proceedings (OSTI)

Multi-agent systems (MAS) are a relatively new software paradigm that is being widely accepted in several application domains to address large and complex tasks. However, with the use of MAS in open, distributed and heterogeneous applications, the security ... Keywords: Agents, Multi-agent systems, Multi-agents, Security, Security in MAS

Rodolfo Carneiro Cavalcante; Ig Ibert Bittencourt; Alan Pedro da Silva; Marlos Silva; Evandro Costa; Robrio Santos

2012-04-01T23:59:59.000Z

326

Electronic security device  

DOE Patents (OSTI)

The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

1992-01-01T23:59:59.000Z

327

Electronic security device  

DOE Patents (OSTI)

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

328

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

329

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

330

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

331

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

332

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

333

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

334

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

335

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

336

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

337

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

338

Security approaches for Radio Frequency Identification systems  

E-Print Network (OSTI)

In this thesis, I explore the challenges related to the security of the Electronic Product Code (EPC) class of Radio Frequency Identification (RFID) tags and associated data. RFID systems can be used to improve supply chain ...

Foley, Joseph Timothy, 1976-

2007-01-01T23:59:59.000Z

339

Essays on trades and security prices  

E-Print Network (OSTI)

This thesis consists of three chapters that investigate the complex relation between security prices and trades of market participants. In the first chapter, I study the evolution of stock prices after trades with different ...

Obizhaeva, Anna

2007-01-01T23:59:59.000Z

340

V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. REFERENCE LINKS: Cisco Security Notice CVE-2013-1172 Cisco Security Notice CVE-2013-1173 SecurityTracker Alert ID: 1028425 CVE-2013-1172 CVE-2013-1173 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger a heap overflow in the Cisco Host Scan component to execute arbitrary code on the target system with System privileges

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Translating Relational Databases into Linked Open Data  

E-Print Network (OSTI)

mappings 68 C Implementation architecture 72 D BOZAR mapping 73 E Agenda.be mappings 80 2 #12;List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 3 #12;Listings 1.1 Resulting triples of the simple RDF graph 1. The proposed structure can be seen as a giant graph where data are interconnected with each other, as shown

Libre de Bruxelles, Université

342

Building Energy Software Tools Directory: Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

BLAST, EnergyPlus, Genopt, SPARK, Energy-10, and Building Design Advisor BLDG-SIM - A free e-mail list for all building energy simulation program users to ask questions to...

343

Related Links - Center for Transportation Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Energy Efficiency and Renewable Energy Vehicle Technologies Program Hydrogen, Fuel Cells & Infrastructure Technologies Program Alternative Fuels & Advanced Vehicles...

344

Advanced Vehicle Testing Activity - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

and Systems DOE Programs and Offices: EPAct Fleet Information and Regulations Alternative Fuels Data Center Clean Cities Program U.S. Department of Energy U.S....

345

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

346

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

347

Secure Control Systems for the Energy Sector  

Science Conference Proceedings (OSTI)

Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

Smith, Rhett; Campbell, Jack; Hadley, Mark

2012-03-31T23:59:59.000Z

348

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

349

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

350

Integrating Patterns and Agent-Oriented Methodologies to Provide Better Solutions for the Development of Secure Agent-Based Systems  

E-Print Network (OSTI)

Although pattern languages have already been proposed for security modelling, such languages mostly employ concepts and notations related to object-oriented systems, and have mainly neglected the agent-oriented paradigm. In this position paper we argue about the need to define a security pattern language applicable to agent-based systems that employs concepts based in the agent-oriented paradigm. In addition, we motivate the need to integrate such a language within the development stages of an agent-oriented methodology, and we briefly discuss what such a language should contain, Keywords: documenting pattern languages, linking requirements to patterns, patterns for secure agent-based systems, integrating patterns with a development methodology, agentoriented software engineering methodologies 1.

Haralambos Mouratidis; Paolo Giorgini; Michael Weiss

2003-01-01T23:59:59.000Z

351

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

352

Plug-in Hybrid Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Plug-in Hybrid Links Plug-in Hybrid Links Exit Fueleconomy.gov The links below are to pages that are not part of the fueleconomy.gov Web site. We offer these external links for your convenience in accessing additional information that may be useful or interesting to you. Plug-in Hybrid Vehicles and Manufacturers Chevrolet Volt Official site for the Chevrolet Volt Cadillac ELR Official site for the Cadillac ELR (arriving early 2014) Ford C-MAX Energi Plug-in Hybrid Official site for the C-MAX Energi Plug-in Hybrid Ford Fusion Energi Plug-in Hybrid Official site for the Fusion Energi Plug-in Hybrid Honda Accord Plug-in Official site for the Honda Accord Plug-in Hybrid Toyota Prius Plug-in Official site for the Toyota Prius Plug-in Hybrid Plug-in-Related Information and Tools

353

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

354

Pages that link to "Property:UNRegion" | Open Energy Information  

Open Energy Info (EERE)

( links) Mauritius ( links) Bahrain ( links) Moldova ( links) Thailand ( links) Portugal ( links) Sudan ( links) View (previous 50 |...

