Powered by Deep Web Technologies
Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Office of Environmental Management (EM)

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY...

2

DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS. Key Cyber...

3

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA Cybersecurity Program Manager (CSPM...

4

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

5

Cyber Security Requirements for Wireless Devices and Information Systems  

Directives, Delegations, and Requirements

The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-11T23:59:59.000Z

6

Cyber Security Process Requirements Manual  

Directives, Delegations, and Requirements

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

7

Cyber Security Requirements for Risk Management  

Directives, Delegations, and Requirements

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

8

Collaborative Utility Task Force Partners with DOE to Develop Cyber  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Collaborative Utility Task Force Partners with DOE to Develop Cyber Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure The Advanced Metering Infrastructure Security (AMI-SEC) Task Force announces the release of the AMI System Security Requirements, a first-of-its-kind for the utility industry that will help utilities procure and implement secure components and systems using a common set of security requirements. Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure More Documents & Publications AMI System Security Requirements - v1_01-1 Before the Senate Energy and Natural Resources Committee

9

DOE Issues Energy Sector Cyber Organization NOI  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues National Energy Sector Cyber Organization Notice of Intent Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. The cyber organization is expected to have the knowledge, expertise, capabilities, and capacity, at a minimum to: * Identify and prioritize cyber security research and development issues.

10

Cyber Security Process Requirements Manual  

Directives, Delegations, and Requirements

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

11

Cyber Security Process Requirements Manual  

Directives, Delegations, and Requirements

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

12

DOE Cyber Security Role, Competency and Functional Matrix  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

13

DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues Energy Sector Cyber Organization NOI, Feb 2010 Issues Energy Sector Cyber Organization NOI, Feb 2010 DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. DOE Issues Energy Sector Cyber Organization NOI More Documents & Publications FAQ: Funding Opportunity Announcement-Smart Grid Investment Grants Grantsdown.xls Before the House Science and Technology Subcommittee on Energy and

14

Department of Energy Cyber Security Management  

Directives, Delegations, and Requirements

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

15

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

16

Department of Energy Cyber Security Management Program  

Directives, Delegations, and Requirements

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

17

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

18

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

19

cyber  

National Nuclear Security Administration (NNSA)

and the review of information prior to public release or posting to publicly available web sites to assure it does not contain data that would assist an adversary.

20

Cyber Security Incident Management Manual  

Directives, Delegations, and Requirements

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8

2011-05-16T23:59:59.000Z

22

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

23

DOE Challenge Home, Washington Program Requirements | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications DOE Challenge Home, California Program Requirements Version Tracking Document for DOE Challenge Homes, National Program Requirements (Rev. 03) DOE...

24

Cyber-Physical System Requirements -A Model Driven Approach Cyber-physical systems (CPS) networked  

E-Print Network (OSTI)

systems such as infusion pumps. Complete and consistent requirements are central to analysis. A generic patient controlled analgesia (GPCA) infusion pump system was used as a case example to provide: Generic Patient Controlled Analgesia Infusion Pump System. Figure: Infusion Pump Plant Model. Figure

Minnesota, University of

25

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

26

DOE Challenge Home, California Program Requirements  

Energy.gov (U.S. Department of Energy (DOE))

DOE Challenge Home, California Program Requirements, as posted on the U.S. Department of Energy's DOE Challenge Home website.

27

Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems  

Directives, Delegations, and Requirements

The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

2004-02-19T23:59:59.000Z

28

Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012; Chg 2, dated 3-11-13.

2011-05-16T23:59:59.000Z

29

Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012.

2011-05-16T23:59:59.000Z

30

Cyber Security Architecture Guidelines  

Directives, Delegations, and Requirements

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

31

DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

information, use the DOE Phonebook. Latest content created by this user Jan 05, 2015 Conduct of Operations Dec 04, 2014 Certification for DOE O 422.1 Admin Chg 1 Jun 29, 2010...

32

DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

use of nuclear explosives. 2015-01-29T17:37:07Z News Item NEW - DOE O 422.1 Admin Chg 2, Conduct of Operations https:www.directives.doe.govnewsnew-doe-o-422.1-admin-chg-2 The...

33

Cyber Security Summer School: Lessons for the Modern Grid | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid June 20, 2011 - 4:34pm Addthis Carol Hawk Program Manager, Cyber Security for Energy Delivery Systems What does this mean for me? Computer systems do more than store and share information. They help control our traffic lights, trains and specifically, our electric grid -- tasks for which continuous function is the primary concern. Protecting control systems on the grid from cyber attack requires a completely different approach to cyber security than information technology systems. The Cyber Summer School gave aspiring attendees a practical understanding of the connection between power systems and computer science required to secure a clean, reliable energy future.

34

DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE Phonebook. Latest content created by this user Nov 21, 2014 Nuclear Explosive and Weapon Surety Program (Informational Purposes Only) Aug 05, 2014 Nuclear Explosive and Weapon...

35

DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

information, use the DOE Phonebook. Latest content created by this user Aug 26, 2005 Safeguards and Security Program Planning and Management Jul 26, 2011 Safeguards and Security...

36

Personnel Security - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

472.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

37

Chapter_14_Cyber_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

38

Conduct of Operations Requirements for DOE Facilities  

Directives, Delegations, and Requirements

"To provide requirements and guidelines for Departmental Elements, including the National Nuclear Security Administration (NNSA), to use in developing directives, plans, and/or procedures relating to the conduct of operations at DOE facilities. The implementation of these requirements and guidelines should result in improved quality and uniformity of operations. Change 2, 10-23-2001. Canceled by DOE O 422.1.

1990-07-09T23:59:59.000Z

39

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

40

Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program (CSP) that protects information and information systems for the Department of Energy (DOE). Chg 1 dated 12-7-2012; Chg 2 dated 3-11-2013; Chg 3, dated 4-29-2014, cancels Chg 2.

2011-05-16T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

DOE Challenge Home, Washington Program Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Challenge Home Washington Program Requirements 9-1-2013 To qualify as a DOE Challenge Home, a home shall meet the minimum requirements specified below, be verified and field-tested in accordance with HERS Standards by an approved verifier, and meet all applicable codes. Builders may meet the requirements of either the Performance Path or the Prescriptive path to qualify a home. 1 Single family detached and attached dwelling units, and dwelling units in multifamily buildings with 3 stories or fewer above-grade 2,3 are eligible for qualification. DOE Challenge Home Prescriptive Path The prescriptive path provides a single set of measures that can be used to construct a DOE Challenge Home labeled home. Modeling is not required, but no tradeoffs are allowed. Follow these steps to use the prescriptive path:

42

DOE Challenge Home, California Program Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Challenge Home California Program Requirements These Program Requirements shall only be used in the State of California. To qualify as a DOE Challenge Home, a home shall meet the minimum requirements specified below, be verified and field-tested in accordance with HERS Standards by an approved verifier, and meet all applicable codes. Builders may meet the requirements of either the Performance Path or the Prescriptive path to qualify a home. 1 Single family detached and attached dwelling units, and dwelling units in multifamily buildings with 3 stories or fewer above-grade 2,3 are eligible for qualification. DOE Challenge Home Prescriptive Path The prescriptive path provides a single set of measures that can be used to construct a DOE Challenge Home labeled

43

News & Updates - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Cancellation of Directives Document Actions NEW - DOE O 422.1 Admin Chg 2, Conduct of Operations by Diane Johnson The objective of this Order is to define the requirements for...

44

Requirements in DOE O 5480.19, Conduct of Operations Requirements for DOE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requirements in DOE O 5480.19, Conduct of Operations Requirements Requirements in DOE O 5480.19, Conduct of Operations Requirements for DOE Facilities Cross-referenced to DOE O 422.1, Conduct of Operations. Requirements in DOE O 5480.19, Conduct of Operations Requirements for DOE Facilities Cross-referenced to DOE O 422.1, Conduct of Operations. This is an open-book evaluation. Complete the questions, and submit your answers (hand-written or electronically) to the Training Center. Someone will check and grade your answers. If you achieve a score of at least 80%, you will receive a completion certificate. Nuclear Facility Safety Basis Fundamentals Self-Study Guide Review Questions More Documents & Publications U.S. Department of Energy Oak Ridge Operations Nuclear Facility Safety Basis Fundamentals, Self-Study Guide

45

PACIFIC NORTHWEST CYBER SUMMIT  

SciTech Connect

On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energys (DOEs) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOEs Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.

Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.; Smith, Karen S.

2013-08-07T23:59:59.000Z

46

Office of Cyber Security Evaluations Appraisal Process Guide, April 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER SECURITY EVALUATIONS CYBER SECURITY EVALUATIONS APPRAISAL PROCESS GUIDE April 2008 Office of Health, Safety and Security U.S. Department of Energy Office of Cyber Security Evaluations Appraisal Process Guide Preface April 2008 i Preface Department of Energy (DOE) Order 470.2B, Independent Oversight and Performance Assurance Program, and Office of Health, Safety and Security (HSS) Standard Operating Procedure, SOP-10-01, Independent Oversight Appraisal Process Protocols, February 2008, provide direction for the Office of Independent Oversight (HS-60) to establish the requirements, responsibilities, and processes for the development and maintenance of Appraisal Process Protocols that describe the activities for evaluating the effectiveness of DOE safeguards and security; cyber security; emergency management; and

47

POLICY GUIDANCE MEMORANDUM #33 - Requirements for DOE Delegated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 - Requirements for DOE Delegated Examining Procedures POLICY GUIDANCE MEMORANDUM 33 - Requirements for DOE Delegated Examining Procedures The purpose of this guidance is to...

48

Requirements in DOE O 5480.19, Conduct of Operations Requirements...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requirements in DOE O 5480.19, Conduct of Operations Requirements for DOE Facilities Cross-referenced to DOE O 422.1, Conduct of Operations. Requirements in DOE O 5480.19, Conduct...

49

Policing Cyber Hate, Cyber Threats and Cyber Terrorism  

Science Journals Connector (OSTI)

What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. This ground-breaking text provides a comprehensive understanding of the range of activities ...

Imran Awan; Brian Blakemore

2012-07-01T23:59:59.000Z

50

News & Updates - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

the Workplace NEW - DOE O 452.2E, Nuclear Explosive Safety NEW - DOE O 422.1 Admin Chg 2, Conduct of Operations NEW - DOE P 481.1, DOE's Policy Regarding Laboratories, Plants and...

51

Certification Memos - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Chg 1 Certification for DOE P 456.1 Certification for DOE G 440.1-7A Certification for DOE G 441.1-1C Certification for DOE G 414.1-4 Certification for DOE M 441.1-1 and DOE O...

52

Cyber Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

53

Justification Memoranda - DOE Directives, Delegations, and Requirement...  

NLE Websites -- All DOE Office Websites (Extended Search)

to Revise DOE G 414.1-1B, Management and Independent Assessments Guide for Use with 10 CFR, Part 830, Subpart A, and DOE O 414.1C, Quality Assurance; DOE M 450.4-1, Integrated...

54

Evaluation Report on The Department's Unclassified Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report on The Department's Unclassified Cyber Security Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security information. It requires agencies to conduct annual reviews and evaluations of unclassified and

55

DOE NEPA Guidance and Requirements - Search Index - Table of Contents |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE NEPA Guidance and Requirements - Search Index - Table of DOE NEPA Guidance and Requirements - Search Index - Table of Contents DOE NEPA Guidance and Requirements - Search Index - Table of Contents Return to Download Page The DOE NEPA Guidance and Requirements - Search Index includes: NEPA Guidance and Requirements Documents Issued by Published A Brief Guide - DOE-wide Contracts For NEPA Documentation DOE 2003 A Citizen's Guide to the NEPA - Having Your Voice Heard CEQ 2007 A Resource Handbook on DOE Transportation Risk Assessment DOE 2002 Actions During the NEPA Process - Interim Actions DOE 2003 Administrative Record Guidance DOJ 1991 Aligning the NEPA Process with EMS CEQ 2007 Alternative Actions For Analysis in Site-wide NEPA Reviews DOE 1992 Amended Environmental Impact Statement Filing System Guidance EPA 2012 Analysis of Impacts on Prime and Unique Agricultural Lands and NEPA

56

Cyber Incident Information | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Services » Guidance » Privacy » Cyber Incident Information Services » Guidance » Privacy » Cyber Incident Information Cyber Incident Information July 2013 Cyber Incident The Department of Energy has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information (PII). January 2013 Cyber Incident The Department of Energy (DOE) has confirmed a cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information (PII). Tips to Monitor Your Identity Here is a suggested list of tips to monitor and protect yourself. Assistive Technology Forms Guidance Capital Planning Information Collection Management

57

NERSC/DOE HEP Requirements Workshop Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

Workshop GoalsOverview November 12, 2009 | Author(s): Yukiko Sekine | Workshop Logistics November 12, 2009 | Author(s): Harvey Wasserman | DOE HEP Overview November 12, 2009...

58

Enforcement of DOE Classified Information Security Requirements Under Title  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of DOE Classified Information Security Requirements of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 Enforcement of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 In publishing 10 CFR Part 824, DOE has determined that civil penalties under Part 824 will only be assessed for violations of requirements for the protection of classified information (Restricted Data, Formerly Restricted Data and National Security Information). The rule does not include civil penalties relating to failure to protect sensitive but unclassified information. IMPLEMENTATION GUIDANCE More Documents & Publications Safety and Security Enforcement Process Overview Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01

59

News - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Explosive and Weapon Surety Program - Read More... NEW - DOE O 422.1 Admin Chg 2, Conduct of Operations - by Diane Johnson - last modified Jan 05, 2015 03:39 PM The...

60

DOE NEPA Guidance and Requirements - Search Index | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE NEPA Guidance and Requirements - Search Index DOE NEPA Guidance and Requirements - Search Index DOE NEPA Guidance and Requirements - Search Index The DOE NEPA Guidance and Requirements - Search Index is a one-stop solution providing you with DOE's Guidance and Requirements documents combined into one file for easy download and use. The compressed (.zip) file contains all of these documents in their optimized and machine-readable format. The file also contains a "search index" that can be used to search for keywords and phrases in all the documents from one search form, without the need to install a separate program. Please direct any questions, comments, or feedback to: John.Jediny@hq.doe.gov Review the documents included in the Search Index as a List or Table NEPA Requirements and Guidance - Search Index.zip

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

DOE NEPA Guidance and Requirements - Search Index | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE NEPA Guidance and Requirements - Search Index DOE NEPA Guidance and Requirements - Search Index DOE NEPA Guidance and Requirements - Search Index The DOE NEPA Guidance and Requirements - Search Index is a one-stop solution providing you with DOE's Guidance and Requirements documents combined into one file for easy download and use. The compressed (.zip) file contains all of these documents in their optimized and machine-readable format. The file also contains a "search index" that can be used to search for keywords and phrases in all the documents from one search form, without the need to install a separate program. Please direct any questions, comments, or feedback to: John.Jediny@hq.doe.gov Review the documents included in the Search Index as a List or Table NEPA Requirements and Guidance - Search Index.zip

62

Delegation Procedures - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy's primary means of establishing policies, requirements, responsibilities, and procedures for Departmental elements and contractors. Directives Program Management Camille...

63

DOE NEPA Guidance and Requirements - Search Index - Table of Contents |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Table of Table of Contents DOE NEPA Guidance and Requirements - Search Index - Table of Contents Return to Download Page The DOE NEPA Guidance and Requirements - Search Index includes: NEPA Guidance and Requirements Documents Issued by Published A Brief Guide - DOE-wide Contracts For NEPA Documentation DOE 2003 A Citizen's Guide to the NEPA - Having Your Voice Heard CEQ 2007 A Resource Handbook on DOE Transportation Risk Assessment DOE 2002 Actions During the NEPA Process - Interim Actions DOE 2003 Administrative Record Guidance DOJ 1991 Aligning the NEPA Process with EMS CEQ 2007 Alternative Actions For Analysis in Site-wide NEPA Reviews DOE 1992 Amended Environmental Impact Statement Filing System Guidance EPA 2012 Analysis of Impacts on Prime and Unique Agricultural Lands and NEPA

64

DOE RFI 2010-11129 NBP RFI: Communications Requirements Titled...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy" DOE RFI 2010-11129 NBP RFI: Communications...

65

Cyber Security Evaluations Appraisal Process Guide - April 2008 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 April 2008 Cyber Security Evaluations Appraisal Process Guide was developed for the purpose of documenting the appraisal approach and techniques specific to evaluations of classified and unclassified cyber security programs throughout DOE. Office of Cyber Security Evaluations Appraisal Process Guide provides additional insight into the Office of Cyber Security Evaluations (HS-62) evaluation approach and processes associated with assessing classified and unclassified cyber security programs. The objective of this document is to establish a standard approach and methodology for conducting cyber security reviews that is well understood by all inspection participants.

66

What are my DOE reporting requirements? | Scientific and Technical  

Office of Scientific and Technical Information (OSTI)

What are my DOE reporting requirements? What are my DOE reporting requirements? Print page Print page Email page Email page DOE reporting requirements for DOE financial assistance recipients are specified as scientific/technical reporting deliverables on the Federal Assistance Reporting Checklist (DOE F 4600.2). Other awardees such as Non-major Site/facility Management Contractors technical reporting requirements are identified in Section J, List of Attachments, of the contract as part of the Performance Work Statement/Statement of Work or as a separate attachment. Each required Scientific/Technical Report deliverable is to be submitted to DOE in electronic format as indicated in the award instrument/contractual agreement. Electronic documents should be submitted in one integrated file that contains all text, tables, diagrams, photographs, schematic, graphs,

67

Delegation Procedures - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Accessibility Text size: (Requires JavaScript) Large Normal Small This site uses the Open Source Content Management System Plone and has been designed to be completely accessible...

68

NERSC/DOE ASCR Requirements Workshop Logistics  

NLE Websites -- All DOE Office Websites (Extended Search)

Logistics Workshop Logistics Large Scale Computing and Storage Requirements for Advanced Scientific Computing Research January 5-6, 2011 Location The workshop will be held at...

69

NERSC/DOE NP Requirements Workshop Logistics  

NLE Websites -- All DOE Office Websites (Extended Search)

Hotel Hotel Arrangements Large Scale Computing and Storage Requirements for Nuclear Physics May 26-27, 2011 Location The workshop will be held at Hyatt Regency Bethesda One...

70

Contact Form - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Form by Diane Johnson Directives are the Department of Energy's Primary means of establishing policies, requirements, responsibilities, and procedures for Departmental...

71

Personnel Security - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

72

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

73

DOE NEPA Guidance and Requirements - Search Index - List of Contents |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

List of List of Contents DOE NEPA Guidance and Requirements - Search Index - List of Contents Return to Download Page The NEPA Guidance and Requirements - Search Index includes: A Brief Guide - DOE-wide Contracts For NEPA Documentation [DOE][2003] A Citizen's Guide to the NEPA - Having Your Voice Heard [CEQ][2007] A Resource Handbook on DOE Transportation Risk Assessment [DOE][2002] Actions During the NEPA Process - Interim Actions [DOE][2003] Administrative Record Guidance [DOJ][1991] Aligning the NEPA Process with EMS [CEQ][2007] Alternative Actions For Analysis in Site-wide NEPA Reviews [DOE][1992] Amended Environmental Impact Statement Filing System Guidance [EPA][2012] Analysis of Impacts on Prime and Unique Agricultural Lands and NEPA [CEQ][1980] Analysis of Impacts to Workers in NEPA Documentation [DOE][1988]

74

NERSC/DOE BER Requirements Workshop Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

Christopher Kerr | Global Cloud Resolving Model May 7, 2009 | Author(s): David Randall | IO Requirements for a Global Cloud Resolving Model May 7, 2009 | Author(s): Bruce...

75

DOE Requires Manufacturer and Labeler to Cease Sale of Incandescent...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manufacturer and Labeler to Cease Sale of Incandescent Reflector Lamps DOE Requires Manufacturer and Labeler to Cease Sale of Incandescent Reflector Lamps June 24, 2010 - 2:40pm...

76

DOE RFI 2010-11129 NBP RFI: Communications Requirements Titled  

NLE Websites -- All DOE Office Websites (Extended Search)

RFI 2010-11129 NBP RFI: Communications Requirements Titled RFI 2010-11129 NBP RFI: Communications Requirements Titled "Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy" DOE RFI 2010-11129 NBP RFI: Communications Requirements Titled "Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy" Grid Net, Inc. Comments on Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy DOE RFI 2010-11129 NBP RFI: Communications Requirements Titled "Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy"

77

DOE Responses to DOE Challenge Home (formerly Builders Challenge) National Program Requirements Public Comments  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- Responses to Draft Specification Comments 1 - Responses to Draft Specification Comments 1 Updated 4/9/2012 DOE Responses to DOE Challenge Home (formerly Builders Challenge) National Program Requirements Public Comments DOE received comments on the draft DOE Challenge Home specifications and requirements from December 15, 2011 through January 31, 2012. This document summarizes the comments received, DOE's responses, and the resulting policy change, if any. All comments were reviewed. Similar comments were grouped together in the responses. Editorial comments and general observations were considered, but are not listed in the responses below unless they involved a significant clarification to the DOE Challenge Home provisions. DOE is not responsible for any typographical errors or omissions.

78

Formulating Cyber-Security as Convex Optimization Problems  

E-Print Network (OSTI)

Formulating Cyber-Security as Convex Optimization Problems Kyriakos G. Vamvoudakis, Jo~ao P. Mission-centric cyber-security analysts require a complete overview and understanding of the state. Keywords: Cyber-Security, Convex Optimization, System Identifica- tion, iCTF 1 Introduction Guaranteeing

Hespanha, João Pedro

79

Formulating Cyber-Security as Convex Optimization Problems  

E-Print Network (OSTI)

Formulating Cyber-Security as Convex Optimization Problems? Kyriakos G. Vamvoudakis1 , Jo~ao P,vigna}@cs.ucsb.edu Abstract. Mission-centric cyber-security analysts require a complete overview and understanding The Flag (iCTF) hacking competition. Keywords: Cyber-Security, Convex Optimization, System Identifica- tion

Vigna, Giovanni

80

Implementation of DOE NPH Requirements at the Thomas Jefferson National Accelerator Facility (TJNAF), a Non-Nuclear DOE Lab  

Energy.gov (U.S. Department of Energy (DOE))

Implementation of DOE NPH Requirements at the Thomas Jefferson National Accelerator Facility (TJNAF), a Non-Nuclear DOE Lab David Luke, DOE, Thomas Jefferson Site Office Stephen McDuffie, DOE, Office of the Chief of Nuclear Safety

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

DOE Challenge Home National Program Requirements (Rev. 03)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Program Requirements (Rev. 03) National Program Requirements (Rev. 03) April 17, 2013 Effective for Homes Revised April 17, 2013 Page 1 of 8 Permitted Starting 6/17/2013 To qualify as a DOE Challenge Home, a home shall meet the minimum requirements specified below, be verified and field-tested in accordance with HERS Standards by an approved verifier, and meet all applicable codes. Builders may meet the requirements of either the Performance Path or the Prescriptive path to qualify a home. 1 Single family detached and attached dwelling units, and dwelling units in multifamily buildings with 3 stories or fewer above-grade 2,3 are eligible for qualification. DOE Challenge Home Prescriptive Path The prescriptive path provides a single set of measures that can be used to construct a DOE Challenge Home labeled

82

The Department's Unclassified Cyber Security Program - 2012, IG-0877  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information technology resources continues to expand, the number of cyber security threats against Federal agencies has also increased. In fact, Federal cyber security officials have warned that the number of cyber attackers has increased and that the Nation's

83

Cyber Innovation Technology Summit | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Innovation Technology Summit Cyber Innovation Technology Summit Cyber Innovation Technology Summit November 5, 2013 8:00AM EST Course Title: Cyber Innovation Technology Summit Course Start/End Date: November 5, 2013 Start/End Time: 8:00AM-12:00 PM Course Type: Classrooom Course Location: Forrestal Large Auditorium Course Description: Every October and November, the Department of Energy (DOE) joins the Department of Homeland Security (DHS) and other federal, state and local agencies across the country in support of National Cybersecurity Awareness Month and the "Stop. Think. Connect." campaign. This year marks the tenth year of the cyber security awareness campaign. The theme for this year is Achieving Cybersecurity Together: It's Our Shared Responsibility. By consistently following simple

84

Cyber Security Standards.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

85

DOE-STD-1077-94; DOE Standard Training Accreditation Program Standard: Requirements and Guidelines  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7-94 7-94 August 1994 Supercedes DOE-STD-0101T, TAP-1, and DOE-STD-0103T, TAP-3 DOE STANDARD TRAINING ACCREDITATION PROGRAM STANDARD: REQUIREMENTS AND GUIDELINES U.S. Department of Energy Washington, D.C. 20585 FSC 6910 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document has been reproduced directly from the best available copy. Available to DOE and DOE contractors from the Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831; (615) 576-8401. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 487-4650. Order No. DE94018723 DOE-STD-1077-94 FOREWORD The Training Accreditation Program was established by the Department of Energy

86

DOE Order Self Study Modules - DOE O 426.2 Personnel Selection, Training, Qualification, and Certification Requirements for DOE Nuclear Facilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6.2 6.2 PERSONNEL SELECTION, TRAINING, QUALIFICATION, AND CERTIFICATION REQUIREMENTS FOR DOE NUCLEAR FACILITIES DOE O 426.2 Familiar Level June 2011 1 DOE O 426.2 PERSONNEL SELECTION, TRAINING, QUALIFICATION, AND CERTIFICATION REQUIREMENTS FOR DOE NUCLEAR FACILITIES FAMILIAR LEVEL ___________________________________________________________________________ OBJECTIVES Given the familiar level of this module and the resources, you will be able answer the following questions: 1. What is the purpose of DOE O 426.2, Personnel Selection, Training, Qualification, and Certification Requirements for DOE Nuclear Facilities? 2. What are the DOE field elements requirements associated with DOE O 426.2? 3. What are the general contractor requirements specified in the contractor requirements

87

Personnel Selection, Qualification, and Training Requirements for DOE Nuclear Facilities  

Directives, Delegations, and Requirements

To establish selection, qualification, and training requirements for management and operating (M&O) contractor personnel involved in the operation, maintenance, and technical support of Department of Energy and National Nuclear Security Administration Category A and B reactors and non-reactor nuclear facilities. Canceled by DOE O 426.2

2001-07-12T23:59:59.000Z

88

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

89

Security and Cyber Evaluations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential

90

Chapter 2 - Definitions of Cyber Terrorism  

Science Journals Connector (OSTI)

Abstract The term cyber terror appeared for the first time in the mid-eighties. Since then the notion has been misused a number of times by journalists and politicians. It does not help that cyber terror does not have a clear, agreed definition. This chapter first analyses the background of the confusion. Secondly, the chapter provides a definition of cyber terrorism which aligns with national definitions of terrorism. From this, it becomes clear that no act of cyber terror has yet occurred. We need to be prepared however as the increasing societal critical reliance on ICT will make ICT systems and services as well as embedded ICT an interesting target for future terrorists.

