Powered by Deep Web Technologies
Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS...  

Broader source: Energy.gov (indexed) [DOE]

CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS. Key Cyber...

2

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Broader source: Energy.gov (indexed) [DOE]

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA Cybersecurity Program Manager (CSPM...

3

NERSC Cyber Security Challenges That Require DOE Development and Support  

E-Print Network [OSTI]

) is to accelerate the pace of scientific discovery by providing high performance computing, information, data, and impacts the productivity of the DOE Science community. In particular, NERSC and other high performance computing (HPC) centers have special security challenges that are unlikely to be met unless DOE funds

Geddes, Cameron Guy Robinson

4

NERSC Cyber Security Challenges That Require DOE Development andSupport  

SciTech Connect (OSTI)

Traditional security approaches do not adequately addressall the requirements of open, scientific computing facilities. Many ofthe methods used for more restricted environments, including almost allcorporate/commercial systems, do not meet the needs of today's science.Use of only the available "state of the practice" commercial methods willhave adverse impact on the ability of DOE to accomplish its sciencegoals, and impacts the productivity of the DOE Science community. Inparticular, NERSC and other high performance computing (HPC) centers havespecial security challenges that are unlikely to be met unless DOE fundsdevelopment and support of reliable and effective tools designed to meetthe cyber security needs of High Performance Science. The securitychallenges facing NERSC can be collected into three basic problem sets:network performance and dynamics, application complexity and diversity,and a complex user community that can have transient affiliations withactual institutions. To address these problems, NERSC proposes thefollowing four general solutions: auditing user and system activityacross sites; firewall port configuration in real time;cross-site/virtual organization identity management and access control;and detecting security issues in application middleware. Solutions arealsoproposed for three general long term issues: data volume,application complexity, and information integration.

Draney, Brent; Campbell, Scott; Walter, Howard

2007-01-16T23:59:59.000Z

5

Extension of DOE Directive on Cyber Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

2003-06-04T23:59:59.000Z

6

Cyber Security Requirements for Wireless Devices and Information Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-11T23:59:59.000Z

7

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

8

Cyber Security Requirements for Risk Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

9

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

10

Foreign National Access to DOE Cyber Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.16, dated 9-15-05, extends this Notice until 9-30-06, unless sooner rescinded. To ensure foreign national access to DOE cyber systems continues to advance DOE program objectives while enforcing information access restrictions.

1999-11-01T23:59:59.000Z

11

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

12

DOE Issues Energy Sector Cyber Organization NOI  

Broader source: Energy.gov (indexed) [DOE]

sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. The cyber organization is...

13

DOE Issues Energy Sector Cyber Organization NOI  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana. DOCUMENTSof Energy DOE ChallengeThese(Notice ofIssues National Energy

14

Department of Energy Cyber Security Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

15

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

16

Department of Energy Cyber Security Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

17

Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish Department of Energy (DOE) requirements and responsibilities for reporting cyber security incidents involving classified and unclassified systems and responding to cyber security alerts and advisories; and to implement requirements of DOE N 205.1, Unclassified Cyber Security Program, and DOE M 471.2-2, Classified Information Systems Security Manual. DOE N 205.13, dated 7-6-04, extends this notice until 7-6-05. Cancels DOE M 471.2-2, Chapter III, section 8.

2002-03-18T23:59:59.000Z

18

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

19

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

20

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8

2011-05-16T23:59:59.000Z

22

Cyber-Physical System Requirements -A Model Driven Approach Cyber-physical systems (CPS) networked  

E-Print Network [OSTI]

systems such as infusion pumps. Complete and consistent requirements are central to analysis. A generic patient controlled analgesia (GPCA) infusion pump system was used as a case example to provide: Generic Patient Controlled Analgesia Infusion Pump System. Figure: Infusion Pump Plant Model. Figure

Minnesota, University of

23

DOE-STD-1104 Requirements Crosswalk  

Office of Environmental Management (EM)

09 to DOE-STD-1104-2014 Requirements Matrix - 1 - No. Section Page Number DOE-STD-1104-2009 Requirement DOE-STD-1104-2014 Requirements Comment Gen DOE-STD-1104-2009 was broadly...

24

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012.

2011-05-16T23:59:59.000Z

25

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. Cancels DOE O 205.1A, DOE M 205.1-4, DOE M 205.1-5, DOE M 205.1-6, DOE M 205.1-7 and DOE M 205.1-8. Admin Chg 1, dated 12-7-2012; Chg 2, dated 3-11-13.

2011-05-16T23:59:59.000Z

26

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

27

Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

2004-02-19T23:59:59.000Z

28

Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements  

SciTech Connect (OSTI)

Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was selected from the list of standards identified in the identification effort. The requirements in these seven standards were then compared against the requirements given in the Framework. This comparison identified gaps (requirements not covered) in both the individual industry standards and in the Framework. In addition to the sector-specific standards reviewed, the team compared the requirements in the cross-sector Instrumentation, Systems, and Automation Society (ISA) Technical Reports (TR) 99 -1 and -2 to the Framework requirements. The Framework defines a set of security classes separated into families as functional requirements for control system security. Each standard reviewed was compared to this template of requirements to determine if the standard requirements closely or partially matched these Framework requirements. An analysis of each class of requirements pertaining to each standard reviewed can be found in the comparison results section of this report. Refer to Appendix A, ''Synopsis of Comparison Results'', for a complete graphical representation of the study's findings at a glance. Some of the requirements listed in the Framework are covered by many of the standards, while other requirements are addressed by only a few of the standards. In some cases, the scope of the requirements listed in the standard for a particular industry greatly exceeds the requirements given in the Framework. These additional families of requirements, identified by the various standards bodies, could potentially be added to the Framework. These findings are, in part, due to the maturity both of the security standards themselves and of the different industries current focus on security. In addition, there are differences in how communication and control is used in different industries and the consequences of disruptions via security breaches to each particular industry that could affect how security requirements are prioritized. The differences in the requirements listed in the Framework and in the various industry standards are due, in part, to differences in the level and purpose of the standards. While the requir

Robert P. Evans

2005-09-01T23:59:59.000Z

29

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Broader source: Energy.gov (indexed) [DOE]

incident characterization (i.e., Type 1 or Type 2) and categorization (i.e., low, medium, high, or very high). * Respond to and report incidents within mandated timeframes...

30

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana. DOCUMENTS AVAILABLEReportEnergyDevelopingSolid-StateBrings Together01-13

31

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program (CSP) that protects information and information systems for the Department of Energy (DOE). Chg 1 dated 12-7-2012; Chg 2 dated 3-11-2013; Chg 3, dated 4-29-2014, cancels Chg 2.