355

Pages that link to "Form:Tool" | Open Energy Information  

Open Energy Info (EERE)

( links) Mauritius ( links) Bahrain ( links) Moldova ( links) Thailand ( links) Portugal ( links) Sudan ( links) Senegal (...

356

Pages that link to "Form:Research Institution" | Open Energy...  

Open Energy Info (EERE)

( links) Mauritius ( links) Bahrain ( links) Moldova ( links) Thailand ( links) Portugal ( links) Sudan ( links) Senegal (...

357

Pages that link to "Form:Program" | Open Energy Information  

Open Energy Info (EERE)

( links) Mauritius ( links) Bahrain ( links) Moldova ( links) Thailand ( links) Portugal ( links) Sudan ( links) Senegal (...

358

Pages that link to "Form:Company" | Open Energy Information  

Open Energy Info (EERE)

( links) Mauritius ( links) Bahrain ( links) Moldova ( links) Thailand ( links) Portugal ( links) Sudan ( links) View (previous 50 |...

359

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

360

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

362

Nonproliferation and National Security Multimedia - Argonne National  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation and National Security Nonproliferation and National Security > Multimedia Multimedia Nuclear Systems Analysis Engineering Analysis Nonproliferation and National Security Detection & Diagnostic Systems Engineering Development & Applications Argonne's Nuclear Science & Technology Legacy Other Multimedia Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Bookmark and Share Nonproliferation and National Security: Multimedia Related Resources Nonproliferation and National Security Vulnerability Assessment Team (VAT) Click on the "Date" header to sort the videos/podcasts in chronological order (ascending or descending). You may also search for a specific keyword; click on the reset button refresh to remove the keyword filter and show again all the Videos/Podcasts.

363

Nuclear Security & Nonproliferation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety » Nuclear Security & Safety » Nuclear Security & Nonproliferation Nuclear Security & Nonproliferation Highly trained nuclear emergency response personnel and more than 17,000 pounds of equipment were sent to Japan as part of the Department of Energy and National Nuclear Security Administration’s effort to assist Japanese personnel with nuclear issues related to the Fukushima nuclear power plant. Above, scientists, technicians and engineers from the National Nuclear Security Administration’s Nevada Site Office board an Air Force C-17. | Photo courtesy of NNSA. Highly trained nuclear emergency response personnel and more than 17,000 pounds of equipment were sent to Japan as part of the Department of Energy

364

Frequently Used Forms and Links | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Safeguards & Security Safeguards & Security » Frequently Used Forms and Links Safety, Security and Infrastructure (SSI) SSI Home Facilities and Infrastructure Safeguards & Security Frequently Used Forms and Links Environment, Safety and Health (ES&H) Organization Chart .pdf file (82KB) Phone Listing .pdf file (129KB) SC HQ Continuity of Operations (COOP) Implementation Plan .pdf file (307KB) Categorical Exclusion Determinations SLI & SS Budget Contact Information Safety, Security and Infrastructure U.S. Department of Energy SC-31/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-4097 F: (301) 903-7047 Safeguards & Security Frequently Used Forms and Links Print Text Size: A A A RSS Feeds FeedbackShare Page Frequently Used Forms Badging DOE F 206.4 - Information Sheet for Sponsorship of HSPD-12 Credential

365

T-724: Microsoft Security Advisory: Fraudulent digital certificates could  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

724: Microsoft Security Advisory: Fraudulent digital certificates 724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing T-724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing September 22, 2011 - 12:45pm Addthis PROBLEM: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing. PLATFORM: Microsoft Untrusted Certificate Store: DigiNotar root certificates ABSTRACT: Microsoft has released a Microsoft security advisory about this issue for IT professionals. reference LINKS: MS Article ID: 2616676 Microsoft Security Advisory: 2607712 DOE-CIRC Tech Bulletin: T-706 IMPACT ASSESSMENT: Medium Discussion: The Microsoft update revokes the trust of the following DigiNotar root certificates by putting them in the Microsoft Untrusted Certificate Store:

366

T-665: Microsoft Security Bulletin Advance Notification for July 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for July 5: Microsoft Security Bulletin Advance Notification for July 2011 T-665: Microsoft Security Bulletin Advance Notification for July 2011 July 11, 2011 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2011 PLATFORM: Windows Operating System and Components ABSTRACT: Microsoft released 4 bulletins to address vulnerability involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: TechNet Webcast Microsoft Security Bulletin Summaries and Webcasts Microsoft Security Bulletin Advance Notification for July 2011

367

T-584: Microsoft March 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Microsoft March 2011 Security Bulletin Release 84: Microsoft March 2011 Security Bulletin Release T-584: Microsoft March 2011 Security Bulletin Release March 21, 2011 - 4:25pm Addthis PROBLEM: Microsoft March 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms.(Affected Software and Download Locations) ABSTRACT: Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: Microsoft Security Bulletin Summary for March 2011 Microsoft Technical Security Notifications

368

Average Interest Rate for Treasury Securities | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Average Interest Rate for Treasury Securities Average Interest Rate for Treasury Securities Consumer Data Apps Challenges Resources About Blogs Let's Talk Feedback Consumer You are here Data.gov » Communities » Consumer » Data Average Interest Rate for Treasury Securities Dataset Summary Description This dataset shows the average interest rates for U.S Treasury securities for the most recent month compared with the same month of the previous year. The data is broken down by the various marketable and non-marketable securities. The summary page for the data provides links for monthly reports from 2001 through the current year. Average Interest Rates are calculated on the total unmatured interest-bearing debt. The average interest rates for total marketable, total non-marketable and total interest-bearing debt do not include the U.S. Treasury Inflation-Protected Securities.

