Powered by Deep Web Technologies
Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Related Links Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and Institutional R&D Programs > Related Links Related Links NNSA Lab Directed Research and Development (LDRD) Lab Directed Research and Development Collaborations DOE Adanced Scientific Computing Research DTRA (Defense Threat Reduction Agency) NAS (National Academy of Sciences) NSF (National Science Foundation) DOD (Department of Defense) NASA Exascale Activities NNSA Exascale Environment Planning Workshop ASCR Co-Design Centers Supercomputing Top 500 List ASC at Supercomputing Conference Printer-friendly version Printer-friendly version Facebook

2

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

3

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

About Us Our Programs Defense Programs Future Science & Technology Programs Advanced Simulation and Computing and Institutional R&D Programs Related Links Related Links...

4

Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > Field Offices > Welcome to the NNSA Production Office > Links Home > Field Offices > Welcome to the NNSA Production Office > Links Links NNSA HQ National Nuclear Security Administration Advanced Simulation & Computing NNSA Graduate Program NNSA Small Business Program Office of Defense Nuclear Nonproliferation Field Offices NNSA Albuquerque Complex Kansas City Field Office Livermore Field Office Los Alamos Field Office Naval Reactors Idaho Branch Office Nevada Field Office Sandia Field Office DOE Oak Ridge Sites Oak Ridge Office Oak Ridge National Laboratory UCOR Oak Ridge Institute for Science and Education Oak Ridge Site Specific Advisory Board American Museum of Science and Energy City of Oak Ridge Plants Laboratories Bechtel Nevada Bettis Laboratory Kansas City Plant Knolls Atomic Power Laboratory Lawrence Livermore National Laboratory

5

NREL: News - Related Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Related Links The U.S. Department of Energy provides news online: EERE Network News News and Blog Science News Science and Technology Highlights from the National Laboratories...

6

Related Links | Department of Energy  

Energy Savers [EERE]

Algal Biofuels Related Links Related Links The links below provide useful algae resources and are organized by categories. Beyond this page, learn more about BETO's Algae...

7

LTS Related Links - Hanford Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Information Management LTS Fact Sheets Briefings LTS Related Links LTS Contact Us 2015 Vision LTS Related Links Email Email Page | Print Print Page |Text Increase Font Size...

8

Demo Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Demo Links | National Nuclear Security Administration Demo Links | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Demo Links Home > About Us > Our Operations > Management and Budget > Human Resources > Pay-banding > Demo Links Demo Links Federal Register Notices July 31, 2008: Federal Register Notice This is a link to a PDF document.

9

EEO Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Links | National Nuclear Security Administration Links | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog EEO Links Home > About Us > Our Operations > Management and Budget > Office of Civil Rights > EEO Links EEO Links DOE Office of Civil Rights (weblink) Department Of Justice Civil Rights Division (weblink) Department of Veterans Affairs (weblink)

10

Related Sites | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Related Sites Related Sites Related Sites Links to the following sources of information are provided as resources. Listings are obtained from government, industry and trade organizations and from other resources. B&W Corporate B&W Corporate The Babcock & Wilcox Company is a leading international provider of energy products and services. B&W Lawrence Livermore Lawrence Livermore National Laboratory helps reduce and counter threats to national and global security through the advancement and application of science and technology. B&W Pantex Located in Amarillo, Texas, the Pantex Plant supports stockpile stewardship, nonproliferation, and safeguards and security. Government System for Award Management The System for Award Management (SAM) (formerly Central Contractor

11

Related Links | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Related Links Related Links Related Links November 1, 2013 - 11:40am Addthis Need additional help or more information? DOE's CHP Technical Assistance Partnerships (CHP TAPs) provide local, individualized solutions to customers on specific combined heat and power (CHP) projects. Partners of DOE's CHP Program include federal and state agencies, non-governmental organizations, international entities, private clean energy companies, technology developers, and commercial builders and developers. Partners American Council for an Energy-Efficient Economy (ACEEE) Argonne National Laboratory (ANL) CHP Association International District Energy Association (IDEA) International Energy Agency (IEA) National Energy Technology Laboratory (NETL) New York State Energy Research and Development Authority (NYSERDA)

12

NREL: Energy Analysis - Related Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Related Links Related Links Here you'll find links to other programs, organizations, and information resources concerning other analysis capabilities, energy-modeling, and technology expertise related to renewable energy. International Applications NREL's International Program in its effort to promote the use of renewable energy as a tool for sustainable development, applies world-class expertise in technology development and deployment, economic analysis, resource assessment, project design and implementation, and policy formulation. Assisting State and Local Governments Using renewable energy and being energy efficient is smart. Not only does it protect the environment, it benefits the economy. Many mayors, governors, city/county commissioners, state legislators, state energy

13

Related Links | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Related Links Related Links Related Links Private, public, and nonprofit organizations around the country offer a wide range of courses and other services to help you either improve your current skills or learn new ones. The sites featured here can help you find courses of specific interest as well as other information about training requirements for certain energy jobs. DOE Related Advanced Manufacturing Office: Training Find training sessions in your area and learn how to save energy in your manufacturing plant or commercial building. American Museum of Science & Energy Learn more about the American Museum of Science & Energy (AMSE), a DOE-sponsored museum in Oak Ridge, TN, that provides cultural, educational, and scientific programs and exhibits, as well as summer camps for kids.

14

EIA - Related Links for Transportation  

U.S. Energy Information Administration (EIA) Indexed Site

Transportation Related Links Transportation Related Links Transportation Related Links government reports, data, and web sites (sorted alphabetically by primary agency) Date Last Updated/Reviewed: December 2006 Next Update/Review: April 2007 Federal and International Agencies and Institutes International Energy Agency (IEA) Dealing with Climate Change The International Energy Agency's »Dealing with Climate Change« database of policies and measures now features 2005 revisions and developments. The database has expanded to include more than 1400 records of the climate policy process in the IEA's 26 Member Countries since 1999. Member country governments have reviewed and endorsed the policies listed, reinforcing the informative value and authority of the database. The database is freely accessible online.

15

RELATED LINKS Green Technology for  

E-Print Network [OSTI]

have been certified to the National Green Building Standard, which was approved earlier this year by the American National Standards Institute. Preferences for specific green building techniques are decidedlyRELATED LINKS Green Technology for 2009: See the Photos Green Building: Getting Past the Media Hype

16

Alternative Fuels Data Center: Electricity Related Links  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Electricity Electricity Printable Version Share this resource Send a link to Alternative Fuels Data Center: Electricity Related Links to someone by E-mail Share Alternative Fuels Data Center: Electricity Related Links on Facebook Tweet about Alternative Fuels Data Center: Electricity Related Links on Twitter Bookmark Alternative Fuels Data Center: Electricity Related Links on Google Bookmark Alternative Fuels Data Center: Electricity Related Links on Delicious Rank Alternative Fuels Data Center: Electricity Related Links on Digg Find More places to share Alternative Fuels Data Center: Electricity Related Links on AddThis.com... More in this section... Electricity Basics Production & Distribution Research & Development Related Links Benefits & Considerations Stations

17

Alternative Fuels Data Center: Biodiesel Related Links  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Biodiesel Biodiesel Printable Version Share this resource Send a link to Alternative Fuels Data Center: Biodiesel Related Links to someone by E-mail Share Alternative Fuels Data Center: Biodiesel Related Links on Facebook Tweet about Alternative Fuels Data Center: Biodiesel Related Links on Twitter Bookmark Alternative Fuels Data Center: Biodiesel Related Links on Google Bookmark Alternative Fuels Data Center: Biodiesel Related Links on Delicious Rank Alternative Fuels Data Center: Biodiesel Related Links on Digg Find More places to share Alternative Fuels Data Center: Biodiesel Related Links on AddThis.com... More in this section... Biodiesel Basics Blends Production & Distribution Specifications Related Links Benefits & Considerations Stations Vehicles Laws & Incentives

18

Alternative Fuels Data Center: Hydrogen Related Links  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Hydrogen Hydrogen Printable Version Share this resource Send a link to Alternative Fuels Data Center: Hydrogen Related Links to someone by E-mail Share Alternative Fuels Data Center: Hydrogen Related Links on Facebook Tweet about Alternative Fuels Data Center: Hydrogen Related Links on Twitter Bookmark Alternative Fuels Data Center: Hydrogen Related Links on Google Bookmark Alternative Fuels Data Center: Hydrogen Related Links on Delicious Rank Alternative Fuels Data Center: Hydrogen Related Links on Digg Find More places to share Alternative Fuels Data Center: Hydrogen Related Links on AddThis.com... More in this section... Hydrogen Basics Production & Distribution Research & Development Related Links Benefits & Considerations Stations Vehicles Laws & Incentives

19

Alternative Fuels Data Center: Ethanol Related Links  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Ethanol Ethanol Printable Version Share this resource Send a link to Alternative Fuels Data Center: Ethanol Related Links to someone by E-mail Share Alternative Fuels Data Center: Ethanol Related Links on Facebook Tweet about Alternative Fuels Data Center: Ethanol Related Links on Twitter Bookmark Alternative Fuels Data Center: Ethanol Related Links on Google Bookmark Alternative Fuels Data Center: Ethanol Related Links on Delicious Rank Alternative Fuels Data Center: Ethanol Related Links on Digg Find More places to share Alternative Fuels Data Center: Ethanol Related Links on AddThis.com... More in this section... Ethanol Basics Blends Specifications Production & Distribution Feedstocks Related Links Benefits & Considerations Stations Vehicles Laws & Incentives

20

Voluntary Protection Program - Related Links | Department of...  

Broader source: Energy.gov (indexed) [DOE]

- Related Links Voluntary Protection Program - Related Links VPPPA - The Voluntary Protection Programs Participants' Association, a non- profit organization is leading the way in...

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Alternative Fuels Data Center: Propane Related Links  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Propane Propane Printable Version Share this resource Send a link to Alternative Fuels Data Center: Propane Related Links to someone by E-mail Share Alternative Fuels Data Center: Propane Related Links on Facebook Tweet about Alternative Fuels Data Center: Propane Related Links on Twitter Bookmark Alternative Fuels Data Center: Propane Related Links on Google Bookmark Alternative Fuels Data Center: Propane Related Links on Delicious Rank Alternative Fuels Data Center: Propane Related Links on Digg Find More places to share Alternative Fuels Data Center: Propane Related Links on AddThis.com... More in this section... Propane Basics Production & Distribution Related Links Benefits & Considerations Stations Vehicles Laws & Incentives Propane Related Links This list includes links related to propane. The Alternative Fuels Data

22

Alternative Fuels Data Center: Related Links  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Related Links to Related Links to someone by E-mail Share Alternative Fuels Data Center: Related Links on Facebook Tweet about Alternative Fuels Data Center: Related Links on Twitter Bookmark Alternative Fuels Data Center: Related Links on Google Bookmark Alternative Fuels Data Center: Related Links on Delicious Rank Alternative Fuels Data Center: Related Links on Digg Find More places to share Alternative Fuels Data Center: Related Links on AddThis.com... Related Links For a list of additional resources about alternative fuels and advanced vehicles, select one or more categories below. All organizations are provided as suggested resources. The Alternative Fuels Data Center does not endorse these companies or the products and services listed on their websites (see disclaimer).

23

Partners and related links | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

are the organizations with which EMSL maintains closest relationships in high performance computing and software development. Partners Note: The links below leave this site...

24

Central Internet Database (CID) Related Links  

Office of Environmental Management (EM)

Related Links Related Links Central Internet Database CID Photo Banner Links to Waste and Materials Disposition Information Below is a collection of reports and links to various documents that provide information related to waste and material disposition. While most of these are directly related to the Department of Energy's waste management activities, some links include information from the commercial sector. Some of the information provides an historical context for current waste disposition alternatives. To view PDF documents, please ensure Adobe Reader is installed on your computer, it is available to download here Exit CID Website . Waste Volume Related Databases For DOE/EM waste and material stream data: Waste Information Management System (WIMS) provided by Florida International University Exit CID Website

25

NREL: Financing Geothermal Power Projects - Related Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Related Links Related Links View these websites for more information on geothermal power project financing. NREL Geothermal Policymakers' Guidebooks NREL Geothermal Policymakers' Guidebooks Learn the five key steps for creating effective policy and increasing the deployment of geothermal electricity generation technologies. California Energy Commission's Geothermal Program Here you'll find information on the California Energy Commission's geothermal program, including geothermal energy, funding opportunities, and contacts. Database of State Incentives for Renewables and Energy Efficiency This database of state, local, utility, and federal incentives and policies that promote renewable energy and energy efficiency can help you find financing incentives and opportunities in your state.

26

Related Links on Hawaii | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Hawaii Hawaii Related Links on Hawaii Below are related links to resources specifically for implementing energy efficiency and renewable energy technologies in Hawaii. Learn more about deployment efforts in Hawaii. Department of Economic Development, Business, and Tourism The state's Department of Business, Economic Development and Tourism works closely with DOE and the National Renewable Energy Laboratory (NREL) to implement deployment efforts from Hawaii Clean Energy Initiative activities. Find resources for economic and statistical data, business development opportunities, energy and conservation information, and foreign trade advantages. Electric Vehicles in Hawaii The state of Hawaii sees the use of electric vehicles (EVs) as one solution to reducing the state's petroleum consumption and provides information on

27

Related Links | Building Energy Codes Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Related Links Related Links Regional Energy Efficiency Organizations MEEA NEEP NEEA SEEA SWEEP SPEER Midwest Energy Efficiency Alliance (MEEA) IL, IN, IA, KS, KY, ND, NE, MI, MN, MO, OH, SD, WI The Midwest Energy Efficiency Alliance (MEEA) is a collaborative network advancing energy efficiency in the Midwest to support sustainable economic development and environmental preservation. MEEA raises awareness, facilitates energy efficiency programs and strengthens policy across the nine-state region. MEEA brings together a respected network of members, partners, board and staff, and inspires others to create new technologies, new products and new ways of thinking when it comes to energy efficiency. Codes Contact Isaac Elnecave Senior Policy Manager ielnecave@mwalliance.org phone: (312)784-7253

28

NREL: State and Local Activities - Related Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Related Links Related Links Find information about U.S. Department of Energy (DOE) and other state and local clean energy technical assistance and deployment programs and activities. State and Local Technical Assistance Programs NREL provides technical assistance to state and local energy projects through the following initiatives and programs. DOE Green Power Network DOE Weatherization & Intergovernmental Program U.S. Department of Agriculture Rural Energy for America Program For more information about NREL's role, contact Dave Peterson. State and Local Deployment Programs NREL strives to increase the scale of clean energy technology deployment in U.S. states and localities by supporting these technology deployment projects and initiatives. DOE Biomass Program DOE Builders Challenge

29

Security and Trust Convergence: Attributes, Relations and Provenance  

E-Print Network [OSTI]

-World Impact! State of Cyber Security Cyber should be "controllable" Nuclear, chemical, biological have beenSecurity and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University of Texas

Sandhu, Ravi

30

Security and Trust Convergence: Attributes, Relations and Provenance  

E-Print Network [OSTI]

-World Impact! State of Cyber Security Cyber should be "controllable" Nuclear, chemical, biological have been1 Security and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University of Texas

Sandhu, Ravi

31

Procurement-Related Forms | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Procurement-Related Forms Procurement-Related Forms Procurement-Related Forms The following procurement-related forms are provided in PDF fillable and/or Word format. Click the link in the "Format" column to open a copy of the form or right-click to download. To sort the table by UCN number or title, click the associated column heading. Number* Title/Description Format** UCN-04452S B&W Y-12 Subcontractor Personnel Exit Checklist PDF-fil UCN-6573 Subcontractor's Invoice for Travel and/or Services PDF-fil UCN-13816B Request for Waiver or Deviation Word UCN-13816C Request for Waiver or Deviation (Continued) Word UCN-20087A Suspect/Counterfeit Part Headmark List PDF UCN-20856 Nonpossessing Security Plan PDF-fil, Word UCN-21329 Subcontract Technical Representative (STR) Change Notice PDF-fil

32

Alternative Fuels Data Center: Natural Gas Related Links  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Natural Gas Natural Gas Printable Version Share this resource Send a link to Alternative Fuels Data Center: Natural Gas Related Links to someone by E-mail Share Alternative Fuels Data Center: Natural Gas Related Links on Facebook Tweet about Alternative Fuels Data Center: Natural Gas Related Links on Twitter Bookmark Alternative Fuels Data Center: Natural Gas Related Links on Google Bookmark Alternative Fuels Data Center: Natural Gas Related Links on Delicious Rank Alternative Fuels Data Center: Natural Gas Related Links on Digg Find More places to share Alternative Fuels Data Center: Natural Gas Related Links on AddThis.com... More in this section... Natural Gas Basics Production & Distribution Related Links Benefits & Considerations Stations Vehicles Laws & Incentives

33

Alternative Fuels Data Center: Idle Reduction Related Links  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Conserve Fuel Conserve Fuel Printable Version Share this resource Send a link to Alternative Fuels Data Center: Idle Reduction Related Links to someone by E-mail Share Alternative Fuels Data Center: Idle Reduction Related Links on Facebook Tweet about Alternative Fuels Data Center: Idle Reduction Related Links on Twitter Bookmark Alternative Fuels Data Center: Idle Reduction Related Links on Google Bookmark Alternative Fuels Data Center: Idle Reduction Related Links on Delicious Rank Alternative Fuels Data Center: Idle Reduction Related Links on Digg Find More places to share Alternative Fuels Data Center: Idle Reduction Related Links on AddThis.com... More in this section... Biodiesel Electricity Ethanol Hydrogen Natural Gas Propane Emerging Fuels Fuel Prices Idle Reduction Related Links

34

CHINA-AFRICA RELATIONS GOVERNANCE, PEACE AND SECURITY  

E-Print Network [OSTI]

CHINA-AFRICA RELATIONS GOVERNANCE, PEACE AND SECURITY Editors Mulugeta Gebrehiwot Berhe and Liu Hongwu #12;CHINA-AFRICA RELATIONS GOVERNANCE, PEACE AND SECURITY Editors Mulugeta Gebrehiwot Berhe of China China's Evolving Policy towards Peace and Security in Africa: Constructing a new paradigm

Paris-Sud XI, Université de

35

Securing linked transportation systems: economic implications and investment strategies  

E-Print Network [OSTI]

implications and investment strategies Adib Kanafani &research explores agency investment behavior in multi-agencysystems develops guidelines for investments in security. The

Kanafani, Adib; Huang, Jiangchuan

2010-01-01T23:59:59.000Z

36

Los Alamos lab director to link science education, national security in  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lab director to link science education, national security in talk Lab director to link science education, national security in talk Los Alamos lab director to link science education, national security in TEDxABQ talk McMillan will describe the events that led to his career in science and share suggestions on how non-scientists can inspire young people to STEM careers and scientific literacy. September 5, 2013 Los Alamos National Laboratory Director Charlie McMillan Los Alamos National Laboratory Director Charlie McMillan Contact Fred deSousa Communications Office (505) 665-3430 Email "Finding young people with the scientific and technical capabilities to carry on the Laboratory's national security missions will be critical, but the linkage to national security goes beyond that," McMillan said. Watch live stream at home or at Bradbury Science Museum

37

Los Alamos lab director to link science education, national security...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

education, national security in TEDxABQ talk McMillan will describe the events that led to his career in science and share suggestions on how non-scientists can inspire young...