2011-05-16T23:59:59.000Z

32

Justification Memoranda - DOE Directives, Delegations, and Requirement...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for EJ and EK Pay Plans Records Management Program (5-26-11) Department of Energy Personal Property Management Program Department of Energy Cyber Security Program Facility Safety...

33

PACIFIC NORTHWEST CYBER SUMMIT  

SciTech Connect (OSTI)

On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energy’s (DOE’s) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOE’s Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.

Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.; Smith, Karen S.

2013-08-07T23:59:59.000Z

34

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

35

DOE Office of Science Exascale Requirements Reviews  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2020-2025 The three DOE Office of Advanced Scientific Computing (ASCR) High Performance Computing (HPC) Facilities are conducting a series of six Exascale Requirements...

36

Cyber Security and Resilient Systems  

SciTech Connect (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

37

Conduct of Operations Requirements for DOE Facilities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

"To provide requirements and guidelines for Departmental Elements, including the National Nuclear Security Administration (NNSA), to use in developing directives, plans, and/or procedures relating to the conduct of operations at DOE facilities. The implementation of these requirements and guidelines should result in improved quality and uniformity of operations. Change 2, 10-23-2001. Canceled by DOE O 422.1.

1990-07-09T23:59:59.000Z

38

Extension of DOE Directives  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The following directives are extended until 3-18-06: DOE N 205.8, Cyber Security Requirements for Wireless Devices and Information Systems, dated 2-11-04; DOE N 205.9, Certification and Accreditation Process for Information Systems Including National Security Systems, dated 02-19-04; DOE N 205.10, Cyber Security Requirements for Risk Management, dated 02-19-04; DOE N 205.11, Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems, dated 2-19-04. DOE N 205.12, Clearing, Sanitizing, and Destroying Information System Storage Media, Memory Devices, and Other Related Hardware, dated 2-19-04.

2005-03-18T23:59:59.000Z

39

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASLNanoporousTestimonyContactWebsite Administrator The DOE

40

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Requirements in DOE O 5480.19, Conduct of Operations Requirements...  

Broader source: Energy.gov (indexed) [DOE]

Requirements in DOE O 5480.19, Conduct of Operations Requirements for DOE Facilities Cross-referenced to DOE O 422.1, Conduct of Operations. Requirements in DOE O 5480.19, Conduct...

42

POLICY GUIDANCE MEMORANDUM #33 - Requirements for DOE Delegated...  

Energy Savers [EERE]

3 - Requirements for DOE Delegated Examining Procedures POLICY GUIDANCE MEMORANDUM 33 - Requirements for DOE Delegated Examining Procedures The purpose of this guidance is to...

43

News & Updates - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the Workplace NEW - DOE O 452.2E, Nuclear Explosive Safety NEW - DOE O 422.1 Admin Chg 2, Conduct of Operations NEW - DOE P 481.1, DOE's Policy Regarding Laboratories, Plants and...

44

Certification Memos - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Chg 1 Certification for DOE P 456.1 Certification for DOE G 440.1-7A Certification for DOE G 441.1-1C Certification for DOE G 414.1-4 Certification for DOE M 441.1-1 and DOE O...

45

Dictionary - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1997 CRD: No DNFSB: No Related History Exemptions Standards Related to: DOE G 430.1-1 Chp 9, Operating Costs DOE G 430.1-1 Chp 19, Data Collection and Normalization for the...

46

References - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1997 CRD: No DNFSB: No Related History Exemptions Standards Related to: DOE G 430.1-1 Chp 9, Operating Costs DOE G 430.1-1 Chp 19, Data Collection and Normalization for the...

47

Task Scheduling for Control Oriented Requirements for Cyber-Physical Systems Fumin Zhang, Klementyna Szwaykowska, Wayne Wolf, and Vincent Mooney  

E-Print Network [OSTI]

Institute of Technology Atlanta, GA, 30332 Email: {fumin, klimka, wolf, mooney}@gatech.edu Abstract The wide applications of cyber-physical systems (CPS) call for effective design strategies that optimize the perfor- mance of both computing units and physical plants. We study the task scheduling problem for a class

Mooney, Vincent

48

Directives Help - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Directives Help by Website Administrator All DOE directives are available through this site. While it may seem overwhelming, given the number of documents, we have provided a...

49

Introduction - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Chp 1, Introduction by John Makepeace Functional areas: Work Processes The objective of this Guide is to improve the quality of cost estimates and further strengthen the DOE...

50

News - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Explosive and Weapon Surety Program - Read More... NEW - DOE O 422.1 Admin Chg 2, Conduct of Operations - by Diane Johnson - last modified Jan 05, 2015 03:39 PM The...

51

DOE RFI 2010-11129 NBP RFI: Communications Requirements Titled...  

Broader source: Energy.gov (indexed) [DOE]

the National Broadband Plan by Studying the Communications Requirements of Electric Utilities to Inform Federal Smart Grid Policy" DOE RFI 2010-11129 NBP RFI: Communications...

52

Application of Engineering and Technical Requirements for DOE...  

Broader source: Energy.gov (indexed) [DOE]

This Standard Review Plan (SRP), Application of Engineering and Technical Requirements for DOE Nuclear Facilities, was developed by the Chief of Nuclear Safety (CNS)1, Office of...

53

Types of Cost Estimates - DOE Directives, Delegations, and Requirement...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CURRENT DOE G 430.1-1 Chp 4, Types of Cost Estimates by John Makepeace Functional areas: Procurement, Project Management The chapter describes the estimates required on...

54

DOE Departmental Elements - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: Crude OilPublicDNA GridironDNA-DirectedMediaDOE

55

Formulating Cyber-Security as Convex Optimization Problems  

E-Print Network [OSTI]

Formulating Cyber-Security as Convex Optimization Problems Kyriakos G. Vamvoudakis, Jo~ao P. Mission-centric cyber-security analysts require a complete overview and understanding of the state. Keywords: Cyber-Security, Convex Optimization, System Identifica- tion, iCTF 1 Introduction Guaranteeing

Hespanha, JoĂŁo Pedro

56

Formulating Cyber-Security as Convex Optimization Problems  

E-Print Network [OSTI]

Formulating Cyber-Security as Convex Optimization ProblemsĂ? Kyriakos G. Vamvoudakis1 , Jo~ao P,vigna}@cs.ucsb.edu Abstract. Mission-centric cyber-security analysts require a complete overview and understanding The Flag (iCTF) hacking competition. Keywords: Cyber-Security, Convex Optimization, System Identifica- tion

Vigna, Giovanni

57

Delegation Procedures - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy's primary means of establishing policies, requirements, responsibilities, and procedures for Departmental elements and contractors. Directives Program Management Camille...

58

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

59

Facility Safety - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Change, Safety, The order establishes facility and programmatic safety requirements for nuclear and explosives safety design criteria, fire protection, criticality safety,...