Eric Luiijf

2014-01-01T23:59:59.000Z

91

Cyber Train Videos | The Ames Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Train Videos 1. Cyber Train Overview 2. Cyber Train Opt-Out Process 3. Cyber Train Complete Training 4. Submitting Course Completion Materials...

92

Cyber Incidents Involving Control Systems  

SciTech Connect

The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

Robert J. Turk

2005-10-01T23:59:59.000Z

93

Model Transformation for Cyber Physical Systems  

Science Journals Connector (OSTI)

Cyber Physical Systems(CPS) are composed with discrete and continuous dynamics. Traditional modeling techniques cant implement the requirement of modeling CPS. One way of solving this is to model CPS parts wi...

Shuguang Feng; Lichen Zhang

2014-01-01T23:59:59.000Z

94

NERSC/DOE BES Requirements Workshop Worksheet - Peter Cummings  

NLE Websites -- All DOE Office Websites (Extended Search)

Peter Cummings Peter Cummings Peter Cummings BES Requirements Worksheet 1.1. Project Information - Molecular-Based Simulation of Complex and Nanostructured Fluids Document Prepared By Peter Cummings Project Title Molecular-Based Simulation of Complex and Nanostructured Fluids Principal Investigator Peter Cummings Participating Organizations Vanderbilt University Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: DOE/EERE 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. We perform primarily molecular dynamics simulations of nanostructured

95

Cyber Security & Smart Grid  

E-Print Network (OSTI)

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

96

DOE-STD-6002-96; DOE Standard Safety of Magnetic Fusion Facilities: Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6002-96 6002-96 May 1996 DOE STANDARD SAFETY OF MAGNETIC FUSION FACILITIES: REQUIREMENTS U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document has been reproduced directly from the best available copy. Available to DOE and DOE contractors from the Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831; (423) 576-8401. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 487-4650. Order No. DE96009495 DOE-STD-6002-96 iii TABLE OF CONTENTS Page FOREWORD....................................................................................................................... v

97

NERSC/DOE FES Requirements Workshop Worksheet - Stephane Ethier  

NLE Websites -- All DOE Office Websites (Extended Search)

Stephane Ethier Stephane Ethier Stephane Ethier FES Requirements Worksheet 1.1. Project Information - Global Gyrokinetic PIC Simulations of Plasma Microturbulence Document Prepared By Stephane Ethier Project Title Global Gyrokinetic PIC Simulations of Plasma Microturbulence Principal Investigator Weixing Wang Participating Organizations PPPL Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. We use global, gyrokinetic particle-in-cell simulations to study all aspects of plasma micro-turbulence in the core of tokamak fusion devices.

98

NERSC/DOE FES Requirements Workshop Worksheet - Frank Tsung  

NLE Websites -- All DOE Office Websites (Extended Search)

Frank Tsung Frank Tsung Frank Tsung FES Requirements Worksheet 1.1. Project Information - Large Scale Particle-in-Cell Simulations of Laser Plasma Interactions Relevant to Inertial Fusion En Document Prepared By Frank Tsung Project Title Large Scale Particle-in-Cell Simulations of Laser Plasma Interactions Relevant to Inertial Fusion En Principal Investigator Frank Tsung Participating Organizations UCLA Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. The goal of this project is to use state-of-art particle-in-cell tools

99

NERSC/DOE FES Requirements Workshop Worksheet - Xianzhu Tang  

NLE Websites -- All DOE Office Websites (Extended Search)

Xianzhu Tang Xianzhu Tang Xianzhu Tang FES Requirements Worksheet 1.1. Project Information - Plasma materials interaction Document Prepared By Xianzhu Tang Project Title Plasma materials interaction Principal Investigator Xianzhu Tang Participating Organizations Los Alamos National Laboratory Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. This project combines kinetic modeling of boundary plasma and atomistic modeling of wall material response to plasma irradiation to understand the

100

NERSC/DOE BES Requirements Workshop Worksheet - Mark Jarrell  

NLE Websites -- All DOE Office Websites (Extended Search)

Mark Jarrell Mark Jarrell Mark Jarrell BES Requirements Worksheet 1.1. Project Information - SciDAC: Next Generation Multi-Scale Quantum Simulation Software for Strongly Correlated Materials Document Prepared By Mark Jarrell Project Title SciDAC: Next Generation Multi-Scale Quantum Simulation Software for Strongly Correlated Materials Principal Investigator Mark Jarrell Participating Organizations Louisiana State University Ohio SuperComputer Center UC Davis ORNL Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

NERSC/DOE FES Requirements Workshop Worksheet - Alex Friedman  

NLE Websites -- All DOE Office Websites (Extended Search)

Alex Friedman Alex Friedman Alex Friedman FES Requirements Worksheet 1.1. Project Information - Simulation of intense beams for heavy-ion-fusion science (HEDLP / Inertial Fusion Energy) Document Prepared By Alex Friedman Project Title Simulation of intense beams for heavy-ion-fusion science (HEDLP / Inertial Fusion Energy) Principal Investigator Alex Friedman Participating Organizations LBNL, LLNL, PPPL, Univ. of Maryland Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. The US Heavy Ion Fusion Science Virtual National Laboratory (HIFS-VNL), a

102

NERSC/DOE BES Requirements Workshop Worksheet - Jeffrey B. Neaton  

NLE Websites -- All DOE Office Websites (Extended Search)

Jeffrey B. Neaton Jeffrey B. Neaton Jeffrey B. Neaton BES Requirements Worksheet 1.1. Project Information - Charge Transport and Excited States at Interfaces in Nanostructured Materials Document Prepared By Jeffrey B. Neaton Project Title Charge Transport and Excited States at Interfaces in Nanostructured Materials Principal Investigator Jeffrey B. Neaton Participating Organizations Lawrence Berkeley National Laboratory Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. Over the next 3-5 years, we seek to develop and apply first-principles

103

NERSC/DOE FES Requirements Workshop Worksheet - Zhihong Lin  

NLE Websites -- All DOE Office Websites (Extended Search)

Zhihong Lin Zhihong Lin Zhihong Lin FES Requirements Worksheet 1.1. Project Information - SciDAC GSEP Center and GPS-TTBP Center Document Prepared By Zhihong Lin Project Title SciDAC GSEP Center and GPS-TTBP Center Principal Investigator Zhihong Lin Participating Organizations University of California, Irvine Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. The SciDAC GSEP project will further extend the first-principles global gyrokinetic simulations to study new physics in the energetic particle

104

NERSC/DOE FES Requirements Workshop Worksheet - CS Chang  

NLE Websites -- All DOE Office Websites (Extended Search)

CS Chang CS Chang CS Chang FES Requirements Worksheet 1.1. Project Information - Center for Plasma Edge Simulation Document Prepared By CS Chang Project Title Center for Plasma Edge Simulation Principal Investigator CS Chang Participating Organizations New York University, ORNL, PPPL, LBNL, MIT, Columbia U., Rutgers U. Lehigh U., Georgia Tech, Auburn U., U. Colorado, U. California at Irvine, Caltech, Hinton Associates Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. Develop the XGC large scale edge kinetic codes further for higher fidelity

105

IDENTIFICATION OF DOE'S POST-CLOSURE MONITORING NEEDS AND REQUIREMENTS  

SciTech Connect

The 2006 plan sets an ambitious agenda for the U.S. Department of Energy (DOE), Office of Environmental Management (EM) and the remediation of sites contaminated by decades of nuclear weapons production activities. The plan's primary objective is to reduce overall clean up costs by first eliminating the environmental problems that are most expensive to control and safely maintain. In the context of the 2006 Plan, closure refers to the completion of area or facility specific cleanup projects. The cleanup levels are determined by the planned future use of the site or facility. Use restrictions are still undecided for most sites but are highly probable to exclude residential or agricultural activities. Most of the land will be remediated to ''industrial use'' levels with access restrictions and some areas will be closed-off through containment. Portions of the site will be reserved for waste disposal, either as a waste repository or the in-situ immobilization of contaminated soil and groundwater, and land use will be restricted to waste disposal only. The land used for waste disposal will require monitoring and maintenance activities after closure. Most of the land used for industrial use may also require such postclosure activities. The required postclosure monitoring and maintenance activities will be imposed by regulators and stakeholders. Regulators will not approve closure plans without clearly defined monitoring methods using approved technologies. Therefore, among all other more costly and labor-intensive closure-related activities, inadequate planning for monitoring and lack of appropriate monitoring technologies can prevent closure. The purpose of this project is to determine, document, and track the current and evolving postclosure monitoring requirements at DOE-EM sites. This information will aid CMST-CP in guiding its postclosure technology development and deployment efforts.

M.A. Ebadian, Ph.D.

1999-01-01T23:59:59.000Z

106

Comparison of selected DOE and non-DOE requirements, standards, and practices for Low-Level Radioactive Waste Disposal  

SciTech Connect

This document results from the Secretary of Energy`s response to Defense Nuclear Facilities Safety Board Recommendation 94--2. The Secretary stated that the US Department of Energy (DOE) would ``address such issues as...the need for additional requirements, standards, and guidance on low-level radioactive waste management. `` The authors gathered information and compared DOE requirements and standards for the safety aspects Of low-level disposal with similar requirements and standards of non-DOE entities.

Cole, L. [Cole and Associates (United States); Kudera, D.; Newberry, W. [Lockheed Idaho Technologies Co., Idaho Falls, ID (United States)

1995-12-01T23:59:59.000Z

107

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

108

Microsoft Word - DOE RFI - NBP RFI Communications Requirements.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 Donahue Ferry Road P.O. Box 5000 Pineville, LA 71361-5000 www.cleco.com Tel. 318-484-7400 July 12, 2010 U. S. Department of Energy Office of the General Counsel 1000 Independence Ave, SW, Room 6A245 Washington, DC 20585 Subject: NBP RFI: Communications Requirements Introduction Cleco Corporation greatly appreciates the opportunity to provide information to the Department of Energy (DOE) on the communications needs of utilities. Cleco is an energy services company based in central Louisiana, serving approximately 276,000 residential, commercial and industrial customers since 1934. Cleco manages over 3,000 megawatts of electric capacity through its regulated Cleco Power LLC and unregulated Cleco Midstream Resources LLC businesses, utilizing a diverse fuel mix of lignite, coal, petcoke and natural gas. With 1,300 employees, Cleco manages and operates 70 transmission

109

POLICY GUIDANCE MEMORANDUM #33- Requirements for DOE Delegated Examining Procedures  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of this guidance is to establish the Department of Energys (DOEs) Delegated Examining policy and procedures in order to ensure an effective competitive examining program that supports...

110

New Justification Memos - DOE Directives, Delegations, and Requirement...  

NLE Websites -- All DOE Office Websites (Extended Search)

Justification Memos by Diane Johnson DOE N 200.1 - Notice of Intent to Develop an Information Sharing and Safeguarding Program Notice DOE G 580.1-1 - Notice of Intent to Revise...

111

Help for the Developers of Control System Cyber Security Standards  

SciTech Connect

A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

Robert P. Evans

2008-05-01T23:59:59.000Z

112

Notice of Intent to Develop DOE O 470.5, Integrating Existing Technical Security Program Requirements  

Directives, Delegations, and Requirements

This memorandum provides justification for the development of one integrated and consolidated set of requirements for the Department of Energy (DOE) Technical Security Program (TSP). This Order will combine the existing necessary requirements from DOE Manual (M) 205.1-3, Telecommunications Security Manual, dated 4-17-2006 and DOE M 470.4-4A chg.1, Information Security Manual, dated 10-12-2010; Section D -Technical Surveillance Countermeasures, into a single DOE Order defining the DOE TSP.

2013-08-21T23:59:59.000Z

113

Applying DOE O 414.1C and NQA-1 Requirements to ISM Software...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications DOE G 414.1-4, Safety Software Guide for Use with 10 CFR 830 Subpart A, Quality Assurance Requirements, and DOE O 414.1C, Quality Assurance...

114

Cyber sleuths face off  

NLE Websites -- All DOE Office Websites (Extended Search)

to plasma physics and new materials. Contact Communications Office (505) 667-7000 Hacking skills put to the test in week of hands-on cyber warfare training LOS ALAMOS, New...

115

The Department's Cyber Security Incident Management Program, IG-0787 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

116

DOE Zero Energy Ready Home National Program Requirements (Rev. 04)  

Energy.gov (U.S. Department of Energy (DOE))

U.S. Department of Energy Zero Energy Ready Home National Program Requirements (Rev. 04), April 21, 2014.

117

DOE Cybersecurity Training and Education  

Energy.gov (U.S. Department of Energy (DOE))

Introductory information to describe DOE Cybersecurity training and education programs, to include available role-based/core competency courses as well as other Fedeal cyber training programs.

118

DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Minimum Appliance Standards DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners Violating Minimum Appliance Standards June 3, 2010 - 2:17pm Addthis...

119

Enforcement handbook: Enforcement of DOE nuclear safety requirements  

SciTech Connect

This Handbook provides detailed guidance and procedures to implement the General Statement of DOE Enforcement Policy (Enforcement Policy or Policy). A copy of this Enforcement Policy is included for ready reference in Appendix D. The guidance provided in this Handbook is qualified, however, by the admonishment to exercise discretion in determining the proper disposition of each potential enforcement action. As discussed in subsequent chapters, the Enforcement and Investigation Staff will apply a number of factors in assessing each potential enforcement situation. Enforcement sanctions are imposed in accordance with the Enforcement Policy for the purpose of promoting public and worker health and safety in the performance of activities at DOE facilities by DOE contractors (and their subcontractors and suppliers) who are indemnified under the Price-Anderson Amendments Act. These indemnified contractors, and their suppliers and subcontractors, will be referred to in this Handbook collectively as DOE contractors. It should be remembered that the purpose of the Department`s enforcement policy is to improve nuclear safety for the workers and the public, and this goal should be the prime consideration in exercising enforcement discretion.

NONE

1995-06-01T23:59:59.000Z

120

DOE's General Counsel Announces New Policy Requiring Online Posting of NEPA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE's General Counsel Announces New Policy Requiring Online Posting DOE's General Counsel Announces New Policy Requiring Online Posting of NEPA Categorical Exclusion Determinations to Further Transparency DOE's General Counsel Announces New Policy Requiring Online Posting of NEPA Categorical Exclusion Determinations to Further Transparency October 15, 2009 - 10:09am Addthis Washington, DC - Consistent with the President's commitment to "disclose information rapidly in forms that the public can readily find and use," DOE announced today a new policy requiring all DOE program and field offices to document certain categorical exclusion determinations and post them online. Categorical exclusions are classes of actions that DOE has determined by regulation do not have a significant effect on the environment, and, therefore, normally do not require detailed environmental

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

NERSC/DOE BES Requirements Workshop Worksheet - Normand Modine  

NLE Websites -- All DOE Office Websites (Extended Search)

Modine BES Requirements Worksheet 1.1. Project Information - Center for Integrated Nanotechnology (CINT) - Theory and Simulation Thrust Document Prepared By Normand Modine Project...

122

NERSC/DOE FES Requirements Workshop Worksheet - Alex Friedman  

NLE Websites -- All DOE Office Websites (Extended Search)

Friedman FES Requirements Worksheet 1.1. Project Information - Simulation of intense beams for heavy-ion-fusion science (HEDLP Inertial Fusion Energy) Document Prepared By...

123

Departmental Cyber Security Management Policy  

Directives, Delegations, and Requirements

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

124

NERSC/DOE FES Requirements Workshop Worksheet - Brian Wirth  

NLE Websites -- All DOE Office Websites (Extended Search)

Brian Wirth Brian Wirth Brian Wirth 1.1. Project Information - Modeling plasma - surface interactions Document Prepared By Brian Wirth Project Title Modeling plasma - surface interactions Principal Investigator Brian Wirth Participating Organizations University of California, Berkeley; University of Tennessee; Oak Ridge National Laboratory Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. It is acknowledged that plasma-material interactions pose an immense scientific challenge and are one of the most critical issues in magnetic

125

DOE-STD-1082-94; DOE Standard Preparation, Review, and Approval of Implementaiton Plans For Nuclear Safety Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

82-94 82-94 October 1994 DOE STANDARD PREPARATION, REVIEW, AND APPROVAL OF IMPLEMENTATION PLANS FOR NUCLEAR SAFETY REQUIREMENTS U.S. Department of Energy AREA SAFT Washington D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document has been reproduced directly from the best available copy. Available to DOE and DOE contractors from the Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831; (615)576-8401. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 487-4650. Order No. DE95001461 DOE-STD-1082-94 iii FOREWORD 1. This Department of Energy (DOE) technical standard has been prepared by the Office of Environment, Safety and Health with the assistance of Steve

126

SSN comments to DOE NBP RFI communications requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Comms Requirements Comms Requirements 12 July 2010 1/6 Michael Jung // Policy Director // Silver Spring Networks 888.406.1882 // mjung@silverspringnet.com (1) What are the current and future communications needs of utilities, including for the deployment of new Smart Grid applications, and how are these needs being met? Utilitiesʼ current communications needs are diverse, with considerable variation from utility to utility. Current communications needs that are related to, but generally pre-date, smart grid include: * System control and data acquisition (SCADA) * Drive-by meter reading * One-way direct load control * Mobile workforce management * Demand response, dynamic pricing for commercial/industrial customers In the smart grid-enabled future, utility smart grid applications will require

127

The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice  

Science Journals Connector (OSTI)

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and ...

Steve Winterfeld; Jason Andress

2012-12-01T23:59:59.000Z

128

Office of Security and Cyber Evaluations  

NLE Websites -- All DOE Office Websites (Extended Search)

Welcome to the Office of Security and Cyber Evaluations The Office of Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential differences in approach since your last interaction with us.

129

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

130

DOE-HDBK-1163-2003; Integration of Multiple Hazard Analysis Requirements and Activities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE-HDBK-1163-2003 October 2003 DOE HANDBOOK INTEGRATION OF MULTIPLE HAZARD ANALYSIS REQUIREMENTS AND ACTIVITIES U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. TS DOE-HDBK-1163-2003 ii This document has been reproduced directly from the best available copy. It is available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy, (800) 473-4375, fax: (301) 903-9823. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 605-6000. DOE-HDBK-1163-2003 iii FOREWORD 1. This Department of Energy (DOE) standard is approved for use by all DOE Components and

131

Version Tracking Document for DOE Challenge Homes, National Program Requirements (Rev. 03)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tracking Document for Tracking Document for DOE Challenge Homes, National Program Requirements (Rev. 03) 4/17/2013 In the time since Revision 02 of the DOE Challenge Home National Program Requirements was released, DOE has modified, clarified, and refined various aspects of the program documents, primarily in response to partner questions and comments. This document is a summary of these edits, organized by the section of the National Program Requirements in which they appear. DOE has also posted the revised National Program Requirements, labeled Rev. 03, on its Web site at www.buildings.energy.gov/challenge. All revisions are categorized as a Change, Clarification, or Refinement. These are defined as follows: Change - The addition, deletion, or modification of a program requirement. A change will typically result from a partner

132

Microsoft Word - OE Cyber Release 10 18 07.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These projects will

133

Cyber security best practices for the nuclear industry  

SciTech Connect

When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)

2012-07-01T23:59:59.000Z

134

Introduction to DOE Order 435.1 Low Level Radioactive Waste Disposal Requirements  

Energy.gov (U.S. Department of Energy (DOE))

Introduction to DOE Order 435.1 Low Level Radioactive Waste Disposal Requirements Christine Gelles*, U.S. Department of Energy ; Edward Regnier, U.S. Department of Energy; Andrew Wallo, U.S. Department of Energy Abstract: The Atomic Energy Act gives the U.S. Department of Energy (US DOE), the authority to regulate the management of radioactive waste generated by US DOE. This session will discuss DOE Order 435.1, which is protective of workers, public, and environment through specific requirements for the generation, treatment, storage, and disposal of US DOE radioactive waste. The Order is divided into four chapters: General Requirements, High-Level Waste, Transuranic Waste and Low-Level Waste. The requirements are consistent with existing promulgated Federal requirements but are specific to waste generated and disposed at US DOE facilities. A technical standard with requirements for documentation supporting the Disposal Authorization for a facility is also being prepared as well as a guide to accompany the Order. US DOE is in the process of updating the Order to maintain consistency with current practices and to increase efficiency in waste management. The draft Order will be available for public comment prior to being finalized.

135

DOE Order 458.1 Property Clearance Requirements and Factors Considered to Update Its Clearance Limits  

Energy.gov (U.S. Department of Energy (DOE))

DOE Order 458.1 Property Clearance Requirements and Factors Considered to Update Its Clearance Limits Carlos Corredor*, U.S. Department of Energy ;Gustavo Vasquez, U.S. Department of Energy; Derek Favret, U.S. Department of Energy This presentation will provide an explanation of the property clearance requirements contained in DOE O 458.1, including the methods to release or clear property: process knowledge and authorized limits. In addition, it will provide a special focus on the efforts to update the surface guidelines table in DOE directives. In planning to update its property clearance criteria DOE is considering many factors; such as their protectiveness, whether they are dose-based, consistency with voluntary consensus standards and national and international radiation protection recommendations, and consistency with DOE dose constraints. One option being considered is a hybrid approach using a national consensus standard for personal property and DOE derived values for real property.

136

Personnel Selection, Training, Qualification, and Certification Requirements for DOE Nuclear Facilities  

Directives, Delegations, and Requirements

The order establishes selection, training, qualification, and certification requirements for contractor personnel who can impact the safety basis through their involvement in the operation, maintenance, and technical support of Hazard Category 1, 2, and 3 nuclear facilities. Cancels DOE O 5480.20A. Admin Chg 1, dated 7-29-13, cancels DOE O 426.2.

2010-04-21T23:59:59.000Z

137

DOE Requires Westinghouse to Cease Sales of Two Light Bulb Models and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requires Westinghouse to Cease Sales of Two Light Bulb Models Requires Westinghouse to Cease Sales of Two Light Bulb Models and Allows Sale of Another DOE Requires Westinghouse to Cease Sales of Two Light Bulb Models and Allows Sale of Another October 18, 2010 - 10:27am Addthis As a part of DOE's continuing enforcement action against Westinghouse Lighting Corporation, the company must cease sales of two light bulb models - medium based CFL basic model 15GLOBE/65/2 (Westinghouse product code 3800400) and general service fluorescent lamp model F40T12/CWE (Westinghouse product code 07521000) - because they do not meet DOE's energy efficiency standards. Based on test data provided by Westinghouse for basic model 15GLOBE/65/2, DOE has issued a Notice of Non-Compliance Determination to Westinghouse Lighting Corporation, requiring Westinghouse to halt sales and notify all

138

Version Tracking Document for DOE Challenge Homes, National Program Requirements (Rev. 03)  

Energy.gov (U.S. Department of Energy (DOE))

Version Tracking Document for DOE Challenge Homes, National Program Requirements (Rev. 03), 4/17/2013, from the U.S. Department of Energy's Office of Energy Efficiency and Renewable Energy website.

139

DOE Requires Westinghouse to Cease Sales of Two Light Bulb Models and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requires Westinghouse to Cease Sales of Two Light Bulb Models Requires Westinghouse to Cease Sales of Two Light Bulb Models and Allows Sale of Another DOE Requires Westinghouse to Cease Sales of Two Light Bulb Models and Allows Sale of Another October 18, 2010 - 10:27am Addthis As a part of DOE's continuing enforcement action against Westinghouse Lighting Corporation, the company must cease sales of two light bulb models - medium based CFL basic model 15GLOBE/65/2 (Westinghouse product code 3800400) and general service fluorescent lamp model F40T12/CWE (Westinghouse product code 07521000) - because they do not meet DOE's energy efficiency standards. Based on test data provided by Westinghouse for basic model 15GLOBE/65/2, DOE has issued a Notice of Non-Compliance Determination to Westinghouse Lighting Corporation, requiring Westinghouse to halt sales and notify all

140

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines September 2, 2010 - 3:15pm Addthis WASHINGTON, D.C. - The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats. The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Obama's Call for Public-Private Cyber Security Collaboration Reflected in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obama's Call for Public-Private Cyber Security Collaboration Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities May 29, 2009 - 4:08pm Addthis In releasing the results of his Administration's 60-day cyber security review, President Barack Obama today emphasized that partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the computer-based systems that monitor and control the nation's electric grid and oil and gas pipelines remains a shared challenge for the Department of Energy. As the industry quickly works to develop and demonstrate Smart Grid technologies to build a more reliable and resilient

142

CYBER SECURITY OF SUBSTATION AUTOMATION SYSTEMS .  

E-Print Network (OSTI)

??Cyber intrusions into substations of a power grid are a source of vulnerability since most substations are unmanned and with limited protection of the cyber (more)

[No author

2014-01-01T23:59:59.000Z

143

Information Security: Coordination of Federal Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

144

Application of Engineering and Technical Requirements for DOE Nuclear Facilities Standard Review Plan (SRP)  

Energy.gov (U.S. Department of Energy (DOE))

This Standard Review Plan (SRP), Application of Engineering and Technical Requirements for DOE Nuclear Facilities, was developed by the Chief of Nuclear Safety (CNS)1, Office of the Under Secretary for Nuclear Security, to help strengthen the technical rigor of line management oversight and federal monitoring of DOE nuclear facilities. This SRP (hereafter refers to as the Engineering SRP) provides consistent review guidance to assure that engineering and technical requirements are appropriately applied for the design, operations and disposition2 of DOE nuclear facilities. It is one of a series of three SRPs developed by the CNS. The other two SRPs address: 1) nuclear safety basis program review; and 2) application of requirements of DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets, and DOE-STD-1189, Integration of Safety into the Design Process, for DOE Critical Decision (CD) review and approval. These SRPs may be revised in the future to reflect changes in the DOE requirements, lessons learned, and experience/insights from nuclear facility design, operations, and disposition.

145

TCIP: Trustworthy CyberInfrastructure for the Power Grid | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid The TCIP, or Trustworthy CyberInfrastructure for the Power Grid, project's vision is to provide the fundamental science and technology to create an intelligent, adaptive power grid which survives malicious adversaries, provides continuous delivery of power, and supports dynamically varying trust requirements. This goal may be reached by creating the cyber building blocks, architecture, and validation technology to quantify the amount of trust provided by a proposed approach. The presentation below was given by William H. Saunders at the Visualization and Controls Program Peer Review in October 2006. TCIP: Trustworthy CyberInfrastructure for the Power Grid

146

The Cyber Security Crisis  

SciTech Connect

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

147

TA-55 Final Safety Analysis Report Comparison Document and DOE Safety Evaluation Report Requirements  

SciTech Connect

This document provides an overview of changes to the currently approved TA-55 Final Safety Analysis Report (FSAR) that are included in the upgraded FSAR. The DOE Safety Evaluation Report (SER) requirements that are incorporated into the upgraded FSAR are briefly discussed to provide the starting point in the FSAR with respect to the SER requirements.

Alan Bond

2001-04-01T23:59:59.000Z

148

THE ADVANCED COURSE IN ENGINEERING ON CYBER A Learning Community for Developing Cyber-Security Leaders  

E-Print Network (OSTI)

THE ADVANCED COURSE IN ENGINEERING ON CYBER SECURITY A Learning Community for Developing Cyber-Security in Engineering, ACE-CS immerses students in the cyber-security discipline through a combination of intense in Engineering on Cyber Security (ACE-CS) [1] is to develop the next generation of cyber-security leaders

Older, Susan

149

Does  

NLE Websites -- All DOE Office Websites (Extended Search)

Does Does the cellulose-binding module move on the cellulose surface? Yu-San Liu Æ Yining Zeng Æ Yonghua Luo Æ Qi Xu Æ Michael E. Himmel Æ Steve J. Smith Æ Shi-You Ding Received: 26 November 2008 / Accepted: 11 May 2009 / Published online: 19 June 2009 Ó Springer Science+Business Media B.V. 2009 Abstract Exoglucanases are key enzymes required for the efficient hydrolysis of crystalline cellulose. It has been proposed that exoglucanases hydrolyze cellulose chains in a processive manner to produce primarily cellobiose. Usually, two functional modules are involved in the processive mechanism: a catalytic module and a carbohydrate-binding module (CBM). In this report, single molecule tracking techniques were used to analyze the molecular motion of CBMs labeled with quantum dots (QDs) and bound to cellulose crystals. By tracking the single QD, we observed that the family 2 CBM from

150

DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requires Manufacturers to Halt Sales of Heat Pumps and Air Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners Violating Minimum Appliance Standards DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners Violating Minimum Appliance Standards June 3, 2010 - 12:00am Addthis Washington, DC - Today, the Department of Energy announced that three manufacturers -- Aspen Manufacturing, Inc., Summit Manufacturing, and Advanced Distributor Products -- must stop distributing 61 heat pump models and 1 air conditioner model that DOE has determined do not comply with federal energy conservation standards. The manufacturers also must notify all of their customers that have been sold noncompliant units. The Department determined that these models were noncompliant based on certification information submitted to DOE for these manufacturers.

151

DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requires Manufacturers to Halt Sales of Heat Pumps and Air Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners Violating Minimum Appliance Standards DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners Violating Minimum Appliance Standards June 3, 2010 - 2:17pm Addthis Today, the Department of Energy announced that three manufacturers -- Aspen Manufacturing, Inc., Summit Manufacturing, and Advanced Distributor Products -- must stop distributing 61 heat pump models and 1 air conditioner model that DOE has determined do not comply with federal energy conservation standards. The manufacturers also must notify all of their customers that have been sold noncompliant units. The Department determined that these models were noncompliant based on certification information submitted to DOE for these manufacturers.

152

Attachment 6, Certification of Intent to Comply with DOE NEPA Requirements/Complete Environmental Questionnaire  

NLE Websites -- All DOE Office Websites (Extended Search)

6 6 CERTIFICATION OF INTENT TO COMPLY WITH DOE NEPA REQUIREMENTS/COMPLETE ENVIRONMENTAL QUESTIONNAIRE The Applicant, , if (name of institution) selected for award under Program Solicitation DE-PS26-02NT41430, "Support of Advanced Fossil Resource Utilization Research by Historically Black Colleges and Universities and Other Minority Institutions," agrees that, it will complete the Environmental Questionnaire within thirty (30) days of request, and provide any other environmental-related data as requested by DOE to satisfy NEPA requirements. (Signature of Authorized Official)

153

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

154

of Western Area Power Administration's Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Western Area Power Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 October 22, 2012 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Western Area Power Administration's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Department of Energy's Western Area Power Administration (Western) markets and delivers hydroelectric power and related services to 15 states within the central and western United States. As the largest U.S. Power Marketing Administration, millions of households and

155

Personnel Selection, Training, Qualification, and Certification Requirements for DOE Nuclear Facilities  

Directives, Delegations, and Requirements

The order establishes selection, training, qualification, and certification requirements for contractor personnel who can impact the safety basis through their involvement in the operation, maintenance, and technical support of Hazard Category 1, 2, and 3 nuclear facilities. Cancels DOE O 5480.20A. Admin Chg 1, dated 7-29-13.

2010-04-21T23:59:59.000Z

156

Cyber and physical infrastructure interdependencies.  

SciTech Connect

The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

2008-09-01T23:59:59.000Z

157

DOE's General Counsel Announces New Policy Requiring Online Posting of NEPA Categorical Exclusion Determinations to Further Transparency  

Energy.gov (U.S. Department of Energy (DOE))

Washington, DC - Consistent with the President's commitment to "disclose information rapidly in forms that the public can readily find and use," DOE announced today a new policy requiring all DOE...

158

Chapter 20 - Cyber Security Countermeasures to Combat Cyber Terrorism  

Science Journals Connector (OSTI)

Abstracts: In this chapter we first consider what constitutes cyber terrorism, to distinguish such events from other forms of cybercrime, and to establish a rationale for that distinction. We discuss some of the characteristics of cyber terrorist events in comparison with cybercriminal events, and the changes that have occurred, socially and technologically, that make such events both more likely and more damaging. We then go on to consider three key aspects of cyber terrorist attacks, cyber attacks on physical systems, malware specifically developed for such attacks, and insider threats to enable or support such attacks. Next, we look at the countermeasures that can be adopted by organizations and individuals to address such threats, highlighting the significant human component of such systems through the need for standards-based policies and protocols, good security hygiene, and the training of system users at all levels. We also consider some issues of physical systems upgrade, and some software measures that can be used to identify and isolate cyber threats. Finally, we consider the future in terms of the likely further growth of cyber terrorist events, and the threat they pose to critical infrastructure and the systems on which, socially and technologically, we increasingly rely.

Lachlan MacKinnon; Liz Bacon; Diane Gan; Georgios Loukas; David Chadwick; Dimitrios Frangiskatos

2013-01-01T23:59:59.000Z

159

Extension of DOE Directives  

Directives, Delegations, and Requirements

This Notice extends the following directives until 2/16/04: DOE N 205.2, Foreign National Access to DOE Cyber Systems, and DOE N 205.3, Password Generation, Protection, and Use, dated 11/23/99-7/1/00.

2003-02-24T23:59:59.000Z

160

DOE Requires Air-Con International to Cease Sales of Inefficient Air  

NLE Websites -- All DOE Office Websites (Extended Search)

Requires Air-Con International to Cease Sales of Inefficient Requires Air-Con International to Cease Sales of Inefficient Air Conditioners and Proposes Penalties DOE Requires Air-Con International to Cease Sales of Inefficient Air Conditioners and Proposes Penalties September 21, 2010 - 6:43pm Addthis The Department has issued a Notice of Noncompliance Determination and Proposed Civil Penalty to Air-Con, International, requiring Air-Con to cease the sale of certain air-conditioning systems in the United States and proposing a civil penalty of $231,090 for sales of these products in violation of the applicable energy efficiency standards. This action reflects the Department's continued commitment to act aggressively to remove unlawful products from the market. In March, 2010, the Department issued a subpoena requiring Air-Con to

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

INL@Work Cyber Security  

SciTech Connect

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

162

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z

163

Energy Cyber Other Degree Program  

E-Print Network (OSTI)

Rev. Energy Cyber Other Yes No Degree Program States National Security Implications of Energy & Environmental Stress New Theories of Cross-Advisor: Graduation Date: Curric Num: Power and Energy New Approaches to Understanding Dimensions of National Security

164

Cyber Attacks, Prevention, and Countermeasures  

Science Journals Connector (OSTI)

In response to the ever-increasing number of cyber attacks on both private companies and the United States government, U.S. Congress has introduced the Cybersecurity Enhancement Act of 2007, the National Commi...

Newton Lee

2013-01-01T23:59:59.000Z

165

Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department's Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates numerous networks and systems to help accomplish its strategic missions in the areas of energy, defense, science and the environment. The systems are frequently subjected to sophisticated cyber attacks that could impact the Department's

166

21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 Steps to Improve Cyber Security of SCADA Networks 1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in cyber space today. By allowing the collection and analysis of data and control of equipment such as pumps and valves from remote locations, SCADA networks provide great efficiency and are widely used. However, they also present a security risk. 21 Steps to Improve Cyber Security of SCADA Networks

167

Visualizing Cyber Security: Usable Workspaces  

SciTech Connect

An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

2009-10-11T23:59:59.000Z

168

DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manufacturers to Halt Sales of Heat Pumps and Air Manufacturers to Halt Sales of Heat Pumps and Air Conditioners Violating Minimum Appliance Standards DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners Violating Minimum Appliance Standards June 3, 2010 - 2:17pm Addthis Today, the Department of Energy announced that three manufacturers -- Aspen Manufacturing, Inc., Summit Manufacturing, and Advanced Distributor Products -- must stop distributing 61 heat pump models and 1 air conditioner model that DOE has determined do not comply with federal energy conservation standards. The manufacturers also must notify all of their customers that have been sold noncompliant units. The Department determined that these models were noncompliant based on certification information submitted to DOE for these manufacturers.

169

Strengthening Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

E E n E rgyB i z November/December 2008 » TECHNOLOGY FRONTIER (Guest OpiniOn) remOte attaCks On systems that control power production and distribution are no longer hypothetical events. At least four utilities have been subjected to extortion demands by criminals who used the Internet to infect the utilities' computers and caused or threatened power outages. Cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption caused a power outage affecting multiple cities. These are criminal acts, but nation-states are actively targeting utility computers, as well, so that in time of war they can turn off their adversary's power. While all this is happening, most executives in the

170

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

171

Convergence Approach to Model Physical World and Cyber World of Aviation Cyber Physical System  

Science Journals Connector (OSTI)

Aviation Cyber-Physical Systems are the integration of cyber systems and physical systems. Recent concentration to Aviation Cyber Physical Systems (ACPS) is driven by the demand for deeper Convergence of design disciplines that integrate physical and ... Keywords: Aviation Cyber Physical System CPS, Modelica, AADL, SysML, Spatial-Temporal Features, Dynamic Continuous Features

Lichen Zhang

2014-08-01T23:59:59.000Z

172

THE ADVANCED COURSE IN ENGINEERING ON CYBER A Learning Community for Developing Cyber-Security Leaders  

E-Print Network (OSTI)

THE ADVANCED COURSE IN ENGINEERING ON CYBER SECURITY A Learning Community for Developing Cyber-Security Advanced Course in Engineering, ACE-CS immerses students in the cyber-security discipline through for the program. Key words: Cyber-security education, technical leadership, learning community. 1. INTRODUCTION

173

First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems  

Science Journals Connector (OSTI)

This extended abstract reports on steps towards an environment for repeatable and scalable experiments on wide-area cyber-physical systems. The cyber-physical systems that underlie the world's critical infrastructure are increasingly vulnerable to attack ... Keywords: cyber-physical, cyber-security, experimental research, overlay network, smart grid, testbed

Ryan Goodfellow; Robert Braden; Terry Benzel; David E. Bakken

2013-01-01T23:59:59.000Z

174

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

175

The Fragmented Securitization of Cyber Threats  

Science Journals Connector (OSTI)

Cybersecurity is one of the most pressing national security issues nowadays. Cyber threats reached truly global scales, cyber attacks that potentially or actually cause physical damage are on the rise, and sec...

Agnes Kasper

2014-01-01T23:59:59.000Z

176

Enforcement Guidance Supplement 99-02: DOE Enforcement Activities of Internal Dosimetry Program Requirements  

Energy.gov (U.S. Department of Energy (DOE))

Section 1.3 of the Operational Procedure entitled Enforcement of DOE Nuclear Safety Requirements under Price-Anderson Amendments Act of 1988, published in June 1998, provides the opportunity for the Office of Enforcement and Investigation (EH Enforcement) to issue clarifying guidance in a timely manner with respect to the processes used in its enforcement activities. The focus of this enforcement guidance clarifies internal dosimetry program requirements identified by the Department of Energys nuclear safety requirements in 10 CFR 835 (Occupational Radiation Protection Programs) and 10 CFR 830.120 (Quality Assurance Requirements). To develop the enforcement guidance, EH Enforcement convened a DOE working group which included representatives from the Field Office elements and the Office of Worker Protection Programs and Hazards Management, which is the office responsible for the content and technical clarifications of 10 CFR 835. The guide discusses the following areas: (1) prospective determination of employees that are likely to receive 100 millirem (mrem) or greater per 10 CFR 835.402, (Individual Monitoring); (2) application of enforcement policy in taking credit for respiratory protection in prospective determinations; (3) use of contractors policies regarding personnel internal exposure to radioactive material; (4) As Low As Reasonably Achievable (ALARA) programs; (5) clarification of enforcement with regard to internal dosimetry programs; and Final Comments.

177

Cyber Security Evaluation of II&C Technologies  

SciTech Connect

The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industrys template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

Ken Thomas

2014-11-01T23:59:59.000Z

178

Modification of the U.S. Department of Energy`s (DOE) sytem of radiation protection requirements and guidance  

SciTech Connect

DOE has undertaken a major modification of its system of radiation protection guidance and requirements. The objectives of this modification are to (1) eliminate unnecessary and redundant requirements, (2) clearly delineate requirements from guidance, (3) codify all radiation protection requirements, and (4) move from a compliance based approach towards a performance based approach. To achieve these objectives DOE has (1) canceled DOE Order 5480.11, {open_quotes}Radiation Protection for DOE Workers,{close_quotes} DOE Order 5480.15, {open_quotes}Department of Energy Laboratory Accreditation Program (DOELAP) for Personnel Dosimetry,{close_quotes} and DOE Notice 5400.13, {open_quotes}Sealed Radioactive Source Accountability,{close_quotes} (2) converted the DOE Radiological Control (RadCon) Manual from mandatory to non mandatory status, and (3) issued DOE Notice 441.1 to maintain those requirements (not in 10 CFR 835) considered necessary for radiation protection of workers. DOE has initiated actions to (1) amend 10 CFR 835 (the Federal rule on occupational radiation protection in the DOE complex) to incorporate the requirements, or their equivalent, in DOE Notice 441.1, (2) issue a technical standard containing guidance on DOELAP, (3) reissue the DOE RadCon Manual as a non mandatory technical standard that reflects the amendments to 10 CFR 835, and (4) revise the implementation guides on radiation protection for consistency with 10 CFR 835 and the RadCon Manual. As a result of these modifications, the system of radiation protection in the DOE will become more comparable with the system of radiation protection used by commercial industry and with the system of protection applied to other areas of worker health and safety.

O`Connell, P.V.; Rabovsky, J.L.; Zobel, S.G. [Department of Energy, Germantown, MD (United States)

1996-06-01T23:59:59.000Z

179

Department of Energy's July 2013 Cyber Security Breach  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Department of Energy's July The Department of Energy's July 2013 Cyber Security Breach DOE/IG-0900 December 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 December 6, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Review of the "Department of Energy's July 2013 Cyber Security Breach" BACKGROUND To facilitate its administrative and operational needs, the Department of Energy maintains a substantial amount of personally identifiable information (PII). The Department's Management Information System (MIS) provides a gateway for users to access a system known as the DOE Employee Data Repository (DOEInfo) database. That system was implemented in 1994, and

180

DOE Policies | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Policies DOE Policies DOE Policies Cyber Security DOE O 205.1B Department of Energy Cyber Security Management (Approved May 16, 2011) Information Management Planning DOE Guide to IT Capital Planning and Investment, September 2010 (pdf) DOE IRM Strategic Plan, FY 2009 - 2011 (pdf) DOE N 203.1, Software Quality Assurance (pdf) DOE G 242.1-1, Forms Management Guide (pdf) DOE O 203.1 Limited Personal Use of Government Office Equipment Including Information Technology (pdf) Information Management Program Order, DOE O 200.1A (pdf) (Access to this document is restricted to DOE employees only) Records Management DOE Directive, O 243.1, Records Management Program (pdf) DOE Directive, O 243.2, Vital Records (pdf) DOE Directive, O 200.2, Information Collection Management Program

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed More Documents & Publications Security is Not an Option ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004)

182

Leadership Development Series: "A Holistic Look at Cyber Security" |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" January 30, 2014 10:30AM to 12:00PM EST Registration link: By e-mail, $0 Course type: Classroom/Auditorium, Video Cast & Teleconference Course Location: DOE Headquarters, Forrestal Building, Washington, DC/ Main Auditorium Course Description: Dr. Steven Bucci, Director, Douglas and Sarah Allison Center for Foreign Policy Studies. The sheer volume of cyber activity is masking serious threats that impact government, business and our personal lives every day. Incidents are now ubiquitous, pervasive and constitute the new "normal". These day to day threats are not existential, but if not addressed, will hinder our

183

Microsoft Word - TIA Reply Comments DOE NBP RFI Smart Grid Communications Requirements.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2010 26, 2010 US Department of Energy Office of the General Counsel 1000 Independence Avenue, SW Room 6A245 Washington, DC 20585 Re: NBP RFI-Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy The Telecommunications Industry Association (TIA) is pleased to provide comments on the communications requirements of electric utilities relevant to smart grid policy. TIA appreciates the proactive role the Department of Energy (DOE) is taking in executing the recommendations from the FCC in the National Broadband Plan. Electric utilities and the ICT industry share a long tradition of partnering to build and maintain the communications networks contributing to the security and reliability of the grid.

184

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Reports Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO),

185

Analysis of waste treatment requirements for DOE mixed wastes: Technical basis  

SciTech Connect

The risks and costs of managing DOE wastes are a direct function of the total quantities of 3wastes that are handled at each step of the management process. As part of the analysis of the management of DOE low-level mixed wastes (LLMW), a reference scheme has been developed for the treatment of these wastes to meet EPA criteria. The treatment analysis in a limited form was also applied to one option for treatment of transuranic wastes. The treatment requirements in all cases analyzed are based on a reference flowsheet which provides high level treatment trains for all LLMW. This report explains the background and basis for that treatment scheme. Reference waste stream chemical compositions and physical properties including densities were established for each stream in the data base. These compositions are used to define the expected behavior for wastes as they pass through the treatment train. Each EPA RCRA waste code was reviewed, the properties, chemical composition, or characteristics which are of importance to waste behavior in treatment were designated. Properties that dictate treatment requirements were then used to develop the treatment trains and identify the unit operations that would be included in these trains. A table was prepared showing a correlation of the waste physical matrix and the waste treatment requirements as a guide to the treatment analysis. The analysis of waste treatment loads is done by assigning wastes to treatment steps which would achieve RCRA compliant treatment. These correlation`s allow one to examine the treatment requirements in a condensed manner and to see that all wastes and contaminant sets are fully considered.

NONE

1995-02-01T23:59:59.000Z

186

Recommended Practice: Creating Cyber Forensics Plans for Control Systems  

SciTech Connect

Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.

Eric Cornelius; Mark Fabro

2008-08-01T23:59:59.000Z

187

Cyber-Security of Networked Control Systems Karl Henrik Johansson  

E-Print Network (OSTI)

7/3/12 1 Cyber-Security of Networked Control Systems Karl Henrik Johansson #12;7/3/12 2 Recent Cyber-ARacks on Control Systems Cyber-Security of Networked

Johansson, Karl Henrik

188

Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security  

Science Journals Connector (OSTI)

The cyber attack risks are threatening the smart grid security. Malicious worm could spread from meter to ... ) has thus developed several iterations of cyber security standards. According to the NERC cyber stand...

Yong Wang; Da Ruan; Jianping Xu; Mi Wen; Liwen Deng

2010-01-01T23:59:59.000Z

189

"Order Module--DOE O 426.2, PERSONNEL SELECTION, TRAINING, QUALIFICATION, AND CERTIFICATION REQUIREMENTS FOR DOE NUCLEAR FACILITIES  

Energy.gov (U.S. Department of Energy (DOE))

"To establish selection, training, qualification, and certification requirements for contractor personnel who can impact the safety basis through their involvement in the operation, maintenance,...

190

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

191

DOE Transmission System Integration Workshop  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Heyeck, AEP, Sr. Vice President, Transmission Heyeck, AEP, Sr. Vice President, Transmission and Chair, EPRI Power Delivery & Utilization Sector Council November 01-02, 2012 DoubleTree Hotel, Crystal City Washington D.C. DOE Transmission System Integration Workshop 2 © 2012 Electric Power Research Institute, Inc. All rights reserved. Near-Zero Emissions Long-Term Operations Renewable Integration Water Management Electric Vehicles Demand Response & Efficiency Renewable Energy Energy Storage Sensors & Control Cyber Security Supply = Demand The Power System Supply to Demand Requires a full portfolio of innovative technologies. Tomorrow's Power System One size does not fit all 3 © 2012 Electric Power Research Institute, Inc. All rights reserved. Grid Transformation to Ensure Reliability, Efficiency, Resiliency and Security

192

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

193

The Technology of Cyber Operations Symposium on Cyber Operations and National  

E-Print Network (OSTI)

operations can be conducted with plausible deniability But adversaries make mistakes too, and allThe Technology of Cyber Operations Herb Lin Symposium on Cyber Operations and National Security not acknowledge role of offensive operations. · Offensive cyber operations can also have non-defensive purposes

194

OCIO Technology Summit: Cyber Innovation | Department of Energy  

Energy Savers (EERE)

Articles OCIO Technology Summit: Cyber Innovation OCIO Technology Summit: Data Analytics OCIO Technology Summit: Cyber Innovation OCIO Technology Summit: High Performance Computing...

195

Common Cyber Security Vulnerabilities Observed in Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

196

INL Cyber Security Research (2008) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL Cyber Security Research (2008) INL Cyber Security Research (2008) Cybersecurity research at INL will help protect critical infrastructure control system computers against worms...

197

Report of the Cyber Security Research Needs for Open Science...  

Energy Savers (EERE)

Report of the Cyber Security Research Needs for Open Science Workshop Report of the Cyber Security Research Needs for Open Science Workshop Protecting systems and users, while...

198

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

199

Office of Electricity Delivery and Energy Reliability Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On...

200

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

202

DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy...  

Energy Savers (EERE)

in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to...

203

Cognitive Cyber Weapon Selection Tool Empirical Evaluation.  

E-Print Network (OSTI)

??Keeping in pace with the latest technological innovations in the cyber world, the misuse of this powerful infrastructure has also increased proportionally. Although a lot (more)

Ponangi, Preethi Vinayak

2011-01-01T23:59:59.000Z

204

Cyber - Protection for utilities ... | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber - Protection for utilities ... Hackers hoping to disrupt the power grid, water or natural gas service may be foiled by an intrusion detection system developed by researchers...

205

Guide to Critical Infrastructure Protection Cyber Vulnerability...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)...

206

Sandia National Laboratories: Sandia Cyber Engineering Research...  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyberdefenders * CERL * computer security * Cyber Engineering Research Laboratory * cybersecurity * SAND2013-2827P * Sandia computing expertise * Sandia Science & Technology Park...

207

Security and Cyber Guidance | Department of Energy  

Office of Environmental Management (EM)

April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Performance Testing Guidance & Information Composite Adversary Team Brochure - April 9, 2008...

208

Graph anomalies in cyber communications  

SciTech Connect

Enterprises monitor cyber traffic for viruses, intruders and stolen information. Detection methods look for known signatures of malicious traffic or search for anomalies with respect to a nominal reference model. Traditional anomaly detection focuses on aggregate traffic at central nodes or on user-level monitoring. More recently, however, traffic is being viewed more holistically as a dynamic communication graph. Attention to the graph nature of the traffic has expanded the types of anomalies that are being sought. We give an overview of several cyber data streams collected at Los Alamos National Laboratory and discuss current work in modeling the graph dynamics of traffic over the network. We consider global properties and local properties within the communication graph. A method for monitoring relative entropy on multiple correlated properties is discussed in detail.

Vander Wiel, Scott A [Los Alamos National Laboratory; Storlie, Curtis B [Los Alamos National Laboratory; Sandine, Gary [Los Alamos National Laboratory; Hagberg, Aric A [Los Alamos National Laboratory; Fisk, Michael [Los Alamos National Laboratory

2011-01-11T23:59:59.000Z

209

Microgrid cyber security reference architecture.  

SciTech Connect

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

210

DOE-HDBK-1139/3-2003; Chemical Management (Volume 3 of 3) Consolidated Chemical User Safety and Health Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TS TS NOT MEASUREMENT SENSITIVE DOE-HDBK-1139/3-2003 DOE HANDBOOK CHEMICAL MANAGEMENT (Volume 3 of 3) Consolidated Chemical User Safety and Health Requirements U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. September 2003 DOE-HDBK-1139/3-2003 This document has been reproduced directly from the best available copy. It is available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy, (800) 473-4375, fax: (301) 903-9823. It is available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161;

211

DOE  

Gasoline and Diesel Fuel Update (EIA)

DOE DOE /E/A- 0202( 83//Q J Sh or t-T er m En er gy O ut lo ok a to m Quar terly Proje ction s Febru ary 1983 Ene rgy Info rma tion Adm inist ratio n Was hing ton, D.C. t rt jrt .or t lor t lor t .lor t- ior t- ior t <.o rt ort . m .er m -Te rm -Te rm -Te rm -Te rm -Te rm -Te rm -Te rm -Te rm -Te rm -Te rm -Te rm -Te rm -T erm -T erm -T erm Nrm ue rgy En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y ^n erg y Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Sh ort -T erm 1 Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm

212

DOE Cybersecurity Awareness Program  

Energy.gov (U.S. Department of Energy (DOE))

The OCIO supports a variety of cybersecurity awareness activities that impress upon DOE employees the importance of cybersecurity and the adverse consequences of its failure. The primary purpose of awareness activities is to enhance the 'general awareness and understanding' of current cyber threats and recommended mitigations as well as to cultivate a computing environment where cybersecurity behaviors and responses are automatic and consistent.

213

From Manual Cyber Attacks Forensic to  

E-Print Network (OSTI)

From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut-00995211,version1- #12;From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers, or governmental organisations. Experimental results of these forensic and high level characteriza- tion methods

Paris-Sud XI, Université de

214

Cyber-Physical System Verification Embedded Systems Group  

E-Print Network (OSTI)

(Felipe Bichued) 21 Introducing Simulation of Hybrid Systems with the Modelica Tool 32 #12;Cyber Physical

Berns, Karsten

215

A Two-Constraint Approach to Risky CyberSecurity  

E-Print Network (OSTI)

A Two-Constraint Approach to Risky CyberSecurity Experiment Management John Wroclawski, Jelena Mirkovic, Ted Faber, Stephen Schwab #12;Risky CyberSecurity Research CyberSecurity systems becoming more;Domains of interest Traditional risky experiment Virus dissection Modern risky CyberSecurity

Faber, Ted

216

The Science, Engineering, and Business of Cyber Security  

E-Print Network (OSTI)

's nuclear football © Ravi Sandhu 7 World-Leading Research with Real-World Impact! Cyber Security Goal ManyThe Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University of Texas at San

Sandhu, Ravi

217

Gamification for Measuring Cyber Security Situational Awareness  

SciTech Connect

Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

2013-03-01T23:59:59.000Z

218

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

219

Management of Los Alamos National Laboratory's Cyber Security Program, IG-0880  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Los Alamos National Los Alamos National Laboratory's Cyber Security Program DOE/IG-0880 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 February 11, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Los Alamos National Laboratory's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Los Alamos National Laboratory (LANL), operated by the National Nuclear Security Administration on behalf of the Department of Energy, is one of the world's largest multi- disciplinary laboratories and is primarily responsible for helping to ensure the safety and

220

DOE/ID-Number  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL/EXT-08-13979 INL/EXT-08-13979 U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB National SCADA Test Bed Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program November 2008 November 2008 INL/EXT-08-13979 Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program November 2008 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

DOE-STD-1033-92; Guide to Good Practices for Operations and Administration Updates Through Required Reading  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3-92 3-92 December 1992 CHANGE NOTICE NO.1 December 1998 DOE STANDARD GUIDE TO GOOD PRACTICES FOR OPERATIONS AND ADMINISTRATION UPDATES THROUGH REQUIRED READING U.S. Department of Energy AREA MISC Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document has been reproduced from the best available copy. Available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy, (800) 473-4375, fax: (301) 903-9823. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 605-6000. Change Notice No.1 DOE-STD-1033-92 December 1998 Guide to Good Practices for Operations and Administration Updates Through

222

DOE Order 458.1 Property Clearance Requirements and Factors Considered...  

Office of Environmental Management (EM)

contained in DOE O 458.1, including the methods to release or clear property: process knowledge and authorized limits. In addition, it will provide a special focus on the efforts...

223

Suspect/Counterfeit Items Guide for Use with 10 CFR 830 Subpart A, Quality Assurance Requirements, and DOE O 414.1B, Quality Assurance  

Directives, Delegations, and Requirements

This Guide provides guidance to assist DOE/NNSA and its contractors in mitigating the safety threat of suspect/counterfeit items (S/CIs). Cancels DOE G 440.1-6, Implementation Guide for use with Suspect/Counterfeit Items Requirements of DOE O 440.1, Worker Protection Management; 10 CFR 830.120; and DOE O 5700.6C, Quality Assurance, dated 6-30-97. Canceled by DOE G 414.1-2B.

2004-11-03T23:59:59.000Z

224

Microsoft Word - Blue Cover Report - DOE FISMA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2010 DOE/IG-0843 October 2010 Department of Energy Washington, DC 20585 October 22, 2010 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2010" BACKGROUND Federal information systems are routinely confronted with increasingly sustained cyber attacks - many of which involve targeted and serious threats - executed with varying levels of technical sophistication. The number of incidents reported by Federal agencies to the Department of Homeland Security has, in fact, increased by over 400 percent in the past 4 years. To help

225

DOE Issues Request for Information for Scope Requirements Planning at Los Alamos National Laboratory  

Energy.gov (U.S. Department of Energy (DOE))

Cincinnati The U.S. Department of Energy (DOE) Environmental Management Consolidated Business Center (EMCBC) today issued a Sources Sought/Request for Information (RFI) seeking 8(a) small business concerns with the capabilities to provide architect-engineer-like services to support a potential upcoming Environmental Management (EM) procurement at Los Alamos National Laboratory (LANL).

226

Social brains, simple minds: does social complexity really require cognitive complexity?  

Science Journals Connector (OSTI)

...social engagement than does interpreting social...us how, at the most fundamental neuronal level, our...system. In The Oxford handbook of evolutionary psychology...Miller, L.CStories are fundamental to meaning and memory...mind. In The Oxford handbook of evolutionary psychology...

2007-01-01T23:59:59.000Z

227

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

228

A rational jurisdiction for cyber terrorism  

Science Journals Connector (OSTI)

Abstract Cyberspace is a cross-national world that transcends geopolitical national borders. Jurisdiction is the focal point for any dispute arising in the international arena, because it determines which state court has the authority to settle a dispute. The objective of this paper is to analyse territorial and universal jurisdiction principles which can be specifically related to cyberspace to determine which of them is best suited to providing the appropriate jurisdiction in combating cyber terrorism and how conflicts arising between them can be settled. The transnational nature of cyber terrorism offences leads to jurisdictional complexity, thereby investigation and prosecution is difficult. Lack of harmonisation in legislating among countries leads to difficulty in investigation and prosecution of cyber terrorism offences. This paper notes that universal jurisdiction is the most feasible and effective method to deter cyber terrorism.

Pardis Moslemzadeh Tehrani; Nazura Abdul Manap

2013-01-01T23:59:59.000Z

229

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)

230

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June

231

Cyber Security Audit and Attack Detection Toolkit  

SciTech Connect

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

232

Data Intensive Architecture for Scalable Cyber Analytics  

SciTech Connect

Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. In this paper, we describe a prototype implementation designed to provide cyber analysts an environment where they can interactively explore a months worth of cyber security data. This prototype utilized On-Line Analytical Processing (OLAP) techniques to present a data cube to the analysts. The cube provides a summary of the data, allowing trends to be easily identified as well as the ability to easily pull up the original records comprising an event of interest. The cube was built using SQL Server Analysis Services (SSAS), with the interface to the cube provided by Tableau. This software infrastructure was supported by a novel hardware architecture comprising a Netezza TwinFin for the underlying data warehouse and a cube server with a FusionIO drive hosting the data cube. We evaluated this environment on a months worth of artificial, but realistic, data using multiple queries provided by our cyber analysts. As our results indicate, OLAP technology has progressed to the point where it is in a unique position to provide novel insights to cyber analysts, as long as it is supported by an appropriate data intensive architecture.

Olsen, Bryan K.; Johnson, John R.; Critchlow, Terence J.

2011-12-19T23:59:59.000Z

233

A nexus of Cyber-Geography and Cyber-Psychology: Topos/Notopia and identity in hacking  

Science Journals Connector (OSTI)

This paper explores the Cyber-Psychological and Cyber-Geographic aspects of hacking and hacktivism. An examination of the literature related to hackers and hacking reveals a complex nexus of spatial (including cyber-spatial such as Notopia) and psychological aspects of hacking, from which emerges a central question of how humans perceive and manipulate their cyber-identities. Concealing (real and cyber) identities is typical in hacking. With our progressive acculturation with identity-less and place-less modes of existence, our cyber-identities through time may be studied from within John Lockes criterion of memory and the spatial-geographical criterion of identity.

Fivos Papadimitriou

2009-01-01T23:59:59.000Z

234

DOE Requires Air-Con International to Cease Sales of Inefficient...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

requiring Air-Con to submit detailed information about the energy consumption of its products and how Air-Con marketed and sold them in the United States. Based on Air-Con's...

235

Towards automation of low standardized logistic processes by use of cyber physical robotic systems (CPRS)  

Science Journals Connector (OSTI)

Global logistics networks have an increasing demand for handling of general cargo. Particularly, huband-spoke networks requires a lot of handling actions in order to realize benefits in comparison to point-to-point networks. The use of automation technologies ... Keywords: cooperative robotics, cyber physical systems, human computer interaction, human machine interface, industrial robots, virtual reality

Bernd Scholz-Reiter; Moritz Rohde; Stefan Kunaschk; Michael Ltjen

2011-11-01T23:59:59.000Z

236

Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices  

E-Print Network (OSTI)

these requirements, some technologies such as Phasor Measurement Unit (PMU), Flexible AC Transmission System (FACTS. Therefore, cyber physical security is vitally important for smart grid infrastructure. The data representing on the U.S. infrastructure increased 17-fold from 2009 to 2011 [4]. The Supervisory Control and Data

Kundur, Deepa

237

Cyber Friendly Fire: Research Challenges for Security Informatics  

SciTech Connect

This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a systems topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approachesare discussed.

Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

2013-06-06T23:59:59.000Z

238

Cyber-security Research Ethics Dialogue & Strategy Erin Kenneally  

E-Print Network (OSTI)

Cyber-security Research Ethics Dialogue & Strategy Workshop Erin Kenneally CAIDA/UC, San Diego La The inaugural Cyber-security Research Ethics Dialogue & Strat- egy Workshop was held on May 23, 2013

California at San Diego, University of

239

NISTIR 7916 Proceedings of the Cybersecurity in Cyber-  

E-Print Network (OSTI)

NISTIR 7916 Proceedings of the Cybersecurity in Cyber- Physical Systems Workshop, April 23 ­ 24 of the Cybersecurity in Cyber- Physical Systems Workshop, April 23 ­ 24, 2012 Editor: Tanya Brewer Computer Security

240

Reducing Cyber Risk to Critical Infrastructure: NIST Framework...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

The Vulnerability Analysis of Energy Delivery Control Systems Report Guidelines for Smart Grid Cyber Security (3.4 MB PDF) A Guide to Developing a Cyber Security and Risk...

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

User requirements for wearable smart textiles: does the usage context matter (medical vs. sports)?  

Science Journals Connector (OSTI)

Wearable smart textiles are a promising approach to provide health related services (e.g., permanent monitoring of vital parameters), and can be used in different context (such as sports or health care). But so far, smart textiles [ST] have not significantly ... Keywords: medical technology, smart textiles, technology acceptance, user diversity, user requirements

Julia van Heek, Anne Kathrin Schaar, Bianka Trevisan, Patrycja Bosowski, Martina Ziefle

2014-05-01T23:59:59.000Z

242

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network (OSTI)

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director cai@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Squicciarini, Anna Cinzia

243

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network (OSTI)

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Giles, C. Lee

244

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain ... Keywords: Culture of security, Cyber crime, Cyber exploitation, Policing and preventative strategy, Public private partnership, Routine Activity Theory

Kim-Kwang Raymond Choo

2011-11-01T23:59:59.000Z

245

Essential Body of Knowledge (EBK) | Department of Energy  

Office of Environmental Management (EM)

Essential Body of Knowledge (EBK) DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA...

246

Secure control systems with application to cyber-physical systems  

SciTech Connect

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

Dong, Jin [ORNL] [ORNL; Djouadi, Seddik M [ORNL] [ORNL; Nutaro, James J [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL

2014-01-01T23:59:59.000Z

247

Cyber Assessment Methods for SCADA Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

248

Los Alamos director echoes cyber concerns  

NLE Websites -- All DOE Office Websites (Extended Search)

Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Director Charlie McMillan told a gathering of energy executives that securing the electrical grid is a major concern now and it's only becoming more serious. May 21, 2013 Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Contact Fred deSousa

249

Quality Assurance Management System Guide for Use with 10 CFR 830 Subpart A, Quality Assurance Requirements, and DOE O 414.1C, Quality Assurance  

Directives, Delegations, and Requirements

This Guide provides information on principles and practices used to establish and implement an effective quality assurance program or quality management system in accordance with the requirements of 10 CFR 830. Cancels DOE G 414.1-2. Canceled by DOE G 414.1-2B.

2005-06-17T23:59:59.000Z

250

Supplemental Requirements for the Use of Management and Operating or Other Facility Management Contractor Employees for Services to DOE in the Washington, D.C., Area  

Directives, Delegations, and Requirements

The Notice supplements review and approval requirements of DOE O 350.2A, Use of Management and Operating (M&O) or Other Facility Management Contractor Employees for Services to DOE in the Washington, D.C., Area, dated 10-29-03.

2005-10-19T23:59:59.000Z

251

Formation of the K30 (group I) capsule in Escherichia coli O9:K30 does not require attachment to lipopolysaccharide lipid A-core.  

Science Journals Connector (OSTI)

...covalent linkage to the LPS core, nor does it require association with KLPS. KLps...proteinase K-treated whole-cell lysates does not preclude the presence of trace amounts...138-186. In E. T. Reitschel (ed.), Handbook of endotoxin. I. chemistry of endotoxin...

P R MacLachlan; W J Keenleyside; C Dodgson; C Whitfield

1993-12-01T23:59:59.000Z

252

A proliferation resistant hexagonal tight lattice BWR fueled core for increased burnup and reduced fuel storage requirements. Annual progress report: August, 1999 to July, 2000 [DOE NERI  

SciTech Connect

(OAK/B204) A proliferation resistant hexagonal tight lattice BWR fueled core for increased burnup and reduced fuel storage requirements. Annual progress report: August, 1999 to July, 2000 [DOE NERI

Hiroshi Takahashi; Upendra Rohatgi; T.J. Downar

2000-08-04T23:59:59.000Z

253

Safety Software Guide for Use with 10 CFR 830, Subpart A, Quality Assurance Requirements, and DOE O 414.1C, Quality Assurance  

Directives, Delegations, and Requirements

This Guide provides acceptable methods for implementing the safety software quality assurance requirements of draft DOE O 414.1C, Quality Assurance. Certified 11-3-10. No cancellation.

2005-06-17T23:59:59.000Z

254

Cyber security in the Smart Grid: Survey and challenges  

Science Journals Connector (OSTI)

The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, the Smart Grid is expected to greatly enhance efficiency and reliability of future power systems with renewable energy resources, as well as distributed intelligence and demand response. Along with the silent features of the Smart Grid, cyber security emerges to be a critical issue because millions of electronic devices are inter-connected via communication networks throughout critical power facilities, which has an immediate impact on reliability of such a widespread infrastructure. In this paper, we present a comprehensive survey of cyber security issues for the Smart Grid. Specifically, we focus on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid. We aim to provide a deep understanding of security vulnerabilities and solutions in the Smart Grid and shed light on future research directions for Smart Grid security.

Wenye Wang; Zhuo Lu

2013-01-01T23:59:59.000Z

255

Cyber-Physical Systems CPS Program  

E-Print Network (OSTI)

prosthetics Critical Infrastructure More reliable and efficient power grid Highways that allow denser traffic hybridization of computational (logical), physical, and human action." Examples of cyber-physical systems devices and systems, next-generation power grid, future defense systems, next-generation automobiles

Rajkumar, Ragunathan "Raj"

256

DOE G 414.1-4, Safety Software Guide for Use with 10 CFR 830 Subpart A, Quality Assurance Requirements, and DOE O 414.1C, Quality Assurance  

Energy.gov (U.S. Department of Energy (DOE))

"This Department of Energy (DOE or Department) Guide provides information plus acceptable methods for implementing the safety software quality assurance (SQA) requirements of DOE O 414.1C, Quality Assurance, dated 6-17-05. DOE O 414.1C requirements supplement the quality assurance program (QAP) requirements of Title 10 Code of Federal Regulations (CFR) 830, Subpart A, Quality Assurance, for DOE nuclear facilities and activities. The safety SQA requirements for DOE, including the National Nuclear Security Administration (NNSA), and its contractors are necessary to implement effective quality assurance (QA) processes and achieve safe nuclear facility operations. DOE promulgated the safety software requirements and this guidance to control or eliminate the hazards and associated postulated accidents posed by nuclear operations, including radiological operations. Safety software failures or unintended output can lead to unexpected system or equipment failures and undue risks to the DOE/NNSA mission, the environment, the public, and the workers. Thus DOE G 414.1-4 has been developed to provide guidance on establishing and implementing effective QA processes tied specifically to nuclear facility safety software applications. DOE also has guidance1 for the overarching QA program, which includes safety software within its scope. This Guide includes software application practices covered by appropriate national and international consensus standards and various processes currently in use at DOE facilities.2 This guidance is also considered to be of sufficient rigor and depth to ensure acceptable reliability of safety software at DOE nuclear facilities. This guidance should be used by organizations to help determine and support the steps necessary to address possible design or functional implementation deficiencies that might exist and to reduce operational hazards-related risks to an acceptable level. Attributes such as the facility life-cycle stage and the hazardous nature of each facilitys operations should be considered when using this Guide. Alternative methods to those described in this Guide may be used provided they result in compliance with the requirements of 10 CFR 830 Subpart A and DOE O 414.1C. Another objective of this guidance is to encourage robust software quality methods to enable the development of high quality safety applications."

257

Control Systems Cyber Security:Defense in Depth Strategies  

SciTech Connect

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing defense-in-depth strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

David Kuipers; Mark Fabro

2006-05-01T23:59:59.000Z

258

6/16/13 New search tool developed to catch cyber thieves post.jagran.com/new-search-tool-developed-to-catch-cyber-thieves-1370602608 1/5  

E-Print Network (OSTI)

cyber thieves Montreal: A new search tool developed by researchers in Canada can now help crime Lifestyle News Desk Cyber thief child porn search tool Canada cyber crime #12;6/16/13 New search tool6/16/13 New search tool developed to catch cyber thieves post.jagran.com/new-search-tool

Fung, Benjamin C. M.

259

DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks October 18, 2007 - 3:21pm Addthis WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These

260

The NIAC Convergence of Physical and Cyber Technbologies and Related  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The NIAC Convergence of Physical and Cyber Technbologies and The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC convened the Physical/Cyber Convergence Working Group (CWG), in October 2005, to investigate the ongoing convergence of physical and cyber technologies for Supervisory Control and Data Acquisition (SCADA) and process control systems and their consolidated network management. The Working Group convened a Study Group of subject matter experts to inform its work. The Working Group report informed the NIAC's deliberations. The NIAC Convergence of Physical and Cyber Technbologies and Related

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

262

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber...

263

Sandia National Laboratories: Cyber Security for Electric Infrastructu...  

NLE Websites -- All DOE Office Websites (Extended Search)

advancements in phasor measurement units (PMUs), distributed energy resources (DER), smart-grid technologies, and cloud computing services represent significant cyber security...

264

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information, as highlighted in this paper. We describe how the Routine Activity Theory can be applied to mitigate these risks by reducing the opportunities for cyber crime to occur, making cyber crime more difficult to commit and by increasing the risks of detection and punishment associated with committing cyber crime. Potential research questions are also identified.

Kim-Kwang Raymond Choo

2011-01-01T23:59:59.000Z

265

Control Systems Cyber Security: Defense in Depth Strategies ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

that use control system networks while maintaining a multi-tier information architecture. Control Systems Cyber Security: Defense in Depth Strategies More Documents &...

266

Uropathogenic Escherichia coli CFT073 Is Adapted to Acetatogenic Growth but Does Not Require Acetate during Murine Urinary Tract Infection  

Science Journals Connector (OSTI)

...d-serine (Fig. 1a), though CFT073 does reach stationary phase slightly sooner...sodium acetate as a sole carbon source than does MG1655 as shown in Fig. 1d. These data...metabolism, dissimilatory acetate metabolism does play a role in colonization of the murine...

Andrew T. Anfora; David K. Halladin; Brian J. Haugen; Rodney A. Welch

2008-10-06T23:59:59.000Z

267

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

268

DOE Testing Reveals Samsung Refrigerator Does Not Meet Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Testing Reveals Samsung Refrigerator Does Not Meet Energy Star Requirements DOE Testing Reveals Samsung Refrigerator Does Not Meet Energy Star Requirements March 16, 2010 - 4:28pm...

269

DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to Provide Nearly $8 Million to Safeguard the Nation's Energy to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks More Documents & Publications "Cybersecurity for State Regulators" - NARUC Primer (June 2012)

270

Policy Flash 2014-33 Revised Department of Energy (DOE) Acquisition Guide Chapter 7.2 Strategic Sourcing Requirements  

Energy.gov (U.S. Department of Energy (DOE))

Questions concerning this policy flash should be directed to Mike Larson at 202-287-1426 or email at Michael.Larson@hq.doe.gov

271

Time-based intrusion detection in cyber-physical systems  

Science Journals Connector (OSTI)

Embedded systems, particularly real-time systems with temporal constraints, are increasingly deployed in every day life. Such systems that interact with the physical world are also referred to as cyber-physical systems (CPS). These systems commonly find ... Keywords: cyber-physical systems, real-time systems, security, timing analysis

Christopher Zimmer; Balasubramanya Bhat; Frank Mueller; Sibin Mohan

2010-04-01T23:59:59.000Z

272

Cyber-physical energy systems: focus on smart buildings  

Science Journals Connector (OSTI)

Operating at the intersection of multiple sensing and control systems designed for occupant comfort, performability and operational efficiency, modern buildings represent a prototypical cyber-physical system with deeply coupled embedded sensing and networked ... Keywords: LEED, ZNEB, buildings, cyber-physical, embedded, energy management, energy metering, smart grid

Jan Kleissl; Yuvraj Agarwal

2010-06-01T23:59:59.000Z

273

Cyber Threat Trees for Large System Threat Cataloging and Analysis*  

E-Print Network (OSTI)

Cyber Threat Trees for Large System Threat Cataloging and Analysis* P. Ongsakorn, K. Turney, M, kturney, mitch, nair, szygenda, manikas}@lyle.smu.edu Abstract--The implementation of cyber threat. Because large systems have many possible threats that may be interdependent, it is crucial

Thornton, Mitchell

274

CyberPhysical System Security for the Electric Power Grid  

E-Print Network (OSTI)

INVITED P A P E R Cyber­Physical System Security for the Electric Power Grid Control in power research efforts aimed at enhancing the smart grid's application and infrastructure security. Finally­physical systems (CPS); cyber security; electric grid; smart grid; supervisory control and data acquisi- tion

Manimaran, Govindarasu

275

Implementing constrained cyber-physical systems with IEC 61499  

Science Journals Connector (OSTI)

Cyber-physical systems (CPS) are integrations of computation and control with sensing and actuation of the physical environment. Typically, such systems consist of embedded computers that monitor and control physical processes in a feedback loop. While ... Keywords: Compilers, IEC 61499, cyber-physical systems, function blocks, software synthesis, synchronous

Li Hsien Yoong; Partha S. Roop; Zoran Salcic

2012-12-01T23:59:59.000Z

276

Deception used for Cyber Defense of Control Systems  

SciTech Connect

Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

Wayne F. Boyer; Miles A. McQueen

2009-05-01T23:59:59.000Z

277

View Consistency in Architectures for Cyber-Physical Systems  

Science Journals Connector (OSTI)

Current methods for modeling, analysis, and design of cyber-physical systems lack a unifying framework due to the complexity and heterogeneity of the constituent elements and their interactions. Our approach is to define relationships between system ... Keywords: system architecture, view consistency, graph morphism, multi-domain modeling, cyber-physical systems

Ajinkya Bhave; Bruce H. Krogh; David Garlan; Bradley Schmerl

2011-04-01T23:59:59.000Z

278

A modelica coordination pattern library for cyber-physical systems  

Science Journals Connector (OSTI)

Today's embedded systems often do not operate individually anymore. Instead, they form so called cyber-physical systems, where the overall functionality is provided by the collaboration of systems. Consequently, the design of this collaboration is an ... Keywords: cyber-physical systems, design patterns, modelica, real-time coordination, simulation

Uwe Pohlmann; Stefan Dziwok; Matthias Meyer; Matthias Tichy; Sebastian Thiele

2014-03-01T23:59:59.000Z

279

Towards a theory for cyber-physical systems modeling  

Science Journals Connector (OSTI)

Modeling the heterogeneous composition of physical, computational and communication systems is an important challenge in engineering Cyber-Physical Systems (CPS), where the major sources of heterogeneity are causality, time semantics, and different physical ... Keywords: cyber-physical systems, formalization, heterogeneous composition, model-based engineering

Gabor Simko; Tihamer Levendovszky; Miklos Maroti; Janos Sztipanovits

2014-04-01T23:59:59.000Z

280

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Cyber Effects Analysis Using VCSE Promoting Control System Reliability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Effects Analysis Using VCSE Promoting Control System Cyber Effects Analysis Using VCSE Promoting Control System Reliability Cyber Effects Analysis Using VCSE Promoting Control System Reliability This report describes the Virtual Control System Environment (VCSE) technology- developed at Sandia National Laboratories-to investigate Supervisory Control And Data Acquisition (SCADA) vulnerabilities associated with energy systems; and it describes a set of experiments with findings from using that environment. The report explains how VCSE can be used to analyze and develop an understanding of cyber attacks. Specific analyses in this report focus on unencrypted, unsecured data channels on Internet protocol (IP)-routed computer networks within electric power systems. Cyber Effects Analysis Using VCSE Promoting Control System Reliability

282

Risk-Informed Safety Requirements for H2 Codes and Standards Development - DOE Hydrogen and Fuel Cells Program FY 2012 Annual Progress Report  

NLE Websites -- All DOE Office Websites (Extended Search)

5 5 FY 2012 Annual Progress Report DOE Hydrogen and Fuel Cells Program Aaron Harris (Primary Contact), Jeffrey LaChance, Katrina Groth Sandia National Laboratories P.O. Box 969 Livermore, CA 94551-0969 Phone: (925) 294-4530 Email: apharri@sandia.gov DOE Manager HQ: Antonio Ruiz Phone: (202) 586-0729 Email: Antonio.Ruiz@ee.doe.gov Project Start Date: October 1, 2003 Project End Date: Project continuation and direction determined annually by DOE Fiscal Year (FY) 2012 Objectives Present results of indoor refueling risk assessment to the * National Fire Protection Association (NFPA) 2 Fueling Working Group. Perform and document required risk assessment (with * input from NFPA 2 and others) for developing science- based risk-informed codes and standards for indoor

283

Computer Recommendations for incoming students in 2012-2013 The college of Engineering and Computer Science does not require students to have their own  

E-Print Network (OSTI)

Computer Recommendations for incoming students in 2012-2013 The college of Engineering and Computer Science does not require students to have their own personal computer. Students will have access to computers through their department, college, and university here on campus. However we do feel that having

Wu, Shin-Tson

284

DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 Million to Safeguard the Nation's Energy 8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks October 18, 2007 - 3:21pm Addthis WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These

285

Microsoft Word - Attachment J-6 List of Applicable DOE Directives...  

NLE Websites -- All DOE Office Websites (Extended Search)

Chg.3 DOE Cyber Program CRD O 206.1 DOE Privacy Program CRD O 243.1B, Admin. Chg 1. Records Management Program CRD O 414.1D, Admin Chg 1. Quality Assurance CRD O 442.1A...

286

Cyber security analysis testbed : combining real, emulation, and simulation.  

SciTech Connect

Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

2010-07-01T23:59:59.000Z

287

Cyber Security Incidents, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

288

Primer Control System Cyber Security Framework and Technical Metrics  

SciTech Connect

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

289

DOE Responses to DOE Challenge Home (formerly Builders Challenge...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy. doeresponseschallengehomecomments.pdf More Documents & Publications Version Tracking Document for DOE Challenge Homes, National Program Requirements (Rev. 03) DOE...

290

DOE-FLEX: DOE's Telework Program  

Directives, Delegations, and Requirements

The order establishes the requirements and responsibilities for the Departments telework program. Cancels DOE N 314.1.

2013-02-11T23:59:59.000Z

291

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeking Comments on Consolidated IT and Cyber Security Support Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

292

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

293

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NNSA Seeking Comments on Consolidated IT and Cyber Security Support NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

294

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

295

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

296

Ruminati : modeling the detection of textual cyber-bullying  

E-Print Network (OSTI)

The scourge of cyber-bullying has received widespread attention at all levels of society including parents, educators, adolescents, social scientists, psychiatrists and policy makers at the highest echelons of power. ...

Dinakar, Karthik

2012-01-01T23:59:59.000Z

297

CYBER SECURITY Software firm identifies hacking program against chemical makers  

Science Journals Connector (OSTI)

A cyber-attack campaign emanating from China targeted private companies involved in the research, development, and manufacture of chemicals and advanced materials between July and September of this year, according to a report from the computer security ...

RICK MULLIN

2011-11-07T23:59:59.000Z

298

Advances in Materials Genomics: Making CyberSteels Fly | Argonne...  

NLE Websites -- All DOE Office Websites (Extended Search)

Events Upcoming Events Upcoming Events Advances in Materials Genomics: Making CyberSteels Fly January 7, 2015 3:00PM to 4:00PM Presenter Greg Olson, Northwestern University and...

299

Managing Threats to Web Databases and Cyber Systems  

Science Journals Connector (OSTI)

This chapter provides an overview of some of the cyber threats information systems as well as data management ... then discusses potential solutions and challenges. The threats include access control violations, ...

Bhavani Thuraisingham

2005-01-01T23:59:59.000Z

300

Towards a modeling language for cyber-physical systems  

Science Journals Connector (OSTI)

A cyber-physical system (CPS) is an interactive system of continuous plants and real-time controller programs. These systems usually feature a tight relationship between the physical and computational components and exhibit true concurrency with respect ...

Longfei Zhu; Yongxin Zhao; Huibiao Zhu; Qiwen Xu

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Microsoft PowerPoint - DOE-RL Hanford Metrics Presentation.pptx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

from the Field: from the Field: Implementing Cyber Security Metrics that Work Rick Grandy & Gregg Serene Cyber Security MSA/Lockheed Martin DOE Hanford Site "To make our customers extraordinarily successful in our unified mission of cleaning up the Hanford cleaning up the Hanford Site..." Hanford Site Scope - 586 square miles - 9 000+ PCs 9,000+ PCs - 500+ servers - 400+ applications - 1 000+ miles fiber to 300 bldgs 1,000+ miles fiber to 300 bldgs - 12,500+ phones 2 Why Metrics? * How do you know if you're How do you know if you re doing well in school? * How do you know if an athlete is performing well? p g * How do you know if you're o do you o you e healthy? - Weight, Blood Pressure 3 Why Metrics? * Does a FISMA Score of "A" mean... - The cyber program is more effective? - The cyber program is more efficient?

302

Good Things in Small Packages: Micro Worlds and Cyber Security  

SciTech Connect

Cyber events, as perpetrated by terrorists and nation states, have become commonplace as evidenced in national and international news media. Cyber attacks affect day-to-day activities of end users through exploitation of social networks, businesses such as banking and stock exchanges, and government entities including Departments of Defense. They are becoming more frequent and sophisticated. Currently, efforts are directed to understanding the methods employed by attackers and towards dissecting the planning and activities of the perpetrator, including review of psychosocial factors.

David I Gertman

2013-11-01T23:59:59.000Z

303

Cyber Security Vulnerability Impact on I&C Reliability  

SciTech Connect

We present a discussion of the cyber security vulnerability impact on instrument and control reliability. In the discussion we demonstrate the likely vector of attack and vulnerabilities associated with commodity hardware, protocols and communication media. The current fleet of nuclear power plants in the United States utilizes aging analog instrument and control systems which are more frequently suffering from obsolescence and failure. The commodity equipment available now and in the near future incorporates features from information technology systems which compound cyber vulnerabilities.

Hadley, Mark D.; McBride, Justin B.

2006-11-01T23:59:59.000Z

304

Implementation of the Clean Air Act, Title V operating permit program requirements for the U.S. DOE Oak Ridge Reservation facilities  

SciTech Connect

Title V of the Clean Air Act (CAA) establishes a new permit program requiring major sources and sources subject to Title III (Hazardous Air Pollutants) to obtain a state operating permit. Historically, most states have issued operating permits for individual emission units. Under the Title V permit program, a single permit will be issued for all of the emission units at the facility much like the current National Pollutant Discharge Elimination System (NPDES) permit program. The permit will specify all reporting, monitoring, and record-keeping requirements for the facility. Sources required to obtain permits include (a) major sources that emit 100 tons per year or more of any criteria air contaminant, (b) any source subject to the HAP provisions of Title III, (c) any source subject to the acid rain provisions of Title IV, (d) any source subject to New Source Performance Standards, and (e) any source subject to new source review under the nonattainment or Prevention of Significant Deterioration provisions. The State of Tennessee Title V Operating Permit Program was approved by EPA on August 28, 1996. This paper will provide details of initiatives underway at US Department of Energy (DOE) Oak Ridge Reservation (ORR) Facilities for implementation of requirements under the Title V Operating Permit Program. The ORR encompasses three DOE Facilities: the Y-12 Plant, Oak Ridge National Laboratory (ORNL), and the East Tennessee Technology Park (ETTP). The Y-12 Plant manufactures component parts for the national nuclear weapons program; the ORNL is responsible for research and development activities including nuclear engineering, engineering technologies, and the environmental sciences; and the ETTP conducts a variety of research and development activities and is the home of a mixed waste incinerator. Each of the three DOE Facilities is considered a major source under Title V of the CAA.

Humphreys, M.P. [Dept. of Energy Oak Ridge Operations Office, TN (United States). Environmental Protection Div.

1998-12-31T23:59:59.000Z

305

Workshop on Scalable Cyber-Security Challenges in Large-Scale Networks: Deployment Obstacles  

E-Print Network (OSTI)

Workshop on Scalable Cyber-Security Challenges in Large-Scale Networks: Deployment Obstacles Large, and Definitions of Cybersecurity.... 8 Conventional Wisdom is Inadequate....................................... 9 Directions in Scalable Cyber-Security in Large-Scale Networks: Deployment Obstacles." The workshop

Feigenbaum, Joan

306

On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem  

E-Print Network (OSTI)

1 On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson Abstract--This paper considers a smart grid cyber-security problem

Johansson, Karl Henrik

307

CYSEP --A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao  

E-Print Network (OSTI)

1 of 9 CYSEP -- A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao.2Interface Memory Controller Cyber-Security Processor SPI4.2Interface To PCI Bus To Memory ToFramer To NP or End Sy stem Figure 1. Cyber-Security Processor (CYSEP) architecture The Firewall and Intrusion

Chao, Jonathan

308

Engineering Energy Systems of the Future as Cyber-Physical Ecosystems  

E-Print Network (OSTI)

Engineering Energy Systems of the Future as Cyber-Physical Ecosystems Marija Ilic, Carnegie Mellon University milic@andrew.cmu.edu Keynote at the Workshop on eNetworks as Infrastructure for the Future Cyber · Examples of existing and evolving energy industry architectures as particular cases of cyber- physical

Ilic, Marija D.

309

Cumulative strategic capability and performance of early movers and followers in the cyber market  

Science Journals Connector (OSTI)

Today, the cyber market is evolving rapidly in the networked age. In the cyber market, the traditional competitive strategy appears to no longer be effective. This study investigates the strategic choice differences of online firms based on their strategic ... Keywords: Cyber market, Early mover, Follower, Porter's generic strategies, Sand Cone model

Sang-Gun Lee; Chulmo Koo; Kichan Nam

2010-06-01T23:59:59.000Z

310

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network (OSTI)

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang Rochester Institute on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment

Jay Yang, Shanchieh

311

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

312

The Department's Unclassified Cyber Security Program 2002, IG-0567  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT'S UNCLASSIFIED DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security

313

Cyber and Security Assessments | Department of Energy  

Energy Savers (EERE)

material. To accomplish this independent oversight function, our office sponsors and trains the DOE composite adversary team to role play the postulated adversary during...

314

DOE-FLEX: DOE's Telework Program  

Directives, Delegations, and Requirements

The directive establishes the requirements and responsibilities for the Departments telework program. Canceled by DOE O 314.1.

2011-07-05T23:59:59.000Z

315

Overcoming performance collapse for 100Gbps cyber security  

Science Journals Connector (OSTI)

In this paper, we present a series of performance tests carried out on R-Scope Dominate-T (RDT), a 1U network security appliance configured with four Tilera Gx-36 processors and with an aggregated network IO capacity of 160Gbps. RDT is optimized with ... Keywords: cyber-security

Jordi Ros-Giralt; Bob Rotsted; Alan Commike

2013-06-01T23:59:59.000Z

316

Synthesis of Optimal Controllers for Cyber Physical Systems Salar Moarref  

E-Print Network (OSTI)

Synthesis of Optimal Controllers for Cyber Physical Systems Salar Moarref November 16, 2012 construction. In this framework, we consider controller synthesis problem: given a model of the system.e. a controller that optimizes a quantitative measure.We review some of the recent works on synthesis of optimal

Plotkin, Joshua B.

317

CyberWalk: Enabling unconstrained omnidirectional walking through virtual environments  

Science Journals Connector (OSTI)

Despite many recent developments in virtual reality, an effective locomotion interface which allows for normal walking through large virtual environments was until recently still lacking. Here, we describe the new CyberWalk omnidirectional treadmill ... Keywords: Virtual reality, control system, locomotion, spatial navigation, treadmill

J. L. Souman; P. Robuffo Giordano; M. Schwaiger; I. Frissen; T. Thmmel; H. Ulbrich; A. De Luca; H. H. Blthoff; M. O. Ernst

2011-11-01T23:59:59.000Z

318

Statistical Model Checking for Cyber-Physical Systems  

E-Print Network (OSTI)

-Physical System (CPS). The autopilot is a software which provides inputs to the aircraft's engines and flight to keep control of the vehicle and improving safety. Cyber-Physical Systems enjoy wide adoption in our society, even in safety- critical applications, but are difficult to reason about. In particular

Clarke, Edmund M.

319

Secure control systems with application to cyber-physical systems  

Science Journals Connector (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power ... Keywords: SCADA systems, cyber-physical systems, secure control, security

Jin Dong; Seddik. M. Djouadi; James J. Nutaro; Teja Kuruganti

2014-04-01T23:59:59.000Z

320

Cyber-Physical Energy Systems: Focus on Smart Buildings  

E-Print Network (OSTI)

of a deeply coupled system of energy usage, comfort and work derived. At a macroscale, buildings use approxiCyber-Physical Energy Systems: Focus on Smart Buildings Jan Kleissl Dept. of Mechanical- tributions: one, a careful examination of different types of buildings and their energy use; two

Gupta, Rajesh

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Cyber-Physical Systems Energy and the Environment  

E-Print Network (OSTI)

to Restructure · Generate energy locally ­ Wind, Solar ­ Energy Storage Plug in Hybrids ­ Share Power ­ Economics12/16/2008 1 Cyber-Physical Systems Energy and the Environment Bruce McMillin Department FREEDM ­ Future Renewable Electric Energy Delivery and Management Systems McMillin, 12/15/2008 Major

Rajkumar, Ragunathan "Raj"

322

Domestic campsites and cyber landscapes in the Rocky Mountains  

E-Print Network (OSTI)

Domestic campsites and cyber landscapes in the Rocky Mountains Laura L. Scheiber1 & Judson Byrd, Central Rocky Mountains, GIS, GPS, stone circles, architecture, multi-scalar, households, technology, tipis, horses and wagons occupying a flat clearing along a valley floor c. 1907. Photograph by Richard

Scheiber, Laura L.

323

DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

O 325.2, Position Management and Classification Sep 24, 2014 Nuclear Explosive and Weapon Surety Program Sep 24, 2014 Nuclear Explosive and Weapon Surety Program Sep 24, 2014...

324

DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

search form enables you to find content on the site by specifying one or more search terms. Remember that you can use the quick search anytime, it's normally good enough, this...

325

T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security  

SciTech Connect

Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

2009-07-20T23:59:59.000Z

326

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE))

The SSCS RM is a tool that assists the DOE federal project review teams in evaluating the technical sufficiency of the project SSCS activities at CD-0 through CD-4.

327

Order Module--SAFETY SOFTWARE GUIDE FOR USE WITH 10 CFR 830, SUBPART A, QUALITY ASSURANCE REQUIREMENTS, AND DOE O 414.1C, QUALITY ASSURANCE  

Energy.gov (U.S. Department of Energy (DOE))

According to DOE-STD-1146-2007, General Technical Base Qualification Standard, this module was to summarize the quality assurance information found in attachments 3, 4, and 5, of DOE O 414.1C,...

328

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

SciTech Connect

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

329

Use and Abuse of the Internet: Parental Knowledge of Cyber Bullying in Middle School.  

E-Print Network (OSTI)

??The current literature has emphasized the impact of cyber bullying on the lives of children and adolescents. However there are gaps in the literature in (more)

Rowe, Na Lisa

2008-01-01T23:59:59.000Z

330

Terrorism or hacking? A law interpretation on the concept of cyber terrorism.  

E-Print Network (OSTI)

?? Cyber-crime, terrorism and hacking is a topic discussed widely and many independent groups as for example Wikileaks and Anonymous are often taken into consideration (more)

Synnestvedt Jensen, Louise

2013-01-01T23:59:59.000Z

331

Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation.  

E-Print Network (OSTI)

??While smart grid technologies are deployed to help achieve improved grid resiliency and efficiency, they also present an increased dependency on cyber resources which may (more)

Hahn, Adam

2013-01-01T23:59:59.000Z

332

Breaking into a computer : attack techniques and tools used by cyber-criminals  

ScienceCinema (OSTI)

Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

None

2011-10-06T23:59:59.000Z

333

The Fe-type nitrile hydratase from Comamonas testosteroni Ni1 does not require an activator accessory protein for expression in Escherichia coli  

SciTech Connect

We report herein the functional expression of an Fe-type nitrile hydratase (NHase) without the co-expression of an activator protein or the Escherichia coli chaperone proteins GroES/EL. Soluble protein was obtained when the {alpha}- and {beta}-subunit genes of the Fe-type NHase Comamonas testosteroni Ni1 (CtNHase) were synthesized with optimized E. coli codon usage and co-expressed. As a control, the Fe-type NHase from Rhodococcus equi TG328-2 (ReNHase) was expressed with (ReNHase{sup +Act}) and without (ReNHase{sup -Act}) its activator protein, establishing that expression of a fully functional, metallated ReNHase enzyme requires the co-expression of its activator protein, similar to all other Fe-type NHase enzymes reported to date, whereas the CtNHase does not. The X-ray crystal structure of CtNHase was determined to 2.4 {angstrom} resolution revealing an {alpha}{beta} heterodimer, similar to other Fe-type NHase enzymes, except for two important differences. First, two His residues reside in the CtNHase active site that are not observed in other Fe-type NHase enzymes and second, the active site Fe(III) ion resides at the bottom of a wide solvent exposed channel. The solvent exposed active site, along with the two active site histidine residues, are hypothesized to play a role in iron incorporation in the absence of an activator protein.

Kuhn, Misty L.; Martinez, Salette; Gumataotao, Natalie; Bornscheuer, Uwe; Liu, Dali; Holz, Richard C. (Loyola); (Greifswald)

2012-10-10T23:59:59.000Z

334

Wireless Policy, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

335

DOE Explosives Safety Manual  

Directives, Delegations, and Requirements

This Manual describes DOE's explosives safety requirements applicable to operations involving the development, testing, handling, and processing of explosives or assemblies containing explosives.

1996-03-29T23:59:59.000Z

336

A Comparison of Cross-Sector Cyber Security Standards  

SciTech Connect

This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

Robert P. Evans

2005-09-01T23:59:59.000Z

337

GridStat Cyber Security and Regional Deployment Project Report  

SciTech Connect

GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStats cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

Clements, Samuel L.

2009-02-18T23:59:59.000Z

338

Control-theoretic cyber-physical system modeling and synthesis: A case study of an active direct methanol fuel cell  

Science Journals Connector (OSTI)

A joint optimization of the physical system and the cyber world is one of the key problems in the design of a cyber-physical system (CPS). The major mechanical forces and/or chemical reactions in a plant are commonly modified by actuators in the balance-of-plant ... Keywords: Balance of plants system, Cyber-physical systems, Direct methanol fuel cell

Donghwa Shin; Jaehyun Park; Younghyun Kim; Jaeam Seo; Naehyuck Chang

2012-12-01T23:59:59.000Z

339

Positive affect predicting worker psychological response to cyber-bullying in the high-tech industry in Northern Taiwan  

Science Journals Connector (OSTI)

Online cyber-bullying has become a frequent occurrence in organizations. To understand individual dispositions and the organizational factors that effect online cyber-bullying, the present study investigates the relationship among positive affect, the ... Keywords: Cyber-bullying, Organizational innovation climate, Positive thinking, Psychological response, Workplace bullying

Jon-Chao Hong; Lin Chien-Hou; Ming-Yueh Hwang; Ru-Ping Hu; Yi-Ling Chen

2014-01-01T23:59:59.000Z

340

Radiological Protection for DOE Activities  

Directives, Delegations, and Requirements

Establishes radiological protection program requirements that, combined with 10 CFR 835 and its associated implementation guidance, form the basis for a comprehensive program for protection of individuals from the hazards of ionizing radiation in controlled areas. Extended by DOE N 441.3. Cancels DOE 5480.11, DOE 5480.15, DOE N 5400.13, DOE N 5480.11; please note: the DOE radiological control manual (DOE/EH-0256T)

1995-09-29T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

User Requirements Gathered for  

NLE Websites -- All DOE Office Websites (Extended Search)

Workshops to derive and document each DOE SC Office's HPC requirements for NERSC in 2013-14" * Deliverables: Reports that includes both the HPC requirements and supporting...

342

BES Science Network Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

the Basic Energy Sciences Network Requirements Workshop Conducted June 4-5, 2007 BES Science Network Requirements Workshop Basic Energy Sciences Program Office, DOE Office of...

343

A multi-level approach to understanding the impact of cyber crime on the financial sector  

Science Journals Connector (OSTI)

This paper puts forward a multi-level model, based on system dynamics methodology, to understand the impact of cyber crime on the financial sector. Consistent with recent findings, our results show that strong dynamic relationships, amongst tangible ... Keywords: Causal loop diagram, Cyber crime, Economic impact, Financial sector, System dynamics

Monica Lagazio, Nazneen Sherif, Mike Cushman

2014-09-01T23:59:59.000Z

344

Emergent Behavior in Cybersecurity Example 2: Program VerificationExample 1: Cyber Epidemics  

E-Print Network (OSTI)

Emergent Behavior in Cybersecurity Example 2: Program VerificationExample 1: Cyber Epidemics Informal Definition and Implication Abstract We argue that emergent behavior is inherent to cybersecurity). Scenario: Illustration of cyber epidemics model (which is a specific kind of Cybersecurity Dynamics model

Xu, Shouhuai

345

Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid  

E-Print Network (OSTI)

Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid Jin Wei and Deepa stability in the smart grid in the face of cyber-physical attack. We model the smart grid as a networked the proposed framework. I. INTRODUCTION It is well known that the smart grid promises increased reliability

Kundur, Deepa

346

DOE G 414  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INITIATED BY: INITIATED BY: http://www.directives.doe.gov Office of Environment, Safety and Health DOE G 414.1-4 Approved 6-17-05 Certified 11-3-10 SAFETY SOFTWARE GUIDE for USE with 10 CFR 830 Subpart A, Quality Assurance Requirements, and DOE O 414.1C, Quality Assurance [This Guide describes suggested nonmandatory approaches for meeting requirements. Guides are not requirements documents and are not construed as requirements in any audit or appraisal for compliance with the parent Policy, Order, Notice, or Manual.] U.S. DEPARTMENT OF ENERGY Washington, D.C. NOT MEASUREMENT SENSITIVE DOE G 414.1-4 i (and ii) 6-17-05 FOREWORD This Department of Energy (DOE) Guide is approved by the Office of Environment, Safety and Health and is available for use by all DOE and National Nuclear Security Administration

347

DOE G 414  

NLE Websites -- All DOE Office Websites (Extended Search)

http://www.directives.doe.gov Office of Environment, Safety and Health DOE G 414.1-4 Approved 6-17-05 Certified 11-3-10 SAFETY SOFTWARE GUIDE for USE with 10 CFR 830 Subpart A, Quality Assurance Requirements, and DOE O 414.1C, Quality Assurance [This Guide describes suggested nonmandatory approaches for meeting requirements. Guides are not requirements documents and are not construed as requirements in any audit or appraisal for compliance with the parent Policy, Order, Notice, or Manual.] U.S. DEPARTMENT OF ENERGY Washington, D.C. NOT MEASUREMENT SENSITIVE DOE G 414.1-4 i (and ii) 6-17-05 FOREWORD This Department of Energy (DOE) Guide is approved by the Office of Environment, Safety and Health and is available for use by all DOE and National Nuclear Security Administration

348

DOE Essential Body of Knowledge | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Essential Body of Knowledge Essential Body of Knowledge DOE Essential Body of Knowledge DOE Essential Body of Knowledge & Core Competency Training The Office of the Chief Information Officer (OCIO) utilized DOE cybersecurity policy, best practices and lessons learned, and comprehensive internal needs assessments to identify fundamental cybersecurity functional roles and associated responsibilities to and define the essential body of knowledge (EBK) needed to support cybersecurity responsibilities and activities within the Department. Components of the EBK are assigned to each functional role, and customized curriculum is determined for each key role via core competency worksheets. The OCIO has determined the following roles to be key functional cyber roles within the Department:

349

ANNUAL HEATING AND COOLING REQUIREMENTS AND DESIGN DAY PERFORMANCE FOR A RESIDENTIAL MODEL IN SIX CLIMATES: A COMPARISON OF NBSLD, BLAST 2, AND DOE-2.1  

E-Print Network (OSTI)

glass. The thermal resistance is equivalent to a V-value ofequivalent to the DOE-2.1 parameter GLASS-CONDUCTANCE '" 1.39, when the inside film resistance

Carroll, William L.

2011-01-01T23:59:59.000Z

350

Updated Skill Set with Annual Skill Set Model Review and VISION Training completion. Revision does not impact MGTF-002 Template 08_1014. Added EOTA IT Security Course and Exam  

NLE Websites -- All DOE Office Websites (Extended Search)

330 330 Reformatted and reorganized entire document. Broke down by position and bumped against Position Descriptions for accuracy, updated names of documents and made consistent throughout 09_0623 Updated Skill Set with Annual Skill Set Model Review and VISION Training completion. Revision does not impact MGTF-002 Template 08_1014. Added EOTA IT Security Course and Exam to process section. 09_0807 Updated Skill Set with Annual Skill Set Model Review. Added Required DOE contractor Training (IT Security, FEOSH & Cyber Security). Added EOTA IT Security Course and Exam to process section. 08_1014 Removed employee no longer with EOTA. MGTP-004, Employee Satisfaction Process no longer active. 08_0829 Annual Skill Set Model Review completed and documented for all EOTA staff. Additional lines added for future training items.

351

DOE standard: Radiological control  

SciTech Connect

The Department of Energy (DOE) has developed this Standard to assist line managers in meeting their responsibilities for implementing occupational radiological control programs. DOE has established regulatory requirements for occupational radiation protection in Title 10 of the Code of Federal Regulations, Part 835 (10 CFR 835), ``Occupational Radiation Protection``. Failure to comply with these requirements may lead to appropriate enforcement actions as authorized under the Price Anderson Act Amendments (PAAA). While this Standard does not establish requirements, it does restate, paraphrase, or cite many (but not all) of the requirements of 10 CFR 835 and related documents (e.g., occupational safety and health, hazardous materials transportation, and environmental protection standards). Because of the wide range of activities undertaken by DOE and the varying requirements affecting these activities, DOE does not believe that it would be practical or useful to identify and reproduce the entire range of health and safety requirements in this Standard and therefore has not done so. In all cases, DOE cautions the user to review any underlying regulatory and contractual requirements and the primary guidance documents in their original context to ensure that the site program is adequate to ensure continuing compliance with the applicable requirements. To assist its operating entities in achieving and maintaining compliance with the requirements of 10 CFR 835, DOE has established its primary regulatory guidance in the DOE G 441.1 series of Guides. This Standard supplements the DOE G 441.1 series of Guides and serves as a secondary source of guidance for achieving compliance with 10 CFR 835.

Not Available

1999-07-01T23:59:59.000Z

352

Probabilistic Characterization of Adversary Behavior in Cyber Security  

SciTech Connect

The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

Meyers, C A; Powers, S S; Faissol, D M

2009-10-08T23:59:59.000Z

353

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

354

Comparison of two methods to quantify cyber and physical security effectiveness.  

SciTech Connect

With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

Wyss, Gregory Dane; Gordon, Kristl A.

2005-11-01T23:59:59.000Z

355

DOE Policy on Decommissioning DOE Facilities Under CERCLA | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Policy on Decommissioning DOE Facilities Under DOE Policy on Decommissioning DOE Facilities Under CERCLA DOE Policy on Decommissioning DOE Facilities Under CERCLA In May 1995, the Department of Energy (DOE) issued a policy in collaboration with the Environmental Protection Agency (EPA) for decommissioning surplus DOE facilities consistent with the requirements of the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA). This policy ensures protection of the environment, worker health and public health, provides opportunities for stakeholder involvement, and achieves risk reduction without unnecessary delay. Consistent with the jointly issued "Guidance on Accelerating CERCLA Environmental Restoration at Federal Facilities" (August 22, 1994), this decommissioning policy encourages streamlined decision-making. This

356

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC is offering a free, public webinar series from January to May 2012 entitled "Issues in Designing the Future Grid," focusing on the information hierarchy for the future grid and grid enablers of sustainable energy systems. The second webinar, Cyber-Physical Systems Security for the Smart Grid, will be held on Fecruary 7, 2012 by Manimaran Govindarasu, Professor if Electrical and Computer Engineering at Iowa State University. Govindarasu_PSERC_Webinar_Feb_2012.pdf More Documents & Publications April 2012 PSERC Webinars on Issues in Designing the Future Grid

357

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network (OSTI)

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

358

Multiple Tenure/Tenure-Track Faculty Positions Software Engineering Focus: CyberSecurity and Big Data  

E-Print Network (OSTI)

Multiple Tenure/Tenure-Track Faculty Positions Software Engineering Focus: CyberSecurity and Big to cybersecurity and big data. Outstanding candidates from all areas of software engineering and computer science

Carver, Jeffrey C.

359

Towards an Experimental Testbed Facility for Cyber-Physical Security Research  

SciTech Connect

Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

2012-01-07T23:59:59.000Z

360

Treatment outcomes using CyberKnife for brain metastases from lung cancer  

Science Journals Connector (OSTI)

......Treatment outcomes using CyberKnife for brain metastases from lung cancer Keisuke Tamari...fractionated stereotactic radiotherapy (SRT) for brain metastases from lung cancer. A total of 67 patients with 109 brain metastases from lung cancer treated using......

Keisuke Tamari; Osamu Suzuki; Naoya Hashimoto; Naoki Kagawa; Masateru Fujiwara; Iori Sumida; Yuji Seo; Fumiaki Isohashi; Yasuo Yoshioka; Toshiki Yoshimine; Kazuhiko Ogawa

2014-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Cyber visual training as a new method for the mastery of endoscopic surgery  

Science Journals Connector (OSTI)

We devised a new method incorporating cyber visual training whereby novices in endoscopic surgery are instructed via repetition of a video-recorded procedure. We then conducted a study designed to investigate ...

S. Takiguchi; M. Sekimoto; M. Yasui

2005-09-01T23:59:59.000Z

362

A quantitative man-machine model for cyber security efficiency analysis  

E-Print Network (OSTI)

of the level of their security defense processes' efficiency and the impact of their investment. Modeling and characterization of the dynamics of cyber security management are essential to risk prediction, damage assessment, and resource allocations...

Jung, Sung-Oh

2007-04-25T23:59:59.000Z

363

Promulgating Nuclear Safety Requirements  

Directives, Delegations, and Requirements

Applies to all Nuclear Safety Requirements Adopted by the Department to Govern the Conduct of its Nuclear Activities. Cancels DOE P 410.1. Canceled by DOE N 251.85.

1996-05-15T23:59:59.000Z

364

Feed tank transfer requirements  

SciTech Connect

This document presents a definition of tank turnover; DOE responsibilities; TWRS DST permitting requirements; TWRS Authorization Basis (AB) requirements; TWRS AP Tank Farm operational requirements; unreviewed safety question (USQ) requirements; records and reporting requirements, and documentation which will require revision in support of transferring a DST in AP Tank Farm to a privatization contractor for use during Phase 1B.

Freeman-Pollard, J.R.

1998-09-16T23:59:59.000Z

365

Cyber in the Cloud -- Lessons Learned from INL's Cloud E-Mail Acquisition  

SciTech Connect

As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.

Troy Hiltbrand; Daniel Jones

2012-12-01T23:59:59.000Z

366

DOE Challenge Home Recommended Quality Management Provisions...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Quality Management Provisions. qm6-14-13.pdf More Documents & Publications Version Tracking Document for DOE Challenge Homes, National Program Requirements (Rev. 03) DOE...

367

DOE Information Center  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE Information Center DOE Information Center The U.S. Department of Energy (DOE) Information Center provides citizens a consolidated facility to obtain information and records related to the DOE's various programs in Oak Ridge and abroad. Employees at the DOE Information Center are available to assist with your requests and searches from 8:00 a.m. to 5:00 p.m. (EST), Monday through Friday, except for federal holidays. Requests Documents can be requested in person or by telephone, email, or fax. Reproduction Please allow DOE Information Center staff adequate time to reproduce documents. Some material requires special handling, security reviews, etc. Delivery Unless special arrangements have been made with DOE Information Center staff, documents should be picked up during normal business hours.

368

DOE Explosives Safety Manual  

Directives, Delegations, and Requirements

The Manual describes the Departments explosive safety requirements applicable to operations involving the development, testing, handling, and processing of explosives or assemblies containing explosives. Cancels DOE M 440.1-1. Canceled by DOE O 440.1B Chg 1.

2006-01-09T23:59:59.000Z

369

Microsoft Word - Cyber Effects Analysis Using VCSE 09.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8-5954 8-5954 Unlimited Release Printed September 2008 Cyber Effects Analysis Using VCSE Promoting Control System Reliability Michael J. McDonald, Gregory N. Conrad, Travis C. Service, Regis H. Cassidy Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of

370

Predicting Cyber-Production deviance in the workplace  

Science Journals Connector (OSTI)

The excessive use of the internet for non-work-related activities is a form of white-collar deviant behaviour at work. Applying the Theory of Reasoned Action, structural equation modelling was used to predict Cyber-Production (CP) deviant behaviours in the workplace. Attitude and intention to visit non-work-related websites were found to be important predictors of such behaviours. Workplace Subjective Norms (SN) had no impact on the tendency to perform CP deviant activities but did influence intention to visit work-related websites. The findings of the study contributed to an expanded understanding of the potential predictors of CP deviance in the workplace and suggested appropriate strategies for effective internet management.

Pruthikrai Mahatanankoon

2006-01-01T23:59:59.000Z

371

BROOKHAVEN NATIONAL LABORATORYS CAPABILITIES FOR ADVANCED ANALYSES OF CYBER THREATS  

SciTech Connect

BNL has several ongoing, mature, and successful programs and areas of core scientific expertise that readily could be modified to address problems facing national security and efforts by the IC related to securing our nations computer networks. In supporting these programs, BNL houses an expansive, scalable infrastructure built exclusively for transporting, storing, and analyzing large disparate data-sets. Our ongoing research projects on various infrastructural issues in computer science undoubtedly would be relevant to national security. Furthermore, BNL frequently partners with researchers in academia and industry worldwide to foster unique and innovative ideas for expanding research opportunities and extending our insights. Because the basic science conducted at BNL is unique, such projects have led to advanced techniques, unlike any others, to support our mission of discovery. Many of them are modular techniques, thus making them ideal for abstraction and retrofitting to other uses including those facing national security, specifically the safety of the nations cyber space.

DePhillips M. P.

2014-06-06T23:59:59.000Z

372

Cyber Assessment Methods for SCADA Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

373

Transmission and Distribution World March 2007: DOE Focuses on Cyber Security  

Energy.gov (U.S. Department of Energy (DOE))

Energy sector owners, operators and system vendors team up to boost control system security with national SCADA test bed.

374

ASCR Science Network Requirements  

E-Print Network (OSTI)

ASCR Science Network Requirements Office of AdvancedScientific Computing Research, DOE Office of ScienceEnergy Sciences Network Gaithersburg, MD April 15 and 16,

Dart, Eli

2010-01-01T23:59:59.000Z

375

Transuranic Waste Requirements  

Directives, Delegations, and Requirements

The guide provides criteria for determining if a waste is to be managed in accordance with DOE M 435.1-1, Chapter III, Transuranic Waste Requirements.

1999-07-09T23:59:59.000Z

376

DOE CORPORATE REPORTING  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7/23/2010 7/23/2010 1 DEPARTMENT OF ENERGY (DOE) CORPORATE REPORTING To ensure projects are effectively managed and delivering on the goals of the American Recovery and Reinvestment Act (Recovery Act), DOE will collect data on project management and execution, risk management, job creation, and key project milestones, in addition to what is required by Section 1512 of the Recovery Act. In most cases, monthly data will be used internally for managerial purposes only, but where DOE does intend to publicize monthly data, it will clearly indicate it to be "preliminary/informal and subject to change." Recipients are required to provide DOE information on, but not limited to, the following issues:

377

DOE Directives | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Directives DOE Directives DOE Directives Directives are the Department of Energy's primary means to communicate and institutionalize directives and policies and to establish requirements, responsibilities, and procedures for Departmental elements and contractors. DOE O 413.3A - Program and Project Management for the Acquisition of Capital Assets DOE G 413.3-1 - Managing Design and Construction Using Systems Engineering for Use with DOE O 413.3A DOE G 413.3-2 - Quality Assurance Guide for Project Management DOE G 413.3-3 - Safeguards and Security for Program and Project Management DOE G 413.3-8 - Environmental Management (EM) Cleanup Projects DOE G 413.3-9 - U.S. Department of Energy Project Review Guide for Capital Asset Projects DOE G 413.3-10 - Earned Value Management System (EVMS)

378

Q&A: Cybersecurity Issues and Requirements, December 11, 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Issues and Requirements - Jeff Dagle Cyber Security Issues and Requirements - Jeff Dagle Q: On the theory that there's not a lock that can't be picked and a safe that can't be cracked, I think cyber security is a bit of an oxymoron, right? We all share the same goal and the same concern. But I think the vast majority of people in this room are not cyber security experts, and we're pretty much dependent upon the vendors and the experts who are in the field. I guess my concern and my question is this: I think we need to set up some defined due diligence around cyber security instead of creating some kind of expectation that we're all going to guarantee that something will never ever happen. Because we cannot guarantee that. Nobody knows what the vulnerabilities are until somebody has tricked the system and found the vulnerability. And at first I didn't think

379

DOE Order on Quality Assurance  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of this order is to ensure that Department of Energy (DOE), including National Nuclear Security Administration (NNSA), products and services meet or exceed customers requirements and...

380

DOE Cooperative Research and Development Agreements  

Directives, Delegations, and Requirements

The order establishes policy, requirements, and responsibilities for the oversight, management, and administration of Cooperative Research and Development Agreement (CRADA) activities at DOE facilities. Cancels DOE O 483.1 Admin Chg 1 and DOE M 483.1-1.

2013-11-06T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Version Tracking Document for DOE Challenge Homes, National Program...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Version Tracking Document for DOE Challenge Homes, National Program Requirements (Rev. 03) Version Tracking Document for DOE Challenge Homes, National Program Requirements (Rev....

382

Finding of No Significant Impact; Energy Efficient Performance Requirements for New Federal Commercial and Residential Buildings (DOE/EA-1463) (1/11/08)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 Federal Register 7 Federal Register / Vol. 73, No. 8 / Friday, January 11, 2008 / Notices Energy; and provide comments and recommendations and priorities for the Department of Energy Annual Plan requirements of the Energy Policy Act of 2005, Subtitle J, Section 999. Tentative Agenda: 7:30 a.m.-8 a.m. Registration 8 a.m.-12 p.m. Welcome & Introductions, Opening Remarks by the Designated Federal Officer, Update Status of the 2007 Program, Overview of 2008 Annual Plan Draft, and Overview of the National Energy Technology Laboratory Complementary Research Program. 12 p.m.-1 p.m. Lunch. 1 p.m.-4 p.m. Committee Discussions. 4 p.m.-4:30 p.m. New Business: Plans for 2008-2010 Federal Advisory Committee. 4:30 p.m.-5 p.m. Public Comments. 5 p.m. Adjourn. Public Participation: The meeting is

383

DOE-STD-1077-94  

Energy.gov (U.S. Department of Energy (DOE))

Training Accreditation Program Standard: Requirements and Guidelines Canceled | Supercedes DOE-STD-0101T, TAP-1, and DOE-STD-0103T, TAP-3 The purpose of this Standard is to provide requirements, information, and guidance for the effective implementation of the DOE Training Accreditation Program established by DOE Order 5480.18B, Nuclear Facility Training Accreditation Program.

384

OMB Requirements | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

OMB Requirements OMB Requirements OMB Requirements Acquisitions OMB Circular A-109, Acquisition of Major Systems (04-05-76) (Available in hard copy only) OMB M-04-08, Maximizing Use of SmartBuy and Avoiding Duplication of Agency Activities with with the President's 24 E-Gov Initiatives (02-25-2004) (pdf) OMB M-04-16, Software Acquisition (07-01-2004) Budget/Capital Planning OMB Circular A-11 OMB M-05-23, Improving Informational Technology (IT) Project Planning and Execution (8-04-2005) (pdf) Cyber Security & Privacy OMB M-00-07, Incorporating and Funding Security in Information Systems Investments (02-28-2000) OMB M-02-01, Guidance for Preparing and Submitting Security Plans of Action and Milestones(10-19-2001) OMB M-02-09, Reporting Instructions for the Government Information

385

DOE Testing Reveals Samsung Refrigerator Does Not Meet Energy Star  

NLE Websites -- All DOE Office Websites (Extended Search)

Testing Reveals Samsung Refrigerator Does Not Meet Energy Star Testing Reveals Samsung Refrigerator Does Not Meet Energy Star Requirements DOE Testing Reveals Samsung Refrigerator Does Not Meet Energy Star Requirements March 16, 2010 - 4:28pm Addthis DOE-initiated testing has revealed that a Samsung refrigerator (model RF26VAB), which the company had claimed was Energy Star compliant, consumed more energy than permitted by the Energy Star program. Test results for the Samsung model at issue show that, when tested in accordance with DOE's test procedure, it consumed between 7 and 11.4 percent more energy than the Energy Star requirement. Samsung is no longer manufacturing this model, although it may still be available from some retail outlets. Based on this testing, DOE is referring Samsung Model RF26VAB to the U.S.

386

DOE Online  

NLE Websites -- All DOE Office Websites (Extended Search)

Fermilab's Science Adventures! Fermilab's Science Adventures! DOE Online K-12 Instructional Resources ed.fnal.gov/doe/ The U.S. Department of Energy is committed to helping educate our nation's next generation of scientists. The following resources help teachers integrate the Internet into K-12 classroom instruction. DOE Labs General Instructional Units Online Resources Lesson Plans General References DOE Laboratory and Facility Education Home Pages (www-ed.fnal.gov/doe/doe_labs.html) Direct links for 27 education Websites at DOE national laboratories and facilities. Online Catalog (www-ed.fnal.gov/trc/library) Fermilab's Teacher Resource Center collection of 10,000+ PreK-12 instructional materials in science, mathematics and technology. Materials include tradebooks, curriculum materials, educational

387

Fast multi-core co-simulation of Cyber-Physical Systems : Application to internal combustion engines  

E-Print Network (OSTI)

on renewable energy and energy efficiency. This challenge affects the whole energy cycle: production, transport. Automobiles are typical examples of Cyber-Physical Systems, where chem- ical energy (gasoline, diesel, ethanol. Currently, building high fidelity system-level models of Cyber-Physical Sys- tems in general and automotive

Boyer, Edmond

388

Materials Informatics for the ICME CyberInfrastructure  

Energy.gov (U.S. Department of Energy (DOE))

2011 DOE Hydrogen and Fuel Cells Program, and Vehicle Technologies Program Annual Merit Review and Peer Evaluation

389

Implementing Least Privilege on Windows XP computers at DOE-RL Hanford  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Least Privilege on Microsoft Least Privilege on Microsoft Windows ® XP computers at DOE-RL Hanford Presented By Eric Anderson, PMP, CISM, CISSP, MCSE Cyber Projects and Technical Lead MSA / Lockheed Martin IS&GS DOE Hanford Site "To make our customers extraordinarily successful in our unified mission of cleaning up the Hanford Site..." Hanford Site Scope - 586 square miles - 9,000+ PCs - 500+ servers - 400+ applications - 1,000+ miles fiber to 300 bldgs - 12,500+ phones 2 What's the problem? Compliance problem - - OIG finding in 2007 ... too many users operate as a "privileged," Local Administrator (LA) on their computers. Cyber Security problem - - Users engage in risky activities while operating as LA.

390

General Responsibilities and Requirements  

Directives, Delegations, and Requirements

The material presented in this guide provides suggestions and acceptable ways of implementing DOE M 435.1-1 and should not be viewed as additional or mandatory requirements. The objective of the guide is to ensure that responsible individuals understand what is necessary and acceptable for implementing the requirements of DOE M 435.1-1.

1999-07-09T23:59:59.000Z

391

Integrated Management Requirements mapping  

SciTech Connect

This document contains five appendices documenting how Sandia implemented the DOE Conduct of Operations (5480.19) and DOE Quality Assurance (5700.6C) orders. It provides a mapping of the Sandia integrated requirements to the specific requirements of each Order and a mapping to Sandia`s approved program for implementing the Conduct of Operations Order.

Holmes, J.T.; Andrews, N.S.

1992-06-01T23:59:59.000Z

392

Integrated Management Requirements mapping  

SciTech Connect

This document contains five appendices documenting how Sandia implemented the DOE Conduct of Operations (5480.19) and DOE Quality Assurance (5700.6C) orders. It provides a mapping of the Sandia integrated requirements to the specific requirements of each Order and a mapping to Sandia's approved program for implementing the Conduct of Operations Order.

Holmes, J.T.; Andrews, N.S.

1992-06-01T23:59:59.000Z

393

Department of Energy Office of Nuclear Safety and Environmental Policy Technical Position NSEP-TP-2007- 1, Technical Position on the Requirement in DOE 0 420.1B to Use National Consensus Industry Standards and the Model Building CodesTechnical Position NS  

Energy.gov (U.S. Department of Energy (DOE))

All new construction required to follow the provisions of Department of Energy(DOE) Order 420. lB, Facility Safety, must comply with national consensus industrystandards and the model building...

394

DOE enforcement program roles and responsibilities: DOE handbook  

SciTech Connect

The Price-Anderson Act provides indemnification to DOE contractors who manage and conduct nuclear activities in the DOE complex. The government acts as an insurer for these contractors against any findings of liability from the nuclear activities of the contractor within the scope of its contract. 10 CFR Part 820 establishes the legal framework for implementing DOE`s Nuclear Safety Enforcement Program. Integration with other DOE organizations and programs would assure that the enforcement process properly considers the actual or potential safety significance of a violation when determining an appropriate enforcement sanction. Achieving a proactive contractor compliance assurance rather than a heavy enforcement hand, will require a foundation of cooperation and teamwork across DOE organizations. This handbook identifies the areas of interface for the DOE Enforcement Program and provides guidance on roles and responsibilities for the key DOE organizational areas. It complements DOE-HDBK-1087-95 and 1089-95.

NONE

1995-08-01T23:59:59.000Z

395

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

396

Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the  

NLE Websites -- All DOE Office Websites (Extended Search)

Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web of Things, and Social Media Speaker(s): Edward Curry Date: April 24, 2013 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: James O'Donnell Philip Haves Cyber-Physical Energy Systems (CPES) exploit the potential of information technology to boost energy efficiency while minimising environmental impacts. CPES can help manage energy more efficiently by providing a functional view of the entire energy system so that energy activities can be understood, changed, and reinvented to better support sustainable practices. CPES can be applied at different scales from Smart Grids and Smart Cities to Smart Enterprises and Smart Buildings. Significant technical challenges exist in terms of information management, leveraging

397

A hybrid systems model to simulate cyber interdependencies between critical infrastructures  

Science Journals Connector (OSTI)

Critical infrastructures (CI) depend on communications and information technology infrastructure (CITI) for many of their key functionalities, which is known as cyber interdependency. In this paper, we presented a cyber interdependency simulation technique that is based on the idea that overall performance of a CI network is determined by the behaviour of its components at multiple time scales. Accordingly, for cyber interdependency simulation, we decomposed CI network into two time scales; regular CI events are captured in large time-steps and data communication network events are captured in smaller time-steps. Two different simulators are used for each of these partitions and results from both simulations are synchronised appropriately. A real life example is presented to demonstrate the accuracy and usefulness of our approach. The hybrid simulation model gives significant flexibility to plug-in domain specific models into the critical infrastructure simulator for accurate and efficient solution.

Hafiz Abdur Rahman; José R. Martí; K.D. Srivastava

2011-01-01T23:59:59.000Z

398

DOE PAGES  

Office of Scientific and Technical Information (OSTI)

a useful reference. Find out more Do you have questions about DOE PAGESBeta content, procedures, or policies? More information is available at OSTI's Public Access Policy page and...

399

DOE News  

NLE Websites -- All DOE Office Websites (Extended Search)

DEPARTMENT OF ENERGY SMALL BUSINESS SYMPOSIUM TO LINK LOCAL COMPANIES WITH HANFORD CONTRACTING OPPORTUNITIES RICHLAND, Wash. - The U.S. Department of Energy (DOE) at the Hanford...

400

DOE-STD-1030-96 | Department of Energy  

Energy Savers (EERE)

for, Lockouts and Tagouts, Chapter IX of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities DOE-STD-1030-95, DOE Standard Guide...

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

DOE Issues Funding Opportunity for Innovations to Increase Cybersecurity  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues Funding Opportunity for Innovations to Increase Issues Funding Opportunity for Innovations to Increase Cybersecurity for Energy Delivery Systems DOE Issues Funding Opportunity for Innovations to Increase Cybersecurity for Energy Delivery Systems February 11, 2013 - 10:53am Addthis The Office of Electricity Delivery and Energy Reliability issued a new Funding Opportunity Announcement (FOA), Innovation for Increasing Cybersecurity for Energy Delivery Systems, on February 8. The announcement is seeking applications to conduct research, development and demonstrations leading to next generation tools and technologies that will become widely adopted to enhance and accelerate deployment of cybersecurity capabilities for the U.S energy infrastructure, including cyber secure integration of smart grid technologies.

402

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program … 2013  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013 OAS-M-14-01 October 2013 Department of Energy Washington, DC 20585 October 23, 2013 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy (Department) responsible for, among other things, regulating the interstate

403

Feed tank transfer requirements  

SciTech Connect

This document presents a definition of tank turnover. Also, DOE and PC responsibilities; TWRS DST permitting requirements; TWRS Authorization Basis (AB) requirements; TWRS AP Tank Farm operational requirements; unreviewed safety question (USQ) requirements are presented for two cases (i.e., tank modifications occurring before tank turnover and tank modification occurring after tank turnover). Finally, records and reporting requirements, and documentation which will require revision in support of transferring a DST in AP Tank Farm to a privatization contractor are presented.

Freeman-Pollard, J.R.

1998-09-16T23:59:59.000Z

404

Mandatory Supervisory Training Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mandatory Supervisory Training Requirements Mandatory Supervisory Training Requirements All DOE supervisors, managers, and executives will comply with mandatory supervisory training requirements (5 CFR 412; 5 CFR 315.801; 5 CFR 315.901; DOE O 360.1; and DOE O 320.1): * New supervisors: 80 hours of supervisory training, with 40 hours required to be completed during the supervisory probationary period. * Experienced supervisors: minimum of 8 hours of supervisory training each year. The Office of Learning and Workforce Development has developed an inventory of training and developmental activities that will meet the supervisory training requirements. The DOE courses Supervisory Essentials (32 hours) and Navigating the Federal Hiring Process (8 hours) are required to fulfill the first year 40-hour training

405

DOE Form  

National Nuclear Security Administration (NNSA)

1991) PROJECT: U.S. Department of Energy Requirements Change Notice Baseline List of Required Compliance Documents CONTRACTOR: Babcock & Wilcox Technical Services Y-12, LLC...

406

DOE Form  

National Nuclear Security Administration (NNSA)

11991) PROJECT: U.S. Department of Energy Requirements Change Notice Baseline List of Required Compliance Documents CONTRACTOR: Babcock & Wilcox Technical Services Y-12, LLC...

407

Drafts - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

O 452.2E Facility Safety Acquisition Career Management Program Nuclear Explosive and Weapon Surety Program Implementation Guide for Use in Developing Technical Safety...

408

Redelegation Procedures - DOE Directives, Delegations, and Requirement...  

NLE Websites -- All DOE Office Websites (Extended Search)

Redelegation Procedures by Website Administrator Text version available here. Delegation Procedures Re-Delegation Procedures Document Actions Redelegation Procedures Redelegating...

409

Delegation Procedures - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Delegation Procedures Text Delegation Procedures Delegation Template Text Redelegation Procedures Redelegation Template Delegation Procedures Redelegation Procedures...

410

NERSC/DOE HEP Requirements Workshop Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

Advanced Modeling for Particle Accelerators November 12, 2009 | Author(s): Lie-Quan Lee | Astrophysical Data Analysis November 12, 2009 | Author(s): Alex Szalay | Astrophysical...

411

Directives - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

and Analysis 300 Human Resources 400 Work Processes 500 Business and Support Services 1100 Org. Authorities, Functions and Internal Relationships 1200 External...

412

NERSC/DOE BER Requirements Workshop Agenda  

NLE Websites -- All DOE Office Websites (Extended Search)

NERSC) 10:15 am - Break 10:30 pm - Case Studies: Climate Science (Lawrence Buja, David Randall, Co-leads) Noon - Working Lunch 1:00 pm - Case Studies: Climate Science, continued...

413

DPC list - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

DPC list by Website Administrator PDF document icon DPC list 9-9-14.pdf - PDF document, 390 KB (399650 bytes...

414

Redelegation Template - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Redelegation Template by Website Administrator Microsoft Word Document icon Re-delegation Template Rev3 10-3-11 (1).doc - Microsoft Word Document, 39 KB (40448 bytes)...

415

Delegation Template - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Template by Website Administrator Microsoft Word Document icon delegationtemplate (1).doc - Microsoft Word Document, 39 KB (40448 bytes) Document Actions...

416

NERSC/DOE ASCR Requirements Workshop Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

charge to committee January 5, 2011 | Author(s): Yukiko Sekine | Workshop outline, logistics, format January 5, 2011 | Author(s): Harvey Wasserman | ASCR Program Office Research...

417

NERSC/DOE BER Requirements Meeting Logistics  

NLE Websites -- All DOE Office Websites (Extended Search)

Logistics Hotel Information Location The workshop was held at the Hilton Washington DCRockville Executive Meeting Center. Address is 1750 Rockville Pike, Rockville, Maryland,...

418

NERSC/DOE HEP Requirements Workshop Logistics  

NLE Websites -- All DOE Office Websites (Extended Search)

Logistics Workshop Logistics Workshop Location Hilton Washington DCRockville Executive Meeting Center 1750 Rockville Pike Rockville, MD, 20852 The hotel is about 27 miles...

419

NERSC/DOE BER Requirements Workshop Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

(high-low) Workshop GoalsOverview May 7, 2009 | Author(s): Yukiko Sekine | Workshop Logistics May 7, 2009 | Author(s): Harvey Wasserman | BER Overview May 7, 2009 | Author(s):...

420

NERSC/DOE BES Requirements Workshop Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

Workshop Goals February 9, 2010 | Author(s): Yukiko Sekine | Workshop outline, logistics, format, procedures February 9, 2010 | Author(s): Richard Gerber | BES Program...

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Justification Memoranda - DOE Directives, Delegations, and Requirement...  

NLE Websites -- All DOE Office Websites (Extended Search)

Justification Memoranda by Diane Johnson Notice of Intent to Revise Department of Energy Order 350.1, Contractor Human Resources Management Program - by Robert Myers - last...

422

Email Alerts - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Email Alerts by Diane Johnson Use this form to subscribeunsubscribe to email alerts. Please select the type of email alert that you would like to receive. Your Name Please enter...

423

Updates - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Updates by Diane Johnson Email Alerts Subscribe to automatic e-mail notification about updates to the portal. Email Alerts...

424

References - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Regulations (DEAR) CFR Code of Federal Regulations CFR (annual edition) 10 CFR 430 10 CFR 830 10 CFR 835 10 CFR 850 10 CFR 851 Directives Review Board Directives Review Board...

425

NERSC/DOE HEP Requirements Review Participants  

NLE Websites -- All DOE Office Websites (Extended Search)

for ASCR Stefan Hoeche SLAC National Accelerator Laboratory Particle physics phenomenology, in particular perturbative QCD and the construction of Monte Carlo event...

426

DOE Federal Register Questions  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

COMMENTS-PAGE 1 COMMENTS-PAGE 1 Comments of the Bonneville Power Administration On May 11, the Department of Energy (DOE) issued a Request for Information (RFI) (NBP RFI: Communications Requirements) seeking comments and information from interested parties to assist DOE in understanding the communications requirement of utilities, including, but not limited to, the requirements of the Smart Grid. The RFI also seeks to collect information about electricity infrastructure's current and projected communications requirements, as well as the types of networks and communications services that may be used for grid modernization, including specifically information on what types of communications capabilities utilities think that they will need and what type of communications capabilities the communications carriers think that they can

427

FY 2013 DOE Agency Financial Report | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agency Financial Reports » FY 2013 DOE Agency Financial Agency Financial Reports » FY 2013 DOE Agency Financial Report FY 2013 DOE Agency Financial Report Notable accomplishments in FY 2013: Investments in energy transformation have resulted in testing of greenhouse gas storage, the first grid-connected offshore wind prototype, cost competitive advances in cellulosic ethanol, the first commercial geothermal system to deliver power to the electric grid, improved efficiency and cyber security for the electric grid, new appliance efficiency standards, the first full-scale nuclear reactor simulation. Basic research in the science field yielded several results, such as: the discovery of a powerful new microbe, major improvements to organic electronics, high-resolution molecular images, 3D printed batteries, improved efficiency in thermoelectric devices.

428

FY 2013 DOE Agency Financial Report | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agency Financial Reports » FY 2013 DOE Agency Financial Agency Financial Reports » FY 2013 DOE Agency Financial Report FY 2013 DOE Agency Financial Report Notable accomplishments in FY 2013: Investments in energy transformation have resulted in testing of greenhouse gas storage, the first grid-connected offshore wind prototype, cost competitive advances in cellulosic ethanol, the first commercial geothermal system to deliver power to the electric grid, improved efficiency and cyber security for the electric grid, new appliance efficiency standards, the first full-scale nuclear reactor simulation. Basic research in the science field yielded several results, such as: the discovery of a powerful new microbe, major improvements to organic electronics, high-resolution molecular images, 3D printed batteries, improved efficiency in thermoelectric devices.

429

Office Inspector General DOE Annual Performance Report FY 2008, Annual  

NLE Websites -- All DOE Office Websites (Extended Search)

Inspector General DOE Annual Performance Report FY 2008, Inspector General DOE Annual Performance Report FY 2008, Annual Performance Plan FY 2009 Office Inspector General DOE Annual Performance Report FY 2008, Annual Performance Plan FY 2009 During Fiscal Year (FY) 2008, we reviewed a variety of critical areas relevant to the Department's mission priorities. One of our goals, for example, was to examine possible programmatic improvements in Department operations relating to cyber security and contract management. Overall, our efforts resulted in the issuance of over 70 audit and inspection reports containing recommendations for enhancing Departmental operations, with likely savings of over $7 million. Further as a result of our investigative efforts, we obtained 20 criminal convictions, recovered $22.8 million in

430

DOE017-0153  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5525 5525 DOE017-0153 ,-.or/ N"( - ./,'-'S MaryBeth Zimmerman 02/14/2001 11:08AM / -- T ' ,44 L - ( _w _1_'- _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ - .I f . J To: Kenneth Friedman/EE/DOE@DOE, Peggy Podolak/EE/DOE@DOE, Linda Silverman/EE/DOE@DOE, Ed Wall/EE/DOE@DOE, David RodgerslEE/DOE@DOE, Jerry DionlEE/DOE@DOE, Gail McKinley/EE/DOE@DOE. Lawrence MansuetifEE/DOE@DOE cc: John Sullivan/EE/DOE@DOE. Darrell Beschen/EEIDOE@DOE, Michael York/EE/DOE@DOE, Buddy GarlandlEEIDOE@DOE, Nancy Jefferv/EEIDOE@DOE, Joel Rubin/EE/DOE@DOE. Sam Baldwin/EE/DOE@DOE, IEE-ADAS Subject: FW: NEP Draft outline Directions on NEP Assessment paper. Please read all of this very carefully before proceeding: Product Schedule: * Inputs due from sectors to Planning: COB on Thursday (sorry) o Due from EERE to Policy Office: noon on Friday

431

Verifiable Active Safety for Automotive Cyber-Physical Systems with Humans in the Loop  

E-Print Network (OSTI)

-6925 A recent trend in the automotive industry is the rapid inclusion of electronics, computers and controlsVerifiable Active Safety for Automotive Cyber-Physical Systems with Humans in the Loop Francesco that focus entirely on improved functionality and overall system robustness. This makes the automotive sector

Rajkumar, Ragunathan "Raj"

432

Cyber Security for Power Grids Frank Mueller, Subhashish Bhattacharya, Christopher Zimmer  

E-Print Network (OSTI)

Cyber Security for Power Grids Frank Mueller, Subhashish Bhattacharya, Christopher Zimmer Dept security challenges for a fu- ture power grid. It highlights deficiencies and shortcom- ings of existing and fault resilience of power as a utility must be a prime objective for power grids. Security compromises

Mueller, Frank

433

Improved Power Grid Stability and Efficiency with a Building-Energy Cyber-Physical System  

E-Print Network (OSTI)

, or for sporadic reasons, for example a power plant goes offline unexpectedly (e.g., due to an earthquake or stagnant winds to propel wind turbines). Dur- ing an episode, the power grid operators must contend1 Improved Power Grid Stability and Efficiency with a Building-Energy Cyber-Physical System Mary

434

Cyber-Physical Systems for Optimal Energy Management Scheme of Autonomous Electric Vehicle  

Science Journals Connector (OSTI)

......cyber-physical systems; autonomous electric vehicle; energy management...applications [e.g., autonomous electric vehicle (AEV) with wireless...systems, such as aircrafts and automobiles, to large-scale systems...infrastructure that supplies electric energy for the recharging......

Jiafu Wan; Hehua Yan; Di Li; Keliang Zhou; Lu Zeng

2013-08-01T23:59:59.000Z

435

Towards A Framework for Cyber Social Status Based Trusted Open Collaboration  

E-Print Network (OSTI)

Towards A Framework for Cyber Social Status Based Trusted Open Collaboration Jaehong Park Institute University of Texas at San Antonio ravi.sandhu@utsa.edu Abstract--Collaboration takes place in both closed and open environments. While closed collaboration focuses on information or resource sharing amongst

Sandhu, Ravi

436

Survey Paper Cyber security in the Smart Grid: Survey and challenges q  

E-Print Network (OSTI)

), and renewable energy resources (e.g., solar and hydro) [2]. Therefore, the National Institute of StandardsSurvey Paper Cyber security in the Smart Grid: Survey and challenges q Wenye Wang , Zhuo Lu importantly, with the integration of advanced computing and communication technologies, the Smart Grid

Wang, Wenye

437

DOE PAGES  

Office of Scientific and Technical Information (OSTI)

States Government purposes. (End of Notice) Ref. DEAR970.5227-2 Rights in data-technology transfer DOE-funded authors are free to publish in journals of their choice, including...

438

DOE Annual Site Environmental Reports (ASER)  

Energy.gov (U.S. Department of Energy (DOE))

ASERs are required by DOE O 231.1B. The ASERs provide important information needed by site managers and DOE Headquarters to assess field environmental program performance, site-wide environmental monitoring and surveillance effectiveness, and confirm compliance with environmental standards and requirements. They are also the means by which DOE sites demonstrate compliance with the radiological protection requirements of DOE O 458.1. In addition, ASERs are an important means of conveying DOE's environmental protection performance to stakeholders and members of the public living near DOE sites.

439

DOE Approved Technical Standards | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Technical Standards Program » DOE DOE Technical Standards Program » DOE Approved Technical Standards DOE Approved Technical Standards Document ID Filter Document ID sort ascending Title Date DOE-STD-7501-99 The DOE Corporate Lessons Learned Programs Superseding DOE-STD-7501-95 Including Change Notice No. 1 (September 1997) This technical standard provides management expectations and a framework for the DOE Corporate Lessons Learned Program. The framework is intended to support development and implementation of a DOE-wide lessons learned infrastructure 01/20/2000 DOE-STD-6005-01 Industrial Hygiene Practices This standard recommends industrial hygiene practices to support components of the Worker Protection Program required by Department of Energy (DOE) Order 440.1A, “Worker Protection Management for DOE Federal and Contractor Employees. 04/30/2001

440

DOE-STD-3006-2010  

Energy.gov (U.S. Department of Energy (DOE))

Planning and Conducting Readiness Reviews Superseding DOE-STD-3006-2000 (June 2000) This Standard provides standardized methods and approaches for planning and conducting RRs. This Standard also provides guidance for preparation of exemption requests in accordance with DOE O 251.1C. DOE O 425.1D requirements for RRs apply both to responsible contractors and to DOE

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

DOE Cooperative Research and Development Agreements Manual  

Directives, Delegations, and Requirements

This Manual provides detailed requirements to supplement DOE O 483.1, DOE Cooperative Research and Development Agreements, dated 1-12-01, which establishes requirements for the performance of technology transfer through the use of Cooperative Research and Development Agreements (CRADAs). Canceled by DOE O 483.1A.

2001-01-12T23:59:59.000Z

442

US Nuclear Regulatory Commission Input to DOE Request for Information Smart  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

US Nuclear Regulatory Commission Input to DOE Request for US Nuclear Regulatory Commission Input to DOE Request for Information Smart Grid Implementation Input US Nuclear Regulatory Commission Input to DOE Request for Information Smart Grid Implementation Input US Nuclear Regulatory Commission Input to DOE Request for Information Smart Grid Implementation Input. Comments relevant to the following two sections of the RFI: "Long Term Issues: Managing a Grid with High Penetration of New Technologies" and "Reliability and Cyber-Security," US Nuclear Regulatory Commission Input to DOE Request for Information Smart Grid Implementation Input More Documents & Publications Comments of DRSG to DOE Smart Grid RFI: Addressing Policy and Logistical Challenges Reply Comments of Entergy Services, Inc. Progress Energy draft regarding Smart Grid RFI: Addressing Policy and

443

Regulators, Requirements, Statutes  

NLE Websites -- All DOE Office Websites (Extended Search)

Regulators, Requirements, Statutes Regulators, Requirements, Statutes Regulators, Requirements, Statutes The Laboratory must comply with environmental laws and regulations that apply to Laboratory operations. Contact Environmental Communication & Public Involvement P.O. Box 1663 MS M996 Los Alamos, NM 87545 (505) 667-0216 Email Environmental laws and regulations LANL complies with more than 30 state and federal regulations and policies designed to protect human health and the environment. Regulators Regulators Environmental Protection Agency (EPA) EPA Homepage EPA - Region VI U.S. Department of Energy (DOE) DOE Homepage DOE Environmental Policy DOE Citizen's Advisory Board U.S. Fish and Wildlife Service (FWS) Southwest Region 2 New Mexico Environment Department (NMED) NMED Homepage NMED DOE Oversight Office

444

NNSA Seeking Comments on Consolidated IT and Cyber Security Support...  

Energy Savers (EERE)

search criteria, click on the down arrow and select "Reference Number". Type in,DE-SOL-0005569. Addthis Related Articles DOE Issues Draft Request for Proposals for Hanford Site...

445

Maintenance Management Program for DOE Nuclear Facilities  

Directives, Delegations, and Requirements

To define the program for the management of cost-effective maintenance of Department of Energy (DOE) nuclear facilities. Guidance for compliance with this Order is contained in DOE G 433.1-1, Nuclear Facility Maintenance Management Program Guide for use with DOE O 433.1, which references Federal regulations, DOE directives, and industry best practices using a graded approach to clarify requirements and guidance for maintaining DOE-owned Government property. (Cancels DOE 4330.4B, Chapter II, Maintenance Management Program, dated 2-10-94.) Cancels DOE 4330.4B (in part). Canceled by DOE O 433.1A.

2001-06-01T23:59:59.000Z

446

Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Failure  

Science Journals Connector (OSTI)

The advanced electric power grid is a cyber-physical system comprised of ... of the device and the reliability of the power grid on which they are deployed. The IEEE118...

Ayman Z. Faza; Sahra Sedigh

2009-01-01T23:59:59.000Z

447

Microsoft Word - Directives Requiring Additional Documentation...  

NLE Websites -- All DOE Office Websites (Extended Search)

Chg 2 Radiation Protection of the Public and the Environment 24 DOE O 5480.19, Chg 2 Conduct of Operations Requirements for DOE Facilities 25 DOE O 5480.20A, Chg 1 Personnel...

448

Part I, DAA Overview ; AODR Role-Based Training | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Training More Documents & Publications AO Role-Based Training Part I, DAA Overview DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS Audit Report:...

449

PARS II New Contractor Information for Interconnection Security...  

Office of Environmental Management (EM)

V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System...

450

Technical Safety Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety Requirements Safety Requirements FUNCTIONAL AREA GOAL: Contractor has developed, maintained, and received DOE Field Office Approval for the necessary operating conditions of a facility. The facility has also maintained an inventory of safety class and safety significant systems and components. REQUIREMENTS:  10 CFR 830.205, Nuclear Safety Rule.  DOE-STD-3009-2002, Preparation Guide for U. S. Department of Energy Nonreactor Nuclear Facility Documented Safety Analyses.  DOE-STD-1186-2004, Specific Administrative Controls. Guidance:  DOE G 423.1-1, Implementation Guide for Use in Developing Technical Safety Requirements.  NSTP 2003-1, Use of Administrative Controls for Specific Safety Functions. Performance Objective 1: Contractor Program Documentation

451

Goals and Requirements  

Energy.gov (U.S. Department of Energy (DOE))

The U.S. Department of Energy (DOE) Sustainability Performance Office (SPO) is committed to meeting the goals of Executive Order (E.O.) 13514, E.O. 13423, and related statutory requirements through the Strategic Sustainability Performance Plan (SSPP).

452

DOE HANDBOOK  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Handbook on Overseas Assignments Handbook on Overseas Assignments United States Department of Energy Office of Human Capital Management July 2013 2 Introduction This handbook covers all types of Federal employment overseas, including details, both within DOE as well as to other agencies; transfers to approved international organizations; assignments to permanent DOE positions; cost-free experts; and personal services agreements (PSAs). This handbook contains information, guidance, sample service agreements, and related documentation that are to be used to implement the following directives: a. Executive Order 11552, Providing for Details and Transfers of Federal Employees to International Organizations at http://www.archives.gov/federal-register/codification/executive-order/11552.html;

453

DOE-STD-1031-92 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

direction for, Communications, Chapter IV of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities. The practices in this guide should...

454

DOE-STD-1042-93 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for, "Control Area Activities," Chapter III of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities."Control Area Activities" is an...

455

DOE-STD-1037-93 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chemistry and Unique Processes, Chapter XIII of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities. The practices in this guide should...

456

DOE-STD-1041-93 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Operating Practices," Chapter II of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities. "Shift Routines and Operating...

457

DOE Challenge Home Policy Record, November 8, 2013 | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Home website. chpolicyrecord11082013.pdf More Documents & Publications Version Tracking Document for DOE Challenge Homes, National Program Requirements (Rev. 03) DOE...

458

DOE Standards Actions, January 1999  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Documents Recently Published Documents Recently Published The following DOE documents have recently been published: • DOE-STD-1032-92, Guide to Good Practices for Operations Or- ganization and Administration, December 1992, Change No- tice No. 1, December 1998. • DOE-STD-1033-92, Guide to Good Practices for Operations and Administration Updates Through Required Reading, December 1992, Change No- tice No. 1, December 1998. • DOE-STD-1034-93, Guide to Good Practices for Timely Or- ders to Operators, March 1993, Change Notice No. 1, Decem- ber 1998. • DOE-STD-1035-93, Guide to Good Practices for Logkeeping, March 1993, Change Notice No. 1, December 1998. • DOE-STD-1036-93, Guide to Good Practices for Independent Verification, June 1993, Change Notice No. 1, December 1998. • DOE-STD-1038-93, Guide to Good Practices for Operations Turn-

459

DOE Report  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 Environmental Assessment for the Multipurpose Haul Road Within the Idaho National Laboratory Site August 2010 DOE/EA-1772 Environmental Assessment for the Multipurpose Haul Road Within the Idaho National Laboratory Site August 2010 CONTENTS ACRONYMS.............................................................................................................................................. vii GLOSSARY ................................................................................................................................................ ix 1. PURPOSE AND NEED ..................................................................................................................... 1 1.1 Background ...........................................................................................................................

460

DOE Report  

NLE Websites -- All DOE Office Websites (Extended Search)

772 772 Environmental Assessment for the Multipurpose Haul Road Within the Idaho National Laboratory Site August 2010 DOE/EA-1772 Environmental Assessment for the Multipurpose Haul Road Within the Idaho National Laboratory Site August 2010 CONTENTS ACRONYMS.............................................................................................................................................. vii GLOSSARY ................................................................................................................................................ ix 1. PURPOSE AND NEED ..................................................................................................................... 1 1.1 Background ...........................................................................................................................

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

ica meeting | netl.doe.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Based Control for Power Systems Aditya Kumar, GE Presentation Model Based Control for Chemical Looping Xinsheng Lou, Alstom Presentation Cyber Security Solution - Demonstration of...

462

Worker Protection Management for DOE Federal and Contractor Employees Guide for use with DOE O 440.1  

Directives, Delegations, and Requirements

This implementation guide provides general information and methodologies that DOE finds acceptable in meeting the Department's requirements defined in DOE O 440.1.

1997-07-10T23:59:59.000Z

463

DOE-STD-1172-2011  

Energy.gov (U.S. Department of Energy (DOE))

Safety Software Quality Assurance Functional Area Qualification Standard This SSQA FAQS identifies the minimum technical competency requirements for DOE personnel who have a responsibility for safety software. Although there may be other competency requirements associated with the positions held by DOE personnel, this technical FAQS is limited to identifying the specific technical competencies required throughout all defense nuclear facilities.

464

DOE-HDBK-1092-98; DOE Handbook Electrical Safety  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

092-98 092-98 January 1998 DOE HANDBOOK ELECTRICAL SAFETY U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document has been reproduced directly from the best available copy. Available to DOE and DOE contractors from the Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831; (423) 576-8401. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 487-4650. Order No. DE98001290 DOE-HDBK-1092-98 DOE-HDBK-1092-98 CONTENTS 1.0 INTRODUCTION 2.0 GENERAL REQUIREMENTS 3.0 ELECTRICAL PREVENTIVE MAINTENANCE 4.0 GROUNDING 5.0 SPECIAL OCCUPANCIES 6.0 REQUIREMENTS FOR SPECIFIC EQUIPMENT

465

DOE Hydrogen Program Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

and Fuel Cells and Fuel Cells Mark Paster U.S. Department of Energy Hydrogen, Fuel Cells and Infrastructure Program January, 2005 A Bold New Approach is Required 0 4 8 12 16 20 24 28 32 1970 1980 1990 2000 2010 2020 2030 2040 2050 Petroleum (MMB/Day Oil Equivalent) Actual Projection U.S. Oil Production EIA 2003 Base Case Extended Oil Consumption With Average Fuel Efficiency Automobile & Light Truck Oil Use U.S. Transportation Oil Consumption U.S. Refinery Capacity Source: DOE/EIA, International Petroleum Statistics Reports, April 1999; DOE/EIA 0520, International Energy Annual 1997, DOE/EIA0219(97), February 1999. 0 20 40 60 80 100 Rest of World OPEC US Percentage of Total Consumption Production Reserves 2% 12% 26% 7% 41% 77% 67% 47% 21% World Oil Reserves are Consolidating in OPEC Nations 0 10 20 30 40 50 60 70 80

466

DOE and Industry Showcase New Control Systems Security Technologies at  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Development » Energy Delivery Systems Technology Development » Energy Delivery Systems Cybersecurity » Control Systems Security News Archive » DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DistribuTECH Conference Tuesday-Thursday, March 23-25, 2010 Tampa Convention Center Booth #231 Tampa, FL Join the Department of Energy and its industry partners as they showcase six new products and technologies designed to secure the nation's energy infrastructure from cyber attack on Tuesday through Thursday, March 23-25. Visit Booth #231 at the DistribuTECH 2010 Conference & Exhibition in Tampa, FL, to see first-hand demonstrations of several newly commercialized control systems security products-each developed through a

467

Certificate in Cyber Operations Pre-Application Form  

E-Print Network (OSTI)

, sex, age, marital status, parental status, physical disability, learning disability, political & SELF-LEARNING 1.What it your highest level of education?* High School Trade School College these systems (i.e. document editing, spreadsheets, email, web applications, databases, etc). If this does

Maryland, Baltimore County, University of

468

Order Module--DOE O 433.1B, MAINTENANCE MANAGEMENT PROGRAM FOR DOE NUCLEAR  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33.1B, MAINTENANCE MANAGEMENT PROGRAM FOR DOE 33.1B, MAINTENANCE MANAGEMENT PROGRAM FOR DOE NUCLEAR FACILITIES Order Module--DOE O 433.1B, MAINTENANCE MANAGEMENT PROGRAM FOR DOE NUCLEAR FACILITIES "The familiar level of this module is designed to summarize the basic information in DOE O 433.1B, Maintenance Management Program for DOE Nuclear Facilities. This Order canceled DOE O 433.1A. This module is divided into three sections. Section one contains the objective, general requirements, and the responsibilities assigned to field element managers. Section two includes the requirements in attachment 2 of the Order, Maintenance Management Program Requirements for DOE Nuclear Facilities. Section three is a summary of the guidance provided in DOE G 433.1-1, Facility Maintenance Management Program Guide for Use with DOE O 433.1.The

469

Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior  

Science Journals Connector (OSTI)

Abstract To protect complex power-grid control networks, efficient security assessment techniques are required. However, efficiently making sure that calculated security measures match the expert knowledge is a challenging endeavor. In this paper, we present EliMet, a framework that combines information from different sources and estimates the extent to which a control network meets its security objective. Initially, EliMet passively observes system operators' online reactive behavior against security incidents, and accordingly refines the calculated security measure values. To make the values comply with the expert knowledge, EliMet actively queries operators regarding those states for which sufficient information was not gained during the passive observation. Finally, EliMet makes use of the estimated security measure values for predictive situational awareness by ranking potential cyber-physical contingencies that the security administrators should plan for upfront. Our experimental results show that EliMet can optimally make use of prior knowledge as well as automated inference techniques to minimize human involvement and efficiently deduce the expert knowledge regarding individual states of that particular system.

Saman Zonouz; Parisa Haghani

2013-01-01T23:59:59.000Z

470

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

471

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

472

DOE Order Self Study Modules - DOE STD 1063, Facility Representatives  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63-2011 63-2011 FACILITY REPRESENTATIVES DOE-STD-1063-2011 Familiar Level August 2011 1 DOE-STD-1063-2011 FACILITY REPRESENTATIVES FAMILIAR LEVEL OBJECTIVES Given the familiar level of this module and the resources listed below, you will be able to answer the following questions: 1. What are the purpose and scope of DOE-STD-1063-2011? 2. What are the definitions of the terms listed in section 3 of DOE-STD-1063-2011? 3. What are the duties, responsibilities, and authorities of facility representatives (FRs) and other key personnel? 4. What are the requirements of the FR program? 5. What are the Department of Energy (DOE)-wide FR performance indicators (PIs)? 6. How are DOE-wide FR PIs calculated? 7. What are the FR program objectives that should be measured by an FR program

473

Modeling and simulation for cyber-physical system security research, development and applications.  

SciTech Connect

This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

2010-02-01T23:59:59.000Z

474

Bullying and Cyber-Bullying in Higher Education: Current Institutional Practice and Prevention  

E-Print Network (OSTI)

. (2010) believes bullying, especially cyber-bullying, is a real 21st century concern and that it must be addressed by those in power. 8 Chapter 2 Bullying of all forms continues to plague the educational system, with no clear methods... report that bullying exists in their schools and it largely through electronic means. Students believe they are anonymous through electronic means and now feel an aura of power and a willingness to say something they would never say in person...

Early, Jeremy Scott

2014-05-31T23:59:59.000Z

475

DOE Cooperative Research and Development Agreements  

Energy.gov (U.S. Department of Energy (DOE))

To establish Department of Energy (DOE) policy, requirements, and responsibilities for theoversight, management, and administration of Cooperative Research and DevelopmentAgreement (CRADA)...

476

CRAD, Feedback and Continuous Improvement - DOE Headquarters...  

Energy Savers (EERE)

2, quality assurance requirements (as stated in 10 Code of Federal Regulations (CFR) 830, Subpart A, DOE Order 414.1 C, Quality Assurance, or other applicable...

477

National cyber defense high performance computing and analysis : concepts, planning and roadmap.  

SciTech Connect

There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

478

DOE-STD-1038-93 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for, Operations Turnover, Chapter XII of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities. DOE-STD-1038-93, Guide to Good...

479

DOE-STD-1034-93 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for, Timely Orders to Operators, Chapter XV of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities. DOE-STD-1034-93, Guide to Good...

480

DOE-STD-1044-93 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Piping Labeling," Chapter XVIII of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities. DOE-STD-1044-93 CN-1, Guide to Good...

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

DOE-STD-1039-93 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Equipment and System Status, Chapter VIII of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities. DOE-STD-1039-93, Guide to Good...

482

DOE-STD-1032-92 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Organization and Administration, Chapter I of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities. DOE-STD-1032-92 Change Notice 1,...

483

DOE-STD-1043-93 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for, Operator Aid Postings, Chapter XVII of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities. DOE-STD-1043-93 CN-1, Guide to Good...

484

DOE-STD-1035-93 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

direction for, Logkeeping, Chapter XI of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities. DOE-STD-1035-93, Guide to Good...

485

Introduction to DOE Order 435.1 Low Level Radioactive Waste Disposal...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Introduction to DOE Order 435.1 Low Level Radioactive Waste Disposal Requirements Introduction to DOE Order 435.1 Low Level Radioactive Waste Disposal Requirements Christine...

486

DOE O 483.1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Energy Department of Energy ORDER Washington, D.C. Approved: 01-12-01 Sunset Review: 01-12-03 Expiration: 01-12-05 SUBJECT: DOE COOPERATIVE RESEARCH AND DEVELOPMENT AGREEMENTS 1. OBJECTIVES. a. To establish Department of Energy (DOE) policy, requirements, and responsibilities for the oversight, management, and administration of Cooperative Research and Development Agreement (CRADA) activities at DOE facilities. b. Through the use of CRADAs, consistent with the terms of the facility contract or delegation of authority, DOE and its facilities will- (1) facilitate the efficient and expeditious development, transfer, and exploitation of Federally owned or originated technology to non-DOE entities for the public benefit and to enhance the accomplishment of DOE missions;

487

DOE F 4600.2  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FEDERAL FEDERAL ASSISTANCE REPORTING CHECKLIST U.S. Department of Energy For instructions see FAL Management of Report Deliverables DOE F 4600.2 (10/01) All Other Editions are Obsolete 1. Identification Number: 2. Program/Project Title: 3. Recipient: 4. Reporting Requirements: Frequency No. of Copies Addressees MANAGEMENT REPORTING Progress Report Special Status Report (see Special Instructions) SCIENTIFIC/TECHNICAL REPORTING (Reports/Products must be submitted with appropriate DOE F 241. The 241 forms are available at .) www.osti.gov/elink Report/Product Form Final Scientific/Technical Report Conference papers/proceedings* Software/Manual Other (see special instructions) * Scientific and technical conferences only DOE F 241.3 DOE F 241.3 DOE F 241.4 DOE F 241.3 FINANCIAL REPORTING CLOSEOUT REPORTING OTHER REPORTING SF-269, Financial Status Report SF- 269A, Financial

488

BNL Password Procedures, Cyber Security,Information Technology Division,  

NLE Websites -- All DOE Office Websites (Extended Search)

Password Policy, Procedures, and Guidance Password Policy, Procedures, and Guidance Password Policy Choosing a Good Password - Online Random Password Generator Password Do's and Don'ts Password Protection Password Changing Password Change Process - Using Windows NT/2000/XP Operating Systems - Unix Systems Users not logged into the BNL Domain Password Policy for BlackBerry and Windows-based Hand-held Wireless Devices Password Policy Based upon DOE Notice N205.3 and guidance in DOE G 205.3-1, all BNL computer platforms capable of supporting password protection systems must have passwords that are in accord with the following. Password contains at least eight non-blank characters, provided such passwords are allowed by the operating system or application. Password contains a combination of letters (a mixture of upper and lowercase), numbers, and at least one special character within the first seven positions, provided such passwords are allowed by the operating system or application.

489

DOE-TSPP-10, Conversion of DOE Technical Standards to Non-Government  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE-TSPP-10, Conversion of DOE Technical Standards to DOE-TSPP-10, Conversion of DOE Technical Standards to Non-Government Standards - August 1, 2000 DOE-TSPP-10, Conversion of DOE Technical Standards to Non-Government Standards - August 1, 2000 Technical Standards Program Procedures (TSPP) This procedure provides guidance on the conversion of DOE Technical Standards to Voluntary Consensus Standards (VCSs), also referred to as non-Government standards. This procedure applies to all DOE Headquarters and field organizations, management and operating contractors, and laboratories (hereafter referred to collectively as "DOE Components") working to the requirements of the latest revision of DOE Order 252.1, "Technical Standards Program." DOE-TSPP-10, Conversion of DOE Technical Standards to Non-Government

490

DOE-STD-1168-2013  

Energy.gov (U.S. Department of Energy (DOE))

Confinement Ventilation and Process Gas Treatment Functional Area Qualification Standard The Confinement Ventilation and Process Gas Treatment Functional Area Qualification Standard establishes common functional area competency requirements for all DOE CV&PGT personnel who provide assistance, direction, guidance, oversight, or evaluation of contractor technical activities that could impact the safe operation of DOEs defense nuclear facilities.

491

DOE-STD-1183-2004  

Energy.gov (U.S. Department of Energy (DOE))

Nuclear Safety Specialist Functional Area Qualification Standard Replaced by DOE-STD-1183-2007 The Nuclear Safety Specialist Functional Area Qualification Standard establishes common functional area competency requirements for Department of Energy personnel who provide assistance, direction, guidance, oversight, or evaluation of contractor technical activities that could impact the safe operation of DOEs defense nuclear facilities.

492

DOE-STD-1027-92  

Energy.gov (U.S. Department of Energy (DOE))

Hazard Categorization and Accident Analysis Techniques for Compliance with DOE Order 5480.23, Nuclear Safety Analysis Reports Change Notice No. 1 (September 1997) The purpose of this DOE Standard is to establish guidance for the preparation and review of hazard categorization and accident analyses techniques as required in DOE Order 5480.23, Nuclear Safety Analysis Reports.

493

DOE-STD-1183-2007  

Energy.gov (U.S. Department of Energy (DOE))

Nuclear Safety Specialist Functional Area Qualification Standard The Nuclear Safety Specialist FAQS establishes common functional area competency requirements for all DOE nuclear safety specialist personnel who provide assistance, direction, guidance, oversight, or evaluation of contractor technical activities that could impact the safe operation of DOEs defense nuclear facilities.

494

DOE-STD-1174-2013  

Energy.gov (U.S. Department of Energy (DOE))

Radiation Protection Functional Area Qualification Standard The Radiation Protection Functional Area Qualification Standard (FAQS) establishes common functional area competency requirements for all DOE Radiation Protection personnel who provide assistance, or direction, guidance, oversight, or evaluation of contractor technical activities that could impact the safe operation of DOEs defense nuclear facilities.

495

DOE-STD-1173-2009  

Energy.gov (U.S. Department of Energy (DOE))

Criticality Safety Functional Areq Qualification Standard The Criticality Safety FAQS establishes common functional area competency requirements for DOE criticality safety personnel who provide assistance, or direction, guidance, oversight, or evaluation of contractor technical activities that could impact the safe operation of DOEs nuclear facilities.

496

DOE-STD-1173-2003  

Energy.gov (U.S. Department of Energy (DOE))

Criticality Safety Functional Areq Qualification Standard Replaced by DOE-STD-1173-2009 The Criticality Safety Functional Area Qualification Standard establishes common functional area competency requirements for Department of Energy criticality safety personnel who provide assistance, direction, guidance, oversight, or evaluation of contractor technical activities that could impact the safe operation of DOEs defense nuclear facilities.

497

DOE-STD-1185-2004  

Energy.gov (U.S. Department of Energy (DOE))

Nuclear Explosive Safety Study Functional Area Qualification Standard Replaced by DOE-STD-1185-2007 The Nuclear Explosive Safety Study Functional Area Qualification Standard establishes common functional area competency requirements for Department of Energy personnel who provide assistance, direction, guidance, oversight, or evaluation of contractor technical activities that could impact the safe operation of DOEs defense nuclear facilities.

498

DOE-STD-1160-2011  

Energy.gov (U.S. Department of Energy (DOE))

Occupational Safety Functional Area Qualification Standard The Occupational Safety technical functional area qualification standard (FAQS) establishes common functional area competency requirements for all DOE occupational safety personnel who provide assistance, or direction, guidance, oversight, or evaluation of contractor technical activities that could impact the safe operation of DOEs defense nuclear facilities.

499

DOE-STD-1175-2013  

Energy.gov (U.S. Department of Energy (DOE))

Senior Technical Safety Manager Functional Area Qualification Standard The STSM FAQS establishes common functional area competency requirements for all DOE STSMs who provide assistance, direction, guidance, oversight, or evaluation of contractor technical activities that could impact the safe operation of DOEs defense nuclear facilities.

500

DOE-STD-1146-2007  

Energy.gov (U.S. Department of Energy (DOE))

General Technical Base Qualification Standard The General Technical Base Qualification Standard establishes common technical competency requirements for all DOE personnel who provide assistance in, direction or guidance to, or oversight or evaluation of contractor technical activities that could impact the safe operation of DOEs defense nuclear facilities.