369

T-553: Microsoft February 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Microsoft February 2011 Security Bulletin Release 53: Microsoft February 2011 Security Bulletin Release T-553: Microsoft February 2011 Security Bulletin Release February 9, 2011 - 7:28am Addthis PROBLEM: Microsoft February 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms. (Affected Software and Download Locations) ABSTRACT: Microsoft released 21 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 3 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference links: Microsoft Security Bulletin Summary for February 2011 Microsoft Technical Security Notifications

370

PIPELINES AS COMMUNICATION NETWORK LINKS  

SciTech Connect

This report presents the results of an investigation into two methods of using the natural gas pipeline as a communication medium. The work addressed the need to develop secure system monitoring and control techniques between the field and control centers and to robotic devices in the pipeline. In the first method, the pipeline was treated as a microwave waveguide. In the second method, the pipe was treated as a leaky feeder or a multi-ground neutral and the signal was directly injected onto the metal pipe. These methods were tested on existing pipeline loops at UMR and Batelle. The results reported in this report indicate the feasibility of both methods. In addition, a few suitable communication link protocols for this network were analyzed.

Kelvin T. Erickson; Ann Miller; E. Keith Stanek; C.H. Wu; Shari Dunn-Norman

2005-03-14T23:59:59.000Z

371

SSTARS Safeguards and Security Tracking, Analysis and Reporting  

Protecting Americas Future SSTARS is a feature-rich system for issues management and enhanced tracking and trending related to security and safety.

372

Cyber Security in Smart Grid Substations  

E-Print Network (OSTI)

Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands, and the cyber security of substations in particular. The focus of this study is the perception of risks and threats in smart grid cyber security and the international standards implemented in smart grids. The created overview is based on semi-structured interviews with 13 experts originating from eight different European countries. These participants are employed at electricity producers, grid operators, technology consultants and technology providers in the utilities sector. Their expertise ranges from information security to electricity grids, specifically smart grid security. Some of them are members of smart grid security related standard committees. The key results of the state of practice are the following: 1. The interconnectivity of the smart grid with multiple stakeholders and European colleagues is indicated as the biggest threat to the security of the smart grid. 2. Another often mentioned threat is awareness. The experts generally indicate that awareness within top management is high. However, personnel on lower levels are reluctant to incorporate security in their processes. 3. All organizations are in a certain stage of implementing standards, the ISO27000 series

Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schnbeck; Sjaak Brinkkemper; Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schnbeck; Sjaak Brinkkemper

2012-01-01T23:59:59.000Z

373

Contact Us | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Center Informational Materials Historical Highlights From Our Historian Historical Media Manhattan Project Resources Oral Histories Photo Gallery Video Gallery Related Links...

374

Homeland Security Issues for Facilities  

E-Print Network (OSTI)

The events of September 11, 2001, along with the Oklahoma City bombing and Washington, DC area sniper attacks have forever changed America's sense of security. Federal, state, and local governments, businesses, and individual homeowners have become more aware of safety, security, and protecting property and people should similar incidents occur in the future. The initial steps in facility protection are identifying potential threats and evaluating the condition of existing building infrastructure and systems. After assessments are complete, the results should be compared with guidelines and recommendations produced by government agencies or professional organizations. Areas to address to enhance security and safety include ventilation, control systems, air filtration, alarm systems, building access, and surveillance. This paper will look at the objectives of task forces, sources of information, and measures owners can take in schools and other facilities. Although actions involving increased awareness, structural reinforcement, and emergency water supplies are important, this discussion will focus on mechanical and security systems and related items. The authors' experiences in assisting Texas school districts will also be shared.

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

375

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

376

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

377

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

378

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

379

Y-12 National Security Complex | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex Y-12 National Security Complex Y-12 National Security Complex Y-12 National Security Complex Aerial View Y-12 National Security Complex Aerial View Y-12 National Security Complex's primary mission is to support of the DOE nuclear weapons stockpile maintenance program. Activities include assembly and disassembly of nuclear weapons components, secure storage of special nuclear material (SNM), and various other nuclear weapons-related activities. Other activities include various aspects of testing and development, nonproliferation, and technology transfer. Enforcement June 13, 2008 Preliminary Notice of Violation, Babcock & Wilcox Teclmical Services Y -12, LLC - NEA-2008-01 Preliminary Notice of Violation issued to Babcock & Wilcox Technical Services Y-12, LLC, related to a Uranium Chip Fire at the Y-12 National

380

Preliminary Notice of Violation, National Security Technologies, LLC -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Security Technologies, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11, 2011 Preliminary Notice of Violation issued to National Security Technologies, LLC related to Deficiencies in Inspection and Installation of Penetration Fire Seals and Other Components at the Nevada National Security Site The Office of Health, Safety and Security's Office of Enforcement and Oversight has completed its investigation into the facts and circumstances associated with quality assurance (QA) related deficiencies in the inspection and installation of penetration fire seals and other components at the Criticality Experiments Facility (CEF) and the Device Assembly Facility (OAF) at the Nevada National Security Site. The results of

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Public Affairs | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Public Affairs Home > Field Offices > Welcome to the Sandia Field Office > Public Affairs Public Affairs The SFO Public Affairs Director is responsible for all public affairs matters connected with the functions of SFO. In this capacity the Public Affairs Director is responsible for the development and management of the SFO public affairs programs including media relations, community relations, tribal relations, public participation, government/congressional relations, protocol, emergency public information, and internal employee communications and contractor oversight of these same programs. For public affairs assistance, please call (505) 845-5264. Printer-friendly version Printer-friendly version

382

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

383

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

384

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

385

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

386

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

387

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

388

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

389

Secure Smart Grid Association | Open Energy Information  

Open Energy Info (EERE)

Secure Smart Grid Association Secure Smart Grid Association Jump to: navigation, search Name Secure Smart Grid Association Address 2374 S Josephine St Place Denver, Colorado Zip 80210 Region Rockies Area Number of employees 1-10 Year founded 2009 Phone number 303-997-2824 Coordinates 39.673446°, -104.9575629° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.673446,"lon":-104.9575629,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

390

The importance of link evidence in Wikipedia  

E-Print Network (OSTI)

Abstract. Wikipedia is one of the most popular information sources on the Web. The free encyclopedia is densely linked. The link structure in Wikipedia differs from the Web at large: internal links in Wikipedia are typically based on words naturally occurring in a page, and link to another semantically related entry. Our main aim is to find out if Wikipedias link structure can be exploited to improve ad hoc information retrieval. We first analyse the relation between Wikipedia links and the relevance of pages. We then experiment with use of link evidence in the focused retrieval of Wikipedia content, based on the test collection of INEX 2006. Our main findings are: First, our analysis of the link structure reveals that the Wikipedia link structure is a (possibly weak) indicator of relevance. Second, our experiments on INEX ad hoc retrieval tasks reveal that if the link evidence is made sensitive to the local context we see a significant improvement of retrieval effectiveness. Hence, in contrast with earlier TREC experiments using crawled Web data, we have shown that Wikipedias link structure can help improve the effectiveness of ad hoc retrieval. 1

Jaap Kamps; Marijn Koolen

2008-01-01T23:59:59.000Z

391

Grant Application Process | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Grant Application Process | National Nuclear Security Administration Grant Application Process | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Grant Application Process Home > Grant Application Process Grant Application Process Please visit www.grants.gov off site link to find out more about the grant application process. At www.grants.gov off site link you can find

392

Enforcement of DOE Classified Information Security Requirements Under Title  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of DOE Classified Information Security Requirements of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 Enforcement of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 In publishing 10 CFR Part 824, DOE has determined that civil penalties under Part 824 will only be assessed for violations of requirements for the protection of classified information (Restricted Data, Formerly Restricted Data and National Security Information). The rule does not include civil penalties relating to failure to protect sensitive but unclassified information. IMPLEMENTATION GUIDANCE More Documents & Publications Safety and Security Enforcement Process Overview Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01

393

Security & Defense Licenses Available | Tech Transfer | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Available Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies | Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614 Robust Low-Frequency Spread-Spectrum Navigation System (Related ID # 200601627) 200501640 Secure Identification of Textiles and Other Consumer Products 200701980 Cyberspace Security Econometrics System 200701995 An Intrusion Detection System Using Quantum-mechanical

394

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

395

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

396

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

397

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

398

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

399

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

400

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

402

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

403

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

404

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

405

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

406

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

407

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

408

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

409

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

410

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

411

Preliminary Notice of Violation, Los Alamos National Security, LLC -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security, LLC Security, LLC - WEA-2012-03 Preliminary Notice of Violation, Los Alamos National Security, LLC - WEA-2012-03 October 17, 2012 Issued to Los Alamos National Security, LLC, related to Four Electrical Safety-Related Events that occurred at the Los Alamos National Laboratory (LANL) This letter refers to the Office of Health, Safety and Security's Office of Enforcement and Oversight investigation into the facts and circumstances surrounding four electrical safety-related events that occurred at the Los Alamos National Laboratory (LANL) from October 2010 through January 2011. Preliminary Notice of Violation, Los Alamos National Security, LLC - WEA-2012-03 More Documents & Publications Sandia Sled Track PNOV Press Release Enforcement Letter, Computer Services, LLC - WEL-2012-03