60

Contact Form - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contact Form by Diane Johnson Directives are the Department of Energy's Primary means of establishing policies, requirements, responsibilities, and procedures for Departmental...

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

The Schedule - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

funds are required. This chapter will briefly discuss some scheduling basics. g4301-1chp12.pdf -- PDF Document, 60 KB Writer: John Makepeace Subjects: Administration Management...

62

NERSC/DOE BER Requirements Workshop Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Christopher Kerr | Global Cloud Resolving Model May 7, 2009 | Author(s): David Randall | IO Requirements for a Global Cloud Resolving Model May 7, 2009 | Author(s): Bruce...

63

Personal Property - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven AshbyDepartment ofGE'sOptimizationUSING CRonOtherDOE

64

Delegation Procedures - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phasesData Files Data Files 1B&W Y-12studiesDOE Directives,Breadcrumb

65

DOE Office of Science Exascale Requirements Reviews  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: Crude OilPublicDNALostPlasma Physics LabDOE

66

DPC Resources - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINL is a U.S. DepartmentDOE/WIPP-13-3507 2EG

67

IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013 847 Cyber-Physical Security Testbeds: Architecture,  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 4, NO. 2, JUNE 2013 847 Cyber-Physical Security Testbeds-physical systems, cyber security, smart grid, testbeds. I. INTRODUCTION CYBER security incidents have gained the importance of cyber security due to more substantial ICT dependencies. The U.S. Department of Energy (DOE

Manimaran, Govindarasu

68

Browse Designations - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone6 M.ExtracellularBradburyBrianforRequirements

69

DOE Requires Manufacturer and Labeler to Cease Sale of Incandescent...  

Broader source: Energy.gov (indexed) [DOE]

Manufacturer and Labeler to Cease Sale of Incandescent Reflector Lamps DOE Requires Manufacturer and Labeler to Cease Sale of Incandescent Reflector Lamps June 24, 2010 - 2:40pm...

70

Cyber Incidents Involving Control Systems  

SciTech Connect (OSTI)

The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

Robert J. Turk

2005-10-01T23:59:59.000Z

71

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

72

Department of Energy Cyber Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Modifications correct changes to the composition of Senior DOE Management organizations, name change from DOE Cyber Incident Response Capability to Joint Cybersecurity Coordination Center and transfer of responsibility for communications security and TEMPEST to the Office of Health, Safety and Security.

2012-12-06T23:59:59.000Z

73

Enhance your Cyber Security Knowledge  

E-Print Network [OSTI]

Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

74

Personnel Selection, Qualification, and Training Requirements for DOE Nuclear Facilities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish selection, qualification, and training requirements for management and operating (M&O) contractor personnel involved in the operation, maintenance, and technical support of Department of Energy and National Nuclear Security Administration Category A and B reactors and non-reactor nuclear facilities. Canceled by DOE O 426.2

2001-07-12T23:59:59.000Z

75

CyberPhysical System Security for the Electric Power Grid  

E-Print Network [OSTI]

systems that may be vulnerable to security attacks is discussed in this paper as are control loop successful cyber attacks. Estimating feasible attack impact requires an evaluation of the grid's dependency of the cyber­physical relationships within the smart grid and a specific review of possible attack vectors

Manimaran, Govindarasu

76

Help for the Developers of Control System Cyber Security Standards  

SciTech Connect (OSTI)

A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

Robert P. Evans

2008-05-01T23:59:59.000Z

77

News & Updates - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn CyberNeutronsNew research contractResources

78

NERSC/DOE FES Requirements Workshop Worksheet - Zhihong Lin  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Center and GPS-TTBP Center Principal Investigator Zhihong Lin Participating Organizations University of California, Irvine Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2....

79

NERSC/DOE BES Requirements Workshop Worksheet - Tony Ladd  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Principal Investigator Tony Ladd Participating Organizations University of Florida University of Warsaw Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project...

80

NERSC/DOE FES Requirements Workshop Worksheet - Kai Germaschewski  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Turbulence Principal Investigator Amitava Bhattacharjee Participating Organizations University of New Hampshire Dartmouth College Funding Agencies DOE SC DOE NSA NSF NOAA NIH...

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

NERSC/DOE FES Requirements Workshop Worksheet - John Ludlow  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Laboratory Los Alamos National Laboratory University of Strathclyde Queen's University of Belfast Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: EAEC, IAEA 2....

82

NERSC/DOE BES Requirements Workshop Worksheet - Burkhard Militzer  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Pressure Materials Principal Investigator Burkhard Militzer Participating Organizations University of California, Berkeley Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2....

83

NERSC/DOE BES Requirements Workshop Worksheet - Randy Cygan  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sandia National Laboratories Michigan State University Northwestern University Purdue University Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary &...

84

NERSC/DOE FES Requirements Workshop Worksheet - Alex Friedman  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Fusion Energy) Principal Investigator Alex Friedman Participating Organizations LBNL, LLNL, PPPL, Univ. of Maryland Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2....

85

NERSC/DOE BES Requirements Workshop Worksheet - Habib Najm  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Organizations Sandia National Laboratories Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a...

86

NERSC/DOE FES Requirements Workshop Worksheet - William Tang  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

William Tang Participating Organizations Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a...

87

NERSC/DOE FES Requirements Workshop Worksheet - Stephane Ethier  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Weixing Wang Participating Organizations PPPL Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a...

88

NERSC/DOE FES Requirements Workshop Worksheet - Linda Sugiyama  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sugiyama Participating Organizations test data Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a...

89

NERSC/DOE BES Requirements Workshop Worksheet - Thomas Miller  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

California Institute of Technology Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a...

90

NERSC/DOE FES Requirements Workshop Worksheet - Stephen Jardin  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Participating Organizations PPPL, MIT, NYU Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a...

91

NERSC/DOE FES Requirements Workshop Worksheet - Scott Kruger  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Scott Kruger Participating Organizations Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a...

92

Metaphors for cyber security.  

SciTech Connect (OSTI)

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

93

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

94

Notice of Intent to Develop DOE O 470.5, Integrating Existing Technical Security Program Requirements  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This memorandum provides justification for the development of one integrated and consolidated set of requirements for the Department of Energy (DOE) Technical Security Program (TSP). This Order will combine the existing necessary requirements from DOE Manual (M) 205.1-3, Telecommunications Security Manual, dated 4-17-2006 and DOE M 470.4-4A chg.1, Information Security Manual, dated 10-12-2010; Section D -Technical Surveillance Countermeasures, into a single DOE Order defining the DOE TSP.

2013-08-21T23:59:59.000Z

95

New Justification Memos - DOE Directives, Delegations, and Requirement...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Justification Memos by Diane Johnson DOE N 200.1 - Notice of Intent to Develop an Information Sharing and Safeguarding Program Notice DOE G 580.1-1 - Notice of Intent to Revise...