38

Securities Law Issues Relating to Community Solar Projects  

Broader source: Energy.gov [DOE]

The law firm Stoel Rives has analyzed the issues related to Securities Law and Community Solar both in the context of Washington state law and federal law.

39

Modeling behavioral considerations related to information security.  

SciTech Connect (OSTI)

The authors present experimental and simulation results of an outcome-based learning model for the identification of threats to security systems. This model integrates judgment, decision-making, and learning theories to provide a unified framework for the behavioral study of upcoming threats.

Martinez-Moyano, I. J.; Conrad, S. H.; Andersen, D. F. (Decision and Information Sciences); (SNL); (Univ. at Albany)

2011-01-01T23:59:59.000Z

40

Former Worker Medical Screening Program Related Documents & Links |  

Broader source: Energy.gov (indexed) [DOE]

Former Former Worker Medical Screening Program Related Documents & Links Former Worker Medical Screening Program Related Documents & Links Related Documents & Links Beryllium Information-ORISE Chronic Beryllium Disease Information-National Jewish Health Department of Energy Human Subjects Protection Program DOE Covered Facilities Database Department of Labor Energy Employees Occupational Illness Compensation Program (EEOICP) Department of Labor EEOICP - Upcoming Events Department of Labor Office of the Ombudsman for EEOICPA NIOSH Advisory Board and Public Meetings NIOSH Division of Compensation Analysis and Support Project Websites Building Trades National Medical Screening Program Medical Exam Program for Former Workers at Los Alamos National Laboratory

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Employment at EERE Related Links | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Employment at EERE Related Links Employment at EERE Related Links Employment at EERE Related Links If you are considering employment with the U.S. Department of Energy (DOE) Office of Energy Efficiency and Renewable Energy (EERE), and even if you already are an EERE employee, you may find the following links helpful: Veterans' Employment Resources The American's Veteran site includes information to help you understand veterans' preference, how federal jobs are filled, and unique veteran appointing authorities designed to help you find a job. Persons with Disabilities The U.S. Office of Personnel Management (OPM) explains how federal agencies such as DOE fill jobs in relation to those with disabilities. Federal Executive Institute The Federal Executive Institute (FEI) helps senior government leaders

42

Related Links on Renewable Energy | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Related Links on Renewable Energy Related Links on Renewable Energy Related Links on Renewable Energy Below are related links to resources that provide information to help communities incorporate renewable energy into rebuilding efforts. American Solar Energy Society A non-profit organization that offers general information about solar energy, practical suggestions, success stories, and more. Geothermal Energy Association Trade association that provides geothermal resource maps and a listing of U.S. geothermal plants by state. Renewable Energy for Consumers, Businesses, and Students Learn about renewable energy at the National Renewable Energy Laboratory's renewable energy basics site for consumers, business owners, and students. Solar Energy Industries Association Solar trade association that provides general information about solar

43

NREL: U.S. Life Cycle Inventory Database - Related Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Related Links Related Links Below are links to life cycle inventory (LCI) databases, life cycle assessment (LCA) information, LCA tools, research institutes utilizing LCA, labeling initiatives and organizations, international LCA initiatives, LCA online forums. Life Cycle Inventory Data Ecoinvent: Swiss Centre for Life Cycle Inventories IVAM LCA Data 4: Dutch LCA Database KITECH (Korea Institute of Industrial Technology): Korea National Cleaner Production Center LCI Database Life Cycle Assessment Information IERE (The Institute for Environmental Research and Education): The American Center for Life Cycle Assessment SETAC (Society of Environmental Toxicology and Chemistry): SETAC Life Cycle Assessment SPOLD (Society for Promotion of Life-cycle Assessment Development): 2.0 LCA Consultants homepage

44

Related Links | U.S. DOE Office of Science (SC)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Related Links Advanced Scientific Computing Research (ASCR) ASCR Home About Research Facilities Science Highlights Benefits of ASCR Funding Opportunities Advanced Scientific Computing Advisory Committee (ASCAC) News & Resources ASCR Discovery Monthly News Roundup News Archives ASCR Program Documents ASCR Workshops and Conferences ASCR Presentations 100Gbps Science Network Related Links Contact Information Advanced Scientific Computing Research U.S. Department of Energy SC-21/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-7486 F: (301) 903-4846 E: sc.ascr@science.doe.gov More Information » News & Resources Related Links Print Text Size: A A A RSS Feeds FeedbackShare Page The White House External link U.S. Department of Energy Office of Science

45

Uniform Methods Project Related Links | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Related Links Related Links Uniform Methods Project Related Links The websites and publications listed below provide supporting information for the Uniform Methods Project and for evaluation, measurement, and verification (EM&V) of energy efficiency programs. Glossaries of EM&V Terms Federal EM&V Resources International Resources Related Standards Glossaries of EM&V Terms The following glossaries provide definitions of technical language and EM&V terms. Appendix A: Glossary of Terms, Energy Efficiency Program Impact Evaluation Guide Appendix A has a glossary of EM&V terms; published by the EM&V SEE Action Working Group. Federal EM&V Resources SEE Action Evaluation, Measurement, and Verification Working Group The State and Local Energy Efficiency Action Network (SEE Action)

46

DOE Hydrogen and Fuel Cells Program: Related Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Plans, Roadmaps, and Vision Documents Program Plans, Roadmaps, and Vision Documents Program Records Annual Progress Reports Annual Merit Review and Peer Evaluation Reports to Congress Policies and Acts Financial Opportunities Related Links U.S. Department of Energy Search help Home > Library > Related Links Printable Version Related Links Visit these websites to learn about federal agencies, national laboratories, international agencies, and partnerships that are working to advance hydrogen and fuel cell technologies. Federal Agency Sites DOE Hydrogen and Fuel Cells Program Offices Office of Energy Efficiency and Renewable Energy Office of Fossil Energy Office of Nuclear Energy Office of Science Alternative Fuels Data Center: Fuel Cell Vehicles - The Alternative Fuels Data Center provides information on alternative fuel and vehicle

47

Related Links on Greensburg, Kansas | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Greensburg, Kansas Greensburg, Kansas Related Links on Greensburg, Kansas Below are related links to resources specifically for Kansas on building with energy efficiency and renewable energy technologies. Learn more about deployment efforts in Greensburg, Kansas. Efficiency Kansas Efficiency Kansas is a loan program from the State Energy Office at the Kansas Corporation Commission that helps homes and businesses access low-interest financing through partner lenders and utilities, identify and implement energy-efficiency improvements, and save on monthly utility bills. Greensburg Sustainable Building Database The Greensburg Sustainable Building Database showcases green building projects in Greensburg, Kansas. The case studies in this database offer ideas for rebuilding energy efficiently and include detailed information

48

Thermodynamics and Relativity: Possible Consequences of their Close Link  

E-Print Network [OSTI]

The first part of this paper is a summary of a hypothesis previously advanced, suggesting the existence of a close link between thermodynamics and relativity. The second part is a preliminary comment about some possible consequences in the fields of physics, astronomy and biology.

Jean-Louis Tane

2008-05-25T23:59:59.000Z

49

Related Links on Energy Planning | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Planning Planning Related Links on Energy Planning Below are related links to energy planning resources. EPA State and Local Climate and Energy Program Access information on technical assistance, analytical tools, and outreach support available for state, local, and tribal governments through the EPA State and Local Climate and Energy Program. View case studies of state and local projects and see examples of greenhouse gas inventories and climate action plans. Local Energy Planning in Practice: A Review of Recent Experiences This American Council for an Energy Efficient Economy (ACEEE) research report reviews the energy-related plans in 30 U.S. locations. The report summarizes progress made in planning processes and choices made by community leaders, and identifies both advantages and difficulties

50

Related Links on Energy Efficiency | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Efficiency Efficiency Related Links on Energy Efficiency Below are related links to resources on incorporating energy efficiency into buildings and homes. Alternative Fuels and Advanced Vehicles Data Center Search the U.S. Department of Energy (DOE) Alternative Fuels and Advanced Vehicles Data Center database for federal and state transportation incentives and laws on alternative fuels and vehicles, air quality, fuel efficiency, and more. Daylighting Strategically place windows to maximize light and minimize glare to save money and energy on electric lighting. Designing and Remodeling Your Home How to reduce energy use and save money when designing or remodeling a home. Energy Savers A DOE website with information about how to save energy and money. ENERGY STAR® Information about choosing energy-efficient products and designing an

51

Related Links on Financial Assistance | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Financial Assistance Financial Assistance Related Links on Financial Assistance Below are related links to resources on financial assistance programs, grants, and incentives for using energy efficiency and renewable energy technologies. American Recovery and Reinvestment Act of 2009 Signed into law by President Obama on February 17, 2009, the Recovery Act contains provisions that financially benefit individuals, businesses, organizations, and the renewable energy industry as a whole. Learn more by visiting the following Web pages: Office of Energy Efficiency and Renewable Energy, U.S. Department of Energy (DOE), and Recovery.gov. Database of State Incentives for Renewables and Efficiency Access the Database of State Incentives for Renewables and Efficiency to find what state, local, utility, and federal incentives and policies are

52

Related Links on Community Renewable Energy Deployment | Department of  

Broader source: Energy.gov (indexed) [DOE]

Community Renewable Energy Deployment Community Renewable Energy Deployment Related Links on Community Renewable Energy Deployment The following publications and websites provide helpful information for communities planning or implementing renewable energy and energy efficiency projects. Publications The U.S. Department of Energy (DOE) and its National Renewable Energy Laboratory (NREL) publish numerous community guides, resources, and examples, as well as publications geared toward organizations that provide technical assistance to communities. Community Guides, Resources, and Examples These documents provide how-to information, steps, and resources for community-wide projects, as well as lessons learned from other communities. A Guide to Community Solar: Utility, Private, and Non-Profit Project

53

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

54

An Advanced Security Infrastructure for Heterogeneous Relational Grid Data Sources  

Science Journals Connector (OSTI)

In this paper we deal with the problem of secure access to metadata information in Grid computing environments. The heterogeneity of the eventual ... database management systems) and the enforcement of security p...

Javier Jan Martnez; JosH. Cans

2004-01-01T23:59:59.000Z

55

Office of Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

56

Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links Links Dedicated links pages are available for the following topics: Diesel Vehicles and Fuels Electric Vehicles Fuel Cell Vehicles Hybrids Plug-in Hybrids Exit Fueleconomy.gov The links below are to pages that are not part of the fueleconomy.gov Web site. We offer these external links for your convenience in accessing additional information that may be useful or interesting to you. Auto Manufacturers Acura Aston Martin Audi Bentley BMW Bugatti Buick Cadillac Chevrolet Chrysler Dodge Ferrari Fiat Ford GMC Honda Hyundai Infiniti Jaguar Jeep Kia Lamborghini Land Rover Lexus Lincoln Lotus Maserati Maybach Mazda McLaren Automotive Mercedes-Benz MINI Mitsubishi Nissan Porsche Ram Rolls Royce Roush Performance Scion smart Spyker Subaru Suzuki Toyota Volkswagen Volvo VPG Buying Guides ACEEE's Green Book Aol Autos

57

Uniform Methods Project Related Links | Department of Energy  

Energy Savers [EERE]

of energy efficiency programs. Glossaries of EM&V Terms Federal EM&V Resources International Resources Related Standards Glossaries of EM&V Terms The following glossaries...

58

Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links Links Public Outreach Clint Sprott's Wonders of Physics from University of Wisconsin, Madison Clint Sprott's Physics Demo Manual Phun Physics shows from University of Virginia Physics Van from Universitiy of Illinois, Urbana-Champaign How Does A Thing Like That Work from University of Pittsburgh Physics on the Road from Purdue University The Mad Science Group University Catalogues of Demonstrations Boston Univeristy's physics demonstrations University of Victoria physics demonstrations Wesleyan University physics demonstrations University of Minnesota, The Origin of the DCS Physics Demonstrations at the University of Texas at Austin University of Maryland University of Wisconsin University of Guelph University of Oregon Brown Physics Lecture Demonstrations University of California, Berkeley

59

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links  

E-Print Network [OSTI]

, a significant part of a vehicle's manufacturing cost goes towards the implementation of electronic components on vehicles on an individual basis eliminating labor costs from the auto manufacturers as well as from costs. To upload software in vehicles, it is critically important that this be done in a secure

Mahmud, Syed Masud

60

Office of Security Assistance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

AODV-based technique for quick and secure local recovery from link failures in MANETs  

Science Journals Connector (OSTI)

Wireless links in MANET may be broken frequently due to nodal mobility and power failures. Such problems make routing protocols, like AODV, inefficient and unreliable. Presently, these problems are solved using local repairing mechanisms at an intermediate ...

Sajal Sarkar; Raja Datta

2013-06-01T23:59:59.000Z

62

The Office of Health, Safety and Security link to the VPPPA  

Broader source: Energy.gov [DOE]

Need to know which sites are current DOE-VPP or OSHA VPP Sites? The link, below, will take you to a Voluntary Protection Programs Participant's Association web page where you may search for current VPP sites by state.

63

Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Related Sites National Nanotechnology Initiative Nano Technology Industries Advanced Materials Research Institute Institute of Physics Max-Planck Institute for Kohlenforschung The...

64

EIA- Energy Efficiency Related Links: EIA Reports and Analyses  

U.S. Energy Information Administration (EIA) Indexed Site

Reports Reports Energy-Efficiency Related: EIA Reports and Analyses Released Release Date: October 1999 Last Updated: August 2010 End Users: Commercial Buildings / Manufacturing / Residential / Transportation Energy Source: Coal / Electricity / Natural Gas / Nuclear / Petroleum / Renewable / All Sectors Commercial Buildings 2003 CBECS Detailed Tables, most recent data on building characteristics and consumption expenditures 2003 Building Characteristics Overview, the Commercial Buildings Energy Consumption Survey (CBECS) estimates that there were nearly 4.9 million commercial buildings and more than 71.6 billion square feet of commercial floorspace in the U. S. in 2003 1999 Building Characteristics Overview, the 1999 CBECS collected information about HVAC (heating, ventilation, and air-conditioning) system, building shell, and lighting conservation features and practices plus information on off-hour reduction of end-use equipment. In general, commercial buildings that were larger than average were more likely to have used these conservation features or measures (May 2002)

65

Related Links  

Broader source: Energy.gov [DOE]

The Advanced Manufacturing Office (AMO) aligns its activities with recommendations from the President and his advisors, while drawing insights from industrial experts and research institutions. Learn more about national priorities for manufacturing from these influential reports.

66

EIA Energy Efficiency-Energy Related Greenhouse Gas Emissions Links for the  

U.S. Energy Information Administration (EIA) Indexed Site

Related Greenhouse Gas Emissions Links Related Greenhouse Gas Emissions Links Energy Related Greenhouse Gas Emissions Links Posted Date: May 2007 Page Last Modified: September 2010 EIA Links Disclaimer: These pages contain hypertext links to information created and maintained by other public and private organizations. These links provide additional information that may be useful or interesting and are being provided consistent with the intended purpose of the EIA website. EIA does not control or guarantee the accuracy, relevance, timeliness, or completeness of this outside information. EIA does not endorse the organizations sponsoring linked websites, the views they express, or the products and services they offer. Government Agencies / Associations Energy Information Administration - Annual Energy Outlook: Carbon Dioxide Emissions, CO2 emissions from the combustion of fossil fuels are proportional to fuel consumption. Among fossil fuel types, coal has the highest carbon content, natural gas the lowest, and petroleum in between. In the AEO2006 reference case, the shares of these fuels change slightly from 2004 to 2030, with more coal and less petroleum and natural gas. The combined share of carbon-neutral renewable and nuclear energy is stable from 2004 to 2030 at 14 percent

67

Website Policies / Important Links | DOE Data Explorer  

Office of Scientific and Technical Information (OSTI)

Website Policies Important Links Website Policies Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links...

68

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

5: ModSecurity Multipart Message Parsing Security Bypass 5: ModSecurity Multipart Message Parsing Security Bypass Vulnerability V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability October 18, 2012 - 6:00am Addthis PROBLEM: ModSecurity Multipart Message Parsing Security Bypass Vulnerability PLATFORM: Modsecurity Versions prior to 2.70 ABSTRACT: SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions REFERENCE LINKS: SEC Consult Secunia Advisory SA49853 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when parsing multipart requests and can be exploited to bypass certain filtering rules. IMPACT: Remote Security Bypass SOLUTION: Update to version 2.70. Addthis Related Articles V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities

69

Security of supply secured by market forces: Different stages and welfare prospects in relation to Danish and  

E-Print Network [OSTI]

that market prices are not sufficiently high to secure new generation capacity. In particular the peak power resources do not seem to be attractive without some capacity payments. Construction of such markets to capacity constraints is questioned. Would an integrated market for security services transfer resources

70

Related Links | OSTI, US Dept of Energy, Office of Scientific and Technical  

Office of Scientific and Technical Information (OSTI)

Related Links Related Links Research Diffusion Accelerator Research Team OSTI has assembled a research team of epidemiological modelers and science diffusion experts, including: Luís Bettencourt, Theoretical Division, T-7, Los Alamos National Laboratory David Kaiser exit federal site , Massachusetts Institute of Technology Carlos Castillo-Chavez exit federal site , Arizona State University The team is coordinated by David Wojick, consultant. General Critical Properties of the Dynamics of Scientific Discovery (994-KB PDF) by Luís M.A. Bettencourt and David I. Kaiser The dynamics of scientific discovery: the spread of ideas and structural transitions in collaboration networks (759-KB PDF) by Luís M. A. Bettencourt, et al. The Digital Road to Scientific Knowledge Diffusion: A Faster, Better

71

Related Links on New Orleans and Hot-Humid Climates | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

New Orleans and Hot-Humid Climates New Orleans and Hot-Humid Climates Related Links on New Orleans and Hot-Humid Climates Below are related links to resources specifically for New Orleans, Louisiana, and other hot-humid climates on building with energy efficiency and renewable energy technologies. Learn more about deployment efforts in New Orleans. Building a Durable and Energy Efficient Home in Post-Katrina New Orleans This report from Building Science examines designing homes with key sustainability concepts, durability, and energy efficiency that can provide insurance to people in the event of a hurricane. Designing and Building Hurricane-Resistant Homes This article from the Consortium for Advanced Residential Buildings details a production builder's efforts to identify better wall systems to use in

72

Security Cases  

Broader source: Energy.gov (indexed) [DOE]

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

73

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

74

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

75

Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis  

Science Journals Connector (OSTI)

......Automated Validation of Internet Security Protocols and...formalisms is natural in a young research area as researchers...Automated Validation of Internet Security Protocols and...used by principal A. By abuse of notation, we also...Mn . We will slightly abuse notation and refer to......

Carlos Caleiro; Luca Vigan; David Basin

2005-11-01T23:59:59.000Z

76

Security Scheme in Wireless Grid  

Science Journals Connector (OSTI)

In this paper, we considered the two security services of authorization and data security in wireless Grid. The security issues is related to authorization and security, specific to Grid, the characteristics of t...

Yue Hong Zhang; Li Hao; Zhong Shan Yang

2011-01-01T23:59:59.000Z

77

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

78

T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections |  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Tomcat May Ignore @ServletSecurity Annotation 0: Apache Tomcat May Ignore @ServletSecurity Annotation Protections T-580: Apache Tomcat May Ignore @ServletSecurity Annotation Protections March 16, 2011 - 3:05pm Addthis PROBLEM: Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by an error related to ignoring @ServletSecurity annotations. An attacker could exploit this vulnerability to bypass security restrictions and launch further attacks on the system. PLATFORM: Apache Tomcat versions 7.0.0 through 7.0.10. ABSTRACT: Apache Tomcat May Ignore @ServletSecurity Annotation Protections. A remote user may be able to bypass @ServletSecurity annotation protections. reference LINKS: Apache Tomcat Advisory: Apache Tomcat 7.0.11 CVE-2011-1088 Security Tracker Alert ID:1025215 OSVDB ID: 71027

79

Message Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

80

Office of Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

82

AFRD - Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links Links Home Organization Diversity Research Highlights Safety Links Intramural Links Accelerators are built, operated, and used by a large and diverse worldwide community. These links will take you to pages elsewhere that are related to AFRD’ work. The U.S. Department of Energy, Office of Science, is the principal supporter of our activities (and many other R&D endeavors). For information on the Joint Accelerator Conferences go to JACoW. The International Committee for Future Accelerators and the American Physical Society’ Division of Physics of Beams are among the organizations that advance, encourage, and communicate accelerator and beam science. The Laboratory's 50th Anniversary magazine gives an overview of the early and middle history of LBNL. Two of its authors later published the

83

Cyber Security, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

84

Geothermal: Related Links  

Office of Scientific and Technical Information (OSTI)

E-print Network Sign up for weekly E-print Alerts on a topic of interest Bonneville Power Administration California Energy Commission California Energy Commission (Geothermal...

85

T-642: RSA SecurID update to Customers | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

86

Diesel Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links Links Exit Fueleconomy.gov The links below are to pages that are not part of the fueleconomy.gov Web site. We offer these external links for your convenience in accessing additional information that may be useful or interesting to you. Diesel Vehicles and Manufacturers Audi A3 (TDI models) A6 (TDI models) A7 (TDI models) A8 L (TDI model) Q5 (TDI models) Q7 (TDI models) BMW 328d Sedan 328d xDrive Sedan 328d xDrive Sports Wagon 535d Sedan 535d xDrive Sedan Chevrolet Cruze Turbo Diesel Jeep Grand Cherokee EcoDiesel Mercedes-Benz E250 BlueTEC GL350 BlueTEC GLK250 BlueTEC ML350 BlueTEC Porsche Cayenne Diesel Volkswagen Beetle (TDI models) Beetle Convertible (TDI models) Golf (TDI models) Jetta (TDI models) Jetta Sportwagen (TDI models) Passat (TDI models) Touareg (TDI models) Diesel-Related Information

87

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

88

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

89

Industrial and Grid Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial and Grid Security Establishing resilient infrastructures that operate when sensors and physical assets are perturbed is an important national objective. Two related LDRD...

90

Structural characterization by cross-linking reveals the detailed architecture of a coatomer-related heptameric module from the nuclear pore complex  

E-Print Network [OSTI]

-related heptameric module from the nuclear pore complex Yi Shi1 *, Javier Fernandez-Martinez2 *, Elina Tjioe3-(3-dimethylaminopropyl) carbodiimide NPC: nuclear pore complex EM: electron microscopy Nup: nucleoporin VCC: vesicle sample preparation protocol and generate a comprehensive, high-quality cross-linking dataset using two

Sali, Andrej

91

Office of Security Operations: Headquarters Security Officers (HSO) Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

92

Contact Us | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contact Us Contact Us Home > Field Offices > Welcome to the Los Alamos Field Office > Contact Us Contact Us Contact the NNSA Los Alamos Field Office NNSA Los Alamos Field Office (NA-00-LA) 3747 West Jemez Road Los Alamos, NM 87544 (505) 667-6691 Please send any comments, questions, or feedback to Toni Chiri Featured Links LANL Phonebook National Nuclear Security Administration Los Alamos National Laboratory Los Alamos County USA Gov Department of Energy (DOE) New Mexico Environmental Department - LANL U.S. Department of Homeland Security Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program LANS Contract Los Alamos Field Office Emergency Public Information Related Links

93

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

94

Framework for SCADA Security Policy  

Broader source: Energy.gov (indexed) [DOE]

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

95

Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

96

V-186: Drupal Login Security Module Security Bypass and Denial of Service  

Broader source: Energy.gov (indexed) [DOE]

6: Drupal Login Security Module Security Bypass and Denial of 6: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June 26, 2013 - 1:28am Addthis PROBLEM: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability PLATFORM: Login Security 6.x-1.x versions prior to 6.x-1.2. Login Security 7.x-1.x versions prior to 7.x-1.2. ABSTRACT: A security issue and a vulnerability have been reported in the Login Security module for Drupal REFERENCE LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2013-053 Secunia Advisory SA53717 CVE-2013-2197 CVE-2013-2198 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The security issue is caused due to an unspecified error and can be exploited to bypass the module features. Successful exploitation requires the "soft blocking" feature to be

97

Automated analysis of security APIs  

E-Print Network [OSTI]

Attacks on security systems within the past decade have revealed that security Application Programming Interfaces (APIs) expose a large and real attack surface but remain to be a relatively unexplored problem. In 2000, ...

Lin, Amerson H

2005-01-01T23:59:59.000Z

98

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Broader source: Energy.gov (indexed) [DOE]

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

99

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

100

Energy Citations Database (ECD) - Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take you to non-federal websites. Their policies may differ from this site....

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Security Enforcement Reporting Criteria | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Classified information security noncompliances are categorized according to the disclosure or potential disclosure of DOE classified information placed at risk. There are two categories of noncompliances that are based on the relative severity of a classified information security incident. The categories are identified by an event category and type. Each of the two categories is further subdivided into three types based on the type of interest (security interest, management interest, and procedural interest). Security Enforcement Reporting Criteria More Documents & Publications Safety and Security Enforcement Coordinator Handbook DOE-STD-1210-2012 HQFMSP Chapter 11, Incidents of Security Concern

102

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

103

Security Topic Group  

Broader source: Energy.gov (indexed) [DOE]

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

104

Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999  

SciTech Connect (OSTI)

This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

2000-06-01T23:59:59.000Z

105

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY, EUROPEAN SECURITY  

E-Print Network [OSTI]

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY recent developments in European Union (EU) security policy and their implications for Germany's bilateral of a greater EU security capability has significantly affected Germany's bilateral relations with the USA

Sheldon, Nathan D.

106

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

107

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

108

Nuclear Energy & Energy Security  

Science Journals Connector (OSTI)

Safety issues related to use of nuclear energy and secure operation of nuclear installations are mail stones of great importance. Although none of technologies producing energy are absolutely safe it is obvious t...

Jumber Mamasakhlisi

2010-01-01T23:59:59.000Z

109

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

110

BSL-3 Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Biosafety Committee (IBC) Homepage National Institutes of Health U.S. DOE NEPA web U.S. Department of Energy National Institute of Allergy and Infectious Diseases Centers...

111

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity...

112

Resources & Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Western Interconnection Synchrophasor Project Resources & Links Demand Response Energy Efficiency Emerging Technologies Smart grid fact sheet Department of...

113

Energy Links Page - EIA  

U.S. Energy Information Administration (EIA) Indexed Site

Publications & Reports > Energy Links Page Publications & Reports > Energy Links Page Related Energy Links Energy Companies Coal & Other Electricity Foreign Integrated Natural Gas Transmission, Distribution, and Marketing News Services and Periodicals Oil & Gas Exploration and Production Petroleum Refining, Marketing, and Transportation State Owned U.S. Integrated Government Agencies Other DOE National Laboratories Federal Energy States Universities Trade Associations & Other Trade Associations Other Associations International Statistics Energy Services Other Energy Sites EIA Links Disclaimer These pages contain hypertext links to information created and maintained by other public and private organizations. These links provide additional information that may be useful or interesting and are being provided consistent with the intended purpose of the EIA Web site. EIA does not control or guarantee the accuracy, relevance, timeliness, or completeness of this outside information. EIA does not endorse the organizations sponsoring linked websites and we do not endorse the views they express or the products/services they offer.

114

06 DEC 2013 1 Information Security Guideline  

E-Print Network [OSTI]

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

115

Related Links | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

la Biomasse) European Renewable Energy Council Fachagentur Nachwachsende Rohstoffe (Germany - Agency of Renewable Resources) International Energy Association Bioenergy Back to...

116

Uniform Methods Project Related Links  

Office of Energy Efficiency and Renewable Energy (EERE)

The websites and publications listed below provide supporting information for theUniform Methods Project and for evaluation, measurement, and verification (EM&V) of energy efficiency programs.

117

Related Links | Department of Energy  

Office of Environmental Management (EM)

of instructional tools and an easy-to-use system for finding, creating, and modifying content. Renewable Energy Competency Model The Renewable Energy Competency Model was...

118

Related Links | Department of Energy  

Energy Savers [EERE]

Laboratory University of Newcastle: Wind Energy Group West Texas State University: Alternative Energy Institute Wind Energy Associations and Organizations Associations or...

119

Related Links | Department of Energy  

Office of Environmental Management (EM)

and Enforcement Programmatic Environmental Impact Statement for Outer Continental Shelf Alternative Energy Ocean Science Journal Research Laboratories and Government Information...

120

EIA - Related Links for Transportation  

U.S. Energy Information Administration (EIA) Indexed Site

(U.S. EPA) Fuel Economy Guides Includes data on gas mileage, greenhouse gas emissions, air pollution ratings, safety information for new and used cars and trucks, and more. U.S....

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Updated 1-12 Link H. Spann  

E-Print Network [OSTI]

Updated 1-12 Link H. Spann Director, Technology Security & Cooperative Programs Navy International of Navy (DoN) foreign disclosure policy to include technology, data, and hardware transfers and Do Technology Transfer and Security Assistance Review Board (TTSARB) disclosure decisions to establish Do

122

Cyber Security | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

123

Energy Efficiency Links  

U.S. Energy Information Administration (EIA) Indexed Site

Energy Energy Efficiency Organizations Energy Efficiency Organizations Release Date: October 1999 Last Updated: Septembert 2009 EIA Links Disclaimer: These pages contain hypertext links to information created and maintained by other public and private organizations. These links provide additional information that may be useful or interesting and are being provided consistent with the intended purpose of the EIA website. EIA does not control or guarantee the accuracy, relevance, timeliness, or completeness of this outside information. EIA does not endorse the organizations sponsoring linked websites, the views they express, or the products and services they offer. U.S. Federal Government / Regional / U.S. Nonprofit / International U.S. Federal Government and Related Agencies

124

Nuclear Data Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links to Other Useful Sites Online Journals Institutions and Programs Related to Nuclear Physics U.S. Nuclear Data Program: All evaluated nuclear data supported by the U.S....

125

Safety, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

126

Lab announces security changes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

127

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

128

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

nonpartisan organization with a mission to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological, and chemical weapons and to...

129

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

130

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

131

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

132

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

133

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

134

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

RESPONSIBILITIES RESPONSIBILITIES FSO Overview FSO Reporting Responsibilities Questions an FSOs at a Non-Possesssing Site Could Be Asked During an Audit Non-Possessing Contractor Security Requirements Plan Training for Facility Security Officers (FSOs) PHY-210DE Facility Security Officer Overview PHY-210DB, Introduction to Facility Security Officer (Self-Study Course ) Duration: 3 days Description: This correspondence course provides an overview of the roles and responsibilities of the DOE or DOE-contractor FSO. The course emphasizes facility clearance requirements, personnel security, information security, incident reporting, and other related programs. The course references the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22-M) and a comprehensive listing of DOE orders, manuals, guides, forms, and notices.

135

Next Generation National Security Leaders  

SciTech Connect (OSTI)

It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had right-sized the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community or it may lie in more effectively using our existing resources and training programs.

Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

2012-07-19T23:59:59.000Z

136

Enterprise Security Planning with Department of Defense Architecture Framework (DODAF)  

E-Print Network [OSTI]

Enterprise Security Planning with Department of Defense Architecture Framework (DODAF) L. Ertaul1 as its application in dealing with enterprise security planning related issues. Keywords: Enterprise Architecture Frameworks, DoDAF, Enterprise Security Planning 1 . Introduction The Department of Defense

Ertaull, Levent

137

Environmental Program Services Contract | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Learn More Environmental Program Services Contract Related Topics apm contracts contracting Related News Security Improvements Project Completed Ahead of Schedule, 20 Million...

138

Requirements for security signalling  

SciTech Connect (OSTI)

There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

Pierson, L.G.; Tarman, T.D.

1995-02-05T23:59:59.000Z

139

Energy Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

140

Private Security and the Law, 4 edition  

Science Journals Connector (OSTI)

Private Security and the Law, 4th Edition, is a unique resource that provides analysis of practices in the security industry as they relate to law, regulation, licensure, and constitutional questions of case and statutory authority.This ...

Charles Nemeth

2011-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Web Security Standards and Practices Page 1 of 13 Web Security Standard Operating Environment (SOE) V1.doc  

E-Print Network [OSTI]

Web Security Standards and Practices Page 1 of 13 Web Security Standard Operating Environment (SOE) V1.doc Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related

Qian, Ning

142

Department of Energy Security Condition (SECON) | Department...  

Energy Savers [EERE]

facilities, sites and locations. SECON Level descriptions per DOE O 470.4B, Safeguards and Security Program, are linked to the SECON level displayed on the EHSS homepage....

143

T-599: Microsoft April 2011 Security Bulletin Release | Department of  

Broader source: Energy.gov (indexed) [DOE]

99: Microsoft April 2011 Security Bulletin Release 99: Microsoft April 2011 Security Bulletin Release T-599: Microsoft April 2011 Security Bulletin Release April 11, 2011 - 5:24am Addthis PROBLEM: Microsoft April 2011 Security Bulletin Release PLATFORM: Microsoft Windows, Microsoft Office, Microsoft Server Software, and Microsoft Developer Tools and Software ABSTRACT: Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. reference LINKS: Microsoft Security Bulletin Advance Notification for April 2011 Microsoft Security April Affected Software TechNet Webcast: Information About Microsoft April Security Bulletins IMPACT ASSESSMENT: High Discussion:

144

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

145

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

146

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

147

Fuel Cell Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Fuel Cell Links Fuel Cell Links The links below are provided as additional resources for fuel-cell-related information. Most of the linked sites are not part of, nor affiliated with, fueleconomy.gov. We do not endorse or vouch for the accuracy of the information found on such sites. Fuel Cell Vehicles and Manufacturers Chevrolet General Motors press release about the Chevrolet Fuel Cell Equinox Ford Ford overview of their hydrogen fuel cell vehicles Honda FCX Clarity official site Hyundai Hyundai press release announcing the upcoming Tucson Fuel Cell Mercedes-Benz Ener-G-Force Fuel-cell-powered concept SUV Nissan Nissan TeRRA concept SUV Toyota Overview of Toyota fuel cell technology Hydrogen- and Fuel-Cell-Related Information and Tools Fuel Cell Vehicles Brief overview of fuel cell vehicles provided by DOE's Alternative Fuels Data Center (AFDC)

148

Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

149

The Climate Impacts LINK Project  

E-Print Network [OSTI]

The Climate Impacts LINK Project The Climatic Research Unit, University of East Anglia Funded Impacts LINK Project: Applying Results from the Hadley Centre's Climate Change Experiments for Climate change is relatively undeveloped.The Climate Impacts LINK Project was conceived to encourage research

Feigon, Brooke

150

ENERGY SECURITY  

Broader source: Energy.gov (indexed) [DOE]

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

151

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

152

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network [OSTI]

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

153

MIDC: Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links Links Other Data Collection Activities Baseline Surface Radiation Network (BSRN) Clear Sky Forcast for NREL/SRRL (or other locations) Colorado Dept. of Public Health & Environment: Air Quality Index (AQI) Reporting System Colorado State University: USDA UV-B Monitoring and Research Program European Skynet Radiometers network (ESR) Jefferson County, Colorado: Jeffco Weather Station NOAA: Climate Monitoring & Diagnostics Laboratory (CMDL) NREL OTF: Reference Meteorological and Irradiance System (RMIS) NREL RReDC: Cooperative Networks for Renewable Resource Measurements (CONFRRM) NREL RReDC: NASA Remote Sensing Validation Data: Saudi Arabia Rocky Mountain Arsenal (RMA): National Wildlife Refuge Sandia National Laboratories: Photovoltaic Systems Evaluation

154

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

155

Security Rulemaking  

Broader source: Energy.gov (indexed) [DOE]

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

156

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

October 10, 2013 October 10, 2013 PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. October 10, 2013 PSH-13-0070 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. Following the individual's employer receiving garnishment notices from both federal and state tax authorities in January 2013, the

157

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

158

Security Testing Based on Attack Patterns  

Science Journals Connector (OSTI)

Testing for security related issues is an important task of growing interest due to the vast amount of applications and services available over the internet. In practice testing for security often is performed manually with the consequences of higher ... Keywords: Attack pattern, UML state machine, SQL injection, cross-site scripting, model-based testing, security testing

Josip Bozic, Franz Wotawa

2014-03-01T23:59:59.000Z

159

Securing Distributed Storage: Challenges, Techniques, and Systems  

E-Print Network [OSTI]

important security issues related to storage and present a comprehensive survey of the security services, present a critical review of the existing solutions, compare them, and highlight potential research issues time, recent trends in data outsourcing have raised many new privacy issues making security a crucial

Kim, Dae-Shik

160

V-001: Mozilla Security vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Mozilla Security vulnerabilities 1: Mozilla Security vulnerabilities V-001: Mozilla Security vulnerabilities October 12, 2012 - 6:00am Addthis PROBLEM: Mozilla Security vulnerabilities PLATFORM: Vulnerabilities are reported in Firefox and Thunderbird versions prior to 16.0.1 and SeaMonkey versions prior to 2.13.1. ABSTRACT: Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities REFERENCE LINKS: Secunia Advisory SA50932 Mozilla Security Blog Mozilla Foundation Security Advisory 2012-88 Mozilla Foundation Security Advisory 2012-89 SecurityTracker Alert ID: 1027653 SecurityTracker Alert ID: 1027652 SecurityTracker Alert ID: 1027651 CVE-2012-4190 CVE-2012-4191 CVE-2012-4192 CVE-2012-4193 IMPACT ASSESSMENT: High DISCUSSION: 1) The protected "location" object is accessible by other domain objects,

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

162

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

163

Fermilab | About FermiLINK  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

About FermiLINK About FermiLINK Fermilab Today September 28, 2009 Mentors wanted for Diversity Office's FermiLINK program Fermilab Today October 5, 2009 Mentors wanted for Diversity Office's FermiLINK program Fermilab Today October 13, 2009 FermiLINK Q&A session Fermilab Today November 9, 2009 FermiLINK calls for mentees FermiLINK is Fermilab’s mentorship system designed to create an organizational network of leaders by providing opportunities for professional development and career management. This support structure creates access to the counsel and institutional knowledge of successful Fermilab professionals independent of the immediate supervisory hierarchy. FermiLINK provides web-based access to a host of mentors for issue-specific work-related challenges and opportunities. The network supports email,

164

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NSS cover - april NSS cover - april Read the April 2013 issue: web | interactive| pdf Skip to Content Skip to Search Skip to Utility Navigation Skip to Top Navigation Skip to Content Navigation Los Alamos National Laboratory submit About | Mission | Business | Newsroom | Phonebook Los Alamos National Laboratory links to site home page Science & Innovation Collaboration Careers, Jobs Community, Environment Science & Innovation Home » Science & Engineering Capabilities Accelerators, Electrodynamics Bioscience, Biosecurity, Health Chemical Science Earth, Space Sciences Energy Engineering High Energy Density Plasmas, Fluids Information Science, Computing, Applied Math Materials Science National Security, Weapons Science Nuclear & Particle Physics, Astrophysics, Cosmology

165

Enforcement Documents - Nevada National Security Site | Department of  

Broader source: Energy.gov (indexed) [DOE]

Nevada National Security Site Nevada National Security Site Enforcement Documents - Nevada National Security Site November 13, 2007 Enforcement Letter, National Security Technologies LLC,- November 13, 2007 Enforcement Letter issued to National Security Technologies, LLC related to an Unplanned Radiological Exposure during a Borehole Activity at the Nevada Test Site May 21, 2007 Enforcement Letter, National Security Technologies, LLC - May 21, 2007 Enforcement Letter issued to National Security Technologies, LLC related to Nuclear Safety Quality Assurance Requirements Deficiencies at the Nevada Test Site April 1, 2004 Enforcement Letter, Bechtel Nevada - April 1, 2002 Enforcement Letter issued to Bechtel Nevada related to Noncompliances with Occupational Radiation Protection and Quality Assurance Requirements at the

166

Energy Security Council  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Watkins...

167

Cyber Security Incidents, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

168

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

169

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

170

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

171

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Tags Tag: Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website,...

172

Planning for Emergencies | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Related News DOENNSA Participates in Large-Scale CTBT On-Site Inspection Exercise in Jordan HQ Emergency Management Team (EMT) Homeland Security and Emergency Management...

173

Exercise Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Related News DOENNSA Participates in Large-Scale CTBT On-Site Inspection Exercise in Jordan HQ Emergency Management Team (EMT) Homeland Security and Emergency Management...

174

Operations Security (OPSEC) Reminder | Department of Energy  

Office of Environmental Management (EM)

or 301-903-9990. Addthis Related Articles Operations Security (OPSEC) Reminder Cybersecurity Is Every Citizen's Responsibility Secretary Moniz visits the Office of Cyber...

175

Security rethink  

Science Journals Connector (OSTI)

......breaches or heightening the risks. One of my clients...business to the socio-political situation of particular...based on the return on investment in keeping a high standard...times that security risks are at their highest...lay-offs. The return on investment must consider the positive......

Michael Chua

2002-09-01T23:59:59.000Z

176

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

177

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

178

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration Finding of No Significant Impact for the Construction and Operation of a New Office Building and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area Office 528 35th Street Los Alamos, N M 8 7 5 4 4 DEPARTMENT OF ENERGY. NATIONAL NUCLEAR SECUIRTY ADMINISTRATION FINDING OF NO SIGNIFICANT INIPACT Construction and Operation of a New Office Building and Related Structures withinTA-3 at Los Alarnos National Laboratory, Los Alamos. New Mexico FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Construction and Operation of a New Office Building and Related Structures within TA-3 at L os Alamos National Laboratory, Los Alamos, New Mexico (DOE/EA- 7 375)

179

Physical Security Systems | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

180

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

182

Enforcement Letter, Lawrence Livermore National Security, LLC- May 2008  

Broader source: Energy.gov [DOE]

Issued to Lawrence Livermore National Security, LLC related to the Protection of Classified Information at the Lawrence Livermore National Laboratory

183

Relationalism  

E-Print Network [OSTI]

This article contributes to the debate of the meaning of relationalism and background independence, which has remained of interest in theoretical physics from Newton versus Leibniz through to foundational issues for today's leading candidate theories of quantum gravity. I contrast and compose the substantially different Leibniz--Mach--Barbour (LMB) and Rovelli--Crane (RC) uses of the word `relational'. Leibniz advocated primary timelessness and Mach that `time is to be abstracted from change'. I consider 3 distinct viewpoints on Machian time: Barbour's, Rovelli's and my own. I provide four expansions on Barbour's taking configuration space to be primary: to (perhaps a weakened notion of) phase space, categorizing, perspecting and propositioning. Categorizing means considering not only object spaces but also the corresponding morphisms and then functors between such pairs. Perspecting means considering the set of subsystem perspectives; this is an arena in which the LMB and Rovelli approaches make contact. By propositioning, I mean considering the set of propositions about a physical (sub)system. I argue against categorization being more than a formal pre-requisite for quantization in general; however, perspecting is a categorical operation, and propositioning leads one to considering topoi, with Isham and Doering's work represents one possibility for a mathematically sharp implementation of propositioning. Further applications of this article are arguing for Ashtekar variables as being relational in LMB as well as just the usually-ascribed RC sense, relationalism versus supersymmetry, string theory and M-theory. The question of whether scale is relational is also considered, with quantum cosmology in mind.

Edward Anderson

2014-07-15T23:59:59.000Z

184

A Day in The Life | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Day in The Life | National Nuclear Security Administration Day in The Life | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog A Day in The Life Home > Federal Employment > Our Jobs > A Day in The Life A Day in The Life Day in the Life Scenario: The Contract Specialist (HQ & SC) Printer-friendly version Printer-friendly version Related Links

185

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

186

Nonproliferation & International Security | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

187

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

188

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

189

Framework for SCADA Security Policy (October 2005) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Framework for SCADA Security Policy (October 2005) Framework for SCADA Security Policy (October 2005) Framework for SCADA Security Policy (October 2005) Modern automation systems used in infrastruc-ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc-ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi-tions, responsibilities, references, revision history, enforce-ment, and exceptions for various subjects relevant for system security. It covers topics including the overall security risk management program, data security, platforms,

190

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

191

Transportation Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Transportation Security Transportation Security Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste...

192

Preliminary Notice of Violation, National Security Technologies, LLC- NEA-2011-03  

Broader source: Energy.gov [DOE]

Issued to National Security Technologies, LLC related to Deficiencies in Inspection and Installation of Penetration Fire Seals and Other Components at the Nevada National Security Site

193

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

194

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

195

Security for grids  

SciTech Connect (OSTI)

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

196

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department of  

Broader source: Energy.gov (indexed) [DOE]

6: Citrix Secure Gateway Unspecified Vulnerability 6: Citrix Secure Gateway Unspecified Vulnerability T-566: Citrix Secure Gateway Unspecified Vulnerability February 28, 2011 - 11:22pm Addthis PROBLEM: Citrix Secure Gateway Unspecified Vulnerability. PLATFORM: Citrix Secure Gateway version 3.1.4 ABSTRACT: A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia Advisory SA43497 Citrix Support IMPACT ASSESSMENT: High Discussion: This vulnerability only affects Secure Gateway version 3.1.4. Secure Gateway version 3.2.0 is not affected by this vulnerability, but Citrix recommends that customers currently using this version upgrade their deployments to version 3.2.1 in line with the guidance provided in

197

T-687: Microsoft Security Bulletin Advance Notification for August 2011 |  

Broader source: Energy.gov (indexed) [DOE]

87: Microsoft Security Bulletin Advance Notification for August 87: Microsoft Security Bulletin Advance Notification for August 2011 T-687: Microsoft Security Bulletin Advance Notification for August 2011 August 8, 2011 - 3:50pm Addthis PROBLEM: This is an advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Advance Notification for August 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: An advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. 12 Bulletin updates and two are considered 'Critical'. Impact: This advance notification provides a number as the bulletin identifier,

198

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Broader source: Energy.gov (indexed) [DOE]

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

199

Climate-derived tensions in Arctic security.  

SciTech Connect (OSTI)

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

200

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

202

V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue |  

Broader source: Energy.gov (indexed) [DOE]

0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue 0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue July 2, 2013 - 12:38am Addthis PROBLEM: ASUS RT-N66U Router AiCloud Security Bypass Security Issue PLATFORM: ASUS RT-N66U Router firmware versions 3.0.0.4.270 and 3.0.0.4.354. ABSTRACT: A security issue in ASUS RT-N66U Router has been reported REFERENCE LINKS: Secunia Advisory SA53931 neohapsis IMPACT ASSESSMENT: Medium DISCUSSION: The security issue is caused due to the device not properly restricting access when processing certain HTTPS requests and can be exploited to gain access to otherwise restricted functionality and e.g. disclose the contents of arbitrary files and directories. Successful exploitation requires the AiCloud web service to be enabled.

203

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

204

Security Modeling of Grid Systems Using Petri Nets  

Science Journals Connector (OSTI)

The paper reviews the security problem with computing and information resources in Grid systems. It discusses security relative characteristics of Grid architecture and provides a common threat model of Grid. It ...

Peter D. Zegzhda; Dmitry P. Zegzhda; Maxim O. Kalinin

2012-01-01T23:59:59.000Z

205

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

206

Security | Department of Energy  

Energy Savers [EERE]

Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

207

Security & Privacy | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

208

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

209

A European vision for addressing global security threats  

Science Journals Connector (OSTI)

There is a robust consensus among EU Member States about the need to identify the complex links between the threats and challenges to the EUs security. ... and instruments required to effectively respond to secu...

Gerhard Sabathil

2010-06-01T23:59:59.000Z

210

Energy Independence and Security Act of 2007 | Open Energy Information  

Open Energy Info (EERE)

This article is a stub. You can help OpenEI by expanding it. External Links Energy Independence and Security Act of 2007 Retrieved from "http:en.openei.orgw...

211

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

212

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

213

Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

214

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

215

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

216

Better Security Through Discussion | Department of Energy  

Office of Environmental Management (EM)

Better Security Through Discussion Better Security Through Discussion Better Security Through Discussion More Documents & Publications Indiana Department of Homeland Security -...

217

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

May 23, 2013 May 23, 2013 PSH-13-0018 - In the Matter of Personnel Security Hearing On May 23, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should not be granted. The Individual had a history of six arrests, five of which were alcohol-related and two of which were marijuana-related. In addition, A DOE Psychologist diagnosed the individual with Alcohol Dependence. The Hearing Officer found that the Individual had not mitigated any the security concerns raised by his alcohol abuse and history of criminal conduct at the hearing, because he was only in the early stages of his recovery from his alcohol d May 22, 2013 PSH-13-0022 - In the Matter of Personnel Security On May 22, 2013, an OHA Hearing Officer issued a decision in which he

218

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

219

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

220

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

97: Cisco Adaptive Security Appliances Denial of Service 97: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability is caused due to an unspecified error when handling IPv6 transit traffic and can be exploited to cause a reload of the affected device. reference LINKS: Vendor Advisory Secunia ID 49647 CVE-2012-3058 IMPACT ASSESSMENT: High Discussion: Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) and Cisco

222

Center for Environment and National Security at Scripps | Open Energy  

Open Energy Info (EERE)

National Security at Scripps National Security at Scripps Jump to: navigation, search Logo: Center for Environment and National Security at Scripps Name Center for Environment and National Security at Scripps Place San Diego, California Website http://sio.ucsd.edu/cens/ References CENS - About[1] LinkedIn Connections Contents 1 Overview 2 Headlines 3 Resources 3.1 CENS Programs 3.2 CENS Tools 4 References Overview Center for Environment and National Security at Scripps is an organization based in San Diego, California. "The Center uses the formidable science and research capacity of Scripps Institution of Oceanography to clarify significant environmental impacts on our national security and international human security, thus bringing information to policy makers for the resolution of society's most pressing

223

T-717: Microsoft Security Bulletin Summary for September 2011 | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Microsoft Security Bulletin Summary for September 2011 7: Microsoft Security Bulletin Summary for September 2011 T-717: Microsoft Security Bulletin Summary for September 2011 September 14, 2011 - 9:30am Addthis PROBLEM: Summary of Microsoft security bulletins released on September 13, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Summary for September 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: CVE-2011-1984 - MS11-070 WINS Local Elevation of Privilege Vulnerability CVE-2011-1991 - MS11-071 Windows Components Insecure Library Loading Vulnerability CVE-2011-1986 - MS11-072 Excel Use after Free WriteAV Vulnerability CVE-2011-1987 - MS11-072 Excel Out of Bounds Array Indexing Vulnerability

224

US National Nuclear Security Administration NNSA | Open Energy Information  

Open Energy Info (EERE)

Nuclear Security Administration NNSA Nuclear Security Administration NNSA Jump to: navigation, search Name US National Nuclear Security Administration (NNSA) Place Washington, DC Zip 20585 Product Washington D.C.-based nuclear body established by the United States Congress as a separately organized agency within the US Department of Energy. References US National Nuclear Security Administration (NNSA)[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. US National Nuclear Security Administration (NNSA) is a company located in Washington, DC . References ↑ "US National Nuclear Security Administration (NNSA)" Retrieved from "http://en.openei.org/w/index.php?title=US_National_Nuclear_Security_Administration_NNSA&oldid=352617

225

T-628: Debian APR Library Security Update | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update May 23, 2011 - 3:35pm Addthis PROBLEM: Debian APR Library Security Update. PLATFORM: APR packages: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0 ABSTRACT: A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. reference LINKS: Debian Security Advisory DSA-2237-2 Security Database Adviory Security Focus Advisory CVE-2011-1928 CVE-2011-0419 Secunia Advisory SA44574 IMPACT ASSESSMENT: Medium Discussion: A directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack.

226

T-533: Microsoft January 2011 Security Bulletin Release | Department of  

Broader source: Energy.gov (indexed) [DOE]

3: Microsoft January 2011 Security Bulletin Release 3: Microsoft January 2011 Security Bulletin Release T-533: Microsoft January 2011 Security Bulletin Release January 12, 2011 - 2:25pm Addthis PROBLEM: Microsoft January 2011 Security Bulletin Release PLATFORM: Various Windows OS Platforms, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2 ABSTRACT: Microsoft released 2 bulletins to address 3 vulnerabilities involving Microsoft Windows and components in Windows OS, and Windows Server Releases. Only 1 of these bulletins get our maximum severity rating of Critical. reference LINKS: Microsoft Security Bulletin Advance Notification for December 2010 TechNet Webcast: Information About Microsoft January 2011 Security Bulletins Discussion: Microsoft Security Bulletin MS11-001 - Important CVE-2010-3145 - This

227

MN Office of Energy Security | Open Energy Information  

Open Energy Info (EERE)

MN Office of Energy Security MN Office of Energy Security Jump to: navigation, search Name MN Office of Energy Security Place St. Paul, MN Website http://www.mnofficeofenergysec References MN Office of Energy Security[1] Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building Systems Integration LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! MN Office of Energy Security is a company located in St. Paul, MN. References ↑ "MN Office of Energy Security" Retrieved from "http://en.openei.org/w/index.php?title=MN_Office_of_Energy_Security&oldid=379158" Categories: Clean Energy Organizations Companies Organizations

228

NERSC Computer Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

229

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

230

Mathematical modeling and simulation in applications for safety and security in society,  

E-Print Network [OSTI]

of safety and security. · Object-oriented modeling for safety and security. · Modeling and simulation r e n c e T h e m e s Modeling and Simulation for Public Safety Linköping, Sweden L i n k ö p i n g· Mathematical modeling and simulation in applications for safety and security in society

Zhao, Yuxiao

231

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Broader source: Energy.gov (indexed) [DOE]

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

232

Security Enforcement Documents | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Enforcement Documents Security Enforcement Documents Security Enforcement Documents Documents Available for Download May 4, 2012 Enforcement Letter, CH2M Oak Ridge, LLC - SEL-2012-01 Issued to URS CH2M Oak Ridge, LLC, related to a Security Incident involving the Protection and Control of Classified Information at the East Tennessee Technology Park April 18, 2011 Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01 Issued to Battelle Energy Alliance, LLC related to Classified Information Introduced into Unapproved Information Systems at the Idaho National Laboratory March 24, 2011 Settlement Agreement, Sandia Corporation - SSA-2011-01 Settlement Agreement between DOE/NNSA and Sandia Corporation for Adverse Classified Information Security Trend at Sandia National Laboratories

233

Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

234

Security Notice | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

235

V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local  

Broader source: Energy.gov (indexed) [DOE]

4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. REFERENCE LINKS: Cisco Security Notice CVE-2013-1172 Cisco Security Notice CVE-2013-1173 SecurityTracker Alert ID: 1028425 CVE-2013-1172 CVE-2013-1173 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger a heap overflow in the Cisco Host Scan component to execute arbitrary code on the target system with System privileges

236

Frequently Used Forms and Links | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Safeguards & Security Safeguards & Security » Frequently Used Forms and Links Safety, Security and Infrastructure (SSI) SSI Home Facilities and Infrastructure Safeguards & Security Frequently Used Forms and Links Environment, Safety and Health (ES&H) Organization Chart .pdf file (82KB) Phone Listing .pdf file (129KB) SC HQ Continuity of Operations (COOP) Implementation Plan .pdf file (307KB) Categorical Exclusion Determinations SLI & SS Budget Contact Information Safety, Security and Infrastructure U.S. Department of Energy SC-31/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-4097 F: (301) 903-7047 Safeguards & Security Frequently Used Forms and Links Print Text Size: A A A RSS Feeds FeedbackShare Page Frequently Used Forms Badging DOE F 206.4 - Information Sheet for Sponsorship of HSPD-12 Credential

237

The pervasive trust foundation for security in next generation networks  

Science Journals Connector (OSTI)

We propose a new paradigm---named the Pervasive Trust Foundation (PTF) ---for computer security in Next Generation Networks, including the Future Internet. We start with a review of basic trust-related terms and concepts. We present motivation ... Keywords: future internet, iso 7498-2, next generation networks, pervasive trust foundation, privacy, security, security mechanisms, security services, trust, trust in the large, trust in the small

Leszek Lilien; Adawia Al-Alawneh; Lotfi Ben Othmane

2010-09-01T23:59:59.000Z

238

Essays on trades and security prices  

E-Print Network [OSTI]

This thesis consists of three chapters that investigate the complex relation between security prices and trades of market participants. In the first chapter, I study the evolution of stock prices after trades with different ...

Obizhaeva, Anna

2007-01-01T23:59:59.000Z

239

Plug-in Hybrid Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Plug-in Hybrid Links Plug-in Hybrid Links Exit Fueleconomy.gov The links below are to pages that are not part of the fueleconomy.gov Web site. We offer these external links for your convenience in accessing additional information that may be useful or interesting to you. Plug-in Hybrid Vehicles and Manufacturers Chevrolet Volt Official site for the Chevrolet Volt Cadillac ELR Official site for the Cadillac ELR (arriving early 2014) Ford C-MAX Energi Plug-in Hybrid Official site for the C-MAX Energi Plug-in Hybrid Ford Fusion Energi Plug-in Hybrid Official site for the Fusion Energi Plug-in Hybrid Honda Accord Plug-in Official site for the Honda Accord Plug-in Hybrid Toyota Prius Plug-in Official site for the Toyota Prius Plug-in Hybrid Plug-in-Related Information and Tools

240

Homeland Security Programs | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

242

Security Policy, Guidance & Reports  

Broader source: Energy.gov [DOE]

Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energys corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that Departmental personnel security programs (including the National Nuclear Security Administration [NNSA]) are consistent and effectively implemented.

243

Cyber Security Standards.PDF  

Broader source: Energy.gov (indexed) [DOE]

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

244

Related Links - HPMC Occupational Health Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Abuse (www.nida.nih.govNIDAHome1.html) Go to this site for: information about drug abuse and its affects. This site provides information for students & young adults, parents &...

245

RELATED LINKS Building the 2009 HGTV  

E-Print Network [OSTI]

to contribute to an energy efficient, cleaner and healthier living environment. "The Pinehills is the perfect wooded lots, walking and nature trails, a swimming pool, three championship-caliber golf courses community for our third annual HGTV Green Home because it allows us to showcase the latest cost efficient

246

Thermochemical Conversion Related Links | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

website's Information Resources section. Some key publications are: Using Heat and Chemistry to Make Fuel and Power: Thermochemical Conversion (January 2011) Thermochemical...

247

Insider threat to secure facilities: data analysis  

SciTech Connect (OSTI)

Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

Not Available

1980-05-09T23:59:59.000Z

248

Information Security Policy Policy Title Information Security Policy  

E-Print Network [OSTI]

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

249

Personal Security Assistance for Secure Internet Commerce  

E-Print Network [OSTI]

Jansson Swedish Institute of Computer Science Box 1263, S-164 28 Kista, Sweden ara@sics.se, sverker visiting your computer. Current agent security approaches are often based on trust in an ex- ternal assigned correct access-restrictions. We argue that a more rewarding security policy is to grant

Janson, Sverker

250

Cyber Security Evaluations - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

251

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

252

Office of Information Security  

Broader source: Energy.gov [DOE]

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

253

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

254

Office of Weapons Material Protection | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

that gradually transfers responsibility for maintaining the security systems to Russia. Related Topics material protection MPC&A SLD second line of defense weapons material...

255

Enforcement Letter, National Security Technologies, LLC- November 13, 2007  

Broader source: Energy.gov [DOE]

Issued to National Security Technologies, LLC related to an Unplanned Radiological Exposure during a Borehole Activity at the Nevada Test Site

256

Y-12 National Security Complex | Department of Energy  

Energy Savers [EERE]

weapons components, secure storage of special nuclear material (SNM), and various other nuclear weapons-related activities. Other activities include various aspects of testing...

257

Special Report Order, Los Alamos National Security, LLC - January...  

Office of Environmental Management (EM)

to Los Alamos National Security, LLC related to Glovebox Activities at TA-55 and Chemistry and Metallurgy Research Facilities at the Los Alamos National Laboratory On January...

258

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

259

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

260

PIPELINES AS COMMUNICATION NETWORK LINKS  

SciTech Connect (OSTI)

This report presents the results of an investigation into two methods of using the natural gas pipeline as a communication medium. The work addressed the need to develop secure system monitoring and control techniques between the field and control centers and to robotic devices in the pipeline. In the first method, the pipeline was treated as a microwave waveguide. In the second method, the pipe was treated as a leaky feeder or a multi-ground neutral and the signal was directly injected onto the metal pipe. These methods were tested on existing pipeline loops at UMR and Batelle. The results reported in this report indicate the feasibility of both methods. In addition, a few suitable communication link protocols for this network were analyzed.

Kelvin T. Erickson; Ann Miller; E. Keith Stanek; C.H. Wu; Shari Dunn-Norman

2005-03-14T23:59:59.000Z

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

262

T-724: Microsoft Security Advisory: Fraudulent digital certificates could  

Broader source: Energy.gov (indexed) [DOE]

724: Microsoft Security Advisory: Fraudulent digital certificates 724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing T-724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing September 22, 2011 - 12:45pm Addthis PROBLEM: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing. PLATFORM: Microsoft Untrusted Certificate Store: DigiNotar root certificates ABSTRACT: Microsoft has released a Microsoft security advisory about this issue for IT professionals. reference LINKS: MS Article ID: 2616676 Microsoft Security Advisory: 2607712 DOE-CIRC Tech Bulletin: T-706 IMPACT ASSESSMENT: Medium Discussion: The Microsoft update revokes the trust of the following DigiNotar root certificates by putting them in the Microsoft Untrusted Certificate Store:

263

T-665: Microsoft Security Bulletin Advance Notification for July 2011 |  

Broader source: Energy.gov (indexed) [DOE]

5: Microsoft Security Bulletin Advance Notification for July 5: Microsoft Security Bulletin Advance Notification for July 2011 T-665: Microsoft Security Bulletin Advance Notification for July 2011 July 11, 2011 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2011 PLATFORM: Windows Operating System and Components ABSTRACT: Microsoft released 4 bulletins to address vulnerability involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: TechNet Webcast Microsoft Security Bulletin Summaries and Webcasts Microsoft Security Bulletin Advance Notification for July 2011

264

T-584: Microsoft March 2011 Security Bulletin Release | Department of  

Broader source: Energy.gov (indexed) [DOE]

84: Microsoft March 2011 Security Bulletin Release 84: Microsoft March 2011 Security Bulletin Release T-584: Microsoft March 2011 Security Bulletin Release March 21, 2011 - 4:25pm Addthis PROBLEM: Microsoft March 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms.(Affected Software and Download Locations) ABSTRACT: Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: Microsoft Security Bulletin Summary for March 2011 Microsoft Technical Security Notifications

265

Average Interest Rate for Treasury Securities | Data.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Average Interest Rate for Treasury Securities Average Interest Rate for Treasury Securities Consumer Data Apps Challenges Resources About Blogs Let's Talk Feedback Consumer You are here Data.gov » Communities » Consumer » Data Average Interest Rate for Treasury Securities Dataset Summary Description This dataset shows the average interest rates for U.S Treasury securities for the most recent month compared with the same month of the previous year. The data is broken down by the various marketable and non-marketable securities. The summary page for the data provides links for monthly reports from 2001 through the current year. Average Interest Rates are calculated on the total unmatured interest-bearing debt. The average interest rates for total marketable, total non-marketable and total interest-bearing debt do not include the U.S. Treasury Inflation-Protected Securities.

266

T-553: Microsoft February 2011 Security Bulletin Release | Department of  

Broader source: Energy.gov (indexed) [DOE]

53: Microsoft February 2011 Security Bulletin Release 53: Microsoft February 2011 Security Bulletin Release T-553: Microsoft February 2011 Security Bulletin Release February 9, 2011 - 7:28am Addthis PROBLEM: Microsoft February 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms. (Affected Software and Download Locations) ABSTRACT: Microsoft released 21 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 3 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference links: Microsoft Security Bulletin Summary for February 2011 Microsoft Technical Security Notifications

267

Information Security Guide  

E-Print Network [OSTI]

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

268

Securing linked transportation systems: economic implications and investment strategies  

E-Print Network [OSTI]

implications and investment strategies Adib Kanafani andeconomic implications and investment strategies Journal ofimplications and investment strategies Adib Kanafani &

Kanafani, Adib; Huang, Jiangchuan

2010-01-01T23:59:59.000Z

269

Nonproliferation and National Security Multimedia - Argonne National  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nonproliferation and National Security Nonproliferation and National Security > Multimedia Multimedia Nuclear Systems Analysis Engineering Analysis Nonproliferation and National Security Detection & Diagnostic Systems Engineering Development & Applications Argonne's Nuclear Science & Technology Legacy Other Multimedia Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Bookmark and Share Nonproliferation and National Security: Multimedia Related Resources Nonproliferation and National Security Vulnerability Assessment Team (VAT) Click on the "Date" header to sort the videos/podcasts in chronological order (ascending or descending). You may also search for a specific keyword; click on the reset button refresh to remove the keyword filter and show again all the Videos/Podcasts.

270

Nuclear Security & Nonproliferation | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Safety » Nuclear Security & Safety » Nuclear Security & Nonproliferation Nuclear Security & Nonproliferation Highly trained nuclear emergency response personnel and more than 17,000 pounds of equipment were sent to Japan as part of the Department of Energy and National Nuclear Security Administration’s effort to assist Japanese personnel with nuclear issues related to the Fukushima nuclear power plant. Above, scientists, technicians and engineers from the National Nuclear Security Administration’s Nevada Site Office board an Air Force C-17. | Photo courtesy of NNSA. Highly trained nuclear emergency response personnel and more than 17,000 pounds of equipment were sent to Japan as part of the Department of Energy

271

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

272

Lemnos Interoperable Security Program  

Broader source: Energy.gov (indexed) [DOE]

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

273

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

274

Information security knowledge sharing inorganizations: Investigating the effect ofbehavioral information security governance andnational culture  

Science Journals Connector (OSTI)

Abstract This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries namely, USA and Sweden allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledge sharing differs based on national culture. The study followed a mixed methods research design, wherein qualitative data was collected to both establish the study's research model and develop a survey instrument that was distributed to 578 information security executives. The results suggest that processes to coordinate implemented security knowledge sharing mechanisms have a major direct influence on the establishment of security knowledge sharing in organizations; the effect of organizational structure (e.g., centralized security function to develop and deploy uniform firm-wide policies, and use of steering committees to facilitate information security planning) is slightly weaker, while business-based information security management has no significant direct effect on security knowledge sharing. A mediation analysis revealed that the reason for the nonsignificant direct relation between business-based information security management and security knowledge sharing is the fully mediating effect of coordinating information security processes. Thus, the results disentangles the interrelated influences of behavioral information security governance factors on security knowledge sharing by showing that information security governance sets the platform to establish security knowledge sharing, and coordinating processes realize the effect of both the structure of the information security function and the alignment of information security management with business needs. A multigroup analysis identified that national culture had a significant moderating effect on the association between four of the six proposed relations. In Sweden which is seen as a less individualist, feminine country managers tend to focus their efforts on implementing controls that are aligned with business activities and employees' need; monitoring the effectiveness of the implemented controls, and assuring that the controls are not too obtrusive to the end-user. On the contrary, US organizations establish security knowledge sharing in their organization through formal arrangements and structures. These results imply that Swedish managers perceive it to be important to involve, or at least know how their employees cope with the decisions that have been made, thus favoring local participation in information security management, while US managers may feel the need to have more central control when running their information security function. The findings suggest that national culture should be taken into consideration in future studies in particular when investigating organizations operating in a global environment and understand how it affects behaviors and decision-making.

Waldo Rocha Flores; Egil Antonsen; Mathias Ekstedt

2014-01-01T23:59:59.000Z

275

Y-12 National Security Complex | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Y-12 National Security Complex Y-12 National Security Complex Y-12 National Security Complex Y-12 National Security Complex Aerial View Y-12 National Security Complex Aerial View Y-12 National Security Complex's primary mission is to support of the DOE nuclear weapons stockpile maintenance program. Activities include assembly and disassembly of nuclear weapons components, secure storage of special nuclear material (SNM), and various other nuclear weapons-related activities. Other activities include various aspects of testing and development, nonproliferation, and technology transfer. Enforcement June 13, 2008 Preliminary Notice of Violation, Babcock & Wilcox Teclmical Services Y -12, LLC - NEA-2008-01 Preliminary Notice of Violation issued to Babcock & Wilcox Technical Services Y-12, LLC, related to a Uranium Chip Fire at the Y-12 National

276

Preliminary Notice of Violation, National Security Technologies, LLC -  

Broader source: Energy.gov (indexed) [DOE]

National Security Technologies, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11, 2011 Preliminary Notice of Violation issued to National Security Technologies, LLC related to Deficiencies in Inspection and Installation of Penetration Fire Seals and Other Components at the Nevada National Security Site The Office of Health, Safety and Security's Office of Enforcement and Oversight has completed its investigation into the facts and circumstances associated with quality assurance (QA) related deficiencies in the inspection and installation of penetration fire seals and other components at the Criticality Experiments Facility (CEF) and the Device Assembly Facility (OAF) at the Nevada National Security Site. The results of

277

Link Building Martin Olsen  

E-Print Network [OSTI]

Link Building Martin Olsen PhD Dissertation Department of Computer Science Aarhus University Denmark #12;#12;Link Building A Dissertation Presented to the Faculty of Science of Aarhus University The Computational Complexity of Link Building Proc. Computing and Combinatorics, 14th Annual International

278

Public Affairs | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

The National Nuclear Security Administration The National Nuclear Security Administration Public Affairs Home > Field Offices > Welcome to the Sandia Field Office > Public Affairs Public Affairs The SFO Public Affairs Director is responsible for all public affairs matters connected with the functions of SFO. In this capacity the Public Affairs Director is responsible for the development and management of the SFO public affairs programs including media relations, community relations, tribal relations, public participation, government/congressional relations, protocol, emergency public information, and internal employee communications and contractor oversight of these same programs. For public affairs assistance, please call (505) 845-5264. Printer-friendly version Printer-friendly version

279

Enforcement of DOE Classified Information Security Requirements Under Title  

Broader source: Energy.gov (indexed) [DOE]

of DOE Classified Information Security Requirements of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 Enforcement of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 In publishing 10 CFR Part 824, DOE has determined that civil penalties under Part 824 will only be assessed for violations of requirements for the protection of classified information (Restricted Data, Formerly Restricted Data and National Security Information). The rule does not include civil penalties relating to failure to protect sensitive but unclassified information. IMPLEMENTATION GUIDANCE More Documents & Publications Safety and Security Enforcement Process Overview Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01

280

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Available Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies | Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614 Robust Low-Frequency Spread-Spectrum Navigation System (Related ID # 200601627) 200501640 Secure Identification of Textiles and Other Consumer Products 200701980 Cyberspace Security Econometrics System 200701995 An Intrusion Detection System Using Quantum-mechanical

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Safeguards and Security and Cyber Security RM  

Broader source: Energy.gov (indexed) [DOE]

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

282

Secure Smart Grid Association | Open Energy Information  

Open Energy Info (EERE)

Secure Smart Grid Association Secure Smart Grid Association Jump to: navigation, search Name Secure Smart Grid Association Address 2374 S Josephine St Place Denver, Colorado Zip 80210 Region Rockies Area Number of employees 1-10 Year founded 2009 Phone number 303-997-2824 Coordinates 39.673446°, -104.9575629° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.673446,"lon":-104.9575629,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

283

Grant Application Process | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Grant Application Process | National Nuclear Security Administration Grant Application Process | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Grant Application Process Home > Grant Application Process Grant Application Process Please visit www.grants.gov off site link to find out more about the grant application process. At www.grants.gov off site link you can find

284

Preliminary Notice of Violation, Los Alamos National Security, LLC -  

Broader source: Energy.gov (indexed) [DOE]

Security, LLC Security, LLC - WEA-2012-03 Preliminary Notice of Violation, Los Alamos National Security, LLC - WEA-2012-03 October 17, 2012 Issued to Los Alamos National Security, LLC, related to Four Electrical Safety-Related Events that occurred at the Los Alamos National Laboratory (LANL) This letter refers to the Office of Health, Safety and Security's Office of Enforcement and Oversight investigation into the facts and circumstances surrounding four electrical safety-related events that occurred at the Los Alamos National Laboratory (LANL) from October 2010 through January 2011. Preliminary Notice of Violation, Los Alamos National Security, LLC - WEA-2012-03 More Documents & Publications Sandia Sled Track PNOV Press Release Enforcement Letter, Computer Services, LLC - WEL-2012-03

285

Enforcement Documents - Y-12 National Security Complex | Department of  

Broader source: Energy.gov (indexed) [DOE]

Y-12 National Security Complex Y-12 National Security Complex Enforcement Documents - Y-12 National Security Complex June 13, 2008 Preliminary Notice of Violation, Babcock & Wilcox Teclmical Services Y-12, LLC - NEA-2008-01 Preliminary Notice of Violation issued to Babcock & Wilcox Technical Services Y-12, LLC, related to a Uranium Chip Fire at the Y-12 National Security Complex September 18, 2007 Preliminary Notice of Violation, BWXT Y-12 LLC - EA-2007-04 Preliminary Notice of Violation issued to BWXT Y-12, LLC, related to Criticality Safety Controls at the Y-12 National Security Complex June 15, 2006 Enforcement Letter, BWXT Y-12 - June 15, 2006 Enforcement Letter issued to BWXT Y-12 related to Quality Assurance Deficiencies in construction activities at the Y-12 National Security

286

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

287

National Nuclear Security Administration | Department of Energy  

Office of Environmental Management (EM)

National Nuclear Security Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction...

288

Waste Isolation Pilot Plant Transportation Security | Department...  

Office of Environmental Management (EM)

Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security More Documents &...

289

SECURITY TERMINATION STATEMENT | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

290

SECURITY OF CELL PHONES AND PDAS Shirley Radack, Editor  

E-Print Network [OSTI]

SECURITY OF CELL PHONES AND PDAS Shirley Radack, Editor Computer Security Division Information today, and very dependent on cell phones and personal digital assistants (PDAs) to carry out work-related functions while on the move. Cell phones and PDAs are small, relatively inexpensive, and convenient tools

291

Office of Security Operations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

292

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

293

Security and Privacy Notice  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

294

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

295

Operational Security (OPSEC) Reminder | Department of Energy  

Office of Environmental Management (EM)

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

296

US, UK, Kazakhstan Secure Radiological Transportation Vehicles...  

National Nuclear Security Administration (NNSA)

place them in secure storage, and improve radiological transportation security and site security. The United Kingdom-funded projects provide an immediate security and safety...

297

College of Safety & Security | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Safety & Security College of Safety & Security College of Safety & Security Mission Through the National Training Center (NTC), the Office of Health, Safety and Security (HSS)...

298

Office of Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Office of Security Mission The Office of Security maintains the Department of Energy's security integrity through the development and promulgation of safeguards and...

299

Safeguards and Security Program - DOE Directives, Delegations...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

70.1A, Safeguards and Security Program by jcowden Functional areas: Safeguards, Security, and Emergency Management, Safety and Security The Safeguards and Security Program ensures...

300

Office of Security Enforcement | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Enforcement Office of Security Enforcement MISSION The Office of Security Enforcement implements the Department's classified information security enforcement program in...

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

302

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

303

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of...

304

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

305

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

306

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

307

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

308

Enforcement Letter, Lawrence Livermore National Security LLC, - May 15,  

Broader source: Energy.gov (indexed) [DOE]

Security LLC, - May Security LLC, - May 15, 2008 Enforcement Letter, Lawrence Livermore National Security LLC, - May 15, 2008 May 15, 2008 Enforcement Letter issued to Lawrence Livermore National Security, LLC related to the Protection of Classified Information at the Lawrence Livermore National Laboratory In our recent dialogue via televideo with your Deputy, safeguards and security director, and other key managers of your staff, we discussed our reasons for sending this enforcement letter to Lawrence Livermore National Security, LLC; the purpose of this letter; and our concerns about the protection of classified information at the Lawrence Livermore National Laboratory (LLNL). Accordingly, this is not a formal enforcement action and imposes no requirements. Enforcement Letter, Lawrence Livermore National Security LLC- May 15, 2008

309

Nuclear Data Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links to Useful Online Nuclear Physics Journals Important Online Resources Science Direct American Institute of Physics Journals APS Journals Online: Physical Review A, B, C, D, E,...

310

Southeast Idaho Area Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Area Attractions and Events Area Geography Area History Area Links Driving Directions Idaho Falls Attractions and Events INL History INL Today Research Park Sagebrush Steppe...

311

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

312

Renewable-Based Energy Secure Communities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Renewable-Based Energy Secure Communities Renewable-Based Energy Secure Communities Renewable-Based Energy Secure Communities U.S. Department of Energy (DOE) Community Renewable Energy Deployment (CommRE) projects receive financial assistance and support from numerous federal and state agencies and partnering organizations. The University of California at Davis CommRE project is not only being funded by DOE, but also by the California Energy Commission's (CEC) Renewable-Based Energy Secure Communities (RESCO) program. Below are summaries of select RESCO projects and links to additional information. About Renewable-Based Energy Secure Communities RESCO projects are funded by the CEC's Public Interest Energy Research (PIER) Program, which supports public interest energy research, development, and demonstration. The goal of RESCO is to develop and

313

V-008: Debian Security Advisory | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8: Debian Security Advisory 8: Debian Security Advisory V-008: Debian Security Advisory October 23, 2012 - 6:00am Addthis PROBLEM: Debian Security Advisory PLATFORM: Debian GNU/Linux 6.0 ABSTRACT: Debian update for bind9 REFERENCE LINKS: Debian Security Advisory DSA-2560-1 Debian bugtracking system: Bug 690118 ISC Reference Number: AA-00801 Secunia Advisory SA51054 CVE-2012-5166 IMPACT ASSESSMENT: Medium DISCUSSION: was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply, when certain combinations of resource records are present. This vulnerability affects both recursive and authoritative servers. For the stable distribution (squeeze), this problem has been fixed in version 1:9.7.3.dfsg-1~squeeze8. IMPACT: Debian has issued an update for bind9. This fixes a vulnerability, which

314

Homeland Security | U.S. DOE Office of Science (SC)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Homeland Security Homeland Security High Energy Physics (HEP) HEP Home About Research Facilities Science Highlights Benefits of HEP Medicine Homeland Security Industry Computing Sciences Workforce Development A Growing List Accelerators for Americas Future External link Funding Opportunities Advisory Committees News & Resources Contact Information High Energy Physics U.S. Department of Energy SC-25/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-3624 F: (301) 903-2597 E: sc.hep@science.doe.gov More Information » Benefits of HEP Homeland Security Print Text Size: A A A RSS Feeds FeedbackShare Page Homeland security: monitoring nuclear nonproliferation In nuclear reactors, the amount of plutonium builds up as the uranium fuel is used, and the number and characteristics of antineutrinos emitted by

315

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

6: Citrix Access Gateway Unspecified Security Bypass 6: Citrix Access Gateway Unspecified Security Bypass Vulnerability V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway PLATFORM: Standard Edition 5.0.x prior to 5.0.4.223524. Versions 4.5.x and 4.6.x are not affected by this vulnerability ABSTRACT: A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA52479 Security Tracker Alert ID 1028255 com/id/1028255 CVE-2013-2263 Citrix Knowledge Center IMPACT ASSESSMENT: High DISCUSSION: The vulnerability could allow an unauthenticated user to gain access to network resources. IMPACT:

316

V-008: Debian Security Advisory | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

08: Debian Security Advisory 08: Debian Security Advisory V-008: Debian Security Advisory October 23, 2012 - 6:00am Addthis PROBLEM: Debian Security Advisory PLATFORM: Debian GNU/Linux 6.0 ABSTRACT: Debian update for bind9 REFERENCE LINKS: Debian Security Advisory DSA-2560-1 Debian bugtracking system: Bug 690118 ISC Reference Number: AA-00801 Secunia Advisory SA51054 CVE-2012-5166 IMPACT ASSESSMENT: Medium DISCUSSION: was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply, when certain combinations of resource records are present. This vulnerability affects both recursive and authoritative servers. For the stable distribution (squeeze), this problem has been fixed in version 1:9.7.3.dfsg-1~squeeze8. IMPACT: Debian has issued an update for bind9. This fixes a vulnerability, which

317

An inter-realm, cyber-security infrastructure for virtual supercomputing  

SciTech Connect (OSTI)

Virtual supercomputing, (ise ., high-performance grid computing), is poised to revolutionize the way we think about and use computing. However, the security of the links interconnecting the nodes within such an environment will be its Achilles heel, particularly when secure communication is required to tunnel through heterogeneous domains. In this paper we examine existing security mechanisms, show their inadequacy, and design a comprehensive cybersecurity infrastructure that meets the security requirements of virtual supercomputing. Keywords Security, virtual supercomputing, grid computing, high-performance computing, GSS-API, SSL, IPsec, component-based software, dynamic reconfiguration.

Al-Muhtadi, J. (Jalal); Feng, W. C. (Wu-Chun); Fisk, M. E. (Mike E. )

2001-01-01T23:59:59.000Z

318

V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus  

Broader source: Energy.gov (indexed) [DOE]

21: Cisco IronPort Web / Email Security Appliance Sophos 21: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities November 12, 2012 - 6:00am Addthis PROBLEM: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities PLATFORM: Cisco IronPort Email Security Appliances (C-Series and X-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. Cisco IronPort Web Security Appliances (S-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. ABSTRACT: Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. REFERENCE LINKS: Cisco Security Advisory ID: cisco-sa-20121108-sophos Secunia Advisory SA51197 IMPACT ASSESSMENT: High DISCUSSION: Cisco has acknowledged some vulnerabilities in Cisco IronPort Web Security

319

V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus  

Broader source: Energy.gov (indexed) [DOE]

1: Cisco IronPort Web / Email Security Appliance Sophos 1: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities November 12, 2012 - 6:00am Addthis PROBLEM: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities PLATFORM: Cisco IronPort Email Security Appliances (C-Series and X-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. Cisco IronPort Web Security Appliances (S-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. ABSTRACT: Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. REFERENCE LINKS: Cisco Security Advisory ID: cisco-sa-20121108-sophos Secunia Advisory SA51197 IMPACT ASSESSMENT: High DISCUSSION: Cisco has acknowledged some vulnerabilities in Cisco IronPort Web Security

320

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Broader source: Energy.gov (indexed) [DOE]

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control  

Broader source: Energy.gov (indexed) [DOE]

26: Cisco Adaptive Security Appliances Port Forwarder ActiveX 26: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability March 16, 2012 - 7:00am Addthis PROBLEM: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability PLATFORM: Cisco Adaptive Security Appliance (ASA) 7.x, Cisco Adaptive Security Appliance (ASA) 8.x, Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Secunia Advisory SA48422 SecurityTracker Alert ID: 1026799 CVE-2012-0358 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the

322

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

323

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

324

Improving link failover efficiency in MANETs using modular prediction  

Science Journals Connector (OSTI)

In this paper, we present a flexible, modular architecture to combine various link state related measurements and prediction algorithms in order to accurately predict link failure in MANETs, while keeping bandwidth and energy overhead low. Our architecture ...

E. Van Den Berg; A. Cisneros; I. Hokelek; K. Parmeswaran; S. Samtani; J. Sucec; J. L. Simbol; A. Staikos; G. B. Rucker

2010-04-01T23:59:59.000Z

325

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

326

Technologies licensed | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Technologies licensed Technologies licensed Technologies licensed Posted: July 16, 2012 - 3:49pm | Y-12 Report | Volume 9, Issue 1 | 2012 Rendering of Y-12's Access Rate Control System Wherever threatening situations arise, in-place security measures make the most of every second. On Feb. 8, a startup firm in Knoxville, Tenn., licensed two security-related technologies from the Y-12 National Security Complex that do just that. The technologies, which delay entrance to controlled-access areas, provide a security solution for various potential markets: commercial nuclear facilities, pharmaceutical manufacturers, correctional facilities and large sporting venues, as well as for other Department of Energy sites. Sustainable Environment Technologies, LLC (SET), licensed the Access Rate

327

Arms control and European security  

SciTech Connect (OSTI)

In October 1987 on the eve of the Washington summit, the Committee on Atlantic Studies, a group of European and North American scholars established in 1964 to promote transatlantic dialogue, met in Toronto to discuss the implications of the new arms control for European security. This book is the fruit of that meeting. Incorporating subsequent developments, up to Grobachev's December 1988 speech to the U.N., it provides a timely assessment of arms control issues from a variety of European and North American perspectives. The contributors to this volume council caution, suggesting that while progress is possible, it will probably be slow. This volume stresses the interplay of strategic and regional arms control. It includes analyses of nuclear, conventional, and naval arms control questions and embodies a broader a broader conception of arms control. The book links arms control to such political measures as confidence-building, conflict avoidance and superpower agreement to the neutrality of particular states.

Auton, G.P.

1989-01-01T23:59:59.000Z

328

Security Assistance | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

329

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

330

Diversity Links; Diversity Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Source Disclaimer: Links and/or hyperlinks on this page may contain information gathered from public sources outside Brookhaven National Laboratory. This information is for reference purposes only and, as such, there is no endorsement of products or services therein, nor is BNL responsible for any content inaccuracies. By clicking any of the aforementioned links and/or hyperlinks, you acknowledge your understanding and agreement with this statement. Source Disclaimer: Links and/or hyperlinks on this page may contain information gathered from public sources outside Brookhaven National Laboratory. This information is for reference purposes only and, as such, there is no endorsement of products or services therein, nor is BNL responsible for any content inaccuracies. By clicking any of the aforementioned links and/or hyperlinks, you acknowledge your understanding and agreement with this statement. Diversity Links BNL & DOE Diversity Links Minority Recruitment Links BNL & DOE Diversity Links Brookhaven National Laboratory (BNL) Brookhaven Advocacy Council (BAC) Brookhaven Employees Recreation Association (BERA) | BERA Clubs U.S. DOE Office of Civil Rights and Diversity U.S. DOE Office of Civil Rights and Diversity - Homepage

331

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

332

Secure video communications system  

DOE Patents [OSTI]

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

333

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

334

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

335

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

336

Microsoft Word - Additional links  

Office of Legacy Management (LM)

Links: Links: Link to annual groundwater reports on LM website: http://www.lm.doe.gov/Monticello/Documents.aspx#gwreports Links to peer-reviewed papers referenced in the Program Status and Analytical Update (Note: Due to copyright restrictions, links to these papers, rather than reproductions, are provided): a. Harding, Lee E. "Non-linear uptake and hormesis effects of selenium in red- winged blackbirds (Agelaius phoeniceus)". Science of the Total Environment 389 (2008) 350-366. Available through sciencedirect at: http://www.sciencedirect.com/science/article/pii/S0048969707010029 b. King, Kirke A. and Thomas W. Custer. "Reproductive Success of Barn Swallows Nesting Near a Selenium-Contaminated Lake in East Texas, USA". Environmental Pollution 84 (1994) 53-58. Available through sciencedirect at:

337

PRIVACY/SECURITY NOTICE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

338

Securing Control Systems Modems  

Broader source: Energy.gov (indexed) [DOE]

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

339

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

340

Basis for an integrated security ontology according to a systematic review of existing proposals  

Science Journals Connector (OSTI)

The use of ontologies to represent knowledge provides us with organization, communication and reusability. The concepts and relations managed by any scientific community need to be formally defined. Since security in information technologies has evolved ... Keywords: Ontologies, Security, Systematic review

Carlos Blanco; Joaqun Lasheras; Eduardo Fernndez-Medina; Rafael Valencia-Garca; Ambrosio Toval

2011-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

U-009:Microsoft Security Bulletin Summary for October 2011 | Department of  

Broader source: Energy.gov (indexed) [DOE]

09:Microsoft Security Bulletin Summary for October 2011 09:Microsoft Security Bulletin Summary for October 2011 U-009:Microsoft Security Bulletin Summary for October 2011 October 12, 2011 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Summary for October 2011 PLATFORM: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2. ABSTRACT: Microsoft released 8 bulletins to address vulnerabilities. This Microsoft bulletin contains 2 critical vulnerabilities. reference LINKS: Microsoft Security Bulletin Summary for October 2011 Security Bulletin Summary October Archive IMPACT ASSESSMENT: High Discussion: For more details regarding the Microsoft October 2011 bulletins, please see follow link for CVE details. You can find more information located under the "Affected Software and Download Locations" section using the following

342

Detecting and Mitigating Security Risks  

E-Print Network [OSTI]

______________________________________________________________________________________________________ 2 Introduction IT security threats are multiplying quickly. One reason is that sophisticated hacking. Second, while hacking once largely constituted an intellectual exercise for security enthusiasts, hacking

Fisher, Kathleen

343

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

344

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

345

January 2007 SECURITY CONTROLS FOR  

E-Print Network [OSTI]

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

346

Headquarters Facilities Master Security Plan  

Office of Environmental Management (EM)

Chapter 10-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: Title 32, CFR, Part 2001,...

347

Security and Privacy Notices | NREL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notices Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory...

348

Security Suites | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

349

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SNL SECURITY CONTACTS SNLNM Contacts SNLCA Contacts Function Contact Email Telephone Badge Office 505-284-3626 - Escorting security@sandia.gov 505-845-1321 Classification...

350

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

351

Simulated Interdiction: Proliferation Security Initiative  

E-Print Network [OSTI]

close relations with Bearia, reflecting Bearias geopolitical weight and the deep economic and cultural links between the two countries. The long Bearia - Brazoristan border is porous to illegal trafficking of all kinds. Bearia regularly exerts strong... trafficking of weapons of mass destruction (WMD), their delivery systems, and related materials to and from states and non-state actors of proliferation concern. The PSI is a tool in the fight against WMD proliferation. Since the launch of the PSI, over...

2009-01-01T23:59:59.000Z

352

Worker Safety and Health Enforcement Letter issued to Los Alamos National Security, LLC, related to Worker Beryllium Exposure during Machining at the Los Alamos National Laboratorys Beryllium Technology Facility, May 29, 2013 (WEL-2013-01)  

Broader source: Energy.gov (indexed) [DOE]

29, 2013 29, 2013 Dr. Charles F. McMillan, President Los Alamos National Security, LLC Los Alamos National Laboratory Mailstop A 100, Drop Point 03140071S Bikini Atoll Road, TA-3 Los Alamos, New Mexico 87454 WEL-2013-01 Dear Dr. McMillan: The Office of Health, Safety and Security's Office of Enforcement and Oversight evaluated the circumstances surrounding a work evolution performed at Los Alamos National Laboratory (LANL) Technical Area 3, Building 141, Beryllium Technology Facility (BTF), on July 11, 2012. The work evolution resulted in a worker exposure to beryllium in excess of the Department of Energy (DOE) action level of 0.2 micrograms per cubic meter for an 8-hour, time-weighted average. Los Alamos National Security, LLC (LANS), which manages and

353

Global food security, biodiversity conservation and the future of agricultural intensification  

E-Print Network [OSTI]

Global food security, biodiversity conservation and the future of agricultural intensification Teja increase, achieving efficient and productive agri- cultural land use while conserving biodiversity. In conclusion, linking agricultural intensifi- cation with biodiversity conservation and hunger reduction

354

Lighting Group: Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links Links Links Organizations Illuminating Engineering Society of North America (IESNA) International Commission on Illumination (CIE) International Association of Lighting Designers (IALD) International Association of Energy-Efficient Lighting Lightfair International Energy Agency - Task 21: Daylight in Buildings: Design Tools and Performance Analysis International Energy Agency - Task 31: Daylighting Buildings in 21st Century National Association on Qualifications for the Lighting Professions (NCQLP) National Association of Independent Lighting Distributors (NAILD) International Association of Lighting Management Companies (NALMCO) Research Centers California Lighting Technology Center Lighting Research Center Lighting Research at Canada Institute for Research in Construction

355

Cryptography and Data Security  

E-Print Network [OSTI]

The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and subsequently whmh data sets an active user may read or wrote. Flow controls regulate the dissemination of values among the data sets accessible to a user. Inference controls protect statistical databases by preventing questioners from deducing confidential information by posing carefully designed sequences of statistical queries and correlating the responses. Statlstmal data banks are much less secure than most people beheve. Data encryption attempts to prevent unauthorized disclosure of confidential information in transit or m storage. This paper describes the general nature of controls of each type, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses. The paper is intended for a general audience with little background in the area.

Dorothy E. Denning; Peter; J. Denning

1982-01-01T23:59:59.000Z

356

Privacy/Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

357

Hybrid Vehicle Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Hybrid Links Hybrid Links Exit Fueleconomy.gov The links below are to pages that are not part of the fueleconomy.gov Web site. We offer these external links for your convenience in accessing additional information that may be useful or interesting to you. Hybrid Vehicles and Manufacturers Acura ILX Hybrid Audi Q5 Hybrid BMW ActiveHybrid 3 ActiveHybrid 5 ActiveHybrid 7 Buick LaCrosse eAssist* Regal eAssist* Chevrolet Malibu Eco* Impala eAssist* Ford Fusion Hybrid Honda Accord Hybrid Civic Hybrid Honda CR-Z Honda Insight Hyundai Sonata Hybrid Infiniti M Hybrid Q50 Hybrid Q50 S Hybrid QX60 Hybrid Kia Optima Hybrid Lexus CT 200h Lexus ES 300h GS 450h LS 600h L RX 450h Lincoln MKZ Hybrid Mercedes-Benz Mercedes E400 Hybrid Nissan Pathfinder Hybrid Porsche Cayenne S Hybrid Subaru XV Crosstrek Hybrid Toyota Avalon Hybrid

358

Location linked information  

E-Print Network [OSTI]

This work builds an infrastructure called Location Linked Information that offers a means to associate digital information with public, physical places. This connection creates a hybrid virtual/physical space, called glean ...

Mankins, Matthew William David, 1975-

2003-01-01T23:59:59.000Z

359

Links - 88-Inch Cyclotron  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lab Cafeteria Jobs at Berkeley Lab Today at Berkeley Lab Health and Safety Manual (PUB-3000) Science Links: Web Elements (Periodic Table) Science Daily News Sci Tech Daily News...

360

National Security Information Systems (NSIS) -National Security Systems &  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

362

2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

363

Information Security: Coordination of Federal Cyber Security Research and  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

364

Office of Headquarters Security Operations | Department of Energy  

Office of Environmental Management (EM)

Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting...

365

Defining and Computing a Valued Based Cyber-Security Measure  

SciTech Connect (OSTI)

In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

Aissa, Anis Ben [University of Tunis, Belvedere, Tunisia; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Mili, Ali [New Jersey Insitute of Technology

2012-01-01T23:59:59.000Z

366

Towards Fully Automatic Placement of Security Sanitizers and Declassifiers  

E-Print Network [OSTI]

in this space has focused on finding missing sanitizers and was performed on relatively small ap- plicationsTowards Fully Automatic Placement of Security Sanitizers and Declassifiers Benjamin Livshits Fully Automatic Placement of Security Sanitizers and Declassifiers Benjamin Livshits Microsoft Research

Livshits, Ben

367

Headquarters Security Quick Reference Book  

Broader source: Energy.gov [DOE]

This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

368

November 2003 NETWORK SECURITY TESTING  

E-Print Network [OSTI]

November 2003 NETWORK SECURITY TESTING Shirley M. Radack, Editor, Computer Security Division be tempted to neglect or insufficiently develop a comprehensive and systematic opera tional security testing program. This guide stresses the need for an effective security testing program within federal agencies

369

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

370

National Security, Weapons Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

371

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, cancels DOE O 470.4B.

2011-07-21T23:59:59.000Z

372

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

373

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

374

Energy Security Through Hydrogen  

Science Journals Connector (OSTI)

Energy and environmental security are major problems facing our global economy. Fossil fuels, particularly crude oil, are ... energy sources. In the long term, a hydrogen-based economy will have an impact on all ...

Professor John W. Sheffield

2007-01-01T23:59:59.000Z

375

GRID Security Review  

Science Journals Connector (OSTI)

A Computational GRID is a collection of heterogeneous computing resources ... computational power of current micro-processors, Computational GRIDs or meta-systems have gradually become more ... a secure environme...

Lazaros Gymnopoulos; Stelios Dritsas; Stefanos Gritzalis

2003-01-01T23:59:59.000Z

376

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

377

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

378

defense nuclear security  

National Nuclear Security Administration (NNSA)

3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

Page...

379

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

380

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

382

U-234: Oracle MySQL User Login Security Bypass Vulnerability | Department  

Broader source: Energy.gov (indexed) [DOE]

234: Oracle MySQL User Login Security Bypass Vulnerability 234: Oracle MySQL User Login Security Bypass Vulnerability U-234: Oracle MySQL User Login Security Bypass Vulnerability August 14, 2012 - 7:00am Addthis PROBLEM: Oracle MySQL User Login Security Bypass Vulnerability PLATFORM: Version(s): prior to 5.1.63 and 5.5.25 are vulnerable. ABSTRACT: Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions. REFERENCE LINKS: http://www.securityfocus.com/bid/53911/discuss CVE-2012-2122 IMPACT ASSESSMENT: Medium Discussion: Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.The vulnerability is identified as CVE-2012-2122 and was addressed in MySQL 5.1.63 and 5.5.25 in

383

U-145: Microsoft Security Bulletin Summary for April 2012 | Department of  

Broader source: Energy.gov (indexed) [DOE]

5: Microsoft Security Bulletin Summary for April 2012 5: Microsoft Security Bulletin Summary for April 2012 U-145: Microsoft Security Bulletin Summary for April 2012 April 11, 2012 - 9:30am Addthis PROBLEM: Microsoft Security Bulletin Summary for April 2012 PLATFORM: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, ABSTRACT: Microsoft Security Bulletin Summary for April 2012. Microsoft has posted 4 Critical Bulletins and 2 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on April 11, 2012, at 11:00 AM Pacific Time (US & Canada). reference LINKS: Microsoft Security Bulletin Security Bulletin Summary Archive

384

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

385

First Analysis Securities Corporation | Open Energy Information  

Open Energy Info (EERE)

First Analysis Securities Corporation First Analysis Securities Corporation Jump to: navigation, search Logo: First Analysis Securities Corporation Name First Analysis Securities Corporation Address One South Wacker Drive, Suite 3900 Place Chicago, Illinois Zip 60606 Product Private equity, venture capital, investment banking and equity research. Year founded 1981 Phone number (312) 258-1400 Website http://www.firstanalysis.com/ Coordinates 41.8819019°, -87.6367295° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":41.8819019,"lon":-87.6367295,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

386

Compliance Order, Los Alamos National Security, LLC - July 12, 2007 |  

Broader source: Energy.gov (indexed) [DOE]

Compliance Order, Los Alamos National Security, LLC - July 12, 2007 Compliance Order, Los Alamos National Security, LLC - July 12, 2007 Compliance Order, Los Alamos National Security, LLC - July 12, 2007 July 12, 2007 Issued to Los Alamos National Security, LLC related to the Unauthorized Reproduction and Removal of Classified Matter from the Los Alamos National Laboratory The Compliance Order directs LANS to implement specific corrective actions to remediate both the laboratory management deficiencies that contributed to the thumb drive security incident at Los Alamos National Laboratory (LANL) discovered in October 2006 and, more broadly, longstanding deficiencies in the classified information and cyber security programs at LANL. Violation of the Compliance Order would subject LANS to issuance of a notice of violation and assessment of civil penalties up to S100,000 per

387

Compliance Order, Los Alamos National Security, LLC - July 12, 2007 |  

Broader source: Energy.gov (indexed) [DOE]

Compliance Order, Los Alamos National Security, LLC - July 12, 2007 Compliance Order, Los Alamos National Security, LLC - July 12, 2007 Compliance Order, Los Alamos National Security, LLC - July 12, 2007 July 12, 2007 Issued to Los Alamos National Security, LLC related to the Unauthorized Reproduction and Removal of Classified Matter from the Los Alamos National Laboratory The Compliance Order directs LANS to implement specific corrective actions to remediate both the laboratory management deficiencies that contributed to the thumb drive security incident at Los Alamos National Laboratory (LANL) discovered in October 2006 and, more broadly, longstanding deficiencies in the classified information and cyber security programs at LANL. Violation of the Compliance Order would subject LANS to issuance of a notice of violation and assessment of civil penalties up to S100,000 per

388

Consent Order, Lawrence Livermore National National Security, LLC -  

Broader source: Energy.gov (indexed) [DOE]

Lawrence Livermore National National Security, LLC - Lawrence Livermore National National Security, LLC - WCO-2010-01 Consent Order, Lawrence Livermore National National Security, LLC - WCO-2010-01 October 29, 2010 Consent Order issued to Lawrence Livermore National Security, LLC for deficiencies associated with the Lawrence Livermore National Laboratory Chronic Beryllium Disease Prevention Program This letter refers to the Office of Health, Safety and Security, Office of Enforcement investigation into deficiencies associated with the Lawrence Livermore National Laboratory (LLNL) Chronic Beryllium Disease Prevention Program (CBDPP) and related work planning and control processes. The results of the investigation were provided to Lawrence Livermore National Security, LLC (LLNS) in an Investigation Report dated July 7, 2009. An

389

Principal Associate Director - Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

390

Nevada National Security Site - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

391

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

392

Incidents of Security Concern  

Broader source: Energy.gov (indexed) [DOE]

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

393

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

394

Security systems engineering overview  

SciTech Connect (OSTI)

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

395

Argonne Team Challenges Physical Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

396

MAJOR CONFORMED CONTRACTS LINKS Site/Project Contract Link Idaho  

Office of Environmental Management (EM)

MAJOR CONFORMED CONTRACTS LINKS SiteProject Contract Link Idaho Idaho Cleanup Project http:www.id.doe.govdoeidICPContractICPContract.htm Advance Mixed Waste Treatment http:...

397

V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors when handling file actions can be exploited to bypass file action permission restrictions and e.g. create or read arbitrary files within or outside the webroot. 2) An error when validating file names within the file renaming functionality can be exploited to bypass the denied file extensions check

398

V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow  

Broader source: Energy.gov (indexed) [DOE]

8: Apache XML Security XPointer Expressions Processing Buffer 8: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability June 28, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Apache XML Security PLATFORM: vulnerability is reported in versions prior to 1.7.2 ABSTRACT: The vulnerability addresses the possibility of a heap overflow condition REFERENCE LINKS: Secunia Advisory SA53959 Apache Advisory CVE-2013-2210 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error within the XML Signature Reference processing code and can be exploited to cause a heap-based buffer overflow via a specially crafted document containing malformed XPointer expressions. IMPACT: Successful exploitation may allow execution of arbitrary code

399

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

400

U-003:RPM Package Manager security update | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

03:RPM Package Manager security update 03:RPM Package Manager security update U-003:RPM Package Manager security update October 4, 2011 - 1:30pm Addthis PROBLEM: A vulnerability was reported in RPM Package Manager. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 4.9.1.1 and prior versions. ABSTRACT: RPM Package Manager Header Validation Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: RPM Package Manager Advisory RHSA-2011:1349-1 SecurityTracker Alert ID: 1026134 CVE-2011-3378 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted RPM package that, when queried or installed by the target user, will trigger a buffer overflow or memory corruption error and execute arbitrary code on the target system. The code

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Campus Security Camera Issued: April 2009  

E-Print Network [OSTI]

Planning and Construction: Shall review camera placement and associated building code-related issues. 3 Unit: Finance & Administration Policy Contact Director of Facilities Management Gary.Bowersock@is.mines locations on the Colorado School of Mines campus. CCTV cameras, also known as security cameras, are utilized

402

Global Climate Change Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Climate Change Links Global Climate Change Links This page provides links to web pages that we at CDIAC feel do a responsible job of presenting information and discussion pertinent to the science behind the global climate change ("global warming") debate. These sites include those on both sides of the debate; some asserting that global warming is a clear and present danger, and others that might be labeled global warming "skeptics." Some of these sites don't take a position per se; they exist to offer the public objective scientific information and results on our present understanding of the climate system. The list is not intended to be comprehensive, by any means. We hope it will be especially helpful for those who may be just beginning their research into global

403

BCDA Machine Status Link  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Machine Status Link Machine Status Link Version 1.33 (December 2005) David M. Kline. The Machine Status Link (MSL) is responsible for distributing the digitized beam current, injection status, P0 clock, and other statuses over a single fiber to several locations around the Storage Ring. The MRD100 is a VME-based module that is part of the MSL and was specifically designed for the APS. It receives and interprets information from the XMS100 module by means of copper or fiber. Signals from the XMS100 module are sent at a P0 rate (3.667 microseconds). It sends two registers every cycle and all in about 12 cycles. Refer to the ASD website for additional information regarding the MSL. The focus of this page is to provide information of how to configure the MRD100 for a beamline IOC and to discuss the sample IOC

404

A systematic review of security requirements engineering  

Science Journals Connector (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

405

SP 800-61 Rev. 1. Computer Security Incident Handling Guide  

Science Journals Connector (OSTI)

Computer security incident response has become an important component of information technology (IT) programs. Security-related threats have become not only more numerous and diverse but also more damaging and disruptive. An incident response capability ... Keywords: Computer security incident, incident handling, incident response, threats, vulnerabilities

Karen A. Scarfone; Timothy Grance; Kelly Masone

2008-03-01T23:59:59.000Z

406

Security Enforcement Regulatory Assistance Reviews | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Security Enforcement Regulatory Assistance Reviews Security Enforcement Regulatory Assistance Reviews Documents Available for Download May 4, 2012 Enforcement Letter, CH2M Oak Ridge, LLC - SEL-2012-01 Issued to URS CH2M Oak Ridge, LLC, related to a Security Incident involving the Protection and Control of Classified Information at the East Tennessee Technology Park April 18, 2011 Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01 Issued to Battelle Energy Alliance, LLC related to Classified Information Introduced into Unapproved Information Systems at the Idaho National Laboratory March 24, 2011 Settlement Agreement, Sandia Corporation - SSA-2011-01 Settlement Agreement between DOE/NNSA and Sandia Corporation for Adverse Classified Information Security Trend at Sandia National Laboratories

407

Solitons, links and knots  

Science Journals Connector (OSTI)

...Soc. Lond. A (1999) Solitons, links and knots 4309 on a grid containing 1003 points, where spatial derivatives are approximated...results we can speculate on some qualitative aspects of an energy mini- mization principle which leads to the interesting structures...

1999-01-01T23:59:59.000Z

408

Tag: GTRI | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

409

April 2014 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

410

Sandia National Laboratories: Water Security Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Water Security Program Water Security CustomersPartners Awards Key Publications Staff Biographies Water Security In many areas of the United States and multiple regions of...

411

Integrated safeguards and security management plan  

E-Print Network [OSTI]

LBNL/PUB-3151 INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT76SF00098 iv Integrated Safeguards and Security Managementprovided. Appendix A. Safeguards and Security Plan http://

Bowen editor, Sue

2001-01-01T23:59:59.000Z

412

Sandia National Laboratories: National Security Missions: Internationa...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security casks We reduce proliferation and terrorism threats to U.S. national security through global technical engagement. Enhance security of vulnerable nuclear weapons...

413

INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS  

E-Print Network [OSTI]

INFORMATION SECURITY GUIDELINES #12;CONSISTENT, EFFECTIVE INFORMATION SECURITY To respond to societal-to-date information security standards. Should we fail to do so, in the event

Prodiæ, Aleksandar

414

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES Form is used to document travel to sensitive countries. SECURITY...

415

Security, Emergency Planning & Safety Records | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

416

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

472.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

417

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

418

Cyber security analysis testbed : combining real, emulation, and simulation.  

SciTech Connect (OSTI)

Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

2010-07-01T23:59:59.000Z

419

Maximum Entry and Mandatory Separation Ages for Certain Security Employees  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Policy in response to government-wide Office of Personnel Management regulations regarding establishment of mandatory retirement ages for employees in certain security related positions. Superseded by DOE P 310.1 Admin Chg 1, 12-1-11.

2001-10-11T23:59:59.000Z

420

An Analysis of Security Services in Grid Storage Systems  

Science Journals Connector (OSTI)

With the wide-spread deployment of Data Grids, storage services are becoming a critical aspect of the Grid infrastructure. Due to the sensitive and critical nature of the data being stored, security issues relate...

Jesus Luna; Michail D. Flouris; Manolis Marazakis

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

New cryptographic protocols With side-channel attack security  

E-Print Network [OSTI]

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

422

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

423

Cyber Security Issues and Requirements  

Broader source: Energy.gov (indexed) [DOE]

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

424

Website Policies and Important Links | Scientific and Technical Information  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Website Policies and Important Links Print page Print page Email page Email page This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright, Restrictions, and Permissions Notice Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Data Rights Freedom of Information Information Quality No Fear Act Schedule for Posting Information Comments Policy USAJOBS Grants Regulations USA.gov Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of

425

SC e-journals Website Policies and Important Links  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Website Policies and Important Links This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright, Restrictions, and Permissions Notice Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Data Rights Freedom of Information Information Quality No Fear Act Schedule for Posting Information Comments Policy USAJOBS Grants Regulations USA.gov Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any

426

Science Open Access Journals - Website Policies/Important Links  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Website Policies and Important Links This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright, Restrictions, and Permissions Notice Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Data Rights Freedom of Information Information Quality No Fear Act Schedule for Posting Information Comments Policy USAJOBS Grants Regulations USA.gov Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any

427

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

428

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

429

Security Clearances; Limitations  

Broader source: Energy.gov (indexed) [DOE]

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

430

New Security Challenges in the Global Era: Environmental Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

431

The security fallacy: Seven myths about physical security | Argonne  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

432

Security Science: The Theory and Practice of Security  

Science Journals Connector (OSTI)

Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners ...

Clifton Smith; David J Brooks

2012-12-01T23:59:59.000Z

433

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Office of Environmental Management (EM)

can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a...

434

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

435

New program investigates health and water link  

E-Print Network [OSTI]

Story by Kathy Wythe tx H2O | pg. 24 New program investigates public health and water link Thousands of cases of waterborne and water-related diseases worldwide are related to drinking water. A new program in the Texas A&M Health Science... Center?s School of Rural Public Health is working to understand this link between diseases and water and educate the public about this connection. The Program in Public Health and Water Research was established in October 2008 within the rural...

Wythe, Kathy

2009-01-01T23:59:59.000Z

436

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

437

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

438

Engineering secure software  

E-Print Network [OSTI]

Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style... Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style...

Jetly, Prateek

2012-06-07T23:59:59.000Z

439

Quantum-secured imaging  

E-Print Network [OSTI]

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magaa-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

440

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...? ? Advanced security methods ? Power analysis for key discovery ? Hardware attacks such as ?decapping? chips ? Developing vulnerability exploits ? Security analysis of smart grid systems & communications ? Reverse engineering ? Penetration testing ? Threat...

Ragsdale, G.

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

PSH-13-0013 - In the Matter of Personnel Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3 - In the Matter of Personnel Security 3 - In the Matter of Personnel Security PSH-13-0013 - In the Matter of Personnel Security On May 30, 2013, an OHA Hearing Officer issued a Decision in which she determined that an Individual's access authorization should not be restored. In reaching this determination, the Hearing Officer found that the Individual had not resolved the security concerns arising from his alcohol use. A DOE psychologist diagnosed the Individual as suffering from alcohol abuse. In addition, the Individual had a number of alcohol-related arrests. The Local Security Office (LSO) raised security concerns related to the diagnosis and arrests under Criteria H and J of the Part 710 regulations. It also raised security concerns related to the arrests under Criterion L of the regulations. The Individual showed that

442

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network [OSTI]

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

443

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

444

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

445

The Universe Adventure - Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Links Links Cosmology and Space Cosmic Journey A site chronicling the history of scientific cosmology, presented by the American Institute of Physics. Hubble Ultra-Deep Field Skywalker Lets you explore the famous Hubble Deep Field photo, which is the deepest view (in the visible spectrum) into the sky to date. QuietBay Constellation Tutorial A fun and easy tutorial to familiarize yourself with the night sky. Astronomy Picture of the Day Astronomy Picture of the Day features a new image from the universe every day, with short explanations written by professional astronomers. The Solar System NASA site that includes images and profiles of the planets (plus Pluto). Earth Guide An Earth planetary science site created by the Japan Science and Technology Agency describing many of the features of Earth and its place in the

446

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

447

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

448

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

449

Covalently Linked DNA Nanotubes  

Science Journals Connector (OSTI)

SEM analyses of the nanotubes generated according to Scheme 2 further support the suggested folding of the 2D cross-linked DNA array into the nanotube structure. ... Here, we report a modular approach to DNA nanotube synthesis that provides access to geometrically well-defined triangular and square-shaped DNA nanotubes. ... and assembly of carbon nanotubes, and in nanotube-based DNA sensing and sepns. ...

Ofer I. Wilner; Anja Henning; Bella Shlyahovsky; Itamar Willner

2010-03-17T23:59:59.000Z

450

Preliminary Notice of Violation, Los Alamos National Security, LLC- WEA-2010-04  

Broader source: Energy.gov [DOE]

Issued to Los Alamos National Security, LLC related to the Electrical Shock that occurred at Technical Area 16 at the Los Alamos National Laboratory

451

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network [OSTI]

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

452

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

453

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

454

About SRNL - Directorates - National Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Technical Partnerships Global...

455

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

456

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

457

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Broader source: Energy.gov (indexed) [DOE]

70: HP Security Bulletin - HP-UX Running OpenSSL, Remote 70: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

458

U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

3: Trend Micro InterScan Messaging Security Flaws Permit 3: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks September 19, 2012 - 6:00am Addthis PROBLEM: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: 7.1-Build_Win32_1394; possibly other versions ABSTRACT: A vulnerability was reported in Trend Micro InterScan Messaging Security. reference LINKS: US CERT Vulnerability Note VU#471364 SecurityTracker Alert ID: 1027544 CVE-2012-2995 CVE-2012-2996 Micro Trend IMPACT ASSESSMENT: Medium Discussion: Several scripts do not properly filter HTML code from user-supplied input

459

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

460

U-190: Microsoft Security Bulletin MS12-037 - Critical | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Microsoft Security Bulletin MS12-037 - Critical 0: Microsoft Security Bulletin MS12-037 - Critical U-190: Microsoft Security Bulletin MS12-037 - Critical June 13, 2012 - 3:30pm Addthis PROBLEM: Microsoft Security Bulletin MS12-037 - Critical PLATFORM: Internet Explorer 8.x ABSTRACT: This security update resolves one publicly disclosed and twelve privately reported vulnerabilities in Internet Explorer. LINKS: Microsoft Security Bulletin MS12-037 - Critical Secunia Advisory SA49412 IMPACT ASSESSMENT: High Discussion: The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Broader source: Energy.gov (indexed) [DOE]

0: HP Security Bulletin - HP-UX Running OpenSSL, Remote 0: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

462

T-697: Google Chrome Prior to 13.0.782.107 Multiple Security  

Broader source: Energy.gov (indexed) [DOE]

97: Google Chrome Prior to 13.0.782.107 Multiple Security 97: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities August 19, 2011 - 3:02pm Addthis PROBLEM: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. PLATFORM: Cross Platform: Google Chrome Prior to 13.0.782.107: Versions and Vulnerabilities (Details) ABSTRACT: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. The Chromium Projects Security Overview. reference LINKS: SecurityFocus: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities

463

Transmission Line Security Monitor  

SciTech Connect (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2011-01-01T23:59:59.000Z

464

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

465

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

466

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

467

Model checking grid security  

Science Journals Connector (OSTI)

Grid computing is one of the leading forms of high performance computing. Security in the grid environment is a challenging issue that can be characterized as a complex system involving many subtleties that may lead designers into error. This is similar to what happens with security protocols where automatic verification techniques (specially model checking) have been proved to be very useful at design time. This paper proposes a formal verification methodology based on model checking that can be applied to host security verification for grid systems. The proposed methodology must take into account that a grid system can be described as a parameterized model, and security requirements can be described as hyperproperties. Unfortunately, both parameterized model checking and hyperproperty verification are, in general, undecidable. However, it has been proved that this problem becomes decidable when jobs have some regularities in their organization. Therefore, this paper presents a verification methodology that reduces a given grid system model to a model to which it is possible to apply a cutoff theorem (i.e., a requirement is satisfied by a system with an arbitrary number of jobs if and only if it is satisfied by a system with a finite number of jobs up to a cutoff size). This methodology is supported by a set of theorems, whose proofs are presented in this paper. The methodology is explained by means of a case study: the Condor system.

F. Pagliarecci; L. Spalazzi; F. Spegni

2013-01-01T23:59:59.000Z

468

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

469

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

470

Mac Security Bible  

Science Journals Connector (OSTI)

Your essential, no-holds-barred guide to Mac security threats and solutions Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely ...

Joe Kissell

2010-01-01T23:59:59.000Z

471

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

472

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

473

Secure Military Social Networking and Rapid Sensemaking in Domain Specific Concept Systems: Research Issues and Future Solutions  

E-Print Network [OSTI]

This paper identifies the need for a secure military social networking site and the underlying research issues linked to the successful development of such sites. The paper further proposes a solution to the most basic ...

Garside, Debbie

474

Gregory H. Friedman: Before the Subcommittee on National Security, Veterans  

Broader source: Energy.gov (indexed) [DOE]

Subcommittee on National Security, Subcommittee on National Security, Veterans Affairs, and International Relations of the Committee on Government Reform U.S. House of Representatives Gregory H. Friedman: Before the Subcommittee on National Security, Veterans Affairs, and International Relations of the Committee on Government Reform U.S. House of Representatives March 15, 2001 Before the Subcommittee on National Security, Veterans Affairs, and International Relations of the Committee on Government Reform U.S. House of Representatives Statement of Gregory H. Friedman Inspector General Department of Energy Request to testify on the major performance and management challenges confronting the Department of Energy (Department). Recently, the Office of Inspector General (OIG) issued a special report on Management Challenges at

475

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Research Areas Fuel Cycle Science & Technology Fusion Nuclear Science Isotope Development and Production Nuclear Security Science & Technology Border Security Comprehensive...

476

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

477

Security Control Assessor | Department of Energy  

Energy Savers [EERE]

Training Worksheet More Documents & Publications Information System Security Manager (ISSM) Cybersecurity Program Manager (CSPM) Information System Security Officer (ISSO)...

478

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

479

Preliminary Notice of Violation, Los Alamos National Security, LLC -  

Broader source: Energy.gov (indexed) [DOE]

Los Alamos National Security, LLC Los Alamos National Security, LLC - WEA-2010-04 Preliminary Notice of Violation, Los Alamos National Security, LLC - WEA-2010-04 October 18, 2010 Preliminary Notice of Violation issued to Los Alamos National Security, LLC related to the Electrical Shock that occurred at Technical Area 16 at the Los Alamos National Laboratory This letter refers to a U.S. Department of Energy (DOE) investigation into the facts and circumstances surrounding the electrical shock event that occurred in building 300 at Technical Area 16 (TA-16) at the Los Alamos National Laboratory (LANL) on March 20, 2009. The results of the investigation were provided to Los Alamos National Security, LLC (LANS) in an Investigation Report dated March 2, 2010. An enforcement conference was held on March 23, 2010, with you and members of your staff to discuss the

480

Draft Nevada National Security Site Environmental Impact Statement Released  

Broader source: Energy.gov (indexed) [DOE]

Nevada National Security Site Environmental Impact Statement Nevada National Security Site Environmental Impact Statement Released Draft Nevada National Security Site Environmental Impact Statement Released July 25, 2011 - 12:00pm Addthis Media Contacts Darwin J. Morgan morgan@nv.doe.gov 702-295-3521 Kelly K. Snyder snyderk@nv.doe.gov 702-295-3521 The Draft Site-Wide Environmental Impact Statement (SWEIS) for the Nevada National Security Site (NNSS) and Off-Site Locations in Nevada is available for public review and comment through October 27, 2011. Within the draft SWEIS, the U.S. Department of Energy, National Security Administration Nevada Site Office presents a formal analysis of how current and potential missions at the NNSS (formerly the Nevada Test Site) and related off-site locations may affect the environment over the next ten

Note: This page contains sample records for the topic "related links security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

NNSA: Securing Domestic Radioactive Material | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NNSA: Securing Domestic Radioactive Material | National Nuclear Security NNSA: Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > NNSA: Securing Domestic Radioactive Material Fact Sheet NNSA: Securing Domestic Radioactive Material Apr 12, 2013 The Department of Energy's National Nuclear Security Administration (NNSA),

482

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

483

CAMD Nanofabrication Links  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Infrastructure :: News :: Related sites National Nanotechnology Initiative Nano Technology Industries Advanced Materials Research Institute Institute of Physics Max-Planck...

484

Physical and Logical Security Convergence: Powered By Enterprise Security Management: Powered By Enterprise Security Management  

Science Journals Connector (OSTI)

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, ... Keywords: Computer Science, Security

Brian T. Contos; Steve Hunt; Colby Derodeff

2007-04-01T23:59:59.000Z

485

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

U.S. DOE SECURITY CLEARANCES U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance Reinvestigation Clearance Termination Clearance Transfer Sandia National Laboratories sponsors and processes U.S. DOE Security Clearances for contractor personnel working on an authorized contract requiring access to classified information. Clearance Office Functions Contractor Pre-Process Background Review Certification Clearance File Change Drug Testing e-Fingerprinting Enrollment Process Maintaining a DOE Security Clearance During an Extended Absence DOE Personnel Security Reporting Requirements Data Report on Spouse/Cohabitant Name Change Change in Citizenship Contractor Clearance Tools Clearance Action Status Inquiries

486

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

487

Headquarters Facilities Master Security Plan  

Broader source: Energy.gov [DOE]

The purpose of the Headquarters Facilities Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures in place at Department of Energy (DOE) Headquarters (HQ) facilities in the Washington, DC area. The HQFMSP does not establish new security requirements; security requirements are established by various Federal laws and regulations, Executive Orders, and DOE directives. This plan explains how these requirements are implemented at HQ and gives HQ personnel and visitors access to the security policies and procedures that affect them regularly. The HQFMSP does not apply to DOE sites or facilities outside the Washington, DC area.

488

Link Analysis Ranking Algorithms, Theory, and Experiments #  

E-Print Network [OSTI]

and the widespread accessibility of the Web has led to surge of research activity in the area of information retrieval on the World Wide Web. The seminal papers of Kleinberg [31], and Brin and Page [9] introduced Link Analysis Ranking, where hyperlink structures are used to determine the relative authority of a Web page

Rosenthal, Jeffrey S.

489

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

October 11, 2012 October 11, 2012 PSH-12-0081 - In the Matter of Personnel Security Hearing On October 11, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for providing false information on a Questionnaire for National Security Positions and failing to comply with rules regarding the handling of classified information and conduct within simited access areas. This behavior raised security concerns under Criteria F, G, and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer fo October 2, 2012 PSH-12-0052 - In the Matter of Personnel Security Hearing On October 2, 2012, an OHA Hearing Officer issued a decision in which he

490

Chapter_14_Cyber_Security  

Broader source: Energy.gov (indexed) [DOE]

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

491

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 5, 2013 March 5, 2013 PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated March 5, 2013 PSH-12-0131 - In the Matter of: Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which he

492

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

January 11, 2012 January 11, 2012 TSO-01113 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on financial issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in July 2011. PSI, DOE Ex. 13 In August 2011, the LSO issued the individual a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about his eligibility to hold a DOE security clearance. (DOE Ex. 1). December 21, 2011 TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection

493

Chapter_3_Personnel_Security  

Broader source: Energy.gov (indexed) [DOE]

Personnel Security Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is designed to ensure that individuals authorized to access classified information and Special Nuclear Material (SNM) do not pose a threat to national security interests. This assurance is provided by the process for issuing initial and continuing

494

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

November 1, 2012 November 1, 2012 PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that October 26, 2012 PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she

495

Security, Safety and Health  

Broader source: Energy.gov (indexed) [DOE]

8, Fourth Quarter, 2012 8, Fourth Quarter, 2012 www.fossil.energy.gov/news/energytoday.html HigHligHts inside 2 Security and Sustainability A Column from the FE Director of Health, Security, Safety and Health 4 Training Goes 3-D NETL's AVESTAR Center Deploys New Virtual Training System 5 Secretary Achievement Awards Two FE Teams Earn Secretary of Energy Recognition 7 Vast Energy Resource Identified FE Study Says Billions of Barrels of Oil in Residual Oil Zones 8 Presidential Award NETL-RUA Engineer Earns Highest Government Honor in Science & Engineering This September marked a major mile- stone for one of the Office of Fossil Energy's largest carbon capture, utili- zation and storage projects: the opening

496

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

JUNE/JULY 2013 JUNE/JULY 2013 inside this issue ... Reaching the summit - Big hitters talk economic development Page 3 Saving yesterday's knowledge today Page 5 What's a fellow to do? Page 6 ... and other Y-12 news On June 3 newly appointed Secretary of Energy Ernest Moniz (right) made Oak Ridge the site of his first official visit since being sworn in as head of the U.S. Department of Energy. Secretary Moniz met earlier in the day with national lab directors at Oak Ridge National Laboratory, then came to Y-12 for tours and a meeting with the National Nuclear Security Administration Production Office, B&W Y-12 and ORNL employees. He was joined by Rep. Chuck Fleischmann. The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental

497

HEADQUARTERS SECURITY OFFICERS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

HEADQUARTERS SECURITY OFFICERS Revision Date: December 16, 2013 ELEMENT Office of Security Operations AR AR-1 AR-1 AR-1 CF CF-40 CF-40 CI CI-3 ED ED-2 EE EE-3A EE-3A NAME LOCATION PHONE FAX NUMBER WAYNE E. BERKEBILE E-325/GTN 301-903-1163 301-903-8108 Advanced Research Projects Agency - Energy MATTHEW TARDUOGNO L'N !NT 950/Rm. 8014 202-586-2892 202-287-5450 NICHOLE CLAGETT (ALT) L'N !NT 950/Rm. 8025 202-287-6409 202-287-5450 SARA DWYER (REP) L'N !NT 950/Rm. B-2 202-287-6411 202-287-5450 Office of the Chief Financial Officer PHILIP A. KNOPP Rm. 1310 CLV. 301-903-0364 301-903-1863 KIMBERLY J. LUCAS (ALT) Rm. 1310 CLV. 301-903-2485 301-903-6877 Assistant Secretary for Congressional and Intergovernmental Affairs

498

The Cyber Security Crisis  

SciTech Connect (OSTI)

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

499

Facilities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Inertial Confinement Fusion Inertial Confinement Fusion Facilities Home > About Us > Our Programs > Defense Programs > Office of Research, Development, Test, and Evaluation > Office of Inertial Confinement Fusion > Facilities Facilities Office of Inertial Confinement Fusion, Facilities ICF operates a set of world-class experimental facilities to create HEDP conditions and to obtain quantitative data in support of its numerous stockpile stewardship-related activities. To learn about three high energy experimental facilities and two small lasers that provide ICF capabilities, select the links below. National Ignition Facility, Lawrence Livermore National Laboratory OMEGA and OMEGA EP, University of Rochester Laboratory for Laser Energetics Z Machine, Sandia National Laboratories

500

Enforcement Letter, National Security Technologies LLC,- November 13, 2007  

Broader source: Energy.gov (indexed) [DOE]

National Security Technologies LLC,- November National Security Technologies LLC,- November 13, 2007 Enforcement Letter, National Security Technologies LLC,- November 13, 2007 November 13, 2007 Enforcement Letter issued to National Security Technologies, LLC related to an Unplanned Radiological Exposure during a Borehole Activity at the Nevada Test Site The Department of Energy's (DOE) Office of Enforcement conducted an evaluation of the deficiencies described in Noncompliance Tracking System (NTS) Report NTS-NSO--NST-NTS-2007-0002, Unplanned Radiological Exposure during Borehole Activity. Our evaluation included reviews of the associated critique and root cause analysis reports, and the related corrective action plan. Based on our evaluation, we have concluded that violations of 10 C.F.R. 835, Occupational Radiation Protection,occurred