412

Enforcement Documents - Y-12 National Security Complex | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex Y-12 National Security Complex Enforcement Documents - Y-12 National Security Complex June 13, 2008 Preliminary Notice of Violation, Babcock & Wilcox Teclmical Services Y-12, LLC - NEA-2008-01 Preliminary Notice of Violation issued to Babcock & Wilcox Technical Services Y-12, LLC, related to a Uranium Chip Fire at the Y-12 National Security Complex September 18, 2007 Preliminary Notice of Violation, BWXT Y-12 LLC - EA-2007-04 Preliminary Notice of Violation issued to BWXT Y-12, LLC, related to Criticality Safety Controls at the Y-12 National Security Complex June 15, 2006 Enforcement Letter, BWXT Y-12 - June 15, 2006 Enforcement Letter issued to BWXT Y-12 related to Quality Assurance Deficiencies in construction activities at the Y-12 National Security

413

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

414

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

415

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

416

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

417

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

418

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

419

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

420

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

422

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

423

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

424

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

425

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

426

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

427

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2006-09-01T23:59:59.000Z

428

ZeptoOS // Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links ZeptoOS-specific resources: Subversion repository Kernel GIT repository Bug tracking system Blue Gene resources: ALCF: Argonne Leadership Computing Facility Blue Gene...

429

Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System  

E-Print Network (OSTI)

This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

2011-01-01T23:59:59.000Z

430

Enforcement Letter, Lawrence Livermore National Security LLC, - May 15,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security LLC, - May Security LLC, - May 15, 2008 Enforcement Letter, Lawrence Livermore National Security LLC, - May 15, 2008 May 15, 2008 Enforcement Letter issued to Lawrence Livermore National Security, LLC related to the Protection of Classified Information at the Lawrence Livermore National Laboratory In our recent dialogue via televideo with your Deputy, safeguards and security director, and other key managers of your staff, we discussed our reasons for sending this enforcement letter to Lawrence Livermore National Security, LLC; the purpose of this letter; and our concerns about the protection of classified information at the Lawrence Livermore National Laboratory (LLNL). Accordingly, this is not a formal enforcement action and imposes no requirements. Enforcement Letter, Lawrence Livermore National Security LLC- May 15, 2008

431

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

432

Renewable-Based Energy Secure Communities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Renewable-Based Energy Secure Communities Renewable-Based Energy Secure Communities Renewable-Based Energy Secure Communities U.S. Department of Energy (DOE) Community Renewable Energy Deployment (CommRE) projects receive financial assistance and support from numerous federal and state agencies and partnering organizations. The University of California at Davis CommRE project is not only being funded by DOE, but also by the California Energy Commission's (CEC) Renewable-Based Energy Secure Communities (RESCO) program. Below are summaries of select RESCO projects and links to additional information. About Renewable-Based Energy Secure Communities RESCO projects are funded by the CEC's Public Interest Energy Research (PIER) Program, which supports public interest energy research, development, and demonstration. The goal of RESCO is to develop and

433

V-008: Debian Security Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Debian Security Advisory 8: Debian Security Advisory V-008: Debian Security Advisory October 23, 2012 - 6:00am Addthis PROBLEM: Debian Security Advisory PLATFORM: Debian GNU/Linux 6.0 ABSTRACT: Debian update for bind9 REFERENCE LINKS: Debian Security Advisory DSA-2560-1 Debian bugtracking system: Bug 690118 ISC Reference Number: AA-00801 Secunia Advisory SA51054 CVE-2012-5166 IMPACT ASSESSMENT: Medium DISCUSSION: was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply, when certain combinations of resource records are present. This vulnerability affects both recursive and authoritative servers. For the stable distribution (squeeze), this problem has been fixed in version 1:9.7.3.dfsg-1~squeeze8. IMPACT: Debian has issued an update for bind9. This fixes a vulnerability, which

434

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix Access Gateway Unspecified Security Bypass 6: Citrix Access Gateway Unspecified Security Bypass Vulnerability V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway PLATFORM: Standard Edition 5.0.x prior to 5.0.4.223524. Versions 4.5.x and 4.6.x are not affected by this vulnerability ABSTRACT: A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA52479 Security Tracker Alert ID 1028255 com/id/1028255 CVE-2013-2263 Citrix Knowledge Center IMPACT ASSESSMENT: High DISCUSSION: The vulnerability could allow an unauthenticated user to gain access to network resources. IMPACT:

435

V-008: Debian Security Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Debian Security Advisory 08: Debian Security Advisory V-008: Debian Security Advisory October 23, 2012 - 6:00am Addthis PROBLEM: Debian Security Advisory PLATFORM: Debian GNU/Linux 6.0 ABSTRACT: Debian update for bind9 REFERENCE LINKS: Debian Security Advisory DSA-2560-1 Debian bugtracking system: Bug 690118 ISC Reference Number: AA-00801 Secunia Advisory SA51054 CVE-2012-5166 IMPACT ASSESSMENT: Medium DISCUSSION: was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply, when certain combinations of resource records are present. This vulnerability affects both recursive and authoritative servers. For the stable distribution (squeeze), this problem has been fixed in version 1:9.7.3.dfsg-1~squeeze8. IMPACT: Debian has issued an update for bind9. This fixes a vulnerability, which

436

Homeland Security | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Homeland Security High Energy Physics (HEP) HEP Home About Research Facilities Science Highlights Benefits of HEP Medicine Homeland Security Industry Computing Sciences Workforce Development A Growing List Accelerators for Americas Future External link Funding Opportunities Advisory Committees News & Resources Contact Information High Energy Physics U.S. Department of Energy SC-25/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-3624 F: (301) 903-2597 E: sc.hep@science.doe.gov More Information » Benefits of HEP Homeland Security Print Text Size: A A A RSS Feeds FeedbackShare Page Homeland security: monitoring nuclear nonproliferation In nuclear reactors, the amount of plutonium builds up as the uranium fuel is used, and the number and characteristics of antineutrinos emitted by

437

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

438

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

439

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

440

Technologies licensed | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Technologies licensed Technologies licensed Technologies licensed Posted: July 16, 2012 - 3:49pm | Y-12 Report | Volume 9, Issue 1 | 2012 Rendering of Y-12's Access Rate Control System Wherever threatening situations arise, in-place security measures make the most of every second. On Feb. 8, a startup firm in Knoxville, Tenn., licensed two security-related technologies from the Y-12 National Security Complex that do just that. The technologies, which delay entrance to controlled-access areas, provide a security solution for various potential markets: commercial nuclear facilities, pharmaceutical manufacturers, correctional facilities and large sporting venues, as well as for other Department of Energy sites. Sustainable Environment Technologies, LLC (SET), licensed the Access Rate

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

442

Los Alamos CCS (Center for Computer Security) formal computer security model  

SciTech Connect

This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The initial motivation for this effort was the need to provide a method by which DOE computer security policy implementation could be tested and verified. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present models. Formal mathematical models for computer security have been designed and developed in conjunction with attempts to build secure computer systems since the early 70's. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The mathematical basis appears to be justified and is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell-Lapadula abstract sets of objects and subjects. 5 refs.

Dreicer, J.S.; Hunteman, W.J. (Los Alamos National Lab., NM (USA))

1989-01-01T23:59:59.000Z

443

V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Cisco IronPort Web / Email Security Appliance Sophos 21: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities November 12, 2012 - 6:00am Addthis PROBLEM: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities PLATFORM: Cisco IronPort Email Security Appliances (C-Series and X-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. Cisco IronPort Web Security Appliances (S-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. ABSTRACT: Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. REFERENCE LINKS: Cisco Security Advisory ID: cisco-sa-20121108-sophos Secunia Advisory SA51197 IMPACT ASSESSMENT: High DISCUSSION: Cisco has acknowledged some vulnerabilities in Cisco IronPort Web Security

444

V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco IronPort Web / Email Security Appliance Sophos 1: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities November 12, 2012 - 6:00am Addthis PROBLEM: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities PLATFORM: Cisco IronPort Email Security Appliances (C-Series and X-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. Cisco IronPort Web Security Appliances (S-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. ABSTRACT: Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. REFERENCE LINKS: Cisco Security Advisory ID: cisco-sa-20121108-sophos Secunia Advisory SA51197 IMPACT ASSESSMENT: High DISCUSSION: Cisco has acknowledged some vulnerabilities in Cisco IronPort Web Security

445

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

446

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: Cisco Adaptive Security Appliances Port Forwarder ActiveX 26: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability March 16, 2012 - 7:00am Addthis PROBLEM: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability PLATFORM: Cisco Adaptive Security Appliance (ASA) 7.x, Cisco Adaptive Security Appliance (ASA) 8.x, Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Secunia Advisory SA48422 SecurityTracker Alert ID: 1026799 CVE-2012-0358 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the

447

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

448

Diversity Links; Diversity Office  

NLE Websites -- All DOE Office Websites (Extended Search)

Source Disclaimer: Links and/or hyperlinks on this page may contain information gathered from public sources outside Brookhaven National Laboratory. This information is for reference purposes only and, as such, there is no endorsement of products or services therein, nor is BNL responsible for any content inaccuracies. By clicking any of the aforementioned links and/or hyperlinks, you acknowledge your understanding and agreement with this statement. Source Disclaimer: Links and/or hyperlinks on this page may contain information gathered from public sources outside Brookhaven National Laboratory. This information is for reference purposes only and, as such, there is no endorsement of products or services therein, nor is BNL responsible for any content inaccuracies. By clicking any of the aforementioned links and/or hyperlinks, you acknowledge your understanding and agreement with this statement. Diversity Links BNL & DOE Diversity Links Minority Recruitment Links BNL & DOE Diversity Links Brookhaven National Laboratory (BNL) Brookhaven Advocacy Council (BAC) Brookhaven Employees Recreation Association (BERA) | BERA Clubs U.S. DOE Office of Civil Rights and Diversity U.S. DOE Office of Civil Rights and Diversity - Homepage

449

Worker Safety and Health Enforcement Letter issued to Los Alamos National Security, LLC, related to Worker Beryllium Exposure during Machining at the Los Alamos National Laboratorys Beryllium Technology Facility, May 29, 2013 (WEL-2013-01)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29, 2013 29, 2013 Dr. Charles F. McMillan, President Los Alamos National Security, LLC Los Alamos National Laboratory Mailstop A 100, Drop Point 03140071S Bikini Atoll Road, TA-3 Los Alamos, New Mexico 87454 WEL-2013-01 Dear Dr. McMillan: The Office of Health, Safety and Security's Office of Enforcement and Oversight evaluated the circumstances surrounding a work evolution performed at Los Alamos National Laboratory (LANL) Technical Area 3, Building 141, Beryllium Technology Facility (BTF), on July 11, 2012. The work evolution resulted in a worker exposure to beryllium in excess of the Department of Energy (DOE) action level of 0.2 micrograms per cubic meter for an 8-hour, time-weighted average. Los Alamos National Security, LLC (LANS), which manages and

450

Comparison of Routable Control System Security Approaches  

SciTech Connect

This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

2011-06-01T23:59:59.000Z

451

Microsoft Word - Additional links  

Office of Legacy Management (LM)

Links: Links: Link to annual groundwater reports on LM website: http://www.lm.doe.gov/Monticello/Documents.aspx#gwreports Links to peer-reviewed papers referenced in the Program Status and Analytical Update (Note: Due to copyright restrictions, links to these papers, rather than reproductions, are provided): a. Harding, Lee E. "Non-linear uptake and hormesis effects of selenium in red- winged blackbirds (Agelaius phoeniceus)". Science of the Total Environment 389 (2008) 350-366. Available through sciencedirect at: http://www.sciencedirect.com/science/article/pii/S0048969707010029 b. King, Kirke A. and Thomas W. Custer. "Reproductive Success of Barn Swallows Nesting Near a Selenium-Contaminated Lake in East Texas, USA". Environmental Pollution 84 (1994) 53-58. Available through sciencedirect at:

452

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

453

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

454

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

455

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

456

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

457

Extender for securing a closure  

DOE Patents (OSTI)

An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.

Thomas, II, Patrick A.

2012-10-02T23:59:59.000Z

458

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

459

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

460

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

462

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

463

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

464

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

465

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

466

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

467

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

468

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

469

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

470

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

471

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

472

Security Resiliency Testing  

Science Conference Proceedings (OSTI)

An accepted practice within the electric sector is to pre-stage and test equipment before deployment. Verification of functionality, operating parameters, and interoperability of equipment to be deployed can often be incorporated into predeployment testing. This testing may also support the selection of features responsible for the security of the host equipment. However, some security features and many aspects of resiliency testing may require activation, interaction, and interoperability with an ...

2013-12-02T23:59:59.000Z

473

Transportation Security Update  

Science Conference Proceedings (OSTI)

The U.S. Department of Transportation (DOT) final rules issued in 2003 required persons who offer for transportation or transport certain hazardous materials to develop and implement security plans. The Electric Power Research Institute (EPRI) formed a Transportation Security Implementation Working Group, which included representation from the Nuclear Energy Institute (NEI), to identify key projects, which were documented in the original report in 2005. This report updates information in the original rep...

2011-07-27T23:59:59.000Z

474

Data port security lock  

DOE Patents (OSTI)

In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

2008-06-24T23:59:59.000Z

475

Secure Smart Environments: Security Requirements, Challenges and Experiences in Pervasive Computing  

E-Print Network (OSTI)

INTRODUCTION In an ideal pervasive computing environment, a large number of connected smart devices are deployed to collaboratively provision seamless services to users. Pervasive computing is enabled by various advanced technologies, particularly wireless technologies and the Internet. It has become a trend for our future lives. A pervasive computing environment can be extremely heterogeneous. We can imagine how many different devices are involved in a smart home: TVs, phones, cameras, coffee makers, or even books and bookshelves. Since these devices are smart and communicate with each other mainly via wireless links, security must be ensured. Otherwise, the smart devices deployed around us would come back to hunt us and the result would be catastrophic. In this abstract we briefly discuss some important security issues in pervasive computing. II. SECURITY CHALLENGES AND REQUIREMENTS IN PERVASIVE COMPUTING:THE BIG PICTURE Due to the very high heterogeneity and complexity of pervasi

Jun Wang; Yaling Yang; William Yurcik

2005-01-01T23:59:59.000Z

476

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

477

Bursty traffic over bursty links  

Science Conference Proceedings (OSTI)

Accurate estimation of link quality is the key to enable efficient routing in wireless sensor networks. Current link estimators focus mainly on identifying long-term stable links for routing. They leave out a potentially large set of intermediate links ... Keywords: bursty links, link estimation, routing

Muhammad Hamad Alizai; Olaf Landsiedel; J gila Bitsch Link; Stefan Gtz; Klaus Wehrle

2009-11-01T23:59:59.000Z

478

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

479

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

480

Security Outreach and Integration Group  

Science Conference Proceedings (OSTI)

Security Outreach and Integration Group. Welcome. The US economy, citizens, and government rely on information technology. ...

2013-01-17T23:59:59.000Z

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

UH Mnoa Contacts: Campus Security  

E-Print Network (OSTI)

UH Mnoa Contacts: Campus Security 956-6911 Security Escort Service 956-SAFE Women's Center 956 pauvaw@hawaii.edu University Health Services 956-8965 www.hawaii.edu/shs/ Mlama Pono | www.hawaii.edu/security if you think you have been drugged. Police and Campus Security are trained in assisting with these types

482

Brief No. 9 WATER SECURITY,  

E-Print Network (OSTI)

Brief No. 9 WATER SECURITY, RISK & SOCIETY 1 of 4 Water Security and Federal Rivers March 2012 Australian National University Key messages · Water security in a hydroclimatic risk society. Climate risks interact with rapidly changing social, demographic and economic forces to position water security

New, Mark

483

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

484

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

485

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

486

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

487

Publicly Submitted White Papers - Security  

Science Conference Proceedings (OSTI)

... Security Threats, Exploits, Vulnerabilites, Incidents, and Responses; ... CAHV); Critical Incident Response and Disaster Recovery Assistance; ...

2011-08-02T23:59:59.000Z

488

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

489

Secure Windows Dr. Bernd Borchert  

E-Print Network (OSTI)

Secure Windows Dr. Bernd Borchert WSI für Informatik Univ. Tübingen #12;Problem: Trojans Server Windows" Server (encoding) Internet #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows

Borchert, Bernd

490

Security-oriented program transformations  

Science Conference Proceedings (OSTI)

Security experts generally believe that, "security cannot be added on, it must be designed from the beginning" [1]. This is because the typical way of improving system security by patches is ad hoc and has not produced good results. My work shows that ... Keywords: program transformation, security

Munawar Hafiz; Ralph E. Johnson

2009-04-01T23:59:59.000Z

491

Lighting Group: Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links Links Links Organizations Illuminating Engineering Society of North America (IESNA) International Commission on Illumination (CIE) International Association of Lighting Designers (IALD) International Association of Energy-Efficient Lighting Lightfair International Energy Agency - Task 21: Daylight in Buildings: Design Tools and Performance Analysis International Energy Agency - Task 31: Daylighting Buildings in 21st Century National Association on Qualifications for the Lighting Professions (NCQLP) National Association of Independent Lighting Distributors (NAILD) International Association of Lighting Management Companies (NALMCO) Research Centers California Lighting Technology Center Lighting Research Center Lighting Research at Canada Institute for Research in Construction

492

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

493

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

494

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

495

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

496

U-009:Microsoft Security Bulletin Summary for October 2011 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09:Microsoft Security Bulletin Summary for October 2011 09:Microsoft Security Bulletin Summary for October 2011 U-009:Microsoft Security Bulletin Summary for October 2011 October 12, 2011 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Summary for October 2011 PLATFORM: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2. ABSTRACT: Microsoft released 8 bulletins to address vulnerabilities. This Microsoft bulletin contains 2 critical vulnerabilities. reference LINKS: Microsoft Security Bulletin Summary for October 2011 Security Bulletin Summary October Archive IMPACT ASSESSMENT: High Discussion: For more details regarding the Microsoft October 2011 bulletins, please see follow link for CVE details. You can find more information located under the "Affected Software and Download Locations" section using the following

497

Cyber Security Solutions for Instrumentation and Control Systems, Topic 3: Security Status Monitoring  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced in response to continual threats to business and process control networks. Many standards have been drafted and subsequently revised and are now being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with the requirements set forth in the North American Electric Reliability Corporations Critical Infrastructure Protection standards and related requirements in the international ...

2013-11-08T23:59:59.000Z

498

Basis for an integrated security ontology according to a systematic review of existing proposals  

Science Conference Proceedings (OSTI)

The use of ontologies to represent knowledge provides us with organization, communication and reusability. The concepts and relations managed by any scientific community need to be formally defined. Since security in information technologies has evolved ... Keywords: Ontologies, Security, Systematic review

Carlos Blanco; Joaqun Lasheras; Eduardo Fernndez-Medina; Rafael Valencia-Garca; Ambrosio Toval

2011-06-01T23:59:59.000Z

499

Public key infrastructure for DOE security research  

SciTech Connect

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

500

Hybrid Vehicle Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Hybrid Links Hybrid Links Exit Fueleconomy.gov The links below are to pages that are not part of the fueleconomy.gov Web site. We offer these external links for your convenience in accessing additional information that may be useful or interesting to you. Hybrid Vehicles and Manufacturers Acura ILX Hybrid Audi Q5 Hybrid BMW ActiveHybrid 3 ActiveHybrid 5 ActiveHybrid 7 Buick LaCrosse eAssist* Regal eAssist* Chevrolet Malibu Eco* Impala eAssist* Ford Fusion Hybrid Honda Accord Hybrid Civic Hybrid Honda CR-Z Honda Insight Hyundai Sonata Hybrid Infiniti M Hybrid Q50 Hybrid Q50 S Hybrid QX60 Hybrid Kia Optima Hybrid Lexus CT 200h Lexus ES 300h GS 450h LS 600h L RX 450h Lincoln MKZ Hybrid Mercedes-Benz Mercedes E400 Hybrid Nissan Pathfinder Hybrid Porsche Cayenne S Hybrid Subaru XV Crosstrek Hybrid Toyota Avalon Hybrid