96

Cyber threat metrics.  

SciTech Connect (OSTI)

Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

2012-03-01T23:59:59.000Z

97

Cyber Friendly Fire  

SciTech Connect (OSTI)

Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public. The network is essentially divided into a production component that hosts the web and network services, and a user component that hosts thirty employee workstations and other end devices. The organization's network is separated from the Internet by a Cisco ASA network security device that both firewalls and detects intrusions. Business sensitive information is stored in various servers. This includes data comprising thousands of internal documents, such as finance and technical designs, email messages for the organization's employees including the CEO, CFO, and CIO, the organization's source code, and Personally Identifiable client data. Release of any of this information to unauthorized parties would have a significant, detrimental impact on the organization's reputation, which would harm earnings. The valuable information stored in these servers pose obvious points of interest for an adversary. We constructed several scenarios around this environment to support studies in cyber SA and cyber FF that may be run in the test range. We describe mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approaches. Finally, we discuss possible future research directions.

Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

2011-09-01T23:59:59.000Z

98

Direct/Indirect Costs - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(CCMD) and describes various estimating techniques for direct and indirect costs. g4301-1chp7.pdf -- PDF Document, 41 KB Writer: John Makepeace Subjects: ID: DOE G 430.1-1 Chp 7...

99

Cost Estimation Package - DOE Directives, Delegations, and Requirement...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

components (or elements) of the cost estimation package and their documentation. g4301-1chp2.pdf -- PDF Document, 10 KB Writer: John Makepeace Subjects: ID: DOE G 430.1-1 Chp 2...

100

Nuclear Safety Policy - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ARCHIVED SEN-35-91, Nuclear Safety Policy by jnichols Functional areas: Environment, Safety, and Health, Canceled by DOE P 420.1 n3591.pdf -- PDF Document, 20 KB Writer: jnichols...

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Process Control System Cyber Security Standards - An Overview  

SciTech Connect (OSTI)

The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

Robert P. Evans

2006-05-01T23:59:59.000Z

102

Modeling Cyber Conflicts Using an Extended Petri Net Formalism  

SciTech Connect (OSTI)

When threatened by automated attacks, critical systems that require human-controlled responses have difficulty making optimal responses and adapting protections in real- time and may therefore be overwhelmed. Consequently, experts have called for the development of automatic real-time reaction capabilities. However, a technical gap exists in the modeling and analysis of cyber conflicts to automatically understand the repercussions of responses. There is a need for modeling cyber assets that accounts for concurrent behavior, incomplete information, and payoff functions. Furthermore, we address this need by extending the Petri net formalism to allow real-time cyber conflicts to be modeled in a way that is expressive and concise. This formalism includes transitions controlled by players as well as firing rates attached to transitions. This allows us to model both player actions and factors that are beyond the control of players in real-time. We show that our formalism is able to represent situational aware- ness, concurrent actions, incomplete information and objective functions. These factors make it well-suited to modeling cyber conflicts in a way that allows for useful analysis. MITRE has compiled the Common Attack Pattern Enumera- tion and Classification (CAPEC), an extensive list of cyber attacks at various levels of abstraction. CAPEC includes factors such as attack prerequisites, possible countermeasures, and attack goals. These elements are vital to understanding cyber attacks and to generating the corresponding real-time responses. We demonstrate that the formalism can be used to extract precise models of cyber attacks from CAPEC. Several case studies show that our Petri net formalism is more expressive than other models, such as attack graphs, for modeling cyber conflicts and that it is amenable to exploring cyber strategies.

Zakrzewska, Anita N [ORNL; Ferragut, Erik M [ORNL

2011-01-01T23:59:59.000Z

103

Elisa Bertino Cyber Center  

E-Print Network [OSTI]

on Information and System Security, ACM Transactions on Web, Acta Informatica, the Parallel and Distributed Society Tsutomu Kanai Award "For pioneering and innovative research contributions to secure distributed Elisa Bertino Director, Cyber Center bertino@purdue.edu 765-496-2399 Elisa Bertino is professor

Ginzel, Matthew

104

DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air...  

Broader source: Energy.gov (indexed) [DOE]

Minimum Appliance Standards DOE Requires Manufacturers to Halt Sales of Heat Pumps and Air Conditioners Violating Minimum Appliance Standards June 3, 2010 - 2:17pm Addthis...

105

DOE Challenge Home, California Program Requirements | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana. DOCUMENTSof Energy DOE Challenge Home Recommended QualityDOE Challenge

106

DOE Challenge Home, Washington Program Requirements | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana. DOCUMENTSof Energy DOE Challenge Home Recommended QualityDOE

107

Enforcement handbook: Enforcement of DOE nuclear safety requirements  

SciTech Connect (OSTI)

This Handbook provides detailed guidance and procedures to implement the General Statement of DOE Enforcement Policy (Enforcement Policy or Policy). A copy of this Enforcement Policy is included for ready reference in Appendix D. The guidance provided in this Handbook is qualified, however, by the admonishment to exercise discretion in determining the proper disposition of each potential enforcement action. As discussed in subsequent chapters, the Enforcement and Investigation Staff will apply a number of factors in assessing each potential enforcement situation. Enforcement sanctions are imposed in accordance with the Enforcement Policy for the purpose of promoting public and worker health and safety in the performance of activities at DOE facilities by DOE contractors (and their subcontractors and suppliers) who are indemnified under the Price-Anderson Amendments Act. These indemnified contractors, and their suppliers and subcontractors, will be referred to in this Handbook collectively as DOE contractors. It should be remembered that the purpose of the Department`s enforcement policy is to improve nuclear safety for the workers and the public, and this goal should be the prime consideration in exercising enforcement discretion.

NONE

1995-06-01T23:59:59.000Z

108

NERSC/DOE BES Requirements Workshop Worksheet - Normand Modine  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Modine BES Requirements Worksheet 1.1. Project Information - Center for Integrated Nanotechnology (CINT) - Theory and Simulation Thrust Document Prepared By Normand Modine Project...

109

Silver Spring Networks comments on DOE NBP RFI: Comms Requirements |  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas |DOE Former

110

DOE NEPA Guidance and Requirements - Search Index - Table of Contents |  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Deliciouscritical_materials_workshop_presentations.pdf MoreProgram |DOE ExercisesReserve |DepartmentSeptember

111

DOE NEPA Guidance and Requirements - Search Index | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehiclesTankless orAChiefAppropriation FYG 242.1-1 DOEDepartment ofDOE NEPA

112

POLICY GUIDANCE MEMORANDUM #33 - Requirements for DOE Delegated Examining  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf11-161-LNG |September 15, 2010Energy Series |DOE'sReassignments

113

Federal Protective Force - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicyFeasibility of SF(STEO) ď‚· EIA expectsARCHIVED DOE M 470.4-8,

114

THE ADVANCED COURSE IN ENGINEERING ON CYBER A Learning Community for Developing Cyber-Security Leaders  

E-Print Network [OSTI]

THE ADVANCED COURSE IN ENGINEERING ON CYBER SECURITY A Learning Community for Developing Cyber-Security in Engineering, ACE-CS immerses students in the cyber-security discipline through a combination of intense in Engineering on Cyber Security (ACE-CS) [1] is to develop the next generation of cyber-security leaders

Older, Susan

115

DOE-STD-1077-94; DOE Standard Training Accreditation Program Standard: Requirements and Guidelines  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Deliciouscritical_materials_workshop_presentations.pdfSTD-1040-93 DOE-STD-1040-93 DOE-STD-1070-94 June 1994857-94

116

Process Control System Cyber Security Standards - An Overview  

SciTech Connect (OSTI)

The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

2005-10-01T23:59:59.000Z

117

Browse Draft Directives - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone6 M.ExtracellularBradburyBrianforRequirementsBrowse Draft

118

Personnel Selection, Training, Qualification, and Certification Requirements for DOE Nuclear Facilities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes selection, training, qualification, and certification requirements for contractor personnel who can impact the safety basis through their involvement in the operation, maintenance, and technical support of Hazard Category 1, 2, and 3 nuclear facilities. Cancels DOE O 5480.20A. Admin Chg 1, dated 7-29-13, cancels DOE O 426.2.

2010-04-21T23:59:59.000Z

119

Cyber sleuths face off  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: Crude OilPublic Safety and100CurrentCybersecurityCyber

120

Cyber and physical infrastructure interdependencies.  

SciTech Connect (OSTI)

The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

2008-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

TA-55 Final Safety Analysis Report Comparison Document and DOE Safety Evaluation Report Requirements  

SciTech Connect (OSTI)

This document provides an overview of changes to the currently approved TA-55 Final Safety Analysis Report (FSAR) that are included in the upgraded FSAR. The DOE Safety Evaluation Report (SER) requirements that are incorporated into the upgraded FSAR are briefly discussed to provide the starting point in the FSAR with respect to the SER requirements.

Alan Bond

2001-04-01T23:59:59.000Z

122

Energy Cyber Other Degree Program  

E-Print Network [OSTI]

Rev. Energy Cyber Other Yes No Degree Program States National Security Implications of Energy & Environmental Stress New Theories of Cross-Advisor: Graduation Date: Curric Num: Power and Energy New Approaches to Understanding Dimensions of National Security

123

INL@Work Cyber Security  

SciTech Connect (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

124

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z

125

Visualizing Cyber Security: Usable Workspaces  

SciTech Connect (OSTI)

An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

2009-10-11T23:59:59.000Z

126

CyberSafety: On the Interactions between CyberSecurity and the  

E-Print Network [OSTI]

CyberSafety: On the Interactions between CyberSecurity and the Software Engineering of SafetyRZ. johnson@dcs.gla.ac.uk, http://www.dcs.gla.ac.uk/~johnson Keywords: Cyber Security, Cyber Safety security concerns. Malware has been detected in power distribution, healthcare, military and transportation

Johnson, Chris

127

THE ADVANCED COURSE IN ENGINEERING ON CYBER A Learning Community for Developing Cyber-Security Leaders  

E-Print Network [OSTI]

THE ADVANCED COURSE IN ENGINEERING ON CYBER SECURITY A Learning Community for Developing Cyber-Security Advanced Course in Engineering, ACE-CS immerses students in the cyber-security discipline through for the program. Key words: Cyber-security education, technical leadership, learning community. 1. INTRODUCTION

128

Transmission and Distribution World March 2007: DOE Focuses on...  

Broader source: Energy.gov (indexed) [DOE]

March 2007: DOE Focuses on Cyber Security Energy sector owners, operators and system vendors team up to boost control system security with national SCADA test bed. Energy Secrtor...

129

Extension of DOE Directives  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Effective immediately, DOE N 205.2, Foreign National Access to DOE Cyber Systems, dated 11-1-99, and DOE N 205.3, Password Generation, Protection, and Use, dated 11-23-99, are extended until 9-30-06, unless sooner rescinded.

2005-09-15T23:59:59.000Z

130

Extension of DOE Directives  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice extends the following directives until 2/16/04: DOE N 205.2, Foreign National Access to DOE Cyber Systems, and DOE N 205.3, Password Generation, Protection, and Use, dated 11/23/99-7/1/00.

2003-02-24T23:59:59.000Z

131

Extension of DOE Directives  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The following directives are extended until 8-12-04. DOE N 205.2, Foreign National Access to DOE Cyber Systems, dated 11/1/99. DOE N 205.3, Password Generation, Protection, and Use, dated 11/23/99.

2004-02-12T23:59:59.000Z

132

Extension of DOE Directives  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The following directives are extended until 8-12-05: DOE N 205.2, Foreign National Access to DOE Cyber Security Systems, dated 11-1-99 and DOE N 205.3, Password Generation, Protection, and Use, dated 11-23-99. No cancellations.

2004-08-12T23:59:59.000Z

133

Third Annual Cyber Security and Information  

E-Print Network [OSTI]

Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

Krings, Axel W.

134

Comparative Analysis Between US NRC Requirements and US DOE Orders - 13402  

SciTech Connect (OSTI)

Small modular reactor (SMR) is a nuclear reactor design approach that is expected to herald in a new era of clean energy in the U.S. These reactors are less than one-third the size of conventional large nuclear power reactors, and have factory-fabricated components that may be transported by rail or truck to a site selected to house a small nuclear reactor. To facilitate the licensing of these smaller nuclear reactor designs, the Nuclear Regulatory Commission (NRC) is in the process of developing a regulatory infrastructure to support licensing review of these unique reactor designs. As part of these activities, the NRC has been meeting with the Department of Energy (DOE) and with individual SMR designers to discuss potential policy, licensing, and key technical differences in SMR designs. It is anticipated by the NRC that such licensing interaction and guidance early in the design process will contribute towards minimizing complexity while adding stability and predictability in the licensing and subsequent regulation of new reactor designs such as SMRs. In conjunction with the current NRC initiative of developing the SMR licensing process, early communication and collaboration in the identification and resolution of any potential technical and licensing differences between NRC requirements and similar requirements applicable at DOE sites would help to expedite demonstration and implementation of SMR technology in the US. In order to foster such early communication, Savannah River Nuclear Solutions (SRNS) has begun taking the first steps in identifying and evaluating potential licensing gaps that may exist between NRC and DOE requirements in siting SMRs at DOE sites. A comparison between the existing NRC regulations for Early Site Permits and the DOE Orders was undertaken to establish the degree of correlation between NRC requirements and compliance methods in place at DOE sites. The ability to use existing data and information to expedite the development of the Environmental Report is being evaluated at the Savannah River Site as a case study for application across the DOE Complex. This paper will present areas of direct correlation as well as those where the need for site specific data for either DOE operations or NRC compliance warrant additional interaction between the agencies. Areas where further refinement of the SMR technologies may drive collaborative development of revised regulations through such means as industry consensus standards will also be highlighted. Both NRC and DOE have requirements that mandate public involvement in their processes. The importance and value of early engagement with the public as well as collaborating regulatory agencies is of critical importance when deploying new technologies. (authors)

Chakraborti, Sayan [MRIGlobal, 425 Volker Blvd, Kansas City, MO 64110 (United States)] [MRIGlobal, 425 Volker Blvd, Kansas City, MO 64110 (United States); Stone, Lynn; Hyatt, Jeannette [Savannah River Nuclear Solutions (United States)] [Savannah River Nuclear Solutions (United States)

2013-07-01T23:59:59.000Z

135

Cyber Security Evaluation of II&C Technologies  

SciTech Connect (OSTI)

The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

Ken Thomas

2014-11-01T23:59:59.000Z

136

DOE's General Counsel Announces New Policy Requiring Online Posting of NEPA Categorical Exclusion Determinations to Further Transparency  

Broader source: Energy.gov [DOE]

Washington, DC - Consistent with the President's commitment to "disclose information rapidly in forms that the public can readily find and use," DOE announced today a new policy requiring all DOE...

137

Personnel Selection, Training, Qualification, and Certification Requirements for DOE Nuclear Facilities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes selection, training, qualification, and certification requirements for contractor personnel who can impact the safety basis through their involvement in the operation, maintenance, and technical support of Hazard Category 1, 2, and 3 nuclear facilities. Cancels DOE O 5480.20A. Admin Chg 1, dated 7-29-13.

2010-04-21T23:59:59.000Z

138

Recommended Practice: Creating Cyber Forensics Plans for Control Systems  

SciTech Connect (OSTI)

Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.

Eric Cornelius; Mark Fabro

2008-08-01T23:59:59.000Z

139

ANNUAL HEATING AND COOLING REQUIREMENTS AND DESIGN DAY PERFORMANCE FOR A RESIDENTIAL MODEL IN SIX CLIMATES: A COMPARISON OF NBSLD, BLAST 2, AND DOE-2.1  

E-Print Network [OSTI]

BLAST DOE-2 (SWF) Annual Cooling Requirements (10 6 Btu)Btu) I'" I NBSLD III DOE-2 (SW'F) DOE-2 (CW'F) DOE-2 (CWF)Heating (1 Annual Total Btu) City Jan HINNEAPOLIS NBSLD

Carroll, William L.

2011-01-01T23:59:59.000Z

140

arvutimnguritus world cyber: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cyber-insurer, thereby making 74 SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Systems Fission and Nuclear Technologies Websites...

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

alleged russian cyber: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cyber-insurer, thereby making 69 SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Systems Fission and Nuclear Technologies Websites...

142

R&K Cyber Solutions licenses ORNL malware detection technology...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

R&K Cyber Solutions licenses ORNL malware detection technology R&K Cyber Solutions LLC has licensed Hyperion, a cyber security technology from the Department of Energy's Oak Ridge...

143

Convergence for the Smart Grid -On the technology opportunities for Future Cyber-Physical Energy Systems, invited paper at New Research Directions for Future Cyber-Physical Energy  

E-Print Network [OSTI]

Convergence for the Smart Grid - On the technology opportunities for Future Cyber-Physical Energy Angeles, CA. 90095 http://winmec.ucla.edu Email:smartgrid@winmec.ucla.edu Convergence for the Smart Grid into what the Future / Smart Electric Grid should look like. For example the DOE has a vision for the Modern

California at Los Angeles, University of

144

Modification of the U.S. Department of Energy`s (DOE) sytem of radiation protection requirements and guidance  

SciTech Connect (OSTI)

DOE has undertaken a major modification of its system of radiation protection guidance and requirements. The objectives of this modification are to (1) eliminate unnecessary and redundant requirements, (2) clearly delineate requirements from guidance, (3) codify all radiation protection requirements, and (4) move from a compliance based approach towards a performance based approach. To achieve these objectives DOE has (1) canceled DOE Order 5480.11, {open_quotes}Radiation Protection for DOE Workers,{close_quotes} DOE Order 5480.15, {open_quotes}Department of Energy Laboratory Accreditation Program (DOELAP) for Personnel Dosimetry,{close_quotes} and DOE Notice 5400.13, {open_quotes}Sealed Radioactive Source Accountability,{close_quotes} (2) converted the DOE Radiological Control (RadCon) Manual from mandatory to non mandatory status, and (3) issued DOE Notice 441.1 to maintain those requirements (not in 10 CFR 835) considered necessary for radiation protection of workers. DOE has initiated actions to (1) amend 10 CFR 835 (the Federal rule on occupational radiation protection in the DOE complex) to incorporate the requirements, or their equivalent, in DOE Notice 441.1, (2) issue a technical standard containing guidance on DOELAP, (3) reissue the DOE RadCon Manual as a non mandatory technical standard that reflects the amendments to 10 CFR 835, and (4) revise the implementation guides on radiation protection for consistency with 10 CFR 835 and the RadCon Manual. As a result of these modifications, the system of radiation protection in the DOE will become more comparable with the system of radiation protection used by commercial industry and with the system of protection applied to other areas of worker health and safety.

O`Connell, P.V.; Rabovsky, J.L.; Zobel, S.G. [Department of Energy, Germantown, MD (United States)

1996-06-01T23:59:59.000Z

145

Enforcement Guidance Supplement 99-02: DOE Enforcement Activities of Internal Dosimetry Program Requirements  

Broader source: Energy.gov [DOE]

Section 1.3 of the Operational Procedure entitled Enforcement of DOE Nuclear Safety Requirements under Price-Anderson Amendments Act of 1988, published in June 1998, provides the opportunity for the Office of Enforcement and Investigation (EH Enforcement) to issue clarifying guidance in a timely manner with respect to the processes used in its enforcement activities. The focus of this enforcement guidance clarifies internal dosimetry program requirements identified by the Department of Energy’s nuclear safety requirements in 10 CFR 835 (Occupational Radiation Protection Programs) and 10 CFR 830.120 (Quality Assurance Requirements). To develop the enforcement guidance, EH Enforcement convened a DOE working group which included representatives from the Field Office elements and the Office of Worker Protection Programs and Hazards Management, which is the office responsible for the content and technical clarifications of 10 CFR 835. The guide discusses the following areas: (1) prospective determination of employees that are “likely to receive” 100 millirem (mrem) or greater per 10 CFR 835.402, (Individual Monitoring); (2) application of enforcement policy in taking credit for respiratory protection in prospective determinations; (3) use of contractor’s policies regarding personnel internal exposure to radioactive material; (4) As Low As Reasonably Achievable (ALARA) programs; (5) clarification of enforcement with regard to internal dosimetry programs; and Final Comments.

146

The Technology of Cyber Operations Symposium on Cyber Operations and National  

E-Print Network [OSTI]

operations can be conducted with plausible deniability But adversaries make mistakes too, and allThe Technology of Cyber Operations Herb Lin Symposium on Cyber Operations and National Security not acknowledge role of offensive operations. · Offensive cyber operations can also have non-defensive purposes

147

Common Cyber Security Vulnerabilities Observed in Control System...  

Broader source: Energy.gov (indexed) [DOE]

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

148

A Scalable Framework for Cyber Attack Discovery and Situational...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

149

Office of Electricity Delivery and Energy Reliability Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On...

150

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

151

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

Amin, Saurabh

2011-01-01T23:59:59.000Z

152

Guide to Critical Infrastructure Protection Cyber Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for...

153

Graph anomalies in cyber communications  

SciTech Connect (OSTI)

Enterprises monitor cyber traffic for viruses, intruders and stolen information. Detection methods look for known signatures of malicious traffic or search for anomalies with respect to a nominal reference model. Traditional anomaly detection focuses on aggregate traffic at central nodes or on user-level monitoring. More recently, however, traffic is being viewed more holistically as a dynamic communication graph. Attention to the graph nature of the traffic has expanded the types of anomalies that are being sought. We give an overview of several cyber data streams collected at Los Alamos National Laboratory and discuss current work in modeling the graph dynamics of traffic over the network. We consider global properties and local properties within the communication graph. A method for monitoring relative entropy on multiple correlated properties is discussed in detail.

Vander Wiel, Scott A [Los Alamos National Laboratory; Storlie, Curtis B [Los Alamos National Laboratory; Sandine, Gary [Los Alamos National Laboratory; Hagberg, Aric A [Los Alamos National Laboratory; Fisk, Michael [Los Alamos National Laboratory

2011-01-11T23:59:59.000Z

154

DOE nuclear material packaging manual: storage container requirements for plutonium oxide materials  

SciTech Connect (OSTI)

Loss of containment of nuclear material stored in containers such as food-pack cans, paint cans, or taped slip lid cans has generated concern about packaging requirements for interim storage of nuclear materials in working facilities such as the plutonium facility at Los Alamos National Laboratory (LANL). In response, DOE has recently issued DOE M 441.1 'Nuclear Material Packaging Manual' with encouragement from the Defense Nuclear Facilities Safety Board. A unique feature compared to transportation containers is the allowance of filters to vent flammable gases during storage. Defining commonly used concepts such as maximum allowable working pressure and He leak rate criteria become problematic when considering vented containers. Los Alamos has developed a set of container requirements that are in compliance with 441.1 based upon the activity of heat-source plutonium (90% Pu-238) oxide, which bounds the requirements for weapons-grade plutonium oxide. The pre and post drop-test He leak rates depend upon container size as well as the material contents. For containers that are routinely handled, ease of handling and weight are a major consideration. Relatively thin-walled containers with flat bottoms are desired yet they cannot be He leak tested at a differential pressure of one atmosphere due to the potential for plastic deformation of the flat bottom during testing. The He leak rates and He leak testing configuration for containers designed for plutonium bearing materials will be presented. The approach to meeting the other manual requirements such as corrosion and thermal degradation resistance will be addressed. The information presented can be used by other sites to evaluate if their conditions are bounded by LANL requirements when considering procurement of 441.1 compliant containers.

Veirs, D Kirk [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

155

Requirements Crosswalk of DOE-STD-1104-2014 | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf11-161-LNG |September 15,2015Department ofRequirements Crosswalk of DOE-STD-1104-2014

156

Microgrid cyber security reference architecture.  

SciTech Connect (OSTI)

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

157

Analysis of waste treatment requirements for DOE mixed wastes: Technical basis  

SciTech Connect (OSTI)

The risks and costs of managing DOE wastes are a direct function of the total quantities of 3wastes that are handled at each step of the management process. As part of the analysis of the management of DOE low-level mixed wastes (LLMW), a reference scheme has been developed for the treatment of these wastes to meet EPA criteria. The treatment analysis in a limited form was also applied to one option for treatment of transuranic wastes. The treatment requirements in all cases analyzed are based on a reference flowsheet which provides high level treatment trains for all LLMW. This report explains the background and basis for that treatment scheme. Reference waste stream chemical compositions and physical properties including densities were established for each stream in the data base. These compositions are used to define the expected behavior for wastes as they pass through the treatment train. Each EPA RCRA waste code was reviewed, the properties, chemical composition, or characteristics which are of importance to waste behavior in treatment were designated. Properties that dictate treatment requirements were then used to develop the treatment trains and identify the unit operations that would be included in these trains. A table was prepared showing a correlation of the waste physical matrix and the waste treatment requirements as a guide to the treatment analysis. The analysis of waste treatment loads is done by assigning wastes to treatment steps which would achieve RCRA compliant treatment. These correlation`s allow one to examine the treatment requirements in a condensed manner and to see that all wastes and contaminant sets are fully considered.

NONE

1995-02-01T23:59:59.000Z

158

Manpower trends and training requirements for radiation protection personnel in the DOE contractor system  

SciTech Connect (OSTI)

This document reports results of a survey undertaken jointly by the Office of Nuclear Safety and the Office of Industrial Relations, US Department of Energy, with assistance from Oak Ridge Associated Universities. The purpose of the survey was twofold: (1) to determine the current status and recent trends in technician-level radiation safety manpower among DOE contractors; and (2) to document the scope of radiation safety training activities for radiation protection technicians and other workers within the DOE contractor system. Data reported here were obtained both by use of a formal written questionnaire completed by staff at 34 government-owned, contractor-operated (GOCO) nuclear facilities and through supplemental documentation obtained from contractors of training procedures and requirements. The first half of this report describes trends in radiation protection manpower and reports workforce characteristics of health physics technicians. The second half of the report describes program requirements and procedures in those facilities that conduct formal in-house training programs for their radiation protection workforces. 4 figures, 22 tables.

Trice, J.

1984-02-01T23:59:59.000Z

159

Engineering Resilient Cyber-Physical Systems  

E-Print Network [OSTI]

Engineering Resilient Cyber-Physical Systems Future Grid Thrust Area 6 White Paper Power Systems Engineering Research Center Empowering Minds to Engineer the Future Electric Energy System #12;Thrust Area 6 White Paper Engineering Resilient Cyber-Physical Systems Project Team Thomas J. Overbye University

160

Cyber Security in Smart Grid Substations  

E-Print Network [OSTI]

Cyber Security in Smart Grid Substations Thijs Baars Lucas van den Bemd Michail Theuns Robin van.089 3508 TB Utrecht The Netherlands #12;CYBER SECURITY IN SMART GRID SUBSTATIONS Thijs Baars T.Brinkkemper@uu.nl Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands

Utrecht, Universiteit

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

From Manual Cyber Attacks Forensic to  

E-Print Network [OSTI]

From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut-00995211,version1- #12;From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers, or governmental organisations. Experimental results of these forensic and high level characteriza- tion methods

Paris-Sud XI, Université de

162

Cyber-Physical System Verification Embedded Systems Group  

E-Print Network [OSTI]

(Felipe Bichued) 21 Introducing Simulation of Hybrid Systems with the Modelica Tool 32 #12;Cyber Physical

Berns, Karsten

163

The Science, Engineering, and Business of Cyber Security  

E-Print Network [OSTI]

's nuclear football © Ravi Sandhu 7 World-Leading Research with Real-World Impact! Cyber Security Goal ManyThe Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University of Texas at San

Sandhu, Ravi

164

A Two-Constraint Approach to Risky CyberSecurity  

E-Print Network [OSTI]

A Two-Constraint Approach to Risky CyberSecurity Experiment Management John Wroclawski, Jelena Mirkovic, Ted Faber, Stephen Schwab #12;Risky CyberSecurity Research CyberSecurity systems becoming more;Domains of interest Traditional risky experiment Virus dissection Modern risky CyberSecurity

Faber, Ted

165

Defense on the Move: Ant-Based Cyber Defense  

SciTech Connect (OSTI)

Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cyber Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.

Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.; Fulp, Errin W.

2014-04-15T23:59:59.000Z

166

Network QoS Management in Cyber-Physical Systems  

E-Print Network [OSTI]

Technical advances in ubiquitous sensing, embedded computing, and wireless communication are leading to a new generation of engineered systems called cyber-physical systems (CPS). CPS promises to transform the way we interact with the physical world just as the Internet transformed how we interact with one another. Before this vision becomes a reality, however, a large number of challenges have to be addressed. Network quality of service (QoS) management in this new realm is among those issues that deserve extensive research efforts. It is envisioned that wireless sensor/actuator networks (WSANs) will play an essential role in CPS. This paper examines the main characteristics of WSANs and the requirements of QoS provisioning in the context of cyber-physical computing. Several research topics and challenges are identified. As a sample solution, a feedback scheduling framework is proposed to tackle some of the identified challenges. A simple example is also presented that illustrates the effectiveness of the pr...

Xia, Feng; Dong, Jinxiang; Sun, Youxian

2008-01-01T23:59:59.000Z

167

Automatic Labeling for Entity Extraction in Cyber Security  

SciTech Connect (OSTI)

Timely analysis of cyber-security information necessitates automated information extraction from unstructured text. While state-of-the-art extraction methods produce extremely accurate results, they require ample training data, which is generally unavailable for specialized applications, such as detecting security related entities; moreover, manual annotation of corpora is very costly and often not a viable solution. In response, we develop a very precise method to automatically label text from several data sources by leveraging related, domain-specific, structured data and provide public access to a corpus annotated with cyber-security entities. Next, we implement a Maximum Entropy Model trained with the average perceptron on a portion of our corpus (~750,000 words) and achieve near perfect precision, recall, and accuracy, with training times under 17 seconds.

Bridges, Robert A [ORNL] [ORNL; Jones, Corinne L [ORNL] [ORNL; Iannacone, Michael D [ORNL] [ORNL; Testa, Kelly M [ORNL] [ORNL; Goodall, John R [ORNL] [ORNL

2014-01-01T23:59:59.000Z

168

Gamification for Measuring Cyber Security Situational Awareness  

SciTech Connect (OSTI)

Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

2013-03-01T23:59:59.000Z

169

Mathematical and Statistical Opportunities in Cyber Security  

SciTech Connect (OSTI)

The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question 'What fundamental problems exist within cyber security research that can be helped by advanced mathematics and statistics'? Our first and most important assumption is that access to real-world data is necessary to understand large and complex systems like the Internet. Our second assumption is that many proposed cyber security solutions could critically damage both the openness and the productivity of scientific research. After examining a range of cyber security problems, we come to the conclusion that the field of cyber security poses a rich set of new and exciting research opportunities for the mathematical and statistical sciences.

Meza, Juan; Campbell, Scott; Bailey, David

2009-03-23T23:59:59.000Z

170

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

171

NERSC/DOE BES Requirements Workshop Worksheet - Hai-Ping Cheng  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Organizations University of Florida Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a...

172

DOE Order 458.1 Property Clearance Requirements and Factors Considered...  

Office of Environmental Management (EM)

and consistency with DOE dose constraints. One option being considered is a hybrid approach using a national consensus standard for personal property and DOE derived...

173

Hazardous Substance Release Reporting Under CERCLA, EPCR {section}304 and DOE Emergency Management System (EMS) and DOE Occurrence Reporting Requirements. Environmental Guidance  

SciTech Connect (OSTI)

Releases of various substances from DOE facilities may be subject to reporting requirements under the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Emergency Planning and Community Right-to-Know Act (EPCRA), as well as DOE`s internal ``Occurrence Reporting and Processing of Operations Information`` and the ``Emergency Management System`` (EMS). CERCLA and EPCPA are Federal laws that require immediate reporting of a release of a Hazardous Substance (HS) and an Extremely Hazardous Substance (EHS), respectively, in a Reportable Quantity (RQ) or more within a 24-hour period. This guidance uses a flowchart, supplemental information, and tables to provide an overview of the process to be followed, and more detailed explanations of the actions that must be performed, when chemical releases of HSs, EHSs, pollutants, or contaminants occur at DOE facilities. This guidance should be used in conjunction with, rather than in lieu of, applicable laws, regulations, and DOE Orders. Relevant laws, regulations, and DOE Orders are referenced throughout this guidance.

Traceski, T.T.

1994-06-01T23:59:59.000Z

174

DOE-STD-1082-94; DOE Standard Preparation, Review, and Approval of Implementaiton Plans For Nuclear Safety Requirements  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Deliciouscritical_materials_workshop_presentations.pdfSTD-1040-93 DOE-STD-1040-93 DOE-STD-1070-94 June 1994857-9482-94

175

Chapter_14_Cyber_Security  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up fromDepartmentTieCelebrate Earth Day with SecretaryDerivedof&6. LIST OF::124 Cyber

176

Cyber Security | More Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FY 2012 FYCustomer-Comments SignCyanideCYBER

177

"Order Module--DOE O 426.2, PERSONNEL SELECTION, