Powered by Deep Web Technologies
Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS. Key Cyber...

2

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

NLE Websites -- All DOE Office Websites (Extended Search)

CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY...

3

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY...

4

NERSC Cyber Security Challenges That Require DOE Development and Support  

E-Print Network (OSTI)

network segments. Table 1. Network Comparison: NERSC vs.Large Corporation NERSC External Network Traffic patternsLBNL-62284 NERSC Cyber Security Challenges That Require DOE

Draney, Brent; Campbell, Scott; Walter, Howard

2008-01-01T23:59:59.000Z

5

NERSC Cyber Security Challenges That Require DOE Development and Support  

E-Print Network (OSTI)

manufacturer, or otherwise, does not necessarily constituteSecurity Challenges That Require DOE Development and Supportimpact on the ability of DOE to accomplish its science

Draney, Brent; Campbell, Scott; Walter, Howard

2008-01-01T23:59:59.000Z

6

NERSC Cyber Security Challenges That Require DOE Development and Support  

E-Print Network (OSTI)

) is to accelerate the pace of scientific discovery by providing high performance computing, information, data, and impacts the productivity of the DOE Science community. In particular, NERSC and other high performance computing (HPC) centers have special security challenges that are unlikely to be met unless DOE funds

Geddes, Cameron Guy Robinson

7

NERSC Cyber Security Challenges That Require DOE Development andSupport  

Science Conference Proceedings (OSTI)

Traditional security approaches do not adequately addressall the requirements of open, scientific computing facilities. Many ofthe methods used for more restricted environments, including almost allcorporate/commercial systems, do not meet the needs of today's science.Use of only the available "state of the practice" commercial methods willhave adverse impact on the ability of DOE to accomplish its sciencegoals, and impacts the productivity of the DOE Science community. Inparticular, NERSC and other high performance computing (HPC) centers havespecial security challenges that are unlikely to be met unless DOE fundsdevelopment and support of reliable and effective tools designed to meetthe cyber security needs of High Performance Science. The securitychallenges facing NERSC can be collected into three basic problem sets:network performance and dynamics, application complexity and diversity,and a complex user community that can have transient affiliations withactual institutions. To address these problems, NERSC proposes thefollowing four general solutions: auditing user and system activityacross sites; firewall port configuration in real time;cross-site/virtual organization identity management and access control;and detecting security issues in application middleware. Solutions arealsoproposed for three general long term issues: data volume,application complexity, and information integration.

Draney, Brent; Campbell, Scott; Walter, Howard

2007-01-16T23:59:59.000Z

8

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

9

DOE Issues Energy Sector Cyber Organization NOI  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan....

10

Collaborative Utility Task Force Partners with DOE to Develop Cyber  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Collaborative Utility Task Force Partners with DOE to Develop Cyber Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure The Advanced Metering Infrastructure Security (AMI-SEC) Task Force announces the release of the AMI System Security Requirements, a first-of-its-kind for the utility industry that will help utilities procure and implement secure components and systems using a common set of security requirements. Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure More Documents & Publications AMI System Security Requirements - v1_01-1 Before the Senate Energy and Natural Resources Committee

11

DOE Issues Energy Sector Cyber Organization NOI  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues National Energy Sector Cyber Organization Notice of Intent Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. The cyber organization is expected to have the knowledge, expertise, capabilities, and capacity, at a minimum to: * Identify and prioritize cyber security research and development issues.

12

DOE O 205.1B Chg 2, Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. ...

2011-05-16T23:59:59.000Z

13

DOE Cyber Security Role, Competency and Functional Matrix  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

14

DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues Energy Sector Cyber Organization NOI, Feb 2010 Issues Energy Sector Cyber Organization NOI, Feb 2010 DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. DOE Issues Energy Sector Cyber Organization NOI More Documents & Publications FAQ: Funding Opportunity Announcement-Smart Grid Investment Grants Grantsdown.xls Before the House Science and Technology Subcommittee on Energy and

15

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

16

JM to Make Admin Chg to DOE O 205.1B, Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

Modifications correct changes to the composition of Senior DOE Management organizations, name change from DOE Cyber Incident Response Capability to Joint ...

2012-12-06T23:59:59.000Z

17

DOE P 205.1, Departmental Cyber Security Management Policy  

Directives, Delegations, and Requirements

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security ...

2001-05-08T23:59:59.000Z

18

Technical Guideline for Cyber Security Requirements and Life Cycle Implementation Guidelines for Nuclear Plant Digital Systems  

Science Conference Proceedings (OSTI)

Nuclear power plants face increasing regulatory requirements from the U.S. Nuclear Regulatory Commission (NRC) and the Federal Energy Regulatory Commission (FERC) for cyber security of digital devices, components, and systems. The focus of these cyber security requirements is to protect plant digital computer systems, communications systems, and networks from cyber attacks that would affect reactor safety or generation reliability. This EPRI guideline document provides technical guidance for addressing c...

2010-10-29T23:59:59.000Z

19

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

20

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

DOE to Provide Nearly $8 Million to Safeguard the Nations Energy Infrastructure from Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE))

U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically-advanced controls and cyber-security devices into our electric grid and energy infrastructure.

22

NERSC Cyber Security Challenges That Require DOE Development and Support  

E-Print Network (OSTI)

NERSC and other high performance computing (HPC) centersby providing high performance computing, information, data,shell accounts on high performance computing systems poses

Draney, Brent; Campbell, Scott; Walter, Howard

2008-01-01T23:59:59.000Z

23

Collaborative Utility Task Force Partners with DOE to Develop...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure Collaborative Utility Task Force Partners with DOE to...

24

Cyber Security Summer School: Lessons for the Modern Grid | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid June 20, 2011 - 4:34pm Addthis Carol Hawk Program Manager, Cyber Security for Energy Delivery Systems What does this mean for me? Computer systems do more than store and share information. They help control our traffic lights, trains and specifically, our electric grid -- tasks for which continuous function is the primary concern. Protecting control systems on the grid from cyber attack requires a completely different approach to cyber security than information technology systems. The Cyber Summer School gave aspiring attendees a practical understanding of the connection between power systems and computer science required to secure a clean, reliable energy future.

25

Chapter_14_Cyber_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

26

July 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a recent cyberincident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable...

27

January 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a recent cyberincident that occurred in mid-January 2013 which targeted the Headquarters'network and resulted in the unauthorized disclosure of...

28

July 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information ...

29

Smart Grid Investment Grant Program (SGIG): Cyber Security Issues...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

(SGIG): Cyber Security Issues and Requirements, November 19, 2009 Smart Grid Investment Grant Program (SGIG): Cyber Security Issues and Requirements, November 19, 2009 Presentation...

30

Order DOE O 205.1B | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

set forth requirements and responsibilities for a Departmental Cyber Security Program (CSP) that protects information and information systems for the Department of Energy (DOE)...

31

PACIFIC NORTHWEST CYBER SUMMIT  

SciTech Connect

On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energys (DOEs) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOEs Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.

Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.; Smith, Karen S.

2013-08-07T23:59:59.000Z

32

Cyber Security and Resilient Systems  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nations cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

33

NERSC/DOE BER Requirements Workshop Participants  

NLE Websites -- All DOE Office Websites (Extended Search)

for Biological and Environmental Research: Target 2017 A Joint ASCR BER NERSC Requirements Review September 11-12, 2012 DOE NERSC Participants and Organizers Name...

34

Office of Cyber Security Evaluations Appraisal Process Guide, April 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER SECURITY EVALUATIONS CYBER SECURITY EVALUATIONS APPRAISAL PROCESS GUIDE April 2008 Office of Health, Safety and Security U.S. Department of Energy Office of Cyber Security Evaluations Appraisal Process Guide Preface April 2008 i Preface Department of Energy (DOE) Order 470.2B, Independent Oversight and Performance Assurance Program, and Office of Health, Safety and Security (HSS) Standard Operating Procedure, SOP-10-01, Independent Oversight Appraisal Process Protocols, February 2008, provide direction for the Office of Independent Oversight (HS-60) to establish the requirements, responsibilities, and processes for the development and maintenance of Appraisal Process Protocols that describe the activities for evaluating the effectiveness of DOE safeguards and security; cyber security; emergency management; and

35

Microsoft Word - DOE E-Government Act Report 11.16.06 Final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in accordance with SmartBUY, as well as other e-Government initiatives and Departmental cyber security and business requirements. * Participation in government-wide efforts: DOE...

36

Does Cyber Campaigning Win Votes? Online Communication in the 2004 Australian Election  

E-Print Network (OSTI)

campaigning looks like, but does it win votes? This paperto voter mobilization, does have a significant and positiverole of the web, the medium does not appear to have assumed

Gibson, Rachel; McAllister, Ian

2005-01-01T23:59:59.000Z

37

DOE Challenge Home, Washington Program Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Challenge Home Washington Program Requirements 9-1-2013 To qualify as a DOE Challenge Home, a home shall meet the minimum requirements specified below, be verified and field-tested in accordance with HERS Standards by an approved verifier, and meet all applicable codes. Builders may meet the requirements of either the Performance Path or the Prescriptive path to qualify a home. 1 Single family detached and attached dwelling units, and dwelling units in multifamily buildings with 3 stories or fewer above-grade 2,3 are eligible for qualification. DOE Challenge Home Prescriptive Path The prescriptive path provides a single set of measures that can be used to construct a DOE Challenge Home labeled home. Modeling is not required, but no tradeoffs are allowed. Follow these steps to use the prescriptive path:

38

DOE Challenge Home, California Program Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Challenge Home California Program Requirements These Program Requirements shall only be used in the State of California. To qualify as a DOE Challenge Home, a home shall meet the minimum requirements specified below, be verified and field-tested in accordance with HERS Standards by an approved verifier, and meet all applicable codes. Builders may meet the requirements of either the Performance Path or the Prescriptive path to qualify a home. 1 Single family detached and attached dwelling units, and dwelling units in multifamily buildings with 3 stories or fewer above-grade 2,3 are eligible for qualification. DOE Challenge Home Prescriptive Path The prescriptive path provides a single set of measures that can be used to construct a DOE Challenge Home labeled

39

Requirements in DOE O 5480.19, Conduct of Operations Requirements for DOE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requirements in DOE O 5480.19, Conduct of Operations Requirements Requirements in DOE O 5480.19, Conduct of Operations Requirements for DOE Facilities Cross-referenced to DOE O 422.1, Conduct of Operations. Requirements in DOE O 5480.19, Conduct of Operations Requirements for DOE Facilities Cross-referenced to DOE O 422.1, Conduct of Operations. This is an open-book evaluation. Complete the questions, and submit your answers (hand-written or electronically) to the Training Center. Someone will check and grade your answers. If you achieve a score of at least 80%, you will receive a completion certificate. Nuclear Facility Safety Basis Fundamentals Self-Study Guide Review Questions More Documents & Publications U.S. Department of Energy Oak Ridge Operations Nuclear Facility Safety Basis Fundamentals, Self-Study Guide

40

Evaluation Report on The Department's Unclassified Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report on The Department's Unclassified Cyber Security Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security information. It requires agencies to conduct annual reviews and evaluations of unclassified and

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Cyber Incident Information | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Services » Guidance » Privacy » Cyber Incident Information Services » Guidance » Privacy » Cyber Incident Information Cyber Incident Information July 2013 Cyber Incident The Department of Energy has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information (PII). January 2013 Cyber Incident The Department of Energy (DOE) has confirmed a cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information (PII). Tips to Monitor Your Identity Here is a suggested list of tips to monitor and protect yourself. Assistive Technology Forms Guidance Capital Planning Information Collection Management

42

Microsoft Word - OE Cyber Release 10 18 07.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE to Provide Nearly 8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for...

43

Cyber Security Procurement Methodology, Rev. 1  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or unclear division of responsibilities between the utility and vendor can often result in costly retrofits to meet the ...

2013-12-17T23:59:59.000Z

44

Computer Use Agreement, BNL Cyber Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Users Be aware of, knowledgeable about, and comply with the requirements of the BNL Cyber Security Program as described in SBMS. Follow BNL policy regarding the use and...

45

Cyber Security Evaluations Appraisal Process Guide - April 2008 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 April 2008 Cyber Security Evaluations Appraisal Process Guide was developed for the purpose of documenting the appraisal approach and techniques specific to evaluations of classified and unclassified cyber security programs throughout DOE. Office of Cyber Security Evaluations Appraisal Process Guide provides additional insight into the Office of Cyber Security Evaluations (HS-62) evaluation approach and processes associated with assessing classified and unclassified cyber security programs. The objective of this document is to establish a standard approach and methodology for conducting cyber security reviews that is well understood by all inspection participants.

46

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

47

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

48

Cyber Infrastructure Group Home Page  

Science Conference Proceedings (OSTI)

Cyber Infrastructure Group. Welcome. The Cyber Infrastructure Group (775.04) addresses the integration and interoperability ...

2012-07-17T23:59:59.000Z

49

DOE NEPA Guidance and Requirements - Search Index - Table of Contents |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE NEPA Guidance and Requirements - Search Index - Table of DOE NEPA Guidance and Requirements - Search Index - Table of Contents DOE NEPA Guidance and Requirements - Search Index - Table of Contents Return to Download Page The DOE NEPA Guidance and Requirements - Search Index includes: NEPA Guidance and Requirements Documents Issued by Published A Brief Guide - DOE-wide Contracts For NEPA Documentation DOE 2003 A Citizen's Guide to the NEPA - Having Your Voice Heard CEQ 2007 A Resource Handbook on DOE Transportation Risk Assessment DOE 2002 Actions During the NEPA Process - Interim Actions DOE 2003 Administrative Record Guidance DOJ 1991 Aligning the NEPA Process with EMS CEQ 2007 Alternative Actions For Analysis in Site-wide NEPA Reviews DOE 1992 Amended Environmental Impact Statement Filing System Guidance EPA 2012 Analysis of Impacts on Prime and Unique Agricultural Lands and NEPA

50

NERSC/DOE BER Requirements Workshop Reference Materials  

NLE Websites -- All DOE Office Websites (Extended Search)

Directors Workshop Invitation Letter from DOE ASCR Program Manager Yukiko Sekine Past ESnet requirements workshop reports (provided for reference) ESnet Requirements Workshop...

51

DOE RFI 2010-11129 NBP RFI: Communications Requirements Titled...  

NLE Websites -- All DOE Office Websites (Extended Search)

Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy" DOE RFI 2010-11129 NBP RFI: Communications Requirements Titled...

52

Development of the PowerCyber SCADA security testbed  

Science Conference Proceedings (OSTI)

Meeting current demands for critical infrastructure cyber security education and research will require accurate testbed development. The PowerCyber was designed to closely resemble power grid communication utilizing actual field devices and SCADA software. ...

Adam Hahn; Ben Kregel; Manimaran Govindarasu; Justin Fitzpatrick; Rafi Adnan; Siddharth Sridhar; Michael Higdon

2010-04-01T23:59:59.000Z

53

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

54

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

55

Enforcement of DOE Classified Information Security Requirements Under Title  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of DOE Classified Information Security Requirements of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 Enforcement of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 In publishing 10 CFR Part 824, DOE has determined that civil penalties under Part 824 will only be assessed for violations of requirements for the protection of classified information (Restricted Data, Formerly Restricted Data and National Security Information). The rule does not include civil penalties relating to failure to protect sensitive but unclassified information. IMPLEMENTATION GUIDANCE More Documents & Publications Safety and Security Enforcement Process Overview Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01

56

NERSC/DOE HEP Requirements Workshop Logistics  

NLE Websites -- All DOE Office Websites (Extended Search)

at NERSC HPC Requirements Reviews Requirements for Science: Target 2014 High Energy Physics (HEP) Logistics Workshop Logistics Workshop Location Hilton Washington...

57

NERSC/DOE BES Requirements Workshop Agenda  

NLE Websites -- All DOE Office Websites (Extended Search)

Jim Davenport Thomas Devereaux Jeffery Neaton 17:30 14:30 Break 17:40 14:40 Case Studies: Classical Molecular Dynamics Codes and Coupling of Length Scales DOE POC: Mark Pederson...

58

DOE NEPA Guidance and Requirements - Search Index | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE NEPA Guidance and Requirements - Search Index DOE NEPA Guidance and Requirements - Search Index DOE NEPA Guidance and Requirements - Search Index The DOE NEPA Guidance and Requirements - Search Index is a one-stop solution providing you with DOE's Guidance and Requirements documents combined into one file for easy download and use. The compressed (.zip) file contains all of these documents in their optimized and machine-readable format. The file also contains a "search index" that can be used to search for keywords and phrases in all the documents from one search form, without the need to install a separate program. Please direct any questions, comments, or feedback to: John.Jediny@hq.doe.gov Review the documents included in the Search Index as a List or Table NEPA Requirements and Guidance - Search Index.zip

59

DOE NEPA Guidance and Requirements - Search Index | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE NEPA Guidance and Requirements - Search Index DOE NEPA Guidance and Requirements - Search Index DOE NEPA Guidance and Requirements - Search Index The DOE NEPA Guidance and Requirements - Search Index is a one-stop solution providing you with DOE's Guidance and Requirements documents combined into one file for easy download and use. The compressed (.zip) file contains all of these documents in their optimized and machine-readable format. The file also contains a "search index" that can be used to search for keywords and phrases in all the documents from one search form, without the need to install a separate program. Please direct any questions, comments, or feedback to: John.Jediny@hq.doe.gov Review the documents included in the Search Index as a List or Table NEPA Requirements and Guidance - Search Index.zip

60

DOE NEPA Guidance and Requirements - Search Index - Table of Contents |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Table of Table of Contents DOE NEPA Guidance and Requirements - Search Index - Table of Contents Return to Download Page The DOE NEPA Guidance and Requirements - Search Index includes: NEPA Guidance and Requirements Documents Issued by Published A Brief Guide - DOE-wide Contracts For NEPA Documentation DOE 2003 A Citizen's Guide to the NEPA - Having Your Voice Heard CEQ 2007 A Resource Handbook on DOE Transportation Risk Assessment DOE 2002 Actions During the NEPA Process - Interim Actions DOE 2003 Administrative Record Guidance DOJ 1991 Aligning the NEPA Process with EMS CEQ 2007 Alternative Actions For Analysis in Site-wide NEPA Reviews DOE 1992 Amended Environmental Impact Statement Filing System Guidance EPA 2012 Analysis of Impacts on Prime and Unique Agricultural Lands and NEPA

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

The Department's Unclassified Cyber Security Program - 2012, IG-0877  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information technology resources continues to expand, the number of cyber security threats against Federal agencies has also increased. In fact, Federal cyber security officials have warned that the number of cyber attackers has increased and that the Nation's

62

DOE Requires Manufacturer and Labeler to Cease Sale of Incandescent...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

90PAR38130 Addthis Related Articles DOE Requires Westinghouse to Cease Sales of Two Light Bulb Models and Allows Sale of Another Westinghouse and Fuzhou Permitted to Restart...

63

NERSC/DOE ASCR Requirements Workshop Reference Materials  

NLE Websites -- All DOE Office Websites (Extended Search)

Reference Materials Large Scale Computing and Storage Requirements for Advanced Scientific Computing Research January 5-6, 2011 Official DOE Invitation Workshop Invitation Letter...

64

What are my DOE reporting requirements? | Scientific and Technical  

Office of Scientific and Technical Information (OSTI)

What are my DOE reporting requirements? What are my DOE reporting requirements? Print page Print page Email page Email page DOE reporting requirements for DOE financial assistance recipients are specified as scientific/technical reporting deliverables on the Federal Assistance Reporting Checklist (DOE F 4600.2). Other awardees such as Non-major Site/facility Management Contractors technical reporting requirements are identified in Section J, List of Attachments, of the contract as part of the Performance Work Statement/Statement of Work or as a separate attachment. Each required Scientific/Technical Report deliverable is to be submitted to DOE in electronic format as indicated in the award instrument/contractual agreement. Electronic documents should be submitted in one integrated file that contains all text, tables, diagrams, photographs, schematic, graphs,

65

NERSC/DOE BER Requirements Meeting Logistics  

NLE Websites -- All DOE Office Websites (Extended Search)

Math & Computer Science Nuclear Science Science Highlights HPC Requirements Reviews Basic Energy Sciences Fusion Energy Sciences (FES) High Energy Physics (HEP) Biological and...

66

NERSC/DOE HPC Requirements Workshops Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

Overview NERSC HPC Program Requirements Reviews Overview Scope These workshops are focused on determining the computational challenges facing research teams and the computational...

67

NERSC/DOE FES Requirements Workshop Logistics  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy's Office of Fusion Energy Sciences and Office of Advanced Scientific Computing Research (ASCR) to elucidate computing requirements for fusion energy sciences...

68

NERSC/DOE ASCR Requirements Workshop Logistics  

NLE Websites -- All DOE Office Websites (Extended Search)

Workshop Logistics Large Scale Computing and Storage Requirements for Advanced Scientific Computing Research January 5-6, 2011 Location The workshop will be held at NERSC's...

69

NERSC/DOE BES Requirements Workshop Logistics  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy's Office of Basic Energy Sciences and Office of Advanced Scientific Computing Research (ASCR) to elucidate computing requirements for high energy physics...

70

NERSC/DOE ASCR Requirements Workshop Agenda  

NLE Websites -- All DOE Office Websites (Extended Search)

Workshop Agenda Large Scale Computing and Storage Requirements for Advanced Scientific Computing Research ASCR NERSC Workshop January 5-6, 2011 >> Download and View these...

71

NERSC/DOE ASCR Requirements Workshop Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

Presentations Large Scale Computing and Storage Requirements for Advanced Scientific Computing Research An ASCR NERSC Workshop January 5-6, 2011 Sort by: Default | Name |...

72

NERSC/DOE ASCR Requirements Workshop Participants  

NLE Websites -- All DOE Office Websites (Extended Search)

Participants Large Scale Computing and Storage Requirements for Advanced Scientific Computing Research An ASCR NERSC Workshop January 5-6, 2011 On-Site Participants Name...

73

Cyber Innovation Technology Summit | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Innovation Technology Summit Cyber Innovation Technology Summit Cyber Innovation Technology Summit November 5, 2013 8:00AM EST Course Title: Cyber Innovation Technology Summit Course Start/End Date: November 5, 2013 Start/End Time: 8:00AM-12:00 PM Course Type: Classrooom Course Location: Forrestal Large Auditorium Course Description: Every October and November, the Department of Energy (DOE) joins the Department of Homeland Security (DHS) and other federal, state and local agencies across the country in support of National Cybersecurity Awareness Month and the "Stop. Think. Connect." campaign. This year marks the tenth year of the cyber security awareness campaign. The theme for this year is Achieving Cybersecurity Together: It's Our Shared Responsibility. By consistently following simple

74

Cyber Security Standards.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

75

NERSC/DOE FES Requirements Workshop Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

Fusion Energy Sciences An FES ASCR NERSC Workshop August 3-4, 2010 Sort by: Default | Name | Date (low-high) | Date (high-low) FESNERSC Requirements Gathering Workshop August...

76

DOE NEPA Guidance and Requirements - Search Index - List of Contents |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

List of List of Contents DOE NEPA Guidance and Requirements - Search Index - List of Contents Return to Download Page The NEPA Guidance and Requirements - Search Index includes: A Brief Guide - DOE-wide Contracts For NEPA Documentation [DOE][2003] A Citizen's Guide to the NEPA - Having Your Voice Heard [CEQ][2007] A Resource Handbook on DOE Transportation Risk Assessment [DOE][2002] Actions During the NEPA Process - Interim Actions [DOE][2003] Administrative Record Guidance [DOJ][1991] Aligning the NEPA Process with EMS [CEQ][2007] Alternative Actions For Analysis in Site-wide NEPA Reviews [DOE][1992] Amended Environmental Impact Statement Filing System Guidance [EPA][2012] Analysis of Impacts on Prime and Unique Agricultural Lands and NEPA [CEQ][1980] Analysis of Impacts to Workers in NEPA Documentation [DOE][1988]

77

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

78

Does General Relativity Require a Metric  

E-Print Network (OSTI)

The nexus between the gravitational field and the space-time metric was an essential element in Einstein's development of General Relativity and led him to his discovery of the field equations for the gravitational field/metric. I will argue here that the metric is in fact an inessential element of this theory and can be dispensed with entirely. Its sole function in the theory was to describe the space-time measurements made by ideal clocks and rods. However, the behavior of model clocks and measuring rods can be derived directly from the field equations of General Relativity using the Einstein-Infeld-Hoffmann (EIH) approiximation procedure. Therefore one does not need to introduce these ideal clocks and rods and hence has no need of a metric.

James L. Anderson

1999-12-13T23:59:59.000Z

79

Understanding cyber threats and vulnerabilities  

Science Conference Proceedings (OSTI)

This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was ... Keywords: actor, critical infrastructure, cyber crime, cyber terrorism, cyber threat, cyber vulnerabilities

Eric Luiijf

2012-01-01T23:59:59.000Z

80

Cyber Security Procurement Methodology for Power Delivery Systems  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new power delivery systems requires cyber security experts, power system engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly backfit to meet requirements.The Electric Power Research ...

2012-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

82

Security and Cyber Evaluations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential

83

Cyber Incidents Involving Control Systems  

Science Conference Proceedings (OSTI)

The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

Robert J. Turk

2005-10-01T23:59:59.000Z

84

Cyber sleuths face off  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber sleuths face off Cyber sleuths face off Computer specialists will meet for a grueling week that combines state-of-the-art training with opportunities to team up, solve...

85

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

86

DOE RFI 2010-11129 NBP RFI: Communications Requirements Titled  

NLE Websites -- All DOE Office Websites (Extended Search)

RFI 2010-11129 NBP RFI: Communications Requirements Titled RFI 2010-11129 NBP RFI: Communications Requirements Titled "Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy" DOE RFI 2010-11129 NBP RFI: Communications Requirements Titled "Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy" Grid Net, Inc. Comments on Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy DOE RFI 2010-11129 NBP RFI: Communications Requirements Titled "Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy"

87

DOE Responses to DOE Challenge Home (formerly Builders Challenge) National Program Requirements Public Comments  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- Responses to Draft Specification Comments 1 - Responses to Draft Specification Comments 1 Updated 4/9/2012 DOE Responses to DOE Challenge Home (formerly Builders Challenge) National Program Requirements Public Comments DOE received comments on the draft DOE Challenge Home specifications and requirements from December 15, 2011 through January 31, 2012. This document summarizes the comments received, DOE's responses, and the resulting policy change, if any. All comments were reviewed. Similar comments were grouped together in the responses. Editorial comments and general observations were considered, but are not listed in the responses below unless they involved a significant clarification to the DOE Challenge Home provisions. DOE is not responsible for any typographical errors or omissions.

88

Training Module for Cyber Security in Nuclear Plant Digital Modifications  

Science Conference Proceedings (OSTI)

Nuclear power plants face increasing regulatory requirements from the U.S. Nuclear Regulatory Commission (NRC) and the Federal Energy Regulatory Commission (FERC) for cyber security of digital devices, components, and systems. The focus of these cyber security requirements is to protect plant digital computer systems, communications systems, and networks from cyber attacks that would affect reactor safety or generation reliability. This Electric Power Research Institute (EPRI) computer-based training mod...

2011-04-28T23:59:59.000Z

89

DOE Challenge Home National Program Requirements (Rev. 03)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Program Requirements (Rev. 03) National Program Requirements (Rev. 03) April 17, 2013 Effective for Homes Revised April 17, 2013 Page 1 of 8 Permitted Starting 6/17/2013 To qualify as a DOE Challenge Home, a home shall meet the minimum requirements specified below, be verified and field-tested in accordance with HERS Standards by an approved verifier, and meet all applicable codes. Builders may meet the requirements of either the Performance Path or the Prescriptive path to qualify a home. 1 Single family detached and attached dwelling units, and dwelling units in multifamily buildings with 3 stories or fewer above-grade 2,3 are eligible for qualification. DOE Challenge Home Prescriptive Path The prescriptive path provides a single set of measures that can be used to construct a DOE Challenge Home labeled

90

Cyber Security ProcurementApplication of the Methodology, Third Example: Digital Feedwater Control  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements to new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of cyber security controls due to lack of proper requirements and/or unclear division of responsibilities between the utility and vendor can result in costly retrofits to meet the ...

2013-12-19T23:59:59.000Z

91

Cyber Security Procurement - Application of the Methodology, Second Example: Feedpump Turbine Speed Control  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of cyber security controls owing to a lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly retrofits to meet the ...

2013-12-20T23:59:59.000Z

92

AMI Cyber Security Incident Response Guidelines  

Science Conference Proceedings (OSTI)

This document is intended to be used by system and asset owners to assist in the preparation and response to AMI cyber security incidents. This document was developed by conducting interviews with EPRI members, AMI asset owners, and vendors, regarding practices involved in responding to AMI cyber security incidents and mapping the responses to requirements put forth by the Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Open Smart Grid (Open-SG) Working ...

2012-12-07T23:59:59.000Z

93

DOE-STD-1077-94; DOE Standard Training Accreditation Program Standard: Requirements and Guidelines  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7-94 7-94 August 1994 Supercedes DOE-STD-0101T, TAP-1, and DOE-STD-0103T, TAP-3 DOE STANDARD TRAINING ACCREDITATION PROGRAM STANDARD: REQUIREMENTS AND GUIDELINES U.S. Department of Energy Washington, D.C. 20585 FSC 6910 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document has been reproduced directly from the best available copy. Available to DOE and DOE contractors from the Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831; (615) 576-8401. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 487-4650. Order No. DE94018723 DOE-STD-1077-94 FOREWORD The Training Accreditation Program was established by the Department of Energy

94

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

95

DOE Order Self Study Modules - DOE O 426.2 Personnel Selection, Training, Qualification, and Certification Requirements for DOE Nuclear Facilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6.2 6.2 PERSONNEL SELECTION, TRAINING, QUALIFICATION, AND CERTIFICATION REQUIREMENTS FOR DOE NUCLEAR FACILITIES DOE O 426.2 Familiar Level June 2011 1 DOE O 426.2 PERSONNEL SELECTION, TRAINING, QUALIFICATION, AND CERTIFICATION REQUIREMENTS FOR DOE NUCLEAR FACILITIES FAMILIAR LEVEL ___________________________________________________________________________ OBJECTIVES Given the familiar level of this module and the resources, you will be able answer the following questions: 1. What is the purpose of DOE O 426.2, Personnel Selection, Training, Qualification, and Certification Requirements for DOE Nuclear Facilities? 2. What are the DOE field elements requirements associated with DOE O 426.2? 3. What are the general contractor requirements specified in the contractor requirements

96

CERCLA reporting requirements, DOE occurrence reporting, and the DOE Emergency Management System. CERCLA Information Brief  

SciTech Connect

The Emergency Management System (EMS) provides a structure for reporting and processing operations information related to DOE owned/operated facilities. Hazardous Substance (HS) releases are subject to reporting requirements under the EMS as well as under the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA). CERCLA requires reporting of HS releases into the environment in amounts greater than or equal to Reportable Quantities (RQs). This Information Brief elaborates on earlier CERCLA reporting and response process information Briefs by providing a general explanation of these CERCLA or EMS requirements, procedures, and events as they pertain to releases of HS`s at DOE facilities.

Dailey, R.

1993-10-01T23:59:59.000Z

97

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

98

Distribution System Cyber Security Architecture  

Science Conference Proceedings (OSTI)

The National Institute of Standards and Technology (NIST) has developed the NISTIR 7628: Guidelines for Smart Grid Cyber Security, while ASAP-SG has developed both the Security Profile for AMI (v2.0) and the Security Profile for Distribution Management. These documents are necessarily high level and generic, covering a broad range of smart grid assets, and focus exclusively on determining the security requirements. However, utilities and their vendors often cannot get a clear picture of what existing tec...

2010-12-31T23:59:59.000Z

99

Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

SciTech Connect

The Annual Cyber Security and Information Intelligence Research Workshop [CSIIRW] was be held at Oak Ridge National Laboratory in Oak Ridge, TN on April 21 - 23, 2010. The aim of this workshop is to introduce and discuss novel theoretical and empirical research focused on (the many) different aspects of software security/dependability, because as we know, the heart of the cyber infrastructure is software. As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value (wiki). The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. Cyber crime is a very serious and growing problem which now has an annual global turnover in the criminal world of more than 1000 BUSD [recent numbers from an FBI white paper] with the hardest hit industries being the banks and the insurance companies. A recent EU study of the banking world showed that more than 60% of cyber crime in banks was carried out by insiders of which ~65% by senior managers. Moreover, cyber security practice and policy is largely heuristic, reactive, and increasingly cumbersome, struggling to keep pace with rapidly evolving threats. Advancing beyond this reactive posture will require a transformation in computing and communication systems architecture and new capabilities that do not merely solve today s plethora of security enigmas, but enable comprehensive game-changing strategies [A Scientific R&D Approach to Cyber Security, C. Catlett, et al., Community-driven report submitted to the DOE, Dec. 2008]. The aim of this workshop is to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. We encourage the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the ever evolving context of cyberspace.

Sheldon, Frederick T [ORNL; Prowell, Stacy J [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2010-01-01T23:59:59.000Z

100

NERSC/DOE BES Requirements Workshop Worksheet - Peter Cummings  

NLE Websites -- All DOE Office Websites (Extended Search)

Peter Cummings Peter Cummings Peter Cummings BES Requirements Worksheet 1.1. Project Information - Molecular-Based Simulation of Complex and Nanostructured Fluids Document Prepared By Peter Cummings Project Title Molecular-Based Simulation of Complex and Nanostructured Fluids Principal Investigator Peter Cummings Participating Organizations Vanderbilt University Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: DOE/EERE 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. We perform primarily molecular dynamics simulations of nanostructured

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks DOE to Provide Nearly 8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks...

102

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO)...

103

DOE-STD-6002-96; DOE Standard Safety of Magnetic Fusion Facilities: Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6002-96 6002-96 May 1996 DOE STANDARD SAFETY OF MAGNETIC FUSION FACILITIES: REQUIREMENTS U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document has been reproduced directly from the best available copy. Available to DOE and DOE contractors from the Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831; (423) 576-8401. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 487-4650. Order No. DE96009495 DOE-STD-6002-96 iii TABLE OF CONTENTS Page FOREWORD....................................................................................................................... v

104

DOE Policies | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Federal Regulations OMB Policies Cybersecurity DOE O 205.1B Department of Energy Cyber Security Management (pdf) (Approved May 16, 2011) Information Management Planning DOE...

105

NERSC/DOE FES Requirements Workshop Worksheet - Stephane Ethier  

NLE Websites -- All DOE Office Websites (Extended Search)

Stephane Ethier Stephane Ethier Stephane Ethier FES Requirements Worksheet 1.1. Project Information - Global Gyrokinetic PIC Simulations of Plasma Microturbulence Document Prepared By Stephane Ethier Project Title Global Gyrokinetic PIC Simulations of Plasma Microturbulence Principal Investigator Weixing Wang Participating Organizations PPPL Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. We use global, gyrokinetic particle-in-cell simulations to study all aspects of plasma micro-turbulence in the core of tokamak fusion devices.

106

NERSC/DOE FES Requirements Workshop Worksheet - Frank Tsung  

NLE Websites -- All DOE Office Websites (Extended Search)

Frank Tsung Frank Tsung Frank Tsung FES Requirements Worksheet 1.1. Project Information - Large Scale Particle-in-Cell Simulations of Laser Plasma Interactions Relevant to Inertial Fusion En Document Prepared By Frank Tsung Project Title Large Scale Particle-in-Cell Simulations of Laser Plasma Interactions Relevant to Inertial Fusion En Principal Investigator Frank Tsung Participating Organizations UCLA Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. The goal of this project is to use state-of-art particle-in-cell tools

107

NERSC/DOE FES Requirements Workshop Worksheet - Xianzhu Tang  

NLE Websites -- All DOE Office Websites (Extended Search)

Xianzhu Tang Xianzhu Tang Xianzhu Tang FES Requirements Worksheet 1.1. Project Information - Plasma materials interaction Document Prepared By Xianzhu Tang Project Title Plasma materials interaction Principal Investigator Xianzhu Tang Participating Organizations Los Alamos National Laboratory Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. This project combines kinetic modeling of boundary plasma and atomistic modeling of wall material response to plasma irradiation to understand the

108

NERSC/DOE BES Requirements Workshop Worksheet - Mark Jarrell  

NLE Websites -- All DOE Office Websites (Extended Search)

Mark Jarrell Mark Jarrell Mark Jarrell BES Requirements Worksheet 1.1. Project Information - SciDAC: Next Generation Multi-Scale Quantum Simulation Software for Strongly Correlated Materials Document Prepared By Mark Jarrell Project Title SciDAC: Next Generation Multi-Scale Quantum Simulation Software for Strongly Correlated Materials Principal Investigator Mark Jarrell Participating Organizations Louisiana State University Ohio SuperComputer Center UC Davis ORNL Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5

109

NERSC/DOE FES Requirements Workshop Worksheet - Alex Friedman  

NLE Websites -- All DOE Office Websites (Extended Search)

Alex Friedman Alex Friedman Alex Friedman FES Requirements Worksheet 1.1. Project Information - Simulation of intense beams for heavy-ion-fusion science (HEDLP / Inertial Fusion Energy) Document Prepared By Alex Friedman Project Title Simulation of intense beams for heavy-ion-fusion science (HEDLP / Inertial Fusion Energy) Principal Investigator Alex Friedman Participating Organizations LBNL, LLNL, PPPL, Univ. of Maryland Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. The US Heavy Ion Fusion Science Virtual National Laboratory (HIFS-VNL), a

110

NERSC/DOE BES Requirements Workshop Worksheet - Jeffrey B. Neaton  

NLE Websites -- All DOE Office Websites (Extended Search)

Jeffrey B. Neaton Jeffrey B. Neaton Jeffrey B. Neaton BES Requirements Worksheet 1.1. Project Information - Charge Transport and Excited States at Interfaces in Nanostructured Materials Document Prepared By Jeffrey B. Neaton Project Title Charge Transport and Excited States at Interfaces in Nanostructured Materials Principal Investigator Jeffrey B. Neaton Participating Organizations Lawrence Berkeley National Laboratory Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. Over the next 3-5 years, we seek to develop and apply first-principles

111

NERSC/DOE FES Requirements Workshop Worksheet - Zhihong Lin  

NLE Websites -- All DOE Office Websites (Extended Search)

Zhihong Lin Zhihong Lin Zhihong Lin FES Requirements Worksheet 1.1. Project Information - SciDAC GSEP Center and GPS-TTBP Center Document Prepared By Zhihong Lin Project Title SciDAC GSEP Center and GPS-TTBP Center Principal Investigator Zhihong Lin Participating Organizations University of California, Irvine Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. The SciDAC GSEP project will further extend the first-principles global gyrokinetic simulations to study new physics in the energetic particle

112

NERSC/DOE FES Requirements Workshop Worksheet - CS Chang  

NLE Websites -- All DOE Office Websites (Extended Search)

CS Chang CS Chang CS Chang FES Requirements Worksheet 1.1. Project Information - Center for Plasma Edge Simulation Document Prepared By CS Chang Project Title Center for Plasma Edge Simulation Principal Investigator CS Chang Participating Organizations New York University, ORNL, PPPL, LBNL, MIT, Columbia U., Rutgers U. Lehigh U., Georgia Tech, Auburn U., U. Colorado, U. California at Irvine, Caltech, Hinton Associates Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. Develop the XGC large scale edge kinetic codes further for higher fidelity

113

Guide to Critical Infrastructure Protection Cyber Vulnerability...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized...

114

IDENTIFICATION OF DOE'S POST-CLOSURE MONITORING NEEDS AND REQUIREMENTS  

Science Conference Proceedings (OSTI)

The 2006 plan sets an ambitious agenda for the U.S. Department of Energy (DOE), Office of Environmental Management (EM) and the remediation of sites contaminated by decades of nuclear weapons production activities. The plan's primary objective is to reduce overall clean up costs by first eliminating the environmental problems that are most expensive to control and safely maintain. In the context of the 2006 Plan, closure refers to the completion of area or facility specific cleanup projects. The cleanup levels are determined by the planned future use of the site or facility. Use restrictions are still undecided for most sites but are highly probable to exclude residential or agricultural activities. Most of the land will be remediated to ''industrial use'' levels with access restrictions and some areas will be closed-off through containment. Portions of the site will be reserved for waste disposal, either as a waste repository or the in-situ immobilization of contaminated soil and groundwater, and land use will be restricted to waste disposal only. The land used for waste disposal will require monitoring and maintenance activities after closure. Most of the land used for industrial use may also require such postclosure activities. The required postclosure monitoring and maintenance activities will be imposed by regulators and stakeholders. Regulators will not approve closure plans without clearly defined monitoring methods using approved technologies. Therefore, among all other more costly and labor-intensive closure-related activities, inadequate planning for monitoring and lack of appropriate monitoring technologies can prevent closure. The purpose of this project is to determine, document, and track the current and evolving postclosure monitoring requirements at DOE-EM sites. This information will aid CMST-CP in guiding its postclosure technology development and deployment efforts.

M.A. Ebadian, Ph.D.

1999-01-01T23:59:59.000Z

115

Organized Cyber Defense Competitions  

Science Conference Proceedings (OSTI)

The Cyber Defense Exercise (CDX), an annual competition between students at the five U.S. Service Academies has developed into an extraordinary educational experience for the participants. During the exercise students will design and implement a realistic ...

Ronald C. Dodge JR; Daniel J. Ragsdale

2004-08-01T23:59:59.000Z

116

Cyber Security Procurement - Application of the Methodology, First Example: Single Loop  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly backfits to meet the requirements.The ...

2013-07-29T23:59:59.000Z

117

Metaphors for cyber security.  

SciTech Connect

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

118

The Department's Cyber Security Incident Management Program, IG-0787 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

119

NERSC/DOE FES Requirements Workshop Worksheet - Charlson Kim  

NLE Websites -- All DOE Office Websites (Extended Search)

Charlson Kim Participating Organizations U. Washington, U. Wisconsin-Madison, Utah State, NRL Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary &...

120

Comparison of selected DOE and non-DOE requirements, standards, and practices for Low-Level Radioactive Waste Disposal  

SciTech Connect

This document results from the Secretary of Energy`s response to Defense Nuclear Facilities Safety Board Recommendation 94--2. The Secretary stated that the US Department of Energy (DOE) would ``address such issues as...the need for additional requirements, standards, and guidance on low-level radioactive waste management. `` The authors gathered information and compared DOE requirements and standards for the safety aspects Of low-level disposal with similar requirements and standards of non-DOE entities.

Cole, L. [Cole and Associates (United States); Kudera, D.; Newberry, W. [Lockheed Idaho Technologies Co., Idaho Falls, ID (United States)

1995-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

International inspection activity impacts upon DOE safeguards requirements  

SciTech Connect

The US has placed certain special nuclear materials declared excess to their strategic needs under international safeguards through the International Atomic Energy Agency (IAEA). This Presidential initiative has obligated materials at several Department of Energy (DOE) facilities for these safeguards activities to demonstrate the willingness of the US to ban production or use of nuclear materials outside of international safeguards. However, IAEA inspection activities generally tend to be intrusive in nature and are not consistent with several domestic safeguards procedures implemented to reduce worker radiation exposures and increase the cost-effectiveness and efficiency of accounting for and storing of special nuclear materials. To help identify and provide workable solutions to these concerns, the Office of Safeguards and Security has conducted a program to determine possible changes to the DOE safeguards and security requirements designed to help facilities under international safeguards inspections more easily comply with domestic safeguards goals during international inspection activities. This paper will discuss the impact of international inspection activities on facility safeguards operations and departmental safeguards procedures and policies.

Zack, N.R. [Los Alamos National Lab., NM (United States). Safeguards Systems Group; Crawford, D.W. [USDOE Office of Safeguards and Security, Washington, DC (United States)

1995-09-01T23:59:59.000Z

122

Microsoft Word - DOE RFI - NBP RFI Communications Requirements.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 Donahue Ferry Road P.O. Box 5000 Pineville, LA 71361-5000 www.cleco.com Tel. 318-484-7400 July 12, 2010 U. S. Department of Energy Office of the General Counsel 1000 Independence Ave, SW, Room 6A245 Washington, DC 20585 Subject: NBP RFI: Communications Requirements Introduction Cleco Corporation greatly appreciates the opportunity to provide information to the Department of Energy (DOE) on the communications needs of utilities. Cleco is an energy services company based in central Louisiana, serving approximately 276,000 residential, commercial and industrial customers since 1934. Cleco manages over 3,000 megawatts of electric capacity through its regulated Cleco Power LLC and unregulated Cleco Midstream Resources LLC businesses, utilizing a diverse fuel mix of lignite, coal, petcoke and natural gas. With 1,300 employees, Cleco manages and operates 70 transmission

123

Loosely time-triggered architectures for cyber-physical systems  

Science Conference Proceedings (OSTI)

Cyber-Physical Systems require distributed architectures to support safety critical real-time control. Kopetz' Time-Triggered Architectures (TTA) have been proposed as both an architecture and a comprehensive paradigm for systems architecture, for such ...

Albert Benveniste

2010-03-01T23:59:59.000Z

124

The cyber-physical attacker  

Science Conference Proceedings (OSTI)

The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker ... Keywords: attacker model, cyber-physical systems, cyber-physical threats, security protocol verification

Roberto Vigo

2012-09-01T23:59:59.000Z

125

Cyber Security Solutions for Instrumentation and Control Systems  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced as a result of continual threats to business and process control networks. Many standards have been drafted, undergone revision, and are being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection standards requirements of the North American Electric Reliability Corporation and related requirements in the international community. Compliance with ...

2012-12-12T23:59:59.000Z

126

Cyber threat metrics.  

SciTech Connect

Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

2012-03-01T23:59:59.000Z

127

Office of Security and Cyber Evaluations  

NLE Websites -- All DOE Office Websites (Extended Search)

Welcome to the Office of Security and Cyber Evaluations The Office of Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential differences in approach since your last interaction with us.

128

Cyber Friendly Fire  

Science Conference Proceedings (OSTI)

Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public. The network is essentially divided into a production component that hosts the web and network services, and a user component that hosts thirty employee workstations and other end devices. The organization's network is separated from the Internet by a Cisco ASA network security device that both firewalls and detects intrusions. Business sensitive information is stored in various servers. This includes data comprising thousands of internal documents, such as finance and technical designs, email messages for the organization's employees including the CEO, CFO, and CIO, the organization's source code, and Personally Identifiable client data. Release of any of this information to unauthorized parties would have a significant, detrimental impact on the organization's reputation, which would harm earnings. The valuable information stored in these servers pose obvious points of interest for an adversary. We constructed several scenarios around this environment to support studies in cyber SA and cyber FF that may be run in the test range. We describe mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approaches. Finally, we discuss possible future research directions.

Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

2011-09-01T23:59:59.000Z

129

DOE Hydrogen and Fuel Cells Program Record 9013: Energy requirements...  

NLE Websites -- All DOE Office Websites (Extended Search)

6 Peschka, W. (1992). "Liquid Hydrogen." Springer-Verlag, New York. 7 Active Magnetic Regenerative Liquefier, John Barclay, Prometheus Energy DOE Annual Merit Review, May 2009...

130

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

131

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

Robert P. Evans

2006-05-01T23:59:59.000Z

132

Microsoft Word - OE Cyber Release 10 18 07.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These projects will

133

Cyber Security Management Memorandum | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Management Memorandum Cyber Security Management Memorandum On December 7, 2009, the Deputy Secretary of Energy released this memorandum directing the creation of a...

134

THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002, IG-0569 THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002,...

135

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

136

Building the Next Generation of Cyber Defenders  

Science Conference Proceedings (OSTI)

Page 1. Building the Next Generation of Cyber Defenders ... 19th Century 20th Century The Cyber Security Problem Space ? Historic Background ...

2013-03-28T23:59:59.000Z

137

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

138

Technical Options to Address Cyber Security, Interoperability...  

NLE Websites -- All DOE Office Websites (Extended Search)

Technical Options to Address Cyber Security, Interoperability and Other Issues with ZigBee SEP Title Technical Options to Address Cyber Security, Interoperability and Other Issues...

139

Protecting Intelligent Distributed Power Grids Against Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a...

140

RFI Comments - Advanced Cyber Security Center  

Science Conference Proceedings (OSTI)

Page 1. Page 1 of 3 Advanced Cyber Security Center Rollout ... The Need The advanced cyber threat is real and growing. ...

2013-04-09T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

142

INL Cyber Security Research | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Research Cyber security research at INL will help protect critical infrastructure control system computers against worms and other viruses. INL Cyber Security Research More...

143

Security and Cyber Guidance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April...

144

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines September 2, 2010 - 3:15pm Addthis WASHINGTON, D.C. - The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats. The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set

145

DOE G 423.1-1A, Implementation Guide for Use in Developing Technical Safety Requirements  

Directives, Delegations, and Requirements

This Guide provides elaboration for the content of TSRs. Section 10 CFR 830.205 of the Nuclear Safety Management rule, requires Department of Energy (DOE) ...

2010-11-03T23:59:59.000Z

146

DOE G 435.1-1 Chapter 3, Transuranic Waste Requirements  

Directives, Delegations, and Requirements

The guide provides criteria for determining if a waste is to be managed in accordance with DOE M 435.1-1, Chapter III, Transuranic Waste Requirements.

1999-07-09T23:59:59.000Z

147

Obama's Call for Public-Private Cyber Security Collaboration Reflected in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obama's Call for Public-Private Cyber Security Collaboration Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities May 29, 2009 - 4:08pm Addthis In releasing the results of his Administration's 60-day cyber security review, President Barack Obama today emphasized that partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the computer-based systems that monitor and control the nation's electric grid and oil and gas pipelines remains a shared challenge for the Department of Energy. As the industry quickly works to develop and demonstrate Smart Grid technologies to build a more reliable and resilient

148

Enforcement handbook: Enforcement of DOE nuclear safety requirements  

SciTech Connect

This Handbook provides detailed guidance and procedures to implement the General Statement of DOE Enforcement Policy (Enforcement Policy or Policy). A copy of this Enforcement Policy is included for ready reference in Appendix D. The guidance provided in this Handbook is qualified, however, by the admonishment to exercise discretion in determining the proper disposition of each potential enforcement action. As discussed in subsequent chapters, the Enforcement and Investigation Staff will apply a number of factors in assessing each potential enforcement situation. Enforcement sanctions are imposed in accordance with the Enforcement Policy for the purpose of promoting public and worker health and safety in the performance of activities at DOE facilities by DOE contractors (and their subcontractors and suppliers) who are indemnified under the Price-Anderson Amendments Act. These indemnified contractors, and their suppliers and subcontractors, will be referred to in this Handbook collectively as DOE contractors. It should be remembered that the purpose of the Department`s enforcement policy is to improve nuclear safety for the workers and the public, and this goal should be the prime consideration in exercising enforcement discretion.

NONE

1995-06-01T23:59:59.000Z

149

TCIP: Trustworthy CyberInfrastructure for the Power Grid | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid The TCIP, or Trustworthy CyberInfrastructure for the Power Grid, project's vision is to provide the fundamental science and technology to create an intelligent, adaptive power grid which survives malicious adversaries, provides continuous delivery of power, and supports dynamically varying trust requirements. This goal may be reached by creating the cyber building blocks, architecture, and validation technology to quantify the amount of trust provided by a proposed approach. The presentation below was given by William H. Saunders at the Visualization and Controls Program Peer Review in October 2006. TCIP: Trustworthy CyberInfrastructure for the Power Grid

150

DOE's General Counsel Announces New Policy Requiring Online Posting of NEPA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE's General Counsel Announces New Policy Requiring Online Posting DOE's General Counsel Announces New Policy Requiring Online Posting of NEPA Categorical Exclusion Determinations to Further Transparency DOE's General Counsel Announces New Policy Requiring Online Posting of NEPA Categorical Exclusion Determinations to Further Transparency October 15, 2009 - 10:09am Addthis Washington, DC - Consistent with the President's commitment to "disclose information rapidly in forms that the public can readily find and use," DOE announced today a new policy requiring all DOE program and field offices to document certain categorical exclusion determinations and post them online. Categorical exclusions are classes of actions that DOE has determined by regulation do not have a significant effect on the environment, and, therefore, normally do not require detailed environmental

151

NERSC/DOE FES Requirements Workshop Worksheet - Zhihong Lin  

NLE Websites -- All DOE Office Websites (Extended Search)

build the predictive capability for energetic particle turbulence and transport in the ITER burning plasmas, which requires understanding nonlinear physics of energetic particle...

152

NERSC/DOE FES Requirements Workshop Worksheet - Martin Greenwald  

NLE Websites -- All DOE Office Websites (Extended Search)

Martin Greenwald Martin Greenwald FES Requirements Worksheet 1.1. Project Information - Fusion Simulation Program Document Prepared By Martin Greenwald Project Title Fusion...

153

NERSC/DOE BES Requirements Workshop Worksheet - Normand Modine  

NLE Websites -- All DOE Office Websites (Extended Search)

Modine BES Requirements Worksheet 1.1. Project Information - Center for Integrated Nanotechnology (CINT) - Theory and Simulation Thrust Document Prepared By Normand Modine Project...

154

NERSC/DOE BES Requirements Workshop Worksheet - Brian Austin  

NLE Websites -- All DOE Office Websites (Extended Search)

Brian Austin Brian Austin BES Requirements Worksheet 1.1. Project Information - Quantum Monte Carlo for the Electronic Structure of Molecules Document Prepared By Brian Austin...

155

NERSC/DOE ASCR Requirements Workshop Organizing Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

Committee Large Scale Computing and Storage Requirements for Advanced Scientific Computing Research An ASCR NERSC Workshop January 5-6, 2011 Dr. Karen Pao ASCR Yukiko...

156

NERSC/DOE FES Requirements Workshop Worksheet - Brian Wirth  

NLE Websites -- All DOE Office Websites (Extended Search)

Brian Wirth Brian Wirth Brian Wirth 1.1. Project Information - Modeling plasma - surface interactions Document Prepared By Brian Wirth Project Title Modeling plasma - surface interactions Principal Investigator Brian Wirth Participating Organizations University of California, Berkeley; University of Tennessee; Oak Ridge National Laboratory Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a brief description of your project - highlighting its computational aspect - and outline its scientific objectives for the next 3-5 years. Please list one or two specific goals you hope to reach in 5 years. It is acknowledged that plasma-material interactions pose an immense scientific challenge and are one of the most critical issues in magnetic

157

DOE-STD-1082-94; DOE Standard Preparation, Review, and Approval of Implementaiton Plans For Nuclear Safety Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

82-94 82-94 October 1994 DOE STANDARD PREPARATION, REVIEW, AND APPROVAL OF IMPLEMENTATION PLANS FOR NUCLEAR SAFETY REQUIREMENTS U.S. Department of Energy AREA SAFT Washington D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document has been reproduced directly from the best available copy. Available to DOE and DOE contractors from the Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831; (615)576-8401. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 487-4650. Order No. DE95001461 DOE-STD-1082-94 iii FOREWORD 1. This Department of Energy (DOE) technical standard has been prepared by the Office of Environment, Safety and Health with the assistance of Steve

158

Protecting users of the cyber commons  

Science Conference Proceedings (OSTI)

Establish a global cyber "neighborhood watch" enabling users to take defensive action to protect their operations.

Stephen J. Lukasik

2011-09-01T23:59:59.000Z

159

The Department's Unclassified Cyber Security Program 2002, IG...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Unclassified Cyber Security Program 2002, IG-0567 The Department's Unclassified Cyber Security Program 2002, IG-0567 The Department's Unclassified Cyber Security Program 2002,...

160

SSN comments to DOE NBP RFI communications requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Comms Requirements Comms Requirements 12 July 2010 1/6 Michael Jung // Policy Director // Silver Spring Networks 888.406.1882 // mjung@silverspringnet.com (1) What are the current and future communications needs of utilities, including for the deployment of new Smart Grid applications, and how are these needs being met? Utilitiesʼ current communications needs are diverse, with considerable variation from utility to utility. Current communications needs that are related to, but generally pre-date, smart grid include: * System control and data acquisition (SCADA) * Drive-by meter reading * One-way direct load control * Mobile workforce management * Demand response, dynamic pricing for commercial/industrial customers In the smart grid-enabled future, utility smart grid applications will require

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

162

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

163

of Western Area Power Administration's Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Western Area Power Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 October 22, 2012 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Western Area Power Administration's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Department of Energy's Western Area Power Administration (Western) markets and delivers hydroelectric power and related services to 15 states within the central and western United States. As the largest U.S. Power Marketing Administration, millions of households and

164

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

2005-10-01T23:59:59.000Z

165

DOE-HDBK-1163-2003; Integration of Multiple Hazard Analysis Requirements and Activities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE-HDBK-1163-2003 October 2003 DOE HANDBOOK INTEGRATION OF MULTIPLE HAZARD ANALYSIS REQUIREMENTS AND ACTIVITIES U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. TS DOE-HDBK-1163-2003 ii This document has been reproduced directly from the best available copy. It is available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy, (800) 473-4375, fax: (301) 903-9823. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 605-6000. DOE-HDBK-1163-2003 iii FOREWORD 1. This Department of Energy (DOE) standard is approved for use by all DOE Components and

166

Cyber and physical infrastructure interdependencies.  

Science Conference Proceedings (OSTI)

The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

2008-09-01T23:59:59.000Z

167

Version Tracking Document for DOE Challenge Homes, National Program Requirements (Rev. 03)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tracking Document for Tracking Document for DOE Challenge Homes, National Program Requirements (Rev. 03) 4/17/2013 In the time since Revision 02 of the DOE Challenge Home National Program Requirements was released, DOE has modified, clarified, and refined various aspects of the program documents, primarily in response to partner questions and comments. This document is a summary of these edits, organized by the section of the National Program Requirements in which they appear. DOE has also posted the revised National Program Requirements, labeled Rev. 03, on its Web site at www.buildings.energy.gov/challenge. All revisions are categorized as a Change, Clarification, or Refinement. These are defined as follows: Change - The addition, deletion, or modification of a program requirement. A change will typically result from a partner

168

Does resolving PvNP require a paradigm shift?  

E-Print Network (OSTI)

I shall argue that a resolution of the PvNP problem requires building an iff bridge between the domain of provability and that of computability. The former concerns how a human intelligence decides the truth of number-theoretic relations, and is formalised by the first-order Peano Arithmetic PA following Dededekind's axiomatisation of Peano's Postulates. The latter concerns how a human intelligence computes the values of number-theoretic functions, and is formalised by the operations of a Turing Machine following Turing's analysis of computable functions. I shall show that such a bridge requires objective definitions of both an `algorithmic' interpretation of PA, and an `instantiational' interpretation of PA. I shall show that both interpretations are implicit in the definition of the subjectively defined `standard' interpretation of PA. However the existence of, and distinction between, the two objectively definable interpretations---and the fact that the former is sound whilst the latter is not---is obscured by the extraneous presumption under the `standard' interpretation of PA that Aristotle's particularisation must hold over the structure N of the natural numbers. I shall argue that recognising the falseness of this belief awaits a paradigm shift in our perception of the application of Tarski's analysis (of the concept of truth in the languages of the deductive sciences) to the `standard' interpretation of PA. I shall then show that an arithmetical formula [F] is PA-provable if, and only if, [F] interprets as true under an algorithmic interpretation of PA. I shall finally show how it then follows from Goedel's construction of a formally `undecidable' arithmetical proposition that there is a Halting-type PA formula which---by Tarski's definitions---is algorithmically verifiable as true, but not algorithmically computable as true, under a sound interpretation of PA.

Bhupinder Singh Anand

2010-03-29T23:59:59.000Z

169

DOE Requires Westinghouse to Cease Sales of Two Light Bulb Models and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requires Westinghouse to Cease Sales of Two Light Bulb Models Requires Westinghouse to Cease Sales of Two Light Bulb Models and Allows Sale of Another DOE Requires Westinghouse to Cease Sales of Two Light Bulb Models and Allows Sale of Another October 18, 2010 - 10:27am Addthis As a part of DOE's continuing enforcement action against Westinghouse Lighting Corporation, the company must cease sales of two light bulb models - medium based CFL basic model 15GLOBE/65/2 (Westinghouse product code 3800400) and general service fluorescent lamp model F40T12/CWE (Westinghouse product code 07521000) - because they do not meet DOE's energy efficiency standards. Based on test data provided by Westinghouse for basic model 15GLOBE/65/2, DOE has issued a Notice of Non-Compliance Determination to Westinghouse Lighting Corporation, requiring Westinghouse to halt sales and notify all

170

DOE Requires Westinghouse to Cease Sales of Two Light Bulb Models and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requires Westinghouse to Cease Sales of Two Light Bulb Models Requires Westinghouse to Cease Sales of Two Light Bulb Models and Allows Sale of Another DOE Requires Westinghouse to Cease Sales of Two Light Bulb Models and Allows Sale of Another October 18, 2010 - 10:27am Addthis As a part of DOE's continuing enforcement action against Westinghouse Lighting Corporation, the company must cease sales of two light bulb models - medium based CFL basic model 15GLOBE/65/2 (Westinghouse product code 3800400) and general service fluorescent lamp model F40T12/CWE (Westinghouse product code 07521000) - because they do not meet DOE's energy efficiency standards. Based on test data provided by Westinghouse for basic model 15GLOBE/65/2, DOE has issued a Notice of Non-Compliance Determination to Westinghouse Lighting Corporation, requiring Westinghouse to halt sales and notify all

171

DOE Requires Manufacturer and Labeler to Cease Sale of Incandescent Reflector Lamps  

Energy.gov (U.S. Department of Energy (DOE))

DOE has issued Notices of Non-Compliance Determination to Westinghouse Lighting Corporation and Fuzhou Sunlight Lighting Electrical Appliance Company requiring that they halt the sale of 8 basic...

172

DOE Requires Westinghouse to Cease Sales of Two Light Bulb Models...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Westinghouse to Cease Sales of Two Light Bulb Models and Allows Sale of Another DOE Requires Westinghouse to Cease Sales of Two Light Bulb Models and Allows Sale of Another October...

173

Strengthening Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

E E n E rgyB i z November/December 2008 » TECHNOLOGY FRONTIER (Guest OpiniOn) remOte attaCks On systems that control power production and distribution are no longer hypothetical events. At least four utilities have been subjected to extortion demands by criminals who used the Internet to infect the utilities' computers and caused or threatened power outages. Cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption caused a power outage affecting multiple cities. These are criminal acts, but nation-states are actively targeting utility computers, as well, so that in time of war they can turn off their adversary's power. While all this is happening, most executives in the

174

A nexus of Cyber-Geography and Cyber-Psychology: Topos/"Notopia" and identity in hacking  

Science Conference Proceedings (OSTI)

This paper explores the Cyber-Psychological and Cyber-Geographic aspects of hacking and hacktivism. An examination of the literature related to hackers and hacking reveals a complex nexus of spatial (including cyber-spatial such as ''Notopia'') and psychological ... Keywords: Cyber-Geography, Cyber-Identity, Cyber-Psychology, Hacking, Identity, Notopia

Fivos Papadimitriou

2009-11-01T23:59:59.000Z

175

Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department's Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates numerous networks and systems to help accomplish its strategic missions in the areas of energy, defense, science and the environment. The systems are frequently subjected to sophisticated cyber attacks that could impact the Department's

176

21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 Steps to Improve Cyber Security of SCADA Networks 1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in cyber space today. By allowing the collection and analysis of data and control of equipment such as pumps and valves from remote locations, SCADA networks provide great efficiency and are widely used. However, they also present a security risk. 21 Steps to Improve Cyber Security of SCADA Networks

177

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

178

TA-55 Final Safety Analysis Report Comparison Document and DOE Safety Evaluation Report Requirements  

Science Conference Proceedings (OSTI)

This document provides an overview of changes to the currently approved TA-55 Final Safety Analysis Report (FSAR) that are included in the upgraded FSAR. The DOE Safety Evaluation Report (SER) requirements that are incorporated into the upgraded FSAR are briefly discussed to provide the starting point in the FSAR with respect to the SER requirements.

Alan Bond

2001-04-01T23:59:59.000Z

179

Cyber-physical systems: imminent challenges  

Science Conference Proceedings (OSTI)

A German project is presented which was initiated in order to analyse the potential and risks associated with Cyber-Physical Systems. These have been recognised as the next wave of innovation in information and communication technology. Cyber-Physical ...

Manfred Broy; Mara Victoria Cengarle; Eva Geisberger

2012-03-01T23:59:59.000Z

180

Cyber Security and Privacy Landscape of the Electric Sector: Release 2  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies, such as the Department of Energy (DOE), the Department of Homeland Security (DHS), the Department of Defense (DOD), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the eff...

2012-07-02T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Smart Manufacturing, Construction, and Cyber-Physical ...  

Science Conference Proceedings (OSTI)

Strategic Goal:Smart Manufacturing, Construction, and Cyber-Physical Systems. Enable the next generation of innovative ...

2013-01-03T23:59:59.000Z

182

Booz Allen Hamilton Cyber Assurance Testing Laboratory  

Science Conference Proceedings (OSTI)

Booz Allen Hamilton Cyber Assurance Testing Laboratory. NVLAP Lab Code: 200423-0. Address and Contact Information: ...

2013-08-16T23:59:59.000Z

183

CIKR Cyber Information Sharing and Collaboration Program ...  

Science Conference Proceedings (OSTI)

Page 1. CIKR Cyber Information Sharing and Collaboration Program (CISCP) In order to meet the Department of Homeland ...

2013-07-16T23:59:59.000Z

184

DRAFT Outline - Preliminary Framework to Reduce Cyber ...  

Science Conference Proceedings (OSTI)

Page 1. 1 DRAFT Outline - Preliminary Framework to Reduce Cyber Risks to Critical Infrastructure, July 1, 2013 NOTES ...

2013-07-02T23:59:59.000Z

185

Comprehensive National Cyber Security: Leap-Ahead ...  

Science Conference Proceedings (OSTI)

Comprehensive National Cyber Security: Leap-Ahead Security for Interconnected Systems (+10 FTE, +$5,500,000). Challenge. image: ...

2010-10-05T23:59:59.000Z

186

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

187

Effective real-world project collaboration: Strategies from a cyber security degree program  

Science Conference Proceedings (OSTI)

The undergraduate degree of computer and cyber security has been offered at the School of Information Technology, Phetchaburi Rajabhat University, Thailand since 2005. Our program requires direct field experience when students are taking upper-level ...

Wajee Chookittikul; Peter E. Maher

2011-05-01T23:59:59.000Z

188

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

189

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

190

The economic impact of cyber terrorism  

Science Conference Proceedings (OSTI)

What is the economic impact of cyber terrorism? Can organizations achieve strategic advantage in the cyber terrorism game? A general game theoretical model is proposed to study the optimal information systems (ISs) security investment and then applied ... Keywords: Cyber terrorism, Game theory, Information systems security, Security investment

Jian Hua, Sanjay Bapna

2013-06-01T23:59:59.000Z

191

DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requires Manufacturers to Halt Sales of Heat Pumps and Air Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners Violating Minimum Appliance Standards DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners Violating Minimum Appliance Standards June 3, 2010 - 12:00am Addthis Washington, DC - Today, the Department of Energy announced that three manufacturers -- Aspen Manufacturing, Inc., Summit Manufacturing, and Advanced Distributor Products -- must stop distributing 61 heat pump models and 1 air conditioner model that DOE has determined do not comply with federal energy conservation standards. The manufacturers also must notify all of their customers that have been sold noncompliant units. The Department determined that these models were noncompliant based on certification information submitted to DOE for these manufacturers.

192

DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requires Manufacturers to Halt Sales of Heat Pumps and Air Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners Violating Minimum Appliance Standards DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners Violating Minimum Appliance Standards June 3, 2010 - 2:17pm Addthis Today, the Department of Energy announced that three manufacturers -- Aspen Manufacturing, Inc., Summit Manufacturing, and Advanced Distributor Products -- must stop distributing 61 heat pump models and 1 air conditioner model that DOE has determined do not comply with federal energy conservation standards. The manufacturers also must notify all of their customers that have been sold noncompliant units. The Department determined that these models were noncompliant based on certification information submitted to DOE for these manufacturers.

193

Cyber Security Solutions for Instrumentation and Control Systems, Topic 2: Patch Management and Automated Change Management  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced as a result of continual threats to business and process control networks. Many standards have been drafted, have undergone revision, and are being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection (CIP) standards requirements of the North American Electric Reliability Corporation (NERC) and related requirements in the international ...

2013-04-18T23:59:59.000Z

194

Cyber Security Solutions for Instrumentation and Control Systems, Topic 3: Security Status Monitoring  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced in response to continual threats to business and process control networks. Many standards have been drafted and subsequently revised and are now being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with the requirements set forth in the North American Electric Reliability Corporations Critical Infrastructure Protection standards and related requirements in the international ...

2013-11-08T23:59:59.000Z

195

Attachment 6, Certification of Intent to Comply with DOE NEPA Requirements/Complete Environmental Questionnaire  

NLE Websites -- All DOE Office Websites (Extended Search)

6 6 CERTIFICATION OF INTENT TO COMPLY WITH DOE NEPA REQUIREMENTS/COMPLETE ENVIRONMENTAL QUESTIONNAIRE The Applicant, , if (name of institution) selected for award under Program Solicitation DE-PS26-02NT41430, "Support of Advanced Fossil Resource Utilization Research by Historically Black Colleges and Universities and Other Minority Institutions," agrees that, it will complete the Environmental Questionnaire within thirty (30) days of request, and provide any other environmental-related data as requested by DOE to satisfy NEPA requirements. (Signature of Authorized Official)

196

Does  

NLE Websites -- All DOE Office Websites (Extended Search)

Does Does the cellulose-binding module move on the cellulose surface? Yu-San Liu Æ Yining Zeng Æ Yonghua Luo Æ Qi Xu Æ Michael E. Himmel Æ Steve J. Smith Æ Shi-You Ding Received: 26 November 2008 / Accepted: 11 May 2009 / Published online: 19 June 2009 Ó Springer Science+Business Media B.V. 2009 Abstract Exoglucanases are key enzymes required for the efficient hydrolysis of crystalline cellulose. It has been proposed that exoglucanases hydrolyze cellulose chains in a processive manner to produce primarily cellobiose. Usually, two functional modules are involved in the processive mechanism: a catalytic module and a carbohydrate-binding module (CBM). In this report, single molecule tracking techniques were used to analyze the molecular motion of CBMs labeled with quantum dots (QDs) and bound to cellulose crystals. By tracking the single QD, we observed that the family 2 CBM from

197

Department of Energy's July 2013 Cyber Security Breach  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Department of Energy's July The Department of Energy's July 2013 Cyber Security Breach DOE/IG-0900 December 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 December 6, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Review of the "Department of Energy's July 2013 Cyber Security Breach" BACKGROUND To facilitate its administrative and operational needs, the Department of Energy maintains a substantial amount of personally identifiable information (PII). The Department's Management Information System (MIS) provides a gateway for users to access a system known as the DOE Employee Data Repository (DOEInfo) database. That system was implemented in 1994, and

198

Implementing Least Privilege on Windows XP computers at DOE...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Least Privilege on Microsoft Windows XP computers at DOE-RL Hanford Presented By Eric Anderson, PMP, CISM, CISSP, MCSE Cyber Projects and Technical Lead MSA Lockheed Martin...

199

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Reports Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO),

200

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed More Documents & Publications Security is Not an Option ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004)

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Leadership Development Series: "A Holistic Look at Cyber Security" |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" January 30, 2014 10:30AM to 12:00PM EST Registration link: By e-mail, $0 Course type: Classroom/Auditorium, Video Cast & Teleconference Course Location: DOE Headquarters, Forrestal Building, Washington, DC/ Main Auditorium Course Description: Dr. Steven Bucci, Director, Douglas and Sarah Allison Center for Foreign Policy Studies. The sheer volume of cyber activity is masking serious threats that impact government, business and our personal lives every day. Incidents are now ubiquitous, pervasive and constitute the new "normal". These day to day threats are not existential, but if not addressed, will hinder our

202

Pricing and Investments in Internet Security: A Cyber-Insurance Perspective  

E-Print Network (OSTI)

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In this regard, an important research problem is the analysis of optimal user self-defense investments and cyber-insurance contracts under the Internet environment. In this paper, we investigate two problems and their relationship: 1) analyzing optimal self-defense investments in the Internet, under optimal cyber-insurance coverage, where optimality is an insurer objective and 2) designing optimal cyber-insurance contracts for Internet users, where a contract is a (premium, coverage) pair.

Pal, Ranjan

2011-01-01T23:59:59.000Z

203

Framework for Evaluating Cyber Security Posture for Power Delivery Systems  

Science Conference Proceedings (OSTI)

While many asset owners and operators are performing self-assessments of their control systems, the methods used vary widely across the electric sector. This lack of consistent criteria and metrics makes it difficult to benchmark and compare the cyber security posture of power delivery systems.The objective of this technical update is to develop an evaluation framework that uses both the Department of Energy (DOE) Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) ...

2013-11-28T23:59:59.000Z

204

Recommended Practice: Creating Cyber Forensics Plans for Control Systems  

SciTech Connect

Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.

Eric Cornelius; Mark Fabro

2008-08-01T23:59:59.000Z

205

ANNUAL HEATING AND COOLING REQUIREMENTS AND DESIGN DAY PERFORMANCE FOR A RESIDENTIAL MODEL IN SIX CLIMATES: A COMPARISON OF NBSLD, BLAST 2, AND DOE-2.1  

E-Print Network (OSTI)

I-' O'l Annual Heating Requirements NBSLD BLAST DOE-2 (SWF)Cooling Requirements (10 6 Btu) Btu) I'" I NBSLD III DOE-2 (DOE-2.1 predictions of annual heating and cooling requirements

Carroll, William L.

2011-01-01T23:59:59.000Z

206

DOE Requires Air-Con International to Cease Sales of Inefficient Air  

NLE Websites -- All DOE Office Websites (Extended Search)

Requires Air-Con International to Cease Sales of Inefficient Requires Air-Con International to Cease Sales of Inefficient Air Conditioners and Proposes Penalties DOE Requires Air-Con International to Cease Sales of Inefficient Air Conditioners and Proposes Penalties September 21, 2010 - 6:43pm Addthis The Department has issued a Notice of Noncompliance Determination and Proposed Civil Penalty to Air-Con, International, requiring Air-Con to cease the sale of certain air-conditioning systems in the United States and proposing a civil penalty of $231,090 for sales of these products in violation of the applicable energy efficiency standards. This action reflects the Department's continued commitment to act aggressively to remove unlawful products from the market. In March, 2010, the Department issued a subpoena requiring Air-Con to

207

Cyber Fit Pyramid for the home user. | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pyramid for the home user. Cyber Fit Pyramid for the home user. Cyber Fit Pyramid for the home user. Developed for Security Awareness materials for the Department Cyber Fit Pyramid...

208

DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manufacturers to Halt Sales of Heat Pumps and Air Manufacturers to Halt Sales of Heat Pumps and Air Conditioners Violating Minimum Appliance Standards DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners Violating Minimum Appliance Standards June 3, 2010 - 2:17pm Addthis Today, the Department of Energy announced that three manufacturers -- Aspen Manufacturing, Inc., Summit Manufacturing, and Advanced Distributor Products -- must stop distributing 61 heat pump models and 1 air conditioner model that DOE has determined do not comply with federal energy conservation standards. The manufacturers also must notify all of their customers that have been sold noncompliant units. The Department determined that these models were noncompliant based on certification information submitted to DOE for these manufacturers.

209

Smart Grid Cyber Security Strategy and Requirements  

E-Print Network (OSTI)

(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nations measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITLs responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Interagency Report discusses ITLs research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Interagency Report 7628 (draft) 305 pages (February 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. Acknowledgments

The Smart; Grid Interoperability

2010-01-01T23:59:59.000Z

210

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

211

NNSA Seeking Comments on Consolidated IT and Cyber Security Support...  

NLE Websites -- All DOE Office Websites (Extended Search)

NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013...

212

THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519 THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519 Protecting unclassified information systems continues to...

213

INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION, IG-0531 INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION, IG-0531 The Office of Inspector...

214

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

215

Strategy for Improvements in Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strategy for Improvements in Cyber Security Strategy for Improvements in Cyber Security Brase-LLNL-SEAB.10.11.pdf More Documents & Publications Computational Advances in Applied...

216

CYBER-RELATED CRITICAL INFRASTRUCTURE IDENTIFICATION AND PROTECTION...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER-RELATED CRITICAL INFRASTRUCTURE IDENTIFICATION AND PROTECTION MEASURES, IG-0545 CYBER-RELATED CRITICAL INFRASTRUCTURE IDENTIFICATION AND PROTECTION MEASURES, IG-0545 In...

217

A Scalable Framework for Cyber Attack Discovery and Situational...  

NLE Websites -- All DOE Office Websites (Extended Search)

Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

218

Office of Electricity Delivery and Energy Reliability Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On September 23, 2010, speaking at the inaugural GridWise...

219

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

220

Report of the Cyber Security Research Needs for Open Science...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Cyber Security Research Needs for Open Science Workshop Report of the Cyber Security Research Needs for Open Science Workshop Protecting systems and users, while maintaining...

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Evaluation Report on The Department's Unclassified Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report on The Department's Unclassified Cyber Security Program 2002, DOEIG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOEIG-0567 As...

222

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

223

Office of Cyber Security Evaluations - Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Evaluations Reports to the Independent Oversight Program Mission and Functions Mission The Office of Cyber Security Evaluations is responsible for the independent...

224

Strategy for Improvements in Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Improvements in Cyber Security Strategy for Improvements in Cyber Security Brase-LLNL-SEAB.10.11.pdf More Documents & Publications Mobile Device Security Checklist Open...

225

Cyber Tips Book Mark (2009 NCSA Month) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sites Power Marketing Administration Other Agencies You are here Home Cyber Tips Book Mark (2009 NCSA Month) Cyber Tips Book Mark (2009 NCSA Month) Training and Awareness...

226

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee...

227

Cyber Effects Analysis Using VCSE Promoting Control System Reliability...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Effects Analysis Using VCSE Promoting Control System Reliability Cyber Effects Analysis Using VCSE Promoting Control System Reliability This report describes the Virtual...

228

Common Cyber Security Vulnerabilities Observed in Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

229

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

230

Convergence for the Smart Grid -On the technology opportunities for Future Cyber-Physical Energy Systems, invited paper at New Research Directions for Future Cyber-Physical Energy  

E-Print Network (OSTI)

Convergence for the Smart Grid - On the technology opportunities for Future Cyber-Physical Energy Angeles, CA. 90095 http://winmec.ucla.edu Email:smartgrid@winmec.ucla.edu Convergence for the Smart Grid into what the Future / Smart Electric Grid should look like. For example the DOE has a vision for the Modern

California at Los Angeles, University of

231

Cyber Security Metrics and Measures abstract  

Science Conference Proceedings (OSTI)

Paul E. Black, Karen Scarfone, and Murugiah Souppaya, Cyber Security Metrics and Measures, in Wiley Handbook of Science and Technology for ...

2013-05-07T23:59:59.000Z

232

Hiring and Managing a Cyber Security Workforce:  

Science Conference Proceedings (OSTI)

... DHS cyber security workers and others from outside of ... Sell the mission! Protecting the US nuclear arsenal or the New York City water supply is a ...

2013-09-19T23:59:59.000Z

233

Cybersecurity for Cyber-Physical Systems  

Science Conference Proceedings (OSTI)

... The second day will focus on cyber security needs of CPSs in the electric Smart Grid. ... NIST - Smart Grid http://www.nist.gov/smartgrid/. ...

2013-01-11T23:59:59.000Z

234

Graph anomalies in cyber communications  

Science Conference Proceedings (OSTI)

Enterprises monitor cyber traffic for viruses, intruders and stolen information. Detection methods look for known signatures of malicious traffic or search for anomalies with respect to a nominal reference model. Traditional anomaly detection focuses on aggregate traffic at central nodes or on user-level monitoring. More recently, however, traffic is being viewed more holistically as a dynamic communication graph. Attention to the graph nature of the traffic has expanded the types of anomalies that are being sought. We give an overview of several cyber data streams collected at Los Alamos National Laboratory and discuss current work in modeling the graph dynamics of traffic over the network. We consider global properties and local properties within the communication graph. A method for monitoring relative entropy on multiple correlated properties is discussed in detail.

Vander Wiel, Scott A [Los Alamos National Laboratory; Storlie, Curtis B [Los Alamos National Laboratory; Sandine, Gary [Los Alamos National Laboratory; Hagberg, Aric A [Los Alamos National Laboratory; Fisk, Michael [Los Alamos National Laboratory

2011-01-11T23:59:59.000Z

235

DOE Policies | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Policies DOE Policies DOE Policies Cyber Security DOE O 205.1B Department of Energy Cyber Security Management (Approved May 16, 2011) Information Management Planning DOE Guide to IT Capital Planning and Investment, September 2010 (pdf) DOE IRM Strategic Plan, FY 2009 - 2011 (pdf) DOE N 203.1, Software Quality Assurance (pdf) DOE G 242.1-1, Forms Management Guide (pdf) DOE O 203.1 Limited Personal Use of Government Office Equipment Including Information Technology (pdf) Information Management Program Order, DOE O 200.1A (pdf) (Access to this document is restricted to DOE employees only) Records Management DOE Directive, O 243.1, Records Management Program (pdf) DOE Directive, O 243.2, Vital Records (pdf) DOE Directive, O 200.2, Information Collection Management Program

236

Microgrid cyber security reference architecture.  

SciTech Connect

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

237

DOE Integrated Safeguards and Security (DISS) historical document archival and retrieval analysis, requirements and recommendations  

Science Conference Proceedings (OSTI)

The overall primary Objective of HDAR is to create a repository of historical personnel security documents and provide the functionality needed for archival and retrieval use by other software modules and application users of the DISS/ET system. The software product to be produced from this specification is the Historical Document Archival and Retrieval Subsystem The product will provide the functionality to capture, retrieve and manage documents currently contained in the personnel security folders in DOE Operations Offices vaults at various locations across the United States. The long-term plan for DISS/ET includes the requirement to allow for capture and storage of arbitrary, currently undefined, clearance-related documents that fall outside the scope of the ``cradle-to-grave`` electronic processing provided by DISS/ET. However, this requirement is not within the scope of the requirements specified in this document.

Guyer, H.B.; McChesney, C.A.

1994-10-07T23:59:59.000Z

238

Modification of the U.S. Department of Energy`s (DOE) sytem of radiation protection requirements and guidance  

SciTech Connect

DOE has undertaken a major modification of its system of radiation protection guidance and requirements. The objectives of this modification are to (1) eliminate unnecessary and redundant requirements, (2) clearly delineate requirements from guidance, (3) codify all radiation protection requirements, and (4) move from a compliance based approach towards a performance based approach. To achieve these objectives DOE has (1) canceled DOE Order 5480.11, {open_quotes}Radiation Protection for DOE Workers,{close_quotes} DOE Order 5480.15, {open_quotes}Department of Energy Laboratory Accreditation Program (DOELAP) for Personnel Dosimetry,{close_quotes} and DOE Notice 5400.13, {open_quotes}Sealed Radioactive Source Accountability,{close_quotes} (2) converted the DOE Radiological Control (RadCon) Manual from mandatory to non mandatory status, and (3) issued DOE Notice 441.1 to maintain those requirements (not in 10 CFR 835) considered necessary for radiation protection of workers. DOE has initiated actions to (1) amend 10 CFR 835 (the Federal rule on occupational radiation protection in the DOE complex) to incorporate the requirements, or their equivalent, in DOE Notice 441.1, (2) issue a technical standard containing guidance on DOELAP, (3) reissue the DOE RadCon Manual as a non mandatory technical standard that reflects the amendments to 10 CFR 835, and (4) revise the implementation guides on radiation protection for consistency with 10 CFR 835 and the RadCon Manual. As a result of these modifications, the system of radiation protection in the DOE will become more comparable with the system of radiation protection used by commercial industry and with the system of protection applied to other areas of worker health and safety.

O`Connell, P.V.; Rabovsky, J.L.; Zobel, S.G. [Department of Energy, Germantown, MD (United States)

1996-06-01T23:59:59.000Z

239

Resource management algorithms for real-time wireless sensor networks with applications in cyber-physical systems  

Science Conference Proceedings (OSTI)

Wireless Sensor Networks (WSN) are playing a key role in the efficient operation of Cyber Physical Systems (CPS). They provide cost efficient solutions to current and future CPS requirements such as real-time structural awareness, faster event localization, ...

Benazir Fateh / Manimaran Govindarasu

2013-01-01T23:59:59.000Z

240

Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor  

SciTech Connect

Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.

Ondrej Linda; Todd Vollmer; Jim Alves-Foss; Milos Manic

2011-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Proposed Comprehensive Cyber Security Legislation, May 2011  

Science Conference Proceedings (OSTI)

The role of cyber security in the critical infrastructures of the United States has been recognized by the President and by members of Congress. To address potential cyber security threats and vulnerabilities, the Senate has proposed revisions to specific laws and regulations. This white paper includes a technical assessment of some of the key proposed revisions.

2011-10-26T23:59:59.000Z

242

Cyber Security in Smart Grid Substations  

E-Print Network (OSTI)

Cyber Security in Smart Grid Substations Thijs Baars Lucas van den Bemd Michail Theuns Robin van.089 3508 TB Utrecht The Netherlands #12;CYBER SECURITY IN SMART GRID SUBSTATIONS Thijs Baars T.Brinkkemper@uu.nl Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands

Utrecht, Universiteit

243

DOE nuclear material packaging manual: storage container requirements for plutonium oxide materials  

Science Conference Proceedings (OSTI)

Loss of containment of nuclear material stored in containers such as food-pack cans, paint cans, or taped slip lid cans has generated concern about packaging requirements for interim storage of nuclear materials in working facilities such as the plutonium facility at Los Alamos National Laboratory (LANL). In response, DOE has recently issued DOE M 441.1 'Nuclear Material Packaging Manual' with encouragement from the Defense Nuclear Facilities Safety Board. A unique feature compared to transportation containers is the allowance of filters to vent flammable gases during storage. Defining commonly used concepts such as maximum allowable working pressure and He leak rate criteria become problematic when considering vented containers. Los Alamos has developed a set of container requirements that are in compliance with 441.1 based upon the activity of heat-source plutonium (90% Pu-238) oxide, which bounds the requirements for weapons-grade plutonium oxide. The pre and post drop-test He leak rates depend upon container size as well as the material contents. For containers that are routinely handled, ease of handling and weight are a major consideration. Relatively thin-walled containers with flat bottoms are desired yet they cannot be He leak tested at a differential pressure of one atmosphere due to the potential for plastic deformation of the flat bottom during testing. The He leak rates and He leak testing configuration for containers designed for plutonium bearing materials will be presented. The approach to meeting the other manual requirements such as corrosion and thermal degradation resistance will be addressed. The information presented can be used by other sites to evaluate if their conditions are bounded by LANL requirements when considering procurement of 441.1 compliant containers.

Veirs, D Kirk [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

244

A Novel Cyber-Insurance for Internet Security  

E-Print Network (OSTI)

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In reality, an Internet user faces risks due to security attacks as well as risks due to non-security related failures (e.g., reliability faults in the form of hardware crash, buffer overflow, etc.) . These risk types are often indistinguishable by a naive user. However, a cyber-insurance agency would most likely insure risks only due to security attacks. In this case, it becomes a challenge for an Internet user to choose the right type of cyber-insurance contract as standard optimal contracts, i.e., contracts under security attacks only, might prove to be sub-optimal for ...

Pal, Ranjan; Psounis, Konstantinos

2011-01-01T23:59:59.000Z

245

NIST Improves Tool for Hardening Software Against Cyber ...  

Science Conference Proceedings (OSTI)

NIST Improves Tool for Hardening Software Against Cyber Attack. From NIST Tech Beat: November 22, 2011. ...

2011-11-22T23:59:59.000Z

246

Microsoft Word - TIA Reply Comments DOE NBP RFI Smart Grid Communications Requirements.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26, 2010 26, 2010 US Department of Energy Office of the General Counsel 1000 Independence Avenue, SW Room 6A245 Washington, DC 20585 Re: NBP RFI-Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy The Telecommunications Industry Association (TIA) is pleased to provide comments on the communications requirements of electric utilities relevant to smart grid policy. TIA appreciates the proactive role the Department of Energy (DOE) is taking in executing the recommendations from the FCC in the National Broadband Plan. Electric utilities and the ICT industry share a long tradition of partnering to build and maintain the communications networks contributing to the security and reliability of the grid.

247

Analysis of waste treatment requirements for DOE mixed wastes: Technical basis  

SciTech Connect

The risks and costs of managing DOE wastes are a direct function of the total quantities of 3wastes that are handled at each step of the management process. As part of the analysis of the management of DOE low-level mixed wastes (LLMW), a reference scheme has been developed for the treatment of these wastes to meet EPA criteria. The treatment analysis in a limited form was also applied to one option for treatment of transuranic wastes. The treatment requirements in all cases analyzed are based on a reference flowsheet which provides high level treatment trains for all LLMW. This report explains the background and basis for that treatment scheme. Reference waste stream chemical compositions and physical properties including densities were established for each stream in the data base. These compositions are used to define the expected behavior for wastes as they pass through the treatment train. Each EPA RCRA waste code was reviewed, the properties, chemical composition, or characteristics which are of importance to waste behavior in treatment were designated. Properties that dictate treatment requirements were then used to develop the treatment trains and identify the unit operations that would be included in these trains. A table was prepared showing a correlation of the waste physical matrix and the waste treatment requirements as a guide to the treatment analysis. The analysis of waste treatment loads is done by assigning wastes to treatment steps which would achieve RCRA compliant treatment. These correlation`s allow one to examine the treatment requirements in a condensed manner and to see that all wastes and contaminant sets are fully considered.

1995-02-01T23:59:59.000Z

248

DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to Provide Nearly 8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks DOE to Provide Nearly 8 Million to Safeguard the Nation's Energy Infrastructure...

249

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

250

Management of Los Alamos National Laboratory's Cyber Security Program, IG-0880  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Los Alamos National Los Alamos National Laboratory's Cyber Security Program DOE/IG-0880 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 February 11, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Los Alamos National Laboratory's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Los Alamos National Laboratory (LANL), operated by the National Nuclear Security Administration on behalf of the Department of Energy, is one of the world's largest multi- disciplinary laboratories and is primarily responsible for helping to ensure the safety and

251

DOE Transmission System Integration Workshop  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Heyeck, AEP, Sr. Vice President, Transmission Heyeck, AEP, Sr. Vice President, Transmission and Chair, EPRI Power Delivery & Utilization Sector Council November 01-02, 2012 DoubleTree Hotel, Crystal City Washington D.C. DOE Transmission System Integration Workshop 2 © 2012 Electric Power Research Institute, Inc. All rights reserved. Near-Zero Emissions Long-Term Operations Renewable Integration Water Management Electric Vehicles Demand Response & Efficiency Renewable Energy Energy Storage Sensors & Control Cyber Security Supply = Demand The Power System Supply to Demand Requires a full portfolio of innovative technologies. Tomorrow's Power System One size does not fit all 3 © 2012 Electric Power Research Institute, Inc. All rights reserved. Grid Transformation to Ensure Reliability, Efficiency, Resiliency and Security

252

Framework for Grading Procurement Requirements for Power Delivery Systems  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new power delivery systems requires cyber security experts, power system engineers, and procurement organizations to work together with vendors to select, implement, and maintain cyber security controls. Improper or incomplete implementations of security controls due to a lack of adequate requirements and/or division of responsibilities between the utility and vendor can often result in costly back fit to meet requirements.This ...

2013-11-27T23:59:59.000Z

253

JM to Revise DOE G 423.1-1A, Implementation Guide for Use in Developing Technical Safety Requirements  

Directives, Delegations, and Requirements

As part of the one-year accuracy review of the November 2010 change to the Guide, as required by DOE O 251.1C, Departmental Directives Progrom, Section 7, ...

2013-06-21T23:59:59.000Z

254

DOE O 426.2 Admin Chg 1, Personnel Selection, Training, Qualification, and Certification Requirements for DOE Nuclear Facilities  

Directives, Delegations, and Requirements

The order establishes selection, training, qualification, and certification requirements for contractor personnel who can impact the safety basis through their ...

2010-04-21T23:59:59.000Z

255

Data Intensive Architecture for Scalable Cyber Analytics  

SciTech Connect

Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. It is necessary to have analytical tools to help analysts identify anomalies that span seconds, days, and weeks. Unfortunately, providing analytical tools effective access to the volumes of underlying data requires novel architectures, which is often overlooked in operational deployments. Our work is focused on a summary record of communication, called a flow. Flow records are intended to summarize a communication session between a source and a destination, providing a level of aggregation from the base data. Despite this aggregation, many enterprise network perimeter sensors store millions of network flow records per day. The volume of data makes analytics difficult, requiring the development of new techniques to efficiently identify temporal patterns and potential threats. The massive volume makes analytics difficult, but there are other characteristics in the data which compound the problem. Within the billions of records of communication that transact, there are millions of distinct IP addresses involved. Characterizing patterns of entity behavior is very difficult with the vast number of entities that exist in the data. Research has struggled to validate a model for typical network behavior with hopes it will enable the identification of atypical behavior. Complicating matters more, typically analysts are only able to visualize and interact with fractions of data and have the potential to miss long term trends and behaviors. Our analysis approach focuses on aggregate views and visualization techniques to enable flexible and efficient data exploration as well as the capability to view trends over long periods of time. Realizing that interactively exploring summary data allowed analysts to effectively identify events, we utilized multidimensional OLAP data cubes. The data cube structure supports interactive analysis of summary data across multiple dimensions, such as location, time, and protocol. Cube technology also allows the analyst to drill-down into the underlying data set, when events of interest are identified and detailed analysis is required. Unfortunately, when creating these cubes, we ran into significant performance issues with our initial architecture, caused by a combination of the data volume and attribute characteristics. Overcoming, these issues required us to develop a novel, data intensive computing infrastructure. In particular, we ended up combining a Netezza Twin Fin data warehouse appliance, a solid state Fusion IO ioDrive, and the Tableau Desktop business intelligence analytic software. Using this architecture, we were able to analyze a month's worth of flow records comprising 4.9B records, totaling approximately 600GB of data. This paper describes our architecture, the challenges that we encountered, and the work that remains to deploy a fully generalized cyber analytical infrastructure.

Olsen, Bryan K.; Johnson, John R.; Critchlow, Terence J.

2011-11-15T23:59:59.000Z

256

Hazardous Substance Release Reporting Under CERCLA, EPCR {section}304 and DOE Emergency Management System (EMS) and DOE Occurrence Reporting Requirements. Environmental Guidance  

SciTech Connect

Releases of various substances from DOE facilities may be subject to reporting requirements under the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Emergency Planning and Community Right-to-Know Act (EPCRA), as well as DOE`s internal ``Occurrence Reporting and Processing of Operations Information`` and the ``Emergency Management System`` (EMS). CERCLA and EPCPA are Federal laws that require immediate reporting of a release of a Hazardous Substance (HS) and an Extremely Hazardous Substance (EHS), respectively, in a Reportable Quantity (RQ) or more within a 24-hour period. This guidance uses a flowchart, supplemental information, and tables to provide an overview of the process to be followed, and more detailed explanations of the actions that must be performed, when chemical releases of HSs, EHSs, pollutants, or contaminants occur at DOE facilities. This guidance should be used in conjunction with, rather than in lieu of, applicable laws, regulations, and DOE Orders. Relevant laws, regulations, and DOE Orders are referenced throughout this guidance.

Traceski, T.T.

1994-06-01T23:59:59.000Z

257

Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor  

Science Conference Proceedings (OSTI)

Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.

Ondrej Linda; Todd Vollmer; Jason Wright; Milos Manic

2011-04-01T23:59:59.000Z

258

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

259

Definition: Critical Cyber Assets | Open Energy Information  

Open Energy Info (EERE)

Related Terms Cyber Assets References Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline...

260

Cyber-Physical Challenges for Space Systems  

Science Conference Proceedings (OSTI)

Modern space systems necessarily have a tight coupling between onboard cyber (processing, communication) and physical (sensing, actuation) elements to survive the harsh extraterrestrial environment and successfully complete ambitious missions. This article ... Keywords: attitude control, communication, robotics, space systems

Andrew T. Klesh; James W. Cutler; Ella M. Atkins

2012-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

DOE O 205.1B Reference List | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

and additional information sources to assist in implementing DOE Order 205.1B, Cyber Security Program. DOE O 205.1B Reference List More Documents & Publications Order DOE...

262

Cyber Security Audit and Attack Detection Toolkit  

Science Conference Proceedings (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

263

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June

264

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)

265

Decontaminating the DOE-STD-3013 Inner Container to Meet 10-CFR-835 Appendix D Requirements  

SciTech Connect

The United States Department of Energy (DOE) has published a standard that specifies the criteria for preparation and packaging of plutonium metals and oxides for safe long-term storage (DOE-STD-3013-96). This standard is followed for the packaging of materials resulting from the disassembly of nuclear weapons at Los Alamos National Laboratory under the Advanced Retirement and Integrated Extraction System (ARIES) project. Declassified plutonium metal or oxide material from the ARES project is packaged into doubly contained and welded type 304L stainless steel containers that comply with the DOE standard. The 3013-96 standard describes requirements for maximum contamination limits on the outer surface of the sealed inner container. These limits are 500 dpm per 100 cm2 for direct measurements and 20 dpm per 100 cm2 for removable contamination. For containers filled, welded, and handled inside a highly contaminated glovebox line, these limits are difficult to obtain. Simple handling within the line is demonstrated to contaminate surfaces from 10,000 to 10,000,000 dpm alpha per 100 cm2. To routinely achieve contamination levels below the maximum contamination levels specified by the 3013-96 standard within a processing operation, a decontamination step must be included. In the ARIES line, this decontamination step is an electrolytic process that produces a controlled uniform etch of the container surfaces. Decontamination of the 3013-96 compliant ARIES inner container is well demonstrated. Within 30 to 50 minutes electrolysis time, tixed contamination is reduced to hundreds of dpm generally occurring only at electrode contact points and welds. Removable contamination is routinely brought to non-detectable levels. The total process time for the cycle (includes electrolysis, rinse, and dry stages) is on the order of 1.5 to 2 hours per container. The ARIES inner container decontamination system highly automated and consists of a plumbing loop, electronic controls and process monitors, and a decontamination chamber or "fixture". The tixture is situated like an air lock between a contaminated and an uncontaminated section of a processing glovebox. The welded and leak tested container is placed into the fixture through a door on the contaminated side and the electrolysis process is run, including rinse and dry cycles. The container is then removed through a second door into the uncontaminated side where it is monitored for surface alpha contamination, leak checked, and reweighed.

Martinez, H.E.; Nelson, T.O.; Rivera, Y.M.; Wedman, D.E.; Weisbrod, K.R.

1999-03-03T23:59:59.000Z

266

DOE G 435.1-1 Chapter 4, Low-Level Waste Requirements  

Directives, Delegations, and Requirements

The guide provides criteria for determining which DOE radioactive wastes are to be managed as low-level waste in accordance with DOE M 435.1-1, Chapter IV.

1999-07-09T23:59:59.000Z

267

DOE G 435.1-1 Chapter 2, High-Level Waste Requirements  

Directives, Delegations, and Requirements

The guide provides the criteria for determining which DOE radioactive wastes are to be managed as high-level waste in accordance with DOE M 435.1-1.

1999-07-09T23:59:59.000Z

268

Cyber security exercises and competitions as a platform for cyber security experiments  

Science Conference Proceedings (OSTI)

This paper discusses the use of cyber security exercises and competitions to produce data valuable for security research. Cyber security exercises and competitions are primarily arranged to train participants and/or to offer competence contests for those ... Keywords: data collection, research method, security competitions, security exercises

Teodor Sommestad; Jonas Hallberg

2012-10-01T23:59:59.000Z

269

DOE/ID-Number  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL/EXT-08-13979 INL/EXT-08-13979 U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB National SCADA Test Bed Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program November 2008 November 2008 INL/EXT-08-13979 Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program November 2008 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB

270

EVALUATION OF STATE-OF-THE-ART MANIPULATORS AND REQUIREMENTS FOR DOE ROBOTICS APPLICATIONS  

Science Conference Proceedings (OSTI)

This report provides an overview of applications within the DOE complex which could benefit from the use of modular robotics technology during remediation operations. Each application area contains one or more specific tasks which are presently conducted by humans under hazardous conditions or which are deemed highly impractical, or are altogether impossible without automation. Five major areas were investigated for specific needs with respect to automation. Information was collected on Mixed Waste Operations, Contaminant Automated Analysis, Tanks, Decontamination and Dismantlement and Automated Plutonium Processing. During this investigation, information was gathered from available literature, telephone interviews with informed personnel and on-site visits. This data serves to provide design requirements and guidelines for the design of a family of modular actuators, which will be used to construct manipulators suited to each task. In addition, a survey of existing modular manipulator designs is presented. This survey addresses modular manipulators developed inside government labs and in universities for such applications as space exploration or controls research. It also addresses efforts at commercially viable industrial manipulators which have been built. This survey of robotic systems provides the reader with a glimpse into what technology currently exists in the way of modular manipulator automation and, to a degree, where this technology may be applicable or, more often, where these systems are unsuited to EM applications. From the information gathered during this study, it is possible to sufficiently define the requirements of one manipulator system which can be used to conduct automated transfer operations within Plutonium gloveboxes. This manipulator will be constructed from ARM Automation actuator modules and will provide this application with a viable option for automation within these gloveboxes. The design issues surrounding this manipulator and its specifications are discussed in the final portion of this report.

BLACK, DEREK; GRUPINSKI, STEPHEN

1998-10-08T23:59:59.000Z

271

DOE-HDBK-1139/3-2003; Chemical Management (Volume 3 of 3) Consolidated Chemical User Safety and Health Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TS TS NOT MEASUREMENT SENSITIVE DOE-HDBK-1139/3-2003 DOE HANDBOOK CHEMICAL MANAGEMENT (Volume 3 of 3) Consolidated Chemical User Safety and Health Requirements U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. September 2003 DOE-HDBK-1139/3-2003 This document has been reproduced directly from the best available copy. It is available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy, (800) 473-4375, fax: (301) 903-9823. It is available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161;

272

Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks  

E-Print Network (OSTI)

CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

Tilaro, F

2011-01-01T23:59:59.000Z

273

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Boot Camps The Cyber Boot Camp Program was developed to help make science and technology more exciting by treating students to hands-on experience and interaction with...

274

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical Systems Security for the Smart Grid...

275

Optimizing investments in cyber-security for critical infrastructure  

Science Conference Proceedings (OSTI)

Investments in the cyber-security of critical infrastructure must balance preventing intrusion, detecting a cyber-attack, and mitigating the attacker's physical effects on computer controlled equipment. For this purpose, we outline a method for making ...

Ike Patterson; James Nutaro; Glenn Allgood; Teja Kuruganti; David Fugate

2013-01-01T23:59:59.000Z

276

Submission to NIST RFI for Critical Infrastructure Cyber ...  

Science Conference Proceedings (OSTI)

... Page 2 of 3 3. The forces that govern cyber security implementation, innovation and transformation are diffuse and widely distributed. ...

2013-04-10T23:59:59.000Z

277

CyberDesign & Infrastructure for Multiscale Modeling and Simulations  

Science Conference Proceedings (OSTI)

Multiscale cyber design methodology, which usually disparate entities such as material characterization, mechanical experimentation, material design, and...

278

Small Business Cyber Security Workshop for Portland, Oregon ...  

Science Conference Proceedings (OSTI)

Page 1. Portland District Office Small Business Cyber Security Workshop Portland District Office 601 SW Second Ave. Suite ...

2013-07-24T23:59:59.000Z

279

NISTIR 7628 Volume 3, Guidelines for Smart Grid Cyber ...  

Science Conference Proceedings (OSTI)

Page 1. NISTIR 7628 Guidelines for Smart Grid Cyber Security: Vol. 3, Supportive Analyses and References The Smart ...

2012-03-01T23:59:59.000Z

280

DOE G 435.1-1 Chapter 1, General Responsibilities and Requirements  

Directives, Delegations, and Requirements

The material presented in this guide provides suggestions and acceptable ways of implementing DOE M 435.1-1 and should not be viewed as additional or mandatory ...

1999-07-09T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Security Issues and Challenges for Cyber Physical System  

Science Conference Proceedings (OSTI)

In this paper, we investigate the security challenges and issues of cyber-physical systems. (1)We abstract the general workflow of cyber physical systems, (2)identify the possible vulnerabilities, attack issues, adversaries characteristics and a set ... Keywords: Cyber-Physical System, Security, actuation, context-aware

Eric Ke Wang; Yunming Ye; Xiaofei Xu; S. M. Yiu; L. C. K. Hui; K. P. Chow

2010-12-01T23:59:59.000Z

282

DOE  

Gasoline and Diesel Fuel Update (EIA)

DOE DOE /E/A- 0202( 83//Q J Sh or t-T er m En er gy O ut lo ok a to m Quar terly Proje ction s Febru ary 1983 Ene rgy Info rma tion Adm inist ratio n Was hing ton, D.C. t rt jrt .or t lor t lor t .lor t- ior t- ior t <.o rt ort . m .er m -Te rm -Te rm -Te rm -Te rm -Te rm -Te rm -Te rm -Te rm -Te rm -Te rm -Te rm -Te rm -T erm -T erm -T erm Nrm ue rgy En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y En erg y ^n erg y Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Ou tlo ok Sh ort -T erm 1 Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm Sh ort -T erm

283

Microsoft Word - Blue Cover Report - DOE FISMA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2010 DOE/IG-0843 October 2010 Department of Energy Washington, DC 20585 October 22, 2010 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2010" BACKGROUND Federal information systems are routinely confronted with increasingly sustained cyber attacks - many of which involve targeted and serious threats - executed with varying levels of technical sophistication. The number of incidents reported by Federal agencies to the Department of Homeland Security has, in fact, increased by over 400 percent in the past 4 years. To help

284

DOE-STD-1033-92; Guide to Good Practices for Operations and Administration Updates Through Required Reading  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3-92 3-92 December 1992 CHANGE NOTICE NO.1 December 1998 DOE STANDARD GUIDE TO GOOD PRACTICES FOR OPERATIONS AND ADMINISTRATION UPDATES THROUGH REQUIRED READING U.S. Department of Energy AREA MISC Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document has been reproduced from the best available copy. Available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy, (800) 473-4375, fax: (301) 903-9823. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 605-6000. Change Notice No.1 DOE-STD-1033-92 December 1998 Guide to Good Practices for Operations and Administration Updates Through

285

Cyber Assessment Methods for SCADA Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

286

Los Alamos director echoes cyber concerns  

NLE Websites -- All DOE Office Websites (Extended Search)

Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Director Charlie McMillan told a gathering of energy executives that securing the electrical grid is a major concern now and it's only becoming more serious. May 21, 2013 Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Contact Fred deSousa

287

Control Systems Cyber Security Standards Support Activities  

Science Conference Proceedings (OSTI)

The Department of Homeland Securitys Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSPs current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

Robert Evans

2009-01-01T23:59:59.000Z

288

DOE G 414.1-4, Safety Software Guide for Use with 10 CFR 830, Subpart A, Quality Assurance Requirements, and DOE O 414.1C, Quality Assurance  

Directives, Delegations, and Requirements

This Guide provides acceptable methods for implementing the safety software quality assurance requirements of draft DOE O 414.1C, Quality Assurance. Certified ...

2005-06-17T23:59:59.000Z

289

CT-Guided Fiducial Placement for CyberKnife Stereotactic Radiosurgery: An Initial Experience  

Science Conference Proceedings (OSTI)

CyberKnife frameless image-guided radiosurgery has become a widely used system for parenchymal extracranial lesions. Gold fiducials are required for the planning and aiming of CyberKnife therapy. We report our initial experience and describe the technique of positioning tumor markers, under CT guidance. We conducted a retrospective review of 105 patients who were referred for CyberKnife stereotactic radiosurgery at Iatropolis CyberKnife Center in Athens. All patients underwent percutaneous fiducial placement via CT guidance. At the desired location, the 18-G needle was advanced into or near the tumor. Data collected included number and locations of fiducials placed and complications experienced to date. One hundred five patients underwent fiducial placement under CT guidance and a total number of 319 gold seeds were implanted. We experienced one episode of pneumothorax that required drainage, one mild pneumothorax, and three episodes of perifocal pulmonary hemorrhage. In conclusion, fiducial implantation under CT guidance appears to be a safe and efficient procedure, as long as it is performed by an experienced interventional radiologist.

Sotiropoulou, Evangelia ['Sotiria' General Hospital of Chest Diseases (Greece); Stathochristopoulou, Irene [Iatropolis CyberKnife Center (Greece); Stathopoulos, Konstantinos ['Sotiria' General Hospital of Chest Diseases (Greece); Verigos, Kosmas; Salvaras, Nikolaos [Iatropolis CyberKnife Center (Greece); Thanos, Loukas, E-mail: loutharad@yahoo.co ['Sotiria' General Hospital of Chest Diseases (Greece)

2010-06-15T23:59:59.000Z

290

Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge  

Science Conference Proceedings (OSTI)

The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

Ondrej Linda; Todd Vollmer; Milos Manic

2012-08-01T23:59:59.000Z

291

Simplifying cyber foraging for mobile devices  

Science Conference Proceedings (OSTI)

Cyber foraging is the transient and opportunistic use of compute servers bymobile devices. The short market life of such devices makes rapid modification of applications for remote execution an important problem. We describe a solution that combines ... Keywords: mobile computing, programmer productivity, rapid prototyping, retargeting applications, software engineering, user study

Rajesh Krishna Balan; Darren Gergle; Mahadev Satyanarayanan; James Herbsleb

2007-06-01T23:59:59.000Z

292

What are we teaching in cyber competitions?  

Science Conference Proceedings (OSTI)

Student competitions are widespread across all academic disciplines, and are often touted as a means to motivate and educate students. Competitions may be internal within a single class or course, or vie school against school as regional, national, or ... Keywords: Educational institutions,Computer security,Robots,Computers,Organizations,Programming,Security Education,Cyber,Competitions

Steven Fulton, Dino Schweitzer, Judson Dressler

2012-10-01T23:59:59.000Z

293

DOE O 410.1, Central Technical Authority Responsibilities Regarding Nuclear Safety Requirements  

Directives, Delegations, and Requirements

The order establishes Central Technical Authority and Chief of Nuclear Safety/Chief of Defense Nuclear Safety responsibilities and requirements directed by the ...

2007-08-28T23:59:59.000Z

294

DOE Requires Air-Con International to Cease Sales of Inefficient...  

NLE Websites -- All DOE Office Websites (Extended Search)

Civil Penalty to Air-Con, International, requiring Air-Con to cease the sale of certain air-conditioning systems in the United States and proposing a civil penalty of 231,090...

295

The NIAC Convergence of Physical and Cyber Technbologies and Related  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The NIAC Convergence of Physical and Cyber Technbologies and The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC convened the Physical/Cyber Convergence Working Group (CWG), in October 2005, to investigate the ongoing convergence of physical and cyber technologies for Supervisory Control and Data Acquisition (SCADA) and process control systems and their consolidated network management. The Working Group convened a Study Group of subject matter experts to inform its work. The Working Group report informed the NIAC's deliberations. The NIAC Convergence of Physical and Cyber Technbologies and Related

296

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

297

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber...

298

Cyber Framework NIST In Support of CIS 4-12-13  

Science Conference Proceedings (OSTI)

... April 12, 2013 Cyber Framework NIST ... Our state and local governments are on the front lines of the cyber battle every day. ...

2013-04-13T23:59:59.000Z

299

Investigating the effectiveness of many-core network processors for high performance cyber protection systems. Part I, FY2011.  

SciTech Connect

This report documents our first year efforts to address the use of many-core processors for high performance cyber protection. As the demands grow for higher bandwidth (beyond 1 Gbits/sec) on network connections, the need to provide faster and more efficient solution to cyber security grows. Fortunately, in recent years, the development of many-core network processors have seen increased interest. Prior working experiences with many-core processors have led us to investigate its effectiveness for cyber protection tools, with particular emphasis on high performance firewalls. Although advanced algorithms for smarter cyber protection of high-speed network traffic are being developed, these advanced analysis techniques require significantly more computational capabilities than static techniques. Moreover, many locations where cyber protections are deployed have limited power, space and cooling resources. This makes the use of traditionally large computing systems impractical for the front-end systems that process large network streams; hence, the drive for this study which could potentially yield a highly reconfigurable and rapidly scalable solution.

Wheeler, Kyle Bruce; Naegle, John Hunt; Wright, Brian J.; Benner, Robert E., Jr.; Shelburg, Jeffrey Scott; Pearson, David Benjamin; Johnson, Joshua Alan; Onunkwo, Uzoma A.; Zage, David John; Patel, Jay S.

2011-09-01T23:59:59.000Z

300

Enhancing NASA Cyber Security Awareness From the C-Suite ...  

Science Conference Proceedings (OSTI)

... Leadership concerns with IT security impacts ? Cyber Security Summit Full day of workshops / panel sessions on transformation of IT / IT security ...

2013-03-28T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Cyber-Enabled Materials Simulations via NanoHUB.org  

Science Conference Proceedings (OSTI)

Symposium, Integrating and Leveraging Collaborative Efforts for ICME Education . Presentation Title, Cyber-Enabled Materials Simulations via NanoHUB.org.

302

The NIAC Convergence of Physical and Cyber Technbologies and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC Convergence of Physical...

303

The Department of Energy Launches Cyber Security Initiative ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

launching an initiative to enhance cyber security on the electric grid. The initiative, led by the Department's Office of Electricity Delivery and Energy Reliability (OE), the...

304

Lab hosts multi-lab cyber security games  

NLE Websites -- All DOE Office Websites (Extended Search)

Joint Cyber Coordination Center, or JC3. The JC3 is focused on improving the national response to threats, leveraging complex resources, and sharing information to meet...

305

CYBER SECURITY AWARENESS & TRAINING Program Plan of Activity...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Publications IM-31, Policy, Guidance, and Planning Division Course Catalogue Cyber Tips Book Mark (2009 NCSA Month) Protect Your Family Brochure (Training and Awareness Materail)...

306

Cyber Security Audit and Attack Detection Toolkit: National SCADA...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and...

307

Proceedings of the Cybersecurity in Cyber-Physical Workshop ...  

Science Conference Proceedings (OSTI)

... modes of operation (such as home health setting ... temperature, pressure, and cooling/heating rates. ... other cyber-physical domains (ie oil/ natural gas ...

2013-02-14T23:59:59.000Z

308

Obama's Call for Public-Private Cyber Security Collaboration...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the...

309

NISTIR 7628 Volume 2, Guidelines for Smart Grid Cyber ...  

Science Conference Proceedings (OSTI)

... Volume 1 Smart Grid Cyber Security Strategy, Architecture, and High-Level ... Appendix F Logical Architecture and Interfaces of the Smart Grid ...

2012-03-01T23:59:59.000Z

310

NIST Finalizes Initial Set of Smart Grid Cyber Security ...  

Science Conference Proceedings (OSTI)

... guidelines is intended to facilitate organization-specific Smart Grid cyber security ... the nation's electric infrastructure to make it smarter, more efficient ...

2010-09-29T23:59:59.000Z

311

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

312

Advanced Metering Infrastructure Cyber Security Risks  

Science Conference Proceedings (OSTI)

The deployment of advanced metering infrastructure (AMI) systems is introducing millions of components to the electric grid that support two-way communication for next-generation grid applications. Although these systems can increase operational efficiencies and enable new capabilities such as demand-response, they also increase the attack surface for potential adversaries. Utilities must address these new cyber security risks as part of their overall enterprise risk management strategy. These ...

2013-12-23T23:59:59.000Z

313

DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks October 18, 2007 - 3:21pm Addthis WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These

314

Smart Grid Cyber Security Strategy and Requirements The Cyber Security Coordination Task Group  

E-Print Network (OSTI)

(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nations measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITLs responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Interagency Report discusses ITLs research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Interagency Report 7628 (draft) 236 pages (September 2009) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. Acknowledgments

Annabelle Lee Lead; Tanya Brewer; Annabelle Lee Lead; Tanya Brewer

2009-01-01T23:59:59.000Z

315

Discovering collaborative cyber attack patterns using social network analysis  

Science Conference Proceedings (OSTI)

This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle ... Keywords: collaborative attacks, degree centrality, hierarchical clustering, network security

Haitao Du; Shanchieh Jay Yang

2011-03-01T23:59:59.000Z

316

Cyber-physical energy systems: focus on smart buildings  

Science Conference Proceedings (OSTI)

Operating at the intersection of multiple sensing and control systems designed for occupant comfort, performability and operational efficiency, modern buildings represent a prototypical cyber-physical system with deeply coupled embedded sensing and networked ... Keywords: LEED, ZNEB, buildings, cyber-physical, embedded, energy management, energy metering, smart grid

Jan Kleissl; Yuvraj Agarwal

2010-06-01T23:59:59.000Z

317

Theorem-based, data-driven, cyber event detection  

Science Conference Proceedings (OSTI)

Nonlinear dynamics and graph theory may provide a theorem-based path to improve design security and aid detection of anomalous events in cyber applications. Using side-channel information such as power taken from underlying computer components and analyzing ... Keywords: cyber anomaly detection, graph theory, nonlinear dynamics, phasespace analysis, power measurement

Lee M. Hively; J. Todd McDonald

2013-01-01T23:59:59.000Z

318

Time-based intrusion detection in cyber-physical systems  

Science Conference Proceedings (OSTI)

Embedded systems, particularly real-time systems with temporal constraints, are increasingly deployed in every day life. Such systems that interact with the physical world are also referred to as cyber-physical systems (CPS). These systems commonly find ... Keywords: cyber-physical systems, real-time systems, security, timing analysis

Christopher Zimmer; Balasubramanya Bhat; Frank Mueller; Sibin Mohan

2010-04-01T23:59:59.000Z

319

Review: From wireless sensor networks towards cyber physical systems  

Science Conference Proceedings (OSTI)

In the past two decades, a lot of research activities have been dedicated to the fields of mobile ad hoc network (MANET) and wireless sensor networks (WSN). More recently, the cyber physical system (CPS) has emerged as a promising direction to enrich ... Keywords: Cyber physical system, Internet technology, Mobile ad hoc network, Pervasive computing, Sensing and actuation, Wireless sensor network

Fang-Jing Wu; Yu-Fen Kao; Yu-Chee Tseng

2011-08-01T23:59:59.000Z

320

Cyber-Terrorism and Ethical Journalism: A Need for Rationalism  

Science Conference Proceedings (OSTI)

Terrorism has been a constant threat in traditional and contemporary societies. Recently, it has been converged with new media technology and cyberspace, resulting in the modern tactic, cyber-terrorism, which has become most effective in achieving terrorist ... Keywords: Computer Security, Cyber-Terrorism, Decision-Making, Ethics, Game Theory, Journalism, Rationality

Mahmoud Eid

2010-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Embedded Cyber-Physical Anomaly Detection in Smart Meters  

E-Print Network (OSTI)

Embedded Cyber-Physical Anomaly Detection in Smart Meters Massimiliano Raciti, Simin Nadjm vulnerabilities that arise from deployment of local cyber-physical attacks at a smart metering location at destabilisation. In this paper we study a smart metering device that uses a trusted platform for storage

322

Deception used for Cyber Defense of Control Systems  

Science Conference Proceedings (OSTI)

Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

Wayne F. Boyer; Miles A. McQueen

2009-05-01T23:59:59.000Z

323

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

324

Cyber Effects Analysis Using VCSE Promoting Control System Reliability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Effects Analysis Using VCSE Promoting Control System Cyber Effects Analysis Using VCSE Promoting Control System Reliability Cyber Effects Analysis Using VCSE Promoting Control System Reliability This report describes the Virtual Control System Environment (VCSE) technology- developed at Sandia National Laboratories-to investigate Supervisory Control And Data Acquisition (SCADA) vulnerabilities associated with energy systems; and it describes a set of experiments with findings from using that environment. The report explains how VCSE can be used to analyze and develop an understanding of cyber attacks. Specific analyses in this report focus on unencrypted, unsecured data channels on Internet protocol (IP)-routed computer networks within electric power systems. Cyber Effects Analysis Using VCSE Promoting Control System Reliability

325

NCSec: a national cyber security referential for the development of a code of practice in national cyber security management  

Science Conference Proceedings (OSTI)

Governments worldwide have faced computer security challenges. These challenges are serious in a context where there is an absence of appropriate organizational and institutional structures to deal with incidents. But more important which agency or agencies ... Keywords: ISO27002, cyber criminality, cyber security, organizational structure, referential

Mohamed Dafir Ech-cherif el Kettani; Taieb Debbagh

2008-12-01T23:59:59.000Z

326

A proliferation resistant hexagonal tight lattice BWR fueled core for increased burnup and reduced fuel storage requirements. Annual progress report: August, 1999 to July, 2000 [DOE NERI  

Science Conference Proceedings (OSTI)

(OAK/B204) A proliferation resistant hexagonal tight lattice BWR fueled core for increased burnup and reduced fuel storage requirements. Annual progress report: August, 1999 to July, 2000 [DOE NERI

Hiroshi Takahashi; Upendra Rohatgi; T.J. Downar

2000-08-04T23:59:59.000Z

327

JM to Revise DOE O 470.5, Notice of Intent to Revise DOE O 470.5, Integrating Existing Technical Security Program Requirements  

Directives, Delegations, and Requirements

This memorandum provides justification for the development of one integrated and consolidated set of req uirements for the Department of Energy (DOE) Technical ...

2013-08-21T23:59:59.000Z

328

DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to Provide Nearly $8 Million to Safeguard the Nation's Energy to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks More Documents & Publications "Cybersecurity for State Regulators" - NARUC Primer (June 2012)

329

CyberGIS software: a synthetic review and integration roadmap  

Science Conference Proceedings (OSTI)

CyberGIS defined as cyberinfrastructure-based geographic information systems (GIS) has emerged as a new generation of GIS representing an important research direction for both cyberinfrastructure and geographic information science. This study introduces a 5-year effort funded by the US National Science Foundation to advance the science and applications of CyberGIS, particularly for enabling the analysis of big spatial data, computationally intensive spatial analysis and modeling (SAM), and collaborative geospatial problem-solving and decision-making, simultaneously conducted by a large number of users. Several fundamental research questions are raised and addressed while a set of CyberGIS challenges and opportunities are identified from scientific perspectives. The study reviews several key CyberGIS software tools that are used to elucidate a vision and roadmap for CyberGIS software research. The roadmap focuses on software integration and synthesis of cyberinfrastructure, GIS, and SAM by defining several key integration dimensions and strategies. CyberGIS, based on this holistic integration roadmap, exhibits the following key characteristics: high-performance and scalable, open and distributed, collaborative, service-oriented, user-centric, and community-driven. As a major result of the roadmap, two key CyberGIS modalities gateway and toolkit combined with a community-driven and participatory approach have laid a solid foundation to achieve scientific breakthroughs across many geospatial communities that would be otherwise impossible.

Wang, Shaowen [University of Illinois, Urbana-Champaign; Anselin, Luc [Arizona State University; Bhaduri, Budhendra L [ORNL; Cosby, Christopher [University Navstar Consortium, Boulder, CO; Goodchild, Michael [University of California, Santa Barbara; Liu, Yan [University of Illinois, Urbana-Champaign; Nygers, Timothy L. [University of Washington, Seattle

2013-01-01T23:59:59.000Z

330

Cyber Security in Smart Grid Substations  

E-Print Network (OSTI)

Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands, and the cyber security of substations in particular. The focus of this study is the perception of risks and threats in smart grid cyber security and the international standards implemented in smart grids. The created overview is based on semi-structured interviews with 13 experts originating from eight different European countries. These participants are employed at electricity producers, grid operators, technology consultants and technology providers in the utilities sector. Their expertise ranges from information security to electricity grids, specifically smart grid security. Some of them are members of smart grid security related standard committees. The key results of the state of practice are the following: 1. The interconnectivity of the smart grid with multiple stakeholders and European colleagues is indicated as the biggest threat to the security of the smart grid. 2. Another often mentioned threat is awareness. The experts generally indicate that awareness within top management is high. However, personnel on lower levels are reluctant to incorporate security in their processes. 3. All organizations are in a certain stage of implementing standards, the ISO27000 series

Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schnbeck; Sjaak Brinkkemper; Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schnbeck; Sjaak Brinkkemper

2012-01-01T23:59:59.000Z

331

Primer Control System Cyber Security Framework and Technical Metrics  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

332

Cyber Security Incidents, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Reporting Computing Security Incidents Reporting Computing Security Incidents Incident Reporting Hotline: 631-344-8484 Security Incidents A computer security incident can range from a simple virus to the disclosure of sensitive information. Incidents can be minor, important, or significant. Incidents that must be reported include computer or network related activity, internal or external to the Laboratory, that may impact the Laboratory's mission. Examples of such activities include: the possibility of: loss of data; denial of services; compromise of computer security; unauthorized access to data that the Laboratory is required to control by law, regulation, or DOE orders; investigative activity by legal, law enforcement, bureaucratic, or political authorities; or a public relations embarrassment.

333

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeking Comments on Consolidated IT and Cyber Security Support Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

334

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NNSA Seeking Comments on Consolidated IT and Cyber Security Support NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

335

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

336

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

337

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

with the CCD have created a reputation on college campuses of Sandia as leader in cyber security. Interactions between the diverse group of students in the CCD has cultivated...

338

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

Us Screen reader users: click here for plain HTML Go to Google Maps Home The Center for Cyber Defenders Loading... Still loading... Slow? Use the troubleshooting guide or basic...

339

CYBER SECURITY AWARENESS & TRAINING Program Plan of Activity...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

III. Theme The theme for the 2009 Summer Takin' It to the Streets awareness event is "Shape Up...Get Cyber Fit." 3 7222009 Last update: 5312011 IV. Audience The intended...

340

Towards A Network-of-Networks Framework for Cyber Security  

Science Conference Proceedings (OSTI)

Networks-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in this paper we build towards a three-layer NoN model for an enterprise cyber system. Each layer captures a different facet of a cyber system. We then discuss the potential benefits of graph-theoretic analysis enabled from such a model. Our goal is to provide a novel and powerful tool for modeling and analyzing problems in cyber security.

Halappanavar, Mahantesh; Choudhury, Sutanay; Hogan, Emilie A.; Hui, Peter SY; Johnson, John R.; Ray, Indrajit; Holder, Lawrence B.

2013-06-07T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC is offering a free, public webinar series from January to May 2012 entitled "Issues in Designing the...

342

UPBOT: a testbed for cyber-physical systems  

Science Conference Proceedings (OSTI)

Developing software for cyber-physical systems presents a unique challenge. These systems are not simply software; they are composed of software running on a collection of machines that present a risk to human safety if anything goes wrong. Researchers ...

Tanya L. Crenshaw; Steven Beyer

2010-08-01T23:59:59.000Z

343

Microsoft Word - Cyber Security Strat Plan final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

R R A A T T E E G G I I C C P P L L A A N N FEBRUARY 12, 2007 CYBER SECURITY STRATEGIC PLAN VERSION 1.0 2 Table of Contents INTRODUCTION ......

344

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

345

DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 Million to Safeguard the Nation's Energy 8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks October 18, 2007 - 3:21pm Addthis WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These

346

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-12-20T23:59:59.000Z

347

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-10-01T23:59:59.000Z

348

Cyber Security Strategy Guidance for the Electric Sector  

Science Conference Proceedings (OSTI)

Smart grid technologies are introducing millions of new intelligent components to the electric grid that communicate in much more advanced ways (two-way communication, dynamic optimization, and wired and wireless communications) than in the past. Cyber security is important because the bi-directional flow of two-way communication and the control capabilities in the smart grid will enable an array of new functionalities and applications. Two areas of critical importance for the smart grid are cyber securi...

2012-05-30T23:59:59.000Z

349

DOE Testing Reveals Samsung Refrigerator Does Not Meet Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Testing Reveals Samsung Refrigerator Does Not Meet Energy Star Requirements DOE Testing Reveals Samsung Refrigerator Does Not Meet Energy Star Requirements March 16, 2010 - 4:28pm...

350

Response to Request for Additional Information regarding Request for Approval of the Cyber Security Plan San Onofre Nuclear Generating Station, Units 2 and 3  

E-Print Network (OSTI)

By letter dated July 22, 2010 (Reference) Southern California Edison submitted a license amendment request for approval of the Cyber Security Plan for San Onofre Nuclear Generating Station (SONGS) in accordance with 10 CFR 73.54. The purpose of this license amendment was to provide an Implementation Schedule, provide a table of SONGS deviations from NEI 08-09 Revision 6, and add a sentence to the existing Facilities Operating Licenses (FOL) license condition for Physical Security to require SCE to fully implement and maintain in effect all provisions of the Commission approved Cyber Security Plan. By e-mail dated March 1, 2011, the NRC requested additional information through three generic questions developed by the NRC staff following discussions with the Nuclear Energy Institute and the industry Cyber Security Task Force. Responses to the NRC request for additional information are provided in the Enclosure to this letter.

Southern Edison; Douglas R. Bauder

2011-01-01T23:59:59.000Z

351

Experiences and Challenges with Using Cert Data to Analyze International Cyber Security  

E-Print Network (OSTI)

With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The ...

Madnick, Stuart

352

Risk-Informed Safety Requirements for H2 Codes and Standards Development - DOE Hydrogen and Fuel Cells Program FY 2012 Annual Progress Report  

NLE Websites -- All DOE Office Websites (Extended Search)

5 5 FY 2012 Annual Progress Report DOE Hydrogen and Fuel Cells Program Aaron Harris (Primary Contact), Jeffrey LaChance, Katrina Groth Sandia National Laboratories P.O. Box 969 Livermore, CA 94551-0969 Phone: (925) 294-4530 Email: apharri@sandia.gov DOE Manager HQ: Antonio Ruiz Phone: (202) 586-0729 Email: Antonio.Ruiz@ee.doe.gov Project Start Date: October 1, 2003 Project End Date: Project continuation and direction determined annually by DOE Fiscal Year (FY) 2012 Objectives Present results of indoor refueling risk assessment to the * National Fire Protection Association (NFPA) 2 Fueling Working Group. Perform and document required risk assessment (with * input from NFPA 2 and others) for developing science- based risk-informed codes and standards for indoor

353

Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry  

SciTech Connect

This document contains introductory material that discusses cyber security challenges in using cloud computing in the electric utility industry.

Akyol, Bora A.

2012-09-01T23:59:59.000Z

354

Advanced Metering Infrastructure (AMI) System Security Requirements  

Science Conference Proceedings (OSTI)

This report identifies key cyber security requirements and suggests basic security approaches for safeguarding the many interfaces of Advanced Metering Infrastructure (AMI) systems. These requirements, which were developed through a clearly defined security assessment procedure, are generic; but they can be used to develop more specific security requirements based on actual configurations and environments.

2009-12-21T23:59:59.000Z

355

OIA: Office of Contract Assurance: Assurance Systems: Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

with applicable Federal, State and local regulations and the US Department of Energy (DOE) orders and requirements. It is the intent of LBNL to establish a culture and work...

356

Cumulative strategic capability and performance of early movers and followers in the cyber market  

Science Conference Proceedings (OSTI)

Today, the cyber market is evolving rapidly in the networked age. In the cyber market, the traditional competitive strategy appears to no longer be effective. This study investigates the strategic choice differences of online firms based on their strategic ... Keywords: Cyber market, Early mover, Follower, Porter's generic strategies, Sand Cone model

Sang-Gun Lee; Chulmo Koo; Kichan Nam

2010-06-01T23:59:59.000Z

357

On the impact of physical-cyber world interactions during unexpected events  

Science Conference Proceedings (OSTI)

Physical world events have a strong and direct impact on the communication activity seen in the cyber world. In this paper, we present three physical world events where we conducted passive network traffic measurements to study the interaction between ... Keywords: cyber world behavior, cyber-physical world interactions, emergency response, high network traffic deviation, non-invasive network measurement, unexpected events, wireless mesh networks

B. S. Manoj; Bheemarjuna Reddy Tamma; Ramesh R. Rao

2011-12-01T23:59:59.000Z

358

Microsoft PowerPoint - DOE-RL Hanford Metrics Presentation.pptx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

from the Field: from the Field: Implementing Cyber Security Metrics that Work Rick Grandy & Gregg Serene Cyber Security MSA/Lockheed Martin DOE Hanford Site "To make our customers extraordinarily successful in our unified mission of cleaning up the Hanford cleaning up the Hanford Site..." Hanford Site Scope - 586 square miles - 9 000+ PCs 9,000+ PCs - 500+ servers - 400+ applications - 1 000+ miles fiber to 300 bldgs 1,000+ miles fiber to 300 bldgs - 12,500+ phones 2 Why Metrics? * How do you know if you're How do you know if you re doing well in school? * How do you know if an athlete is performing well? p g * How do you know if you're o do you o you e healthy? - Weight, Blood Pressure 3 Why Metrics? * Does a FISMA Score of "A" mean... - The cyber program is more effective? - The cyber program is more efficient?

359

or are "Cyberspace " and "Cyber Space " the same?  

E-Print Network (OSTI)

This project has at least two facets to it: (1) advancing the algorithms in the sub-field of bibliometrics often referred to as "text mining " whereby hundreds of thousands of documents (such as journal articles) are scanned and relationships amongst words and phrases are established and (2) applying these tools in support of the Explorations in Cyber International Relations (ECIR) research effort. In international relations, it is important that all the parties understand each other. Although dictionaries, glossaries, and other sources tell you what words/phrases are supposed to mean (somewhat complicated by the fact that they often contradict each other), they do not tell you how people are actually using them. As an example, when we started, we assumed that "cyberspace " and "cyber space " were essentially the same word with just a minor variation in punctuation (i.e., the space, or lack thereof, between "cyber " and "space") and that the choice of the punctuation was a rather random occurrence. With that assumption in mind, we would expect that the taxonomies that would be constructed by our algorithms using "cyberspace " and "cyber space " as seed terms would be basically the same. As it turned out, they were quite different, both in overall shape and groupings within the taxonomy. Since the overall field of cyber international relations is so new, understanding the field and how people think about (as evidenced by their actual usage of terminology, and how usage changes over time) is an important goal as part of the overall ECIR project. 1.

Steven Camia; Stuart Madnick; Nazli Choucri; Wei Lee Woon; Steven Camia; Wei Lee Woon

2011-01-01T23:59:59.000Z

360

Cyber Security Testing and Training Programs for Industrial Control Systems  

DOE Green Energy (OSTI)

Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

Daniel Noyes

2012-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

ANNUAL HEATING AND COOLING REQUIREMENTS AND DESIGN DAY PERFORMANCE FOR A RESIDENTIAL MODEL IN SIX CLIMATES: A COMPARISON OF NBSLD, BLAST 2, AND DOE-2.1  

E-Print Network (OSTI)

DOE-2 (SWF)3 DOE-2 (I ') 3 . PHOENIX NBSLD BLAST DOE-2 (S~JF) 3 DOE-2 (CWF)3TAMPA NBSLD BLAST DOE-2 DOE-2 (I Feb YJ.8.r o. o. o. o. O.

Carroll, William L.

2011-01-01T23:59:59.000Z

362

Evaluation Report on "The Department's Unclassified Cyber Security Program"  

SciTech Connect

Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing discl

2009-10-01T23:59:59.000Z

363

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

364

A Cyber-Physical Experimentation Environment for the Security Analysis  

E-Print Network (OSTI)

Although many studies address the security of Networked Industrial Control Systems (NICS), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these systems. This paper presents an innovative framework for an experimentation environment that can reproduce concurrently physical and cyber systems. The proposed approach uses an emulation testbed based on Emulab to recreate cyber components and a real-time simulator, based on Simulink, to recreate physical processes. The main novelty of the proposed framework is that it provides a set of experimental capabilities that are missing from other approaches, e.g. safe experimentation with real malware, flexibility to use different physical processes. The feasibility of the approach is confirmed by the development of a fully functional prototype, while its applicability is proven through two case studies of industrial systems from the electrical and chemical domain.

Bla Genge; Christos Siaterlis; Igor Nai Fovino; Marcelo Masera

2012-01-01T23:59:59.000Z

365

Human dimensions in cyber operations research and development priorities.  

SciTech Connect

Within cyber security, the human element represents one of the greatest untapped opportunities for increasing the effectiveness of network defenses. However, there has been little research to understand the human dimension in cyber operations. To better understand the needs and priorities for research and development to address these issues, a workshop was conducted August 28-29, 2012 in Washington DC. A synthesis was developed that captured the key issues and associated research questions. Research and development needs were identified that fell into three parallel paths: (1) human factors analysis and scientific studies to establish foundational knowledge concerning factors underlying the performance of cyber defenders; (2) development of models that capture key processes that mediate interactions between defenders, users, adversaries and the public; and (3) development of a multi-purpose test environment for conducting controlled experiments that enables systems and human performance measurement. These research and development investments would transform cyber operations from an art to a science, enabling systems solutions to be engineered to address a range of situations. Organizations would be able to move beyond the current state where key decisions (e.g. personnel assignment) are made on a largely ad hoc basis to a state in which there exist institutionalized processes for assuring the right people are doing the right jobs in the right way. These developments lay the groundwork for emergence of a professional class of cyber defenders with defined roles and career progressions, with higher levels of personnel commitment and retention. Finally, the operational impact would be evident in improved performance, accompanied by a shift to a more proactive response in which defenders have the capacity to exert greater control over the cyber battlespace.

Forsythe, James Chris; Silva, Austin Ray; Stevens-Adams, Susan Marie; Bradshaw, Jeffrey [Institute for Human and Machine Cognition] Institute for Human and Machine Cognition

2012-11-01T23:59:59.000Z

366

The Department's Unclassified Cyber Security Program 2002, IG-0567  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT'S UNCLASSIFIED DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security

367

The Magellan Final Report on Cloud Computing  

E-Print Network (OSTI)

In order to meet DOE requirements, these features would needthrough the lens of DOE security requirements and report onscience? Can DOE cyber security requirements be met within a

Coghlan, Susan

2013-01-01T23:59:59.000Z

368

The development of cyber security warning, advice and report points  

Science Conference Proceedings (OSTI)

The threat to electronic information systems increasingly has origins in organised crime or nation-state sponsored or supported activity. Any successful cyber security programme relies upon the sharing of information. How this is achieved is a question ... Keywords: information sharing, security information, warning advice and reporting points

Tony Proctor

2012-10-01T23:59:59.000Z

369

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

This project provides ongoing updates on the status of research and development activities, federal and state policy and regulatory proposals, standards and guidance document development, key personnel, and organizations that are funding or executing smart grid cyber security and privacy activities.

2012-04-17T23:59:59.000Z

370

Overcoming performance collapse for 100Gbps cyber security  

Science Conference Proceedings (OSTI)

In this paper, we present a series of performance tests carried out on R-Scope Dominate-T (RDT), a 1U network security appliance configured with four Tilera Gx-36 processors and with an aggregated network IO capacity of 160Gbps. RDT is optimized with ... Keywords: cyber-security

Jordi Ros-Giralt; Bob Rotsted; Alan Commike

2013-06-01T23:59:59.000Z

371

Survey Cyber security in the Smart Grid: Survey and challenges  

Science Conference Proceedings (OSTI)

The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, ... Keywords: Attacks and countermeasures, Cryptography, Cyber security, Security protocols, Smart Grid

Wenye Wang; Zhuo Lu

2013-04-01T23:59:59.000Z

372

Ideal based cyber security technical metrics for control systems  

Science Conference Proceedings (OSTI)

Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provide the basis for management decisions that affect the protection of the ... Keywords: control system security, cyber security metrics

Wayne Boyer; Miles McQueen

2007-10-01T23:59:59.000Z

373

Cyber-sustainability: leaving a lasting legacy of human wellbeing  

Science Conference Proceedings (OSTI)

This paper presents a case for the importance of sustainability in HCI as it relates to the Web. So far, the discussion about sustainability in HCI has focused on environmental aspects. However, our belief is that cyber-sustainability is much greater ... Keywords: cyberspace, design, environment, sustainability, wellbeing, worldview

Bran Richards; Stuart Walker; Lynne Blair

2011-07-01T23:59:59.000Z

374

Cyber-physical systems for next generation intelligent buildings  

Science Conference Proceedings (OSTI)

The proliferation of the smart grid creates new opportunities for large buildings to act as smart end-points that provide mutually beneficial services for building occupants and the grid. In this article we describe how Cyber-Physical systems that provide ...

Andreas Savvides; Ioannis Paschalidis; Michael Caramanis

2011-06-01T23:59:59.000Z

375

The Cyber Threat to National Critical Infrastructures: Beyond Theory  

Science Conference Proceedings (OSTI)

Adversary threats to critical infrastructures have always existed during times of conflict, but threat scenarios now include peacetime attacks from anonymous computer hackers. Current events, including examples from Israel and Estonia, prove that a certain ... Keywords: Estonia, business continuity and disaster recover planning, critical, cyber, infrastructure, security architecture and design, telecommunications and network security threat

Kenneth Geers

2009-01-01T23:59:59.000Z

376

Cyber-Physical Systems Security for Smart Grid  

E-Print Network (OSTI)

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy, mitigation, and resilience ­ is among the most important R&D needs for the emerging smart grid. One

377

Cyber-Physical Systems Security for Smart Grid  

E-Print Network (OSTI)

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy important R&D needs for the emerging smart grid. One of the overarching goals of the future research

378

Cyber Criminals on the Internet Super Highways: A Technical Investigation of Different Shades and Colours within the Nigerian Cyber Space  

Science Conference Proceedings (OSTI)

The internet has impacted the lives of individuals, organisations, and governments all over the world. However, it is now viewed and adopted with caution due mainly to the criminal tendencies of some misguided elements within the society. The internet ... Keywords: Cyber Crimes, E-Mails, Internet, Nigeria, Stakeholders

Edwin Agwu

2013-04-01T23:59:59.000Z

379

T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security  

Science Conference Proceedings (OSTI)

Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

2009-07-20T23:59:59.000Z

380

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE))

The SSCS RM is a tool that assists the DOE federal project review teams in evaluating the technical sufficiency of the project SSCS activities at CD-0 through CD-4.

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

382

Comparison and Analysis of Regulatory and Derived Requirements for Certain DOE Spent Nuclear Fuel Shipments; Lessons Learned for Future Spent Fuel Transportation Campaigns  

Science Conference Proceedings (OSTI)

Radioactive materials transportation is stringently regulated by the Department of Transportation and the Nuclear Regulatory Commission to protect the public and the environment. As a Federal agency, however, the U.S. Department of Energy (DOE) must seek State, Tribal and local input on safety issues for certain transportation activities. This interaction has invariably resulted in the imposition of extra-regulatory requirements, greatly increasing transportation costs and delaying schedules while not significantly enhancing the level of safety. This paper discusses the results an analysis of the regulatory and negotiated requirements established for a July 1998 shipment of spent nuclear fuel from foreign countries through the west coast to the Idaho National Engineering and Environmental Laboratory (INEEL). Staff from the INEEL Nuclear Materials Engineering and Disposition Department undertook the analysis in partnership with HMTC, to discover if there were instances where requirements derived from stakeholder interactions duplicate, contradict, or otherwise overlap with regulatory requirements. The study exhaustively lists and classifies applicable Department of Transportation (DOT) and Nuclear Regulatory Commission (NRC) regulations. These are then compared with a similarly classified list of requirements from the Environmental Impact Statements (EIS) and those developed during stakeholder negotiations. Comparison and analysis reveals numerous attempts to reduce transportation risk by imposing more stringent safety measures than those required by DOT and NRC. These usually took the form of additional inspection, notification and planning requirements. There are also many instances of overlap with, and duplication of regulations. Participants will gain a greater appreciation for the need to understand the risk-oriented basis of the radioactive materials regulations and their effectiveness in ensuring safety when negotiating extra-regulatory requirements.

Kramer, George L., Ph.D.; Fawcett, Rick L.; Rieke, Philip C.

2003-02-27T23:59:59.000Z

383

Cyber-Enabled Ab Initio Simulations in Nanohub.org: Simulation ...  

Science Conference Proceedings (OSTI)

This presentation describes recent progress in cyber-enabling ab initio codes and in the development and deployment of supporting material and learning...

384

Agenda for the Designed-in Cybersecurity for Cyber-Physical ...  

Science Conference Proceedings (OSTI)

Page 1. Designed-in Cybersecurity for Cyber-Physical Systems Workshop Thursday, April 4, 2013 8:00 Breakfast 9:00 Plenary ...

2013-04-03T23:59:59.000Z

385

Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation.  

E-Print Network (OSTI)

??While smart grid technologies are deployed to help achieve improved grid resiliency and efficiency, they also present an increased dependency on cyber resources which may (more)

Hahn, Adam

2013-01-01T23:59:59.000Z

386

Wireless Policy, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

387

Data Diodes in Support of Trustworthy Cyber Infrastructure  

SciTech Connect

Interconnections between process control networks and en- terprise networks has resulted in the proliferation of stan- dard communication protocols in industrial control systems which exposes instrumentation, control systems, and the critical infrastructure components they operate to a variety of cyber attacks. Various standards and technologies have been proposed to protect industrial control systems against cyber attacks and to provide them with confidentiality, in- tegrity, and availability. Among these technologies, data diodes provide protection of critical systems by the means of physically enforcing traffic direction on the network. In order to deploy data diodes effectively, it is imperative to un- derstand the protection they provide, the protection they do not provide, their limitations, and their place in the larger security infrastructure. In this work, we briefly review the security challenges in an industrial control system, study data diodes, their functionalities and limitations, and pro- pose a scheme for their effective deployment in trusted pro- cess control networks (TPCNs.)

Sheldon, Frederick T [ORNL; Okhravi, Hamed [ORNL

2010-01-01T23:59:59.000Z

388

Cyber Security and Privacy Industry Tracking Newsletter, April 2012  

Science Conference Proceedings (OSTI)

EPRIs tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-04-11T23:59:59.000Z

389

Cyber Security and Privacy Industry Tracking Newsletter, April, 2013  

Science Conference Proceedings (OSTI)

EPRIs tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-03-26T23:59:59.000Z

390

Cyber Security and Privacy Industry Tracking Newsletter, July 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-06-25T23:59:59.000Z

391

Cyber Security and Privacy Industry Tracking Newsletter: December 2012  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute (EPRI) remains committed to supporting the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts, EPRI works diligently to stay abreast of the present state of standards and guideline developments, as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups and insights into future activities.This ...

2012-12-28T23:59:59.000Z

392

Cyber Security and Privacy Industry Tracking Newsletter, October 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-10-11T23:59:59.000Z

393

Cyber Security and Privacy Industry Tracking Newsletter, October 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-09-26T23:59:59.000Z

394

Cyber Security and Privacy Industry Tracking Newsletter, July 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-07-02T23:59:59.000Z

395

A Comparison of Cross-Sector Cyber Security Standards  

Science Conference Proceedings (OSTI)

This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

Robert P. Evans

2005-09-01T23:59:59.000Z

396

Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues  

SciTech Connect

This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nations current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

Wayne F. Boyer; Scott A. McBride

2009-04-01T23:59:59.000Z

397

GridStat Cyber Security and Regional Deployment Project Report  

Science Conference Proceedings (OSTI)

GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStats cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

Clements, Samuel L.

2009-02-18T23:59:59.000Z

398

Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements  

E-Print Network (OSTI)

Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nations measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology (IT). ITLs responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in federal computer systems. This National Institute of Standards and Technology Interagency Report (NISTIR) discusses ITLs research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Interagency Report 7628, vol. 1 289 pages (August 2010) Certain commercial entities, equipment, or materials may be identified in this report in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply

The Smart; Grid Interoperability

2010-01-01T23:59:59.000Z

399

Chinese Attack Tools: Chinese cyber-attack tools continue to evolve  

Science Conference Proceedings (OSTI)

Cyber-attacks from China are on the rise. In September 2008, SecureWorks, a leading security services provider, published a report citing the locations of the computers from which the greatest number of cyber attacks were attempted against its clients. ...

Dennis Dwyer

2009-04-01T23:59:59.000Z

400

Virtual Queue Based Distributed Data Traffic Scheduling for Cyber Physical Systems with Application in Smart Grid  

Science Conference Proceedings (OSTI)

Communication is needed in cyber physical system (CPS) to convey information from sensors to controllers. In this paper, a wireless network is considered to serve as the communication infrastructure in CPS. The data traffic scheduling problem is studied ... Keywords: Kalman filtering, cyber physical system, scheduling

Husheng Li

2012-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Modeling Effects of Physical Factors on Controller Area Network in Cyber-physical Systems  

Science Conference Proceedings (OSTI)

Cyber-physical systems (CPS) are becoming a promising research field to integrate the computing components, the physical processes, and the communication networks. A primary challenge in designing CPS is to understand the effect of physical factors on ... Keywords: Cyber-physical systems (CPS), Controller Area Network (CAN), performance analysis, temperature, electromagnetic interference

Bo Shen, Xingshe Zhou, Ru Wang

2013-08-01T23:59:59.000Z

402

Routing in Cyber Physical Systems with Application for Voltage Control in Microgrids: A Hybrid System Approach  

Science Conference Proceedings (OSTI)

A key challenge of cyber physical system is how to design the communication system. In this paper, the framework of hybrid system which consists of both continuous and discrete system states is adopted for the communication system design, particularly ... Keywords: cyber physical system, hybrid systems, routing

Husheng Li; Robert C. Qiu; Zhiqiang Wu

2012-06-01T23:59:59.000Z

403

Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems  

Science Conference Proceedings (OSTI)

This volume contains the papers presented at the Fourth IEEE/ACM International Conference on Cyber-Physical Systems (ICCPS 2013), which was held with the Cyber- Physical Systems Week in Philadelphia, USA, on 8-11 April 2013. ICCPS has been the flagship ...

Chenyang Lu, P. R. Kumar, R. Stoleru

2013-04-01T23:59:59.000Z

404

Cybercrime and cyber-security issues associated with China: some economic and institutional considerations  

Science Conference Proceedings (OSTI)

China is linked to cybercrimes of diverse types, scales, motivations and objectives. The Chinese cyberspace thus provides an interesting setting for the study of cybercrimes. In this paper, we first develop typology, classification and characterization ... Keywords: China, Cyber-security, Cyber-security related alliances, Cybercrime, International relations, International trade, Intrinsic and extrinsic motivations

Nir Kshetri

2013-03-01T23:59:59.000Z

405

Toward a cyber-physical topology language: applications to NERC CIP audit  

Science Conference Proceedings (OSTI)

Our Cyber-Physical Topology Language (CPTL) provides a language that utilities can use to programmatically analyze current and future cyber-physical architectures. The motivation for our research emerged from the importance and limitations of several ... Keywords: NERC CIP, audit, graph theory

Gabriel A. Weaver, Carmen Cheh, Edmond J. Rogers, William H. Sanders, Dennis Gammel

2013-11-01T23:59:59.000Z

406

Integrating CyberGIS gateway with Windows Azure: a case study on MODFLOW groundwater simulation  

Science Conference Proceedings (OSTI)

The CyberGIS Gateway represents a cutting-edge cyberin-frastructure-based geographic information system that facilitates computationally intensive and collaborative spatial analysis and modeling. As more and more geospatial problems are becoming increasingly ... Keywords: CyberGIS, MODFLOW, Windows Azure, cloud computing, science gateway

Babak Behzad; Anand Padmanabhan; Yong Liu; Yan Liu; Shaowen Wang

2011-11-01T23:59:59.000Z

407

Survey Paper Cyber security in the Smart Grid: Survey and challenges q  

E-Print Network (OSTI)

Survey Paper Cyber security in the Smart Grid: Survey and challenges q Wenye Wang , Zhuo Lu Accepted 29 December 2012 Available online 17 January 2013 Keywords: Smart Grid Cyber security Attacks and countermeasures Cryptography Security protocols a b s t r a c t The Smart Grid, generally referred to as the next

Wang, Wenye

408

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network (OSTI)

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

Krings, Axel W.

409

Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse  

SciTech Connect

The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

Czejdo, Bogdan [ORNL; Ferragut, Erik M [ORNL; Goodall, John R [ORNL; Laska, Jason A [ORNL

2012-01-01T23:59:59.000Z

410

Cyber Science and Security - An R&D Partnership at LLNL  

Science Conference Proceedings (OSTI)

Lawrence Livermore National Laboratory has established a mechanism for partnership that integrates the high-performance computing capabilities of the National Labs, the network and cyber technology expertise of leading information technology companies, and the long-term research vision of leading academic cyber programs. The Cyber Science and Security Center is designed to be a working partnership among Laboratory, Industrial, and Academic institutions, and provides all three with a shared R&D environment, technical information sharing, sophisticated high-performance computing facilities, and data resources for the partner institutions and sponsors. The CSSC model is an institution where partner organizations can work singly or in groups on the most pressing problems of cyber security, where shared vision and mutual leveraging of expertise and facilities can produce results and tools at the cutting edge of cyber science.

Brase, J; Henson, V

2011-03-11T23:59:59.000Z

411

Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research: Energy Infrastructure Cyber Protection  

Science Conference Proceedings (OSTI)

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Protecting and trusting information is not unique to the grid. Indeed, the information security market is worth tens of billions of dollars, almost exclusively in cyber security products and services. Yet, solutions designed for the Internet are often not appropriate for securing the energy grid, which has a different set of priorities and communication needs. Any viable information security solution must address those unique challenges and features. The discussion at the CSIIR Workshop was primarily focused about the Energy Infrastructure Cyber Protection (ENCyP) Initiative. ENCyP is a multidisciplinary strategic theme oriented on cyber protection for the most critical and most vulnerable components of Energy Delivery System (EDS). The initiative derived from ORNL's focus on energy and cyber-physical defenses. On this basis we received just over 100 submissions stemming from both novel theoretical and empirical research focused on the many different aspects of ENCyP. We encouraged the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the evolving context ENCyP. Topics included: Security assurance/interoperability for Energy Delivery Systems (EDS) Scalable/trusted control (cyber-physical) systems security Visual analytics for cyber security Next generation control systems vulnerability assessment Wireless Smart Grid security SCADA, EDS communications security test beds Use cases and attack scenarios for EDS Wide area monitoring, protection & control AMI, demand-response, distribution grid management security Electric transportation & distributed energy resources security Policy/standards driven architectures for EDS Anti-tamper device architectures Cryptographic key management for EDS Security risk assessment and management for EDS Insider and life-cycle threats Automated vulnerability detection Access control management and authentication services for EDS Secure information exchange gateway & watchdog switches Bio-Inspired technologies for enhancing EDS cybersecurity A principle goal of the workshop was to foster discussions and dialog among the 210 registered attendees from North and South America, Europe, Asia, and Africa. This goal was initiated and facilitated by 8 plenary keynote addresses including our banquet and reception speakers. There were also six invited speakers, including two panels of government and national laboratory representatives. A total of one hundred and three papers (i.e., extended abstracts [EAs]) were submitted involving over three hundred independent reviews from more than one hundred reviewers. Thirty two percent of the papers that were submitted received two reviews while all of the rest of the papers received three or more. Fifty-four EAs were accepted. Twenty-five posters were invited. All of the EAs, presentations and posters are included in our proceedings. The subject areas span the topics above and were organized into nine tracks: Security Assurance for EDS; Wide Area Mo

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [University of Idaho

2011-01-01T23:59:59.000Z

412

JM to Revise DOE G 414.1-4, Safety Software Guide for Use with 10 CFR 830, Subpart A, Quality Assurance Requirements, and DOE O 414.1C, Quality Assurance  

Directives, Delegations, and Requirements

The revision to DOE G 414.1-4 will conform to the revised DOE O 414.1D and incorporate new information and lessons learned since 2005, including information ...

2013-07-17T23:59:59.000Z

413

Probabilistic Characterization of Adversary Behavior in Cyber Security  

SciTech Connect

The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

Meyers, C A; Powers, S S; Faissol, D M

2009-10-08T23:59:59.000Z

414

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

415

ANNUAL HEATING AND COOLING REQUIREMENTS AND DESIGN DAY PERFORMANCE FOR A RESIDENTIAL MODEL IN SIX CLIMATES: A COMPARISON OF NBSLD, BLAST 2, AND DOE-2.1  

E-Print Network (OSTI)

and gains. BLAST DOE-2.1 (eWF) r 7SOF - 680F 75.SoF - 70.5DOE-2 ( SWF) _o_~_"'_ DOE-2 (eWF) I i I rI '"d C\\! -10 o H

Carroll, William L.

2011-01-01T23:59:59.000Z

416

The Fe-type nitrile hydratase from Comamonas testosteroni Ni1 does not require an activator accessory protein for expression in Escherichia coli  

Science Conference Proceedings (OSTI)

We report herein the functional expression of an Fe-type nitrile hydratase (NHase) without the co-expression of an activator protein or the Escherichia coli chaperone proteins GroES/EL. Soluble protein was obtained when the {alpha}- and {beta}-subunit genes of the Fe-type NHase Comamonas testosteroni Ni1 (CtNHase) were synthesized with optimized E. coli codon usage and co-expressed. As a control, the Fe-type NHase from Rhodococcus equi TG328-2 (ReNHase) was expressed with (ReNHase{sup +Act}) and without (ReNHase{sup -Act}) its activator protein, establishing that expression of a fully functional, metallated ReNHase enzyme requires the co-expression of its activator protein, similar to all other Fe-type NHase enzymes reported to date, whereas the CtNHase does not. The X-ray crystal structure of CtNHase was determined to 2.4 {angstrom} resolution revealing an {alpha}{beta} heterodimer, similar to other Fe-type NHase enzymes, except for two important differences. First, two His residues reside in the CtNHase active site that are not observed in other Fe-type NHase enzymes and second, the active site Fe(III) ion resides at the bottom of a wide solvent exposed channel. The solvent exposed active site, along with the two active site histidine residues, are hypothesized to play a role in iron incorporation in the absence of an activator protein.

Kuhn, Misty L.; Martinez, Salette; Gumataotao, Natalie; Bornscheuer, Uwe; Liu, Dali; Holz, Richard C. (Loyola); (Greifswald)

2012-10-10T23:59:59.000Z

417

Updated Skill Set with Annual Skill Set Model Review and VISION Training completion. Revision does not impact MGTF-002 Template 08_1014. Added EOTA IT Security Course and Exam  

NLE Websites -- All DOE Office Websites (Extended Search)

330 330 Reformatted and reorganized entire document. Broke down by position and bumped against Position Descriptions for accuracy, updated names of documents and made consistent throughout 09_0623 Updated Skill Set with Annual Skill Set Model Review and VISION Training completion. Revision does not impact MGTF-002 Template 08_1014. Added EOTA IT Security Course and Exam to process section. 09_0807 Updated Skill Set with Annual Skill Set Model Review. Added Required DOE contractor Training (IT Security, FEOSH & Cyber Security). Added EOTA IT Security Course and Exam to process section. 08_1014 Removed employee no longer with EOTA. MGTP-004, Employee Satisfaction Process no longer active. 08_0829 Annual Skill Set Model Review completed and documented for all EOTA staff. Additional lines added for future training items.

418

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC is offering a free, public webinar series from January to May 2012 entitled "Issues in Designing the Future Grid," focusing on the information hierarchy for the future grid and grid enablers of sustainable energy systems. The second webinar, Cyber-Physical Systems Security for the Smart Grid, will be held on Fecruary 7, 2012 by Manimaran Govindarasu, Professor if Electrical and Computer Engineering at Iowa State University. Govindarasu_PSERC_Webinar_Feb_2012.pdf More Documents & Publications April 2012 PSERC Webinars on Issues in Designing the Future Grid

419

A cyber-physical experimentation environment for the security analysis of networked industrial control systems  

Science Conference Proceedings (OSTI)

Although many studies address the security of Networked Industrial Control Systems (NICSs), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these ...

BLa Genge; Christos Siaterlis; Igor Nai Fovino; Marcelo Masera

2012-09-01T23:59:59.000Z

420

Researchers develop new search tool to help fight child porn, catch cyber  

E-Print Network (OSTI)

Researchers develop new search tool to help fight child porn, catch cyber thieves Canada Standard a comment... Post to Facebook 0 0 New #12;Researchers develop new search tool to help fight child porn

Fung, Benjamin C. M.

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network (OSTI)

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

422

Analyzing resiliency of the smart grid communication architectures under cyber attack  

Science Conference Proceedings (OSTI)

Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an ...

Anas AlMajali; Arun Viswanathan; Clifford Neuman

2012-08-01T23:59:59.000Z

423

Multimodal Gumdo Game: The Whole Body Interaction with an Intelligent Cyber Fencer  

Science Conference Proceedings (OSTI)

This paper presents an immersive multimodal Gumdo simulation game that allows a user to experience the whole body interaction with an intelligent cyber fencer. The proposed system consists of three modules: (i) a nondistracting multimodal interface with ...

Jungwon Yoon; Sehwan Kim; Jeha Ryu; Woontack Woo

2002-12-01T23:59:59.000Z

424

SU?FF?T?388: Secondary Radiation Doses From CyberKnife SRS/RT  

Science Conference Proceedings (OSTI)

Purpose: Because of extensive use of conventional x?rays in CyberKnife SRS/RT for treatment tracking and large number of monitor units (MU) in beam delivery

C Yu

2006-01-01T23:59:59.000Z

425

Towards an Experimental Testbed Facility for Cyber-Physical Security Research  

Science Conference Proceedings (OSTI)

Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

2012-01-07T23:59:59.000Z

426

CyberShake 3.0: Physics-based Probabilistic Seismic Hazard Analysis...  

NLE Websites -- All DOE Office Websites (Extended Search)

CyberShake 3.0: Physics-based Probabilistic Seismic Hazard Analysis PI Name: Thomas Jordan PI Email: tjordan@usc.edu Institution: University of Southern California Allocation...

427

CyberShake3.0: Physics-Based Probabilistic Seismic Hazard Analysis...  

NLE Websites -- All DOE Office Websites (Extended Search)

CyberShake3.0: Physics-Based Probabilistic Seismic Hazard Analysis PI Name: Thomas Jordan PI Email: tjordan@usc.edu Institution: University of Southern California Allocation...

428

Stability of a cyber-physical smart grid system using cooperating invariants  

Science Conference Proceedings (OSTI)

Cyber-Physical Systems (CPS) consist of computational components interconnected by computer networks that monitor and control switched physical entities interconnected by physical infrastructures. Ensuring stability and correctness (both logical and ...

Ashish Choudhari, Harini Ramaprasad, Tamal Paul, Jonathan W. Kimball, Maciej Zawodniok, Bruce McMillin, Sriram Chellappan

2013-04-01T23:59:59.000Z

429

DOE Essential Body of Knowledge | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Essential Body of Knowledge Essential Body of Knowledge DOE Essential Body of Knowledge DOE Essential Body of Knowledge & Core Competency Training The Office of the Chief Information Officer (OCIO) utilized DOE cybersecurity policy, best practices and lessons learned, and comprehensive internal needs assessments to identify fundamental cybersecurity functional roles and associated responsibilities to and define the essential body of knowledge (EBK) needed to support cybersecurity responsibilities and activities within the Department. Components of the EBK are assigned to each functional role, and customized curriculum is determined for each key role via core competency worksheets. The OCIO has determined the following roles to be key functional cyber roles within the Department:

430

Cyber in the Cloud -- Lessons Learned from INL's Cloud E-Mail Acquisition  

Science Conference Proceedings (OSTI)

As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.

Troy Hiltbrand; Daniel Jones

2012-12-01T23:59:59.000Z

431

Cyber Security and Privacy Landscape of the Electric Sector, Release 5  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2013-03-27T23:59:59.000Z

432

Science-Driven Network Requirements for ESnet  

E-Print Network (OSTI)

Neutron Source Network Requirements Six DOE laboratories arehas networking requirements which differ from many other DOEhas networking requirements which differ from many other DOE

2006-01-01T23:59:59.000Z

433

Microsoft Word - Cyber Effects Analysis Using VCSE 09.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8-5954 8-5954 Unlimited Release Printed September 2008 Cyber Effects Analysis Using VCSE Promoting Control System Reliability Michael J. McDonald, Gregory N. Conrad, Travis C. Service, Regis H. Cassidy Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of

434

Cyber Assessment Methods for SCADA Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

435

Cyber-Security Considerations for the Smart Grid  

Science Conference Proceedings (OSTI)

The electrical power grid is evolving into the smart grid. The goal of the smart grid is to improve efficiency and availability of power by adding more monitoring and control capabilities. These new technologies and mechanisms are certain to introduce vulnerabilities into the power grid. In this paper we provide an overview of the cyber security state of the electrical power grid. We highlight some of the vulnerabilities that already exist in the power grid including limited capacity systems, implicit trust and the lack of authentication. We also address challenges of complexity, scale, added capabilities and the move to multipurpose hardware and software as the power grid is upgraded. These changes create vulnerabilities that did not exist before and bring increased risks. We conclude the paper by showing that there are a number mitigation strategies that can help keep the risk at an acceptable level.

Clements, Samuel L.; Kirkham, Harold

2010-07-26T23:59:59.000Z

436

DOE-STD-1082-94 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE requirements are identified in DOE Rules, Orders, Notices, Immediate Action Directives, and Manuals (hereinafter referred to as DOE requirements documents). Preparation,...

437

Parking requirements as a barrier to housing development: regulation and reform in Los Angeles  

E-Print Network (OSTI)

a residential parking requirement does not only discriminatethis does suggest that the parking requirement itself might

Manville, Michael; Shoup, Donald C

2010-01-01T23:59:59.000Z

438

2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop  

SciTech Connect

Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on rebalancing cyberspace to mitigate threats and maximize benefits, ensuring security and privacy in a constantly changing adversarial environment. Recognizing this great need, we requested original paper submissions in four general areas derived from the Federal Cybersecurity R&D program thrusts: Designed-In-Security (DIS) Builds the capability to design, develop, and evolve high-assurance, software-intensive systems predictably and reliably while effectively managing risk, cost, schedule, quality, and complexity. Tailored Trustworthy Spaces (TTS) Provides flexible, adaptive, distributed trust environments that can support functional and policy requirements arising from a wide spectrum of activities in the face of an evolving range of threats--recognizing the user's context and evolves as the context evolves. Moving Target (MT) Enables us to create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency. Cyber Economic Incentives (CEI) Develops effective incentives to make cybersecurity ubiquitous, including incentives affecting individuals and organizations.

Sheldon, Frederick T [ORNL; Giani, Annarita N. [Los Alamos National Laboratory (LANL); Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2013-01-01T23:59:59.000Z

439

2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop  

SciTech Connect

Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on rebalancing cyberspace to mitigate threats and maximize benefits, ensuring security and privacy in a constantly changing adversarial environment. Recognizing this great need, we requested original paper submissions in four general areas derived from the Federal Cybersecurity R&D program thrusts: Designed-In-Security (DIS) Builds the capability to design, develop, and evolve high-assurance, software-intensive systems predictably and reliably while effectively managing risk, cost, schedule, quality, and complexity. Tailored Trustworthy Spaces (TTS) Provides flexible, adaptive, distributed trust environments that can support functional and policy requirements arising from a wide spectrum of activities in the face of an evolving range of threats--recognizing the user's context and evolves as the context evolves. Moving Target (MT) Enables us to create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency. Cyber Economic Incentives (CEI) Develops effective incentives to make cybersecurity ubiquitous, including incentives affecting individuals and organizations.

Sheldon, Frederick T [ORNL; Giani, Annarita N. [Los Alamos National Laboratory (LANL); Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2013-01-01T23:59:59.000Z

440

Minimum State Awareness for Resilient Control Systems Under Cyber-Attack  

Science Conference Proceedings (OSTI)

State awareness for a control system is the accurate knowledge of the internal states of the system realization. To maintain stable operation, a controller requires a certain degree of state awareness. By definition, a cyber-attacker decreases the state awareness by modifying or removing the information available to the operator and control system. By doing so, the attacker can directly cause damage to the physical system through the control system, or indirectly by causing the operator to react in a damaging manner to the false information. In a number of recent papers, detection and mitigation strategies have been proposed that assume state awareness. The goal of the attacker to reduce or remove state awareness makes this assumption invalid for most situations. One of the central problems of resilient control is developing methods to retain sufficient state awareness to continue operation during a cyberattack. In this paper, we will define state awareness, discuss the consequences of loss of state awareness, and some potential research directions for maintaining state awareness.

Kisner, Roger [ORNL; Fugate, David L [ORNL; McIntyre, Timothy J [ORNL

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

DOE G 414  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INITIATED BY: INITIATED BY: http://www.directives.doe.gov Office of Environment, Safety and Health DOE G 414.1-4 Approved 6-17-05 Certified 11-3-10 SAFETY SOFTWARE GUIDE for USE with 10 CFR 830 Subpart A, Quality Assurance Requirements, and DOE O 414.1C, Quality Assurance [This Guide describes suggested nonmandatory approaches for meeting requirements. Guides are not requirements documents and are not construed as requirements in any audit or appraisal for compliance with the parent Policy, Order, Notice, or Manual.] U.S. DEPARTMENT OF ENERGY Washington, D.C. NOT MEASUREMENT SENSITIVE DOE G 414.1-4 i (and ii) 6-17-05 FOREWORD This Department of Energy (DOE) Guide is approved by the Office of Environment, Safety and Health and is available for use by all DOE and National Nuclear Security Administration

442

DOE G 414  

NLE Websites -- All DOE Office Websites (Extended Search)

http://www.directives.doe.gov Office of Environment, Safety and Health DOE G 414.1-4 Approved 6-17-05 Certified 11-3-10 SAFETY SOFTWARE GUIDE for USE with 10 CFR 830 Subpart A, Quality Assurance Requirements, and DOE O 414.1C, Quality Assurance [This Guide describes suggested nonmandatory approaches for meeting requirements. Guides are not requirements documents and are not construed as requirements in any audit or appraisal for compliance with the parent Policy, Order, Notice, or Manual.] U.S. DEPARTMENT OF ENERGY Washington, D.C. NOT MEASUREMENT SENSITIVE DOE G 414.1-4 i (and ii) 6-17-05 FOREWORD This Department of Energy (DOE) Guide is approved by the Office of Environment, Safety and Health and is available for use by all DOE and National Nuclear Security Administration

443

DOE standard: Radiological control  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) has developed this Standard to assist line managers in meeting their responsibilities for implementing occupational radiological control programs. DOE has established regulatory requirements for occupational radiation protection in Title 10 of the Code of Federal Regulations, Part 835 (10 CFR 835), ``Occupational Radiation Protection``. Failure to comply with these requirements may lead to appropriate enforcement actions as authorized under the Price Anderson Act Amendments (PAAA). While this Standard does not establish requirements, it does restate, paraphrase, or cite many (but not all) of the requirements of 10 CFR 835 and related documents (e.g., occupational safety and health, hazardous materials transportation, and environmental protection standards). Because of the wide range of activities undertaken by DOE and the varying requirements affecting these activities, DOE does not believe that it would be practical or useful to identify and reproduce the entire range of health and safety requirements in this Standard and therefore has not done so. In all cases, DOE cautions the user to review any underlying regulatory and contractual requirements and the primary guidance documents in their original context to ensure that the site program is adequate to ensure continuing compliance with the applicable requirements. To assist its operating entities in achieving and maintaining compliance with the requirements of 10 CFR 835, DOE has established its primary regulatory guidance in the DOE G 441.1 series of Guides. This Standard supplements the DOE G 441.1 series of Guides and serves as a secondary source of guidance for achieving compliance with 10 CFR 835.

Not Available

1999-07-01T23:59:59.000Z

444

Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

Science Conference Proceedings (OSTI)

Our reliance on the cyber infrastructure has further grown and the dependencies have become more complex. The infrastructure and applications running on it are not generally governed by the rules of bounded systems and inherit the properties of unbounded systems, such as the absence of global control, borders and barriers. Furthermore, the quest for increasing functionality and ease of operation is often at the cost of controllability, potentially opening up avenues for exploitation and failures. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. In the presence of information explosion, i.e., the pervasive abundance of (public/private) information and the effects of such, intelligence has the potential to shift the advantages in the dynamic game of defense and attacks in cyber space. Gathering, analyzing, and making use of information constitutes a business-/sociopolitical-/military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace. The goal of the workshop is to establish, debate and challenge the far-reaching agenda that broadly and comprehensively outlines a strategy for cyber security and information intelligence that is founded on sound principles and technologies.

Sheldon, Frederick T [ORNL; Peterson, Greg D [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2009-01-01T23:59:59.000Z

445

Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies To Meet The Cyber Security And Information Intelligence Challenges Ahead  

Science Conference Proceedings (OSTI)

As our dependence on the cyber infrastructure grows ever larger, more complex and more distributed, the systems that compose it become more prone to failures and/or exploitation. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. Information explosion describes the pervasive abundance of (public/private) information and the effects of such. Gathering, analyzing, and making use of information constitutes a business- / sociopolitical- / military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace "mechanization." The goal of the workshop was to challenge, establish and debate a far-reaching agenda that broadly and comprehensively outlined a strategy for cyber security and information intelligence that is founded on sound principles and technologies. We aimed to discuss novel theoretical and applied research focused on different aspects of software security/dependability, as software is at the heart of the cyber infrastructure.

Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2008-01-01T23:59:59.000Z

446

Transmission and Distribution World March 2007: DOE Focuses on Cyber Security  

Energy.gov (U.S. Department of Energy (DOE))

Energy sector owners, operators and system vendors team up to boost control system security with national SCADA test bed.

447

Slide 1  

NLE Websites -- All DOE Office Websites (Extended Search)

9 Security Enforcement Enforceable Classified Information Security Requirements - DOE Orders 205.1B, DOE Cyber Security Program 231.1B, Environment, Safety and...

448

Assessment of current cybersecurity practices in the public domain : cyber indications and warnings domain.  

SciTech Connect

This report assesses current public domain cyber security practices with respect to cyber indications and warnings. It describes cybersecurity industry and government activities, including cybersecurity tools, methods, practices, and international and government-wide initiatives known to be impacting current practice. Of particular note are the U.S. Government's Trusted Internet Connection (TIC) and 'Einstein' programs, which are serving to consolidate the Government's internet access points and to provide some capability to monitor and mitigate cyber attacks. Next, this report catalogs activities undertaken by various industry and government entities. In addition, it assesses the benchmarks of HPC capability and other HPC attributes that may lend themselves to assist in the solution of this problem. This report draws few conclusions, as it is intended to assess current practice in preparation for future work, however, no explicit references to HPC usage for the purpose of analyzing cyber infrastructure in near-real-time were found in the current practice. This report and a related SAND2010-4766 National Cyber Defense High Performance Computing and Analysis: Concepts, Planning and Roadmap report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

449

Fast track article: Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence  

Science Conference Proceedings (OSTI)

The physical environment is becoming more and more saturated with computing and communication entities that interact among themselves, as well as with users: virtually everything will be enabled to source information and respond to appropriate stimuli. ... Keywords: Cyber-physical convergence, Cyber-world security, Data storage, Opportunistic networking and computing, Pervasive computing, Quality of Information, Self-*, Social networks, Wearable computing

Marco Conti; Sajal K. Das; Chatschik Bisdikian; Mohan Kumar; Lionel M. Ni; Andrea Passarella; George Roussos; Gerhard Trster; Gene Tsudik; Franco Zambonelli

2012-02-01T23:59:59.000Z

450

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for  

E-Print Network (OSTI)

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for the Smart Grid Adam Hahn, Student Member, IEEE, and Manimaran Govindarasu, Senior Member, IEEE Abstract--The smart grid's heavy reliance on cyber resources introduces numerous security concerns

Manimaran, Govindarasu

451

Q&A: Cybersecurity Issues and Requirements, December 11, 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Issues and Requirements - Jeff Dagle Cyber Security Issues and Requirements - Jeff Dagle Q: On the theory that there's not a lock that can't be picked and a safe that can't be cracked, I think cyber security is a bit of an oxymoron, right? We all share the same goal and the same concern. But I think the vast majority of people in this room are not cyber security experts, and we're pretty much dependent upon the vendors and the experts who are in the field. I guess my concern and my question is this: I think we need to set up some defined due diligence around cyber security instead of creating some kind of expectation that we're all going to guarantee that something will never ever happen. Because we cannot guarantee that. Nobody knows what the vulnerabilities are until somebody has tricked the system and found the vulnerability. And at first I didn't think

452

Cyber Security and Information Intelligence Research Workshop (CSIIRW'11) Proceedings  

SciTech Connect

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Moreover, Massachusetts Institute of Technology (MIT) released the results of a two-year study, The Future of the Electric Grid.

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2011-01-01T23:59:59.000Z

453

Protecting Intelligent Distributed Power Grids against Cyber Attacks  

Science Conference Proceedings (OSTI)

Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

2010-12-31T23:59:59.000Z

454

A PROPOSED FRAMEWORK FOR PLANNING DEACTIVATION AND DECOMMISSIONING ENGINEERING AND DESIGN ACTIVITIES TO MEET THE REQUIREMENTS OF DOE ORDER 413.3A, PROGRAM AND PROJECT MANAGEMENT FOR THE ACQUISITION OF CAPITAL ASSETS  

SciTech Connect

This paper provides guidance in applying the requirements of DOE O 413.3A to Deactivation and Decommissioning (D&D) projects. A list of 41 engineering and design activities relevant to D&D projects was generated. For several activities in this list, examples of the level of development and/or types of deliverables that might be expected at the completion of the conceptual, preliminary and final project design phases described in the Order are provided.

Santos, J; John Gladden, J

2007-11-06T23:59:59.000Z

455

Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the  

NLE Websites -- All DOE Office Websites (Extended Search)

Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web of Things, and Social Media Speaker(s): Edward Curry Date: April 24, 2013 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: James O'Donnell Philip Haves Cyber-Physical Energy Systems (CPES) exploit the potential of information technology to boost energy efficiency while minimising environmental impacts. CPES can help manage energy more efficiently by providing a functional view of the entire energy system so that energy activities can be understood, changed, and reinvented to better support sustainable practices. CPES can be applied at different scales from Smart Grids and Smart Cities to Smart Enterprises and Smart Buildings. Significant technical challenges exist in terms of information management, leveraging

456

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

457

DOE Policy on Decommissioning DOE Facilities Under CERCLA | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Policy on Decommissioning DOE Facilities Under DOE Policy on Decommissioning DOE Facilities Under CERCLA DOE Policy on Decommissioning DOE Facilities Under CERCLA In May 1995, the Department of Energy (DOE) issued a policy in collaboration with the Environmental Protection Agency (EPA) for decommissioning surplus DOE facilities consistent with the requirements of the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA). This policy ensures protection of the environment, worker health and public health, provides opportunities for stakeholder involvement, and achieves risk reduction without unnecessary delay. Consistent with the jointly issued "Guidance on Accelerating CERCLA Environmental Restoration at Federal Facilities" (August 22, 1994), this decommissioning policy encourages streamlined decision-making. This

458

The Federal Energy Regulatory Commission's Unclassified Cyber Security Program … 2013  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013 OAS-M-14-01 October 2013 Department of Energy Washington, DC 20585 October 23, 2013 MEMORANDUM FOR THE EXECUTIVE DIRECTOR, FEDERAL ENERGY REGULATORY COMMISSION FROM: Rickey R. Hass Deputy Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Federal Energy Regulatory Commission's Unclassified Cyber Security Program - 2013" BACKGROUND The Federal Energy Regulatory Commission (Commission) is an independent agency within the Department of Energy (Department) responsible for, among other things, regulating the interstate

459

Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.  

Science Conference Proceedings (OSTI)

The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

Dawson, Lon Andrew; Stinebaugh, Jennifer A.

2010-04-01T23:59:59.000Z

460

DOE O 227.1, Independent Oversight Program  

Directives, Delegations, and Requirements

The order prescribes the requirements and responsibilities for the DOE Independent Oversight Program. Cancels DOE O 470.2B.

2011-08-30T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

DOE O 534.1B, Accounting  

Directives, Delegations, and Requirements

To prescribe the requirements and responsibilities for the accounting and financial management of the Department of Energy (DOE). Cancels DOE O 534.1A.

2003-01-06T23:59:59.000Z

462

DOE Information Center  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE Information Center DOE Information Center The U.S. Department of Energy (DOE) Information Center provides citizens a consolidated facility to obtain information and records related to the DOE's various programs in Oak Ridge and abroad. Employees at the DOE Information Center are available to assist with your requests and searches from 8:00 a.m. to 5:00 p.m. (EST), Monday through Friday, except for federal holidays. Requests Documents can be requested in person or by telephone, email, or fax. Reproduction Please allow DOE Information Center staff adequate time to reproduce documents. Some material requires special handling, security reviews, etc. Delivery Unless special arrangements have been made with DOE Information Center staff, documents should be picked up during normal business hours.

463

DOE Federal Quality Council: Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

- Section B Crosswalk of DOE O 414.1D, ISO 9001, and NQA-1 - Task Planning Document (TPD) DOE QA Requirement Training Performance Metrics for QA Program Effectiveness (Note: For a...

464

Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber security and information intelligence challenges and strategies  

SciTech Connect

As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information, which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value. The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. The aim of this workshop (www.csiir.ornl.gov/csiirw) was to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. Topics include: Scalable trustworthy systems Enterprise-level metrics Coping with insider and life-cycle threats Coping with malware and polymorphism Phishing/whaling, spam and cyber crime High assurance system survivability Cyber security for the Smart Grid Digital provenance and data integrity Privacy-aware security and usable security Social networking models for managing trust and security A principle goal of the workshop was to foster discussions and dialog among the 150 registered attendees from North America, Europe, Asia, and Africa. This goal was initiated and facilitated by 14 plenary keynote addresses including a banquet presentation and the CIO / CTO perspectives panel. A total of 98 papers (i.e., extended abstracts [EAs]) were submitted and 54 EAs were accepted plus 11 posters were invited. All of the abstracts and either presentation materials or posters are included in the proceedings. The subject areas span the topics above and were organized into eight tracks: Trust, Design, Malware, Network, Privacy and Metrics, Enterprise, Survivability and Formal Methods.

Sheldon, Frederick T [ORNL; Prowell, Stacy J [ORNL; Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2010-01-01T23:59:59.000Z

465

OMB Requirements | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

OMB Requirements OMB Requirements OMB Requirements Acquisitions OMB Circular A-109, Acquisition of Major Systems (04-05-76) (Available in hard copy only) OMB M-04-08, Maximizing Use of SmartBuy and Avoiding Duplication of Agency Activities with with the President's 24 E-Gov Initiatives (02-25-2004) (pdf) OMB M-04-16, Software Acquisition (07-01-2004) Budget/Capital Planning OMB Circular A-11 OMB M-05-23, Improving Informational Technology (IT) Project Planning and Execution (8-04-2005) (pdf) Cyber Security & Privacy OMB M-00-07, Incorporating and Funding Security in Information Systems Investments (02-28-2000) OMB M-02-01, Guidance for Preparing and Submitting Security Plans of Action and Milestones(10-19-2001) OMB M-02-09, Reporting Instructions for the Government Information

466

CCI: Program Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Your Arrival Your First Day Weekly Activities Program Requirements Checkout FAQ The DOE WDTS site has comprehensive information on Participant Obligations. Consult that site for...

467

ASCR Science Network Requirements  

E-Print Network (OSTI)

ASCR Science Network Requirements Office of AdvancedScientific Computing Research, DOE Office of ScienceEnergy Sciences Network Gaithersburg, MD April 15 and 16,

Dart, Eli

2010-01-01T23:59:59.000Z

468

Simulating non-stationary congestion systems using splitting with applications to cyber security  

Science Conference Proceedings (OSTI)

According to the former counterterrorism czar, Richard A. Clarke (2010), our national infrastructure could be severely damaged in 15 minutes by a cyber attack. A worm attack on an Internet Protocol (IP) network is one type of attack that is possible. ...

Martin J. Fischer; Denise M. B. Masi; John F. Shortle; Chun-Hung Chen

2010-12-01T23:59:59.000Z

469

Effects of applying STR for group learning activities on learning performance in a synchronous cyber classroom  

Science Conference Proceedings (OSTI)

This study aimed to apply Speech to Text Recognition (STR) for individual oral presentations and group discussions of students in a synchronous cyber classroom. An experiment was conducted to analyze the effectiveness of applying STR on learning performance. ... Keywords: Computer-mediated communication, Distance education and telelearning, Improving classroom teaching, Pedagogical issues, cooperative/collaborative learning

Tony C. T. Kuo; Rustam Shadiev; Wu-Yuin Hwang; Nian-Shing Chen

2012-01-01T23:59:59.000Z

470

Optimal and Adaptive Battery Discharge Strategies for Cyber-Physical Fumin Zhang and Zhenwu Shi  

E-Print Network (OSTI)

Optimal and Adaptive Battery Discharge Strategies for Cyber-Physical Systems Fumin Zhang and Zhenwu Shi Abstract-- We introduce a dynamic battery model that de- scribes the variations of the capacity of a battery under time varying discharge current. This model is input-output equivalent to the Rakhmatov

Zhang, Fumin

471

Security aspects of cyber-physical device safety in assistive environments  

Science Conference Proceedings (OSTI)

As more devices that affect their environment come into use, their proper functioning to protect the welfare of their charges is a concern. Examples include assistive transport devices, robotics, drug delivery systems, etc. Here privacy is not the primary ... Keywords: assistive-environments, cyber-physical systems, pervasive computing, safety, security, standards

Steven J. Templeton

2011-05-01T23:59:59.000Z

472

Self-aware cyber-physical systems and applications in smart buildings and cities  

Science Conference Proceedings (OSTI)

The world is facing several challenges that must be dealt within the coming years such as efficient energy management, need for economic growth, security and quality of life of its habitants. The increasing concentration of the world population into ... Keywords: autonomic computing, cyber-physical systems, self-aware systems, smart city

Levent Gurgen; Ozan Gunalp; Yazid Benazzouz; Mathieu Gallissot

2013-03-01T23:59:59.000Z

473

Reducing the Peak Power through Real-Time Scheduling Techniques in Cyber-Physical Energy Systems  

E-Print Network (OSTI)

], large networks of electric cars [4], and automated energy supply and distribution for town and city of electric loads in cyber-physical energy systems. The aim of the proposed approach is to achieve predictability of the activation of electric loads to guarantee an upper bound on the peak electric power

Lipari, Giuseppe

474

Frameworks and data initiatives for smart grid and other cyber-physical systems (invited keynote)  

Science Conference Proceedings (OSTI)

I describe the NIST smart grid framework and its applicability as a model for organizational efforts to advance cyber-physical systems, and provide an overview of smart grid data initiatives. Keywords: cybersecurity, data analytics, data initiatives, frameworks, green button, interoperability, smart grid, testing and certification

David A. Wollman

2013-06-01T23:59:59.000Z

475

The institute for cyber-enabled research: regional organization to promote computation in science  

Science Conference Proceedings (OSTI)

The Institute for Cyber-Enabled Research (iCER) at Michigan State University (MSU) was established in 2009 to coordinate and support multidisciplinary resources for computation and computational sciences. iCER is the home of MSU's centralized High Performance ...

Dirk Colbry, Bill Punch, Wolfgang Bauer

2013-07-01T23:59:59.000Z

476

Portable Storage Support for Cyber Foraging YaYunn Su and Jason Flinn  

E-Print Network (OSTI)

stateful services such as remote desktops be handled efficiently? . How much can portable storage reduce focused considerable attention on enabling resource­poor mobile computers such as cell­phones and hand solution, cyber foraging, uses remote comput­ ers located at wireless hotspots to execute applica­ tion

Flinn, Jason

477

Portable Storage Support for Cyber Foraging Ya-Yunn Su and Jason Flinn  

E-Print Network (OSTI)

stateful services such as remote desktops be handled efficiently? · How much can portable storage reduce focused considerable attention on enabling resource-poor mobile computers such as cell-phones and hand solution, cyber foraging, uses remote comput- ers located at wireless hotspots to execute applica- tion

Chu, Hao-hua

478

Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems  

Science Conference Proceedings (OSTI)

The consolidation of cyber communications networks and physical control systems within the energy smart grid introduces a number of new risks. Unfortunately, these risks are largely unknown and poorly understood, yet include very high impact losses from attack and component failures. One important aspect of risk management is the detection of anomalies and changes. However, anomaly detection within cyber security remains a difficult, open problem, with special challenges in dealing with false alert rates and heterogeneous data. Furthermore, the integration of cyber and physical dynamics is often intractable. And, because of their broad scope, energy grid cyber-physical systems must be analyzed at multiple scales, from individual components, up to network level dynamics. We describe an improved approach to anomaly detection that combines three important aspects. First, system dynamics are modeled using a reduced order model for greater computational tractability. Second, a probabilistic and principled approach to anomaly detection is adopted that allows for regulation of false alerts and comparison of anomalies across heterogeneous data sources. Third, a hierarchy of aggregations are constructed to support interactive and automated analyses of anomalies at multiple scales.

Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Melin, Alexander M [ORNL; Czejdo, Bogdan [ORNL

2013-01-01T23:59:59.000Z

479

Implementing Least Privilege on Windows XP computers at DOE-RL Hanford  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Least Privilege on Microsoft Least Privilege on Microsoft Windows ® XP computers at DOE-RL Hanford Presented By Eric Anderson, PMP, CISM, CISSP, MCSE Cyber Projects and Technical Lead MSA / Lockheed Martin IS&GS DOE Hanford Site "To make our customers extraordinarily successful in our unified mission of cleaning up the Hanford Site..." Hanford Site Scope - 586 square miles - 9,000+ PCs - 500+ servers - 400+ applications - 1,000+ miles fiber to 300 bldgs - 12,500+ phones 2 What's the problem? Compliance problem - - OIG finding in 2007 ... too many users operate as a "privileged," Local Administrator (LA) on their computers. Cyber Security problem - - Users engage in risky activities while operating as LA.

480

Natural phenomena hazards assessment criteria for DOE sites: DOE Standard DOE-STD-1023-95  

Science Conference Proceedings (OSTI)

This paper summarizes hazard assessment criteria (DOE-STD-1023-95) for Natural Phenomena Hazards (NPH) at DOE sites. The DOE has established policy and requirements for NPH mitigation for DOE sites and facilities using a graded approach by DOE Order 5480.28. The graded approach is implemented by five performance categories established for structures, systems, and components (SSCs) at DOE facilities based on criteria provided by DOE-STD-1021-93. In applying the design/evaluation criteria of DOE-STD-1020-94 for DOE facilities subjected to one of the natural phenomena hazards, the establishment of design basis load levels consistent with the corresponding performance category is required. This standard provides general criteria as well as specific criteria for natural phenomena hazard assessments to ensure that adequate design basis load levels are established for design and/or evaluation of DOE facilities.

Chen, J.C.; Lu, S.C.; Boissonnade, A.C. [and others

1995-03-24T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

DOE Directives | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Directives DOE Directives DOE Directives Directives are the Department of Energy's primary means to communicate and institutionalize directives and policies and to establish requirements, responsibilities, and procedures for Departmental elements and contractors. DOE O 413.3A - Program and Project Management for the Acquisition of Capital Assets DOE G 413.3-1 - Managing Design and Construction Using Systems Engineering for Use with DOE O 413.3A DOE G 413.3-2 - Quality Assurance Guide for Project Management DOE G 413.3-3 - Safeguards and Security for Program and Project Management DOE G 413.3-8 - Environmental Management (EM) Cleanup Projects DOE G 413.3-9 - U.S. Department of Energy Project Review Guide for Capital Asset Projects DOE G 413.3-10 - Earned Value Management System (EVMS)

482

DOE CORPORATE REPORTING  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7/23/2010 7/23/2010 1 DEPARTMENT OF ENERGY (DOE) CORPORATE REPORTING To ensure projects are effectively managed and delivering on the goals of the American Recovery and Reinvestment Act (Recovery Act), DOE will collect data on project management and execution, risk management, job creation, and key project milestones, in addition to what is required by Section 1512 of the Recovery Act. In most cases, monthly data will be used internally for managerial purposes only, but where DOE does intend to publicize monthly data, it will clearly indicate it to be "preliminary/informal and subject to change." Recipients are required to provide DOE information on, but not limited to, the following issues:

483

HPSS in the Extreme Scale Era: Report to DOE Office of Science on HPSS in 2018-2022  

E-Print Network (OSTI)

HPSS collaboration for specific DOE OS requirements. HPSS isto meeting both DOE NNSA and OS requirements and those ofwithin the DOE OS. These high level requirements aid in

Hick, Jason

2010-01-01T23:59:59.000Z

484

DOE Order on Quality Assurance  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of this order is to ensure that Department of Energy (DOE), including National Nuclear Security Administration (NNSA), products and services meet or exceed customers requirements and...

485

Finding of No Significant Impact; Energy Efficient Performance Requirements for New Federal Commercial and Residential Buildings (DOE/EA-1463) (1/11/08)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 Federal Register 7 Federal Register / Vol. 73, No. 8 / Friday, January 11, 2008 / Notices Energy; and provide comments and recommendations and priorities for the Department of Energy Annual Plan requirements of the Energy Policy Act of 2005, Subtitle J, Section 999. Tentative Agenda: 7:30 a.m.-8 a.m. Registration 8 a.m.-12 p.m. Welcome & Introductions, Opening Remarks by the Designated Federal Officer, Update Status of the 2007 Program, Overview of 2008 Annual Plan Draft, and Overview of the National Energy Technology Laboratory Complementary Research Program. 12 p.m.-1 p.m. Lunch. 1 p.m.-4 p.m. Committee Discussions. 4 p.m.-4:30 p.m. New Business: Plans for 2008-2010 Federal Advisory Committee. 4:30 p.m.-5 p.m. Public Comments. 5 p.m. Adjourn. Public Participation: The meeting is

486

Explorations in Cyber International Relations (ECIR) Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System  

E-Print Network (OSTI)

Growing global interconnection and interdependency of computer networks, in combination with increased sophistication of cyber attacks over time, demonstrate the need for better understanding of the collective and cooperative ...

Madnick, Stuart

2009-08-10T23:59:59.000Z

487

DOE Issues Funding Opportunity for Innovations to Increase Cybersecurity  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues Funding Opportunity for Innovations to Increase Issues Funding Opportunity for Innovations to Increase Cybersecurity for Energy Delivery Systems DOE Issues Funding Opportunity for Innovations to Increase Cybersecurity for Energy Delivery Systems February 11, 2013 - 10:53am Addthis The Office of Electricity Delivery and Energy Reliability issued a new Funding Opportunity Announcement (FOA), Innovation for Increasing Cybersecurity for Energy Delivery Systems, on February 8. The announcement is seeking applications to conduct research, development and demonstrations leading to next generation tools and technologies that will become widely adopted to enhance and accelerate deployment of cybersecurity capabilities for the U.S energy infrastructure, including cyber secure integration of smart grid technologies.

488

Technical Standards, DOE-STD-1082-94 - November 29, 1995 | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

plans for DOE nuclear safety requirements. DOE requirements are identified in DOE Rules, Orders, Notices, Immediate Action Directives, and Manuals (hereinafter referred...

489

Coordinated Cyber-Physical Attacks, High-Impact Low-Frequency (HILF) Events, and Risk Management in the Electric Sector  

Science Conference Proceedings (OSTI)

Although the North American electricity grid is one of the most reliable power systems in the world, the high-impact low-frequency (HILF) class of rare but potentially catastrophically damaging events is of growing concern in the industry. This white paper summarizes key activities under two EPRI initiatives that address a HILF cyber-physical attack as well as risk assessment approaches and management tools relevant to a HILF event.EPRIs Cyber Security and Privacy Program ...

2012-12-12T23:59:59.000Z

490

Integrated Management Requirements mapping  

Science Conference Proceedings (OSTI)

This document contains five appendices documenting how Sandia implemented the DOE Conduct of Operations (5480.19) and DOE Quality Assurance (5700.6C) orders. It provides a mapping of the Sandia integrated requirements to the specific requirements of each Order and a mapping to Sandia's approved program for implementing the Conduct of Operations Order.

Holmes, J.T.; Andrews, N.S.

1992-06-01T23:59:59.000Z

491

DOE M 483.1-1, DOE Cooperative Research and Development Agreements Manual  

Directives, Delegations, and Requirements

This Manual provides detailed requirements to supplement DOE O 483.1, DOE Cooperative Research and Development Agreements, dated 1-12-01, which establishes ...

2001-01-12T23:59:59.000Z

492

DOE Testing Reveals Samsung Refrigerator Does Not Meet Energy Star  

NLE Websites -- All DOE Office Websites (Extended Search)

Testing Reveals Samsung Refrigerator Does Not Meet Energy Star Testing Reveals Samsung Refrigerator Does Not Meet Energy Star Requirements DOE Testing Reveals Samsung Refrigerator Does Not Meet Energy Star Requirements March 16, 2010 - 4:28pm Addthis DOE-initiated testing has revealed that a Samsung refrigerator (model RF26VAB), which the company had claimed was Energy Star compliant, consumed more energy than permitted by the Energy Star program. Test results for the Samsung model at issue show that, when tested in accordance with DOE's test procedure, it consumed between 7 and 11.4 percent more energy than the Energy Star requirement. Samsung is no longer manufacturing this model, although it may still be available from some retail outlets. Based on this testing, DOE is referring Samsung Model RF26VAB to the U.S.

493

DOE Online  

NLE Websites -- All DOE Office Websites (Extended Search)

Fermilab's Science Adventures! Fermilab's Science Adventures! DOE Online K-12 Instructional Resources ed.fnal.gov/doe/ The U.S. Department of Energy is committed to helping educate our nation's next generation of scientists. The following resources help teachers integrate the Internet into K-12 classroom instruction. DOE Labs General Instructional Units Online Resources Lesson Plans General References DOE Laboratory and Facility Education Home Pages (www-ed.fnal.gov/doe/doe_labs.html) Direct links for 27 education Websites at DOE national laboratories and facilities. Online Catalog (www-ed.fnal.gov/trc/library) Fermilab's Teacher Resource Center collection of 10,000+ PreK-12 instructional materials in science, mathematics and technology. Materials include tradebooks, curriculum materials, educational

494

Building Technologies Office: 179D DOE Calculator  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy simulations are required to show compliance with the energy and power cost savings requirements. View more detailed information. What is the 179D DOE Calculator? The...

495

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

496

Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Attack Detection Toolkit: National SCADA Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to integrate security incident detection intelligence into control system historians. These upgrades will

497

Data Diodes in Support of a Power Grid Trustworthy Cyber Infrastructure  

SciTech Connect

Industrial Control Systems (ICS) are an integral part of the industrial infrastructure providing for the national good. While sharing basic constructs with Information Technology (IT) business systems, ICSs are technically, administratively, and functionally more complex and unique than business IT systems. Critical infrastructure protection focuses on protecting and maintaining a safe and reliable supply of electric power, oil, water, gasoline, chemicals, food, etc. Cyber vul-nerabilities are important if they can affect the safe, functional performance of these systems and processes. The majority of ICS exhibit vulnerable devices with unsecured physical access and/or subject to insider attack. In this whitepaper, we advocate trusted process control networks as a way to address the serious cyber security flaws which combines both white/black listing into a design philosophy that addresses information warfare scenarios, software process monitoring and an attack recognition and management architecture.

Sheldon, Frederick T [ORNL; MacIntyre, Lawrence Paul [ORNL; Okhravi, Hamed [ORNL; Munson, Dr. John C. [Computer Measurement Laboratory, Inc.

2009-12-01T23:59:59.000Z

498

Mandatory Supervisory Training Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mandatory Supervisory Training Requirements Mandatory Supervisory Training Requirements All DOE supervisors, managers, and executives will comply with mandatory supervisory training requirements (5 CFR 412; 5 CFR 315.801; 5 CFR 315.901; DOE O 360.1; and DOE O 320.1): * New supervisors: 80 hours of supervisory training, with 40 hours required to be completed during the supervisory probationary period. * Experienced supervisors: minimum of 8 hours of supervisory training each year. The Office of Learning and Workforce Development has developed an inventory of training and developmental activities that will meet the supervisory training requirements. The DOE courses Supervisory Essentials (32 hours) and Navigating the Federal Hiring Process (8 hours) are required to fulfill the first year 40-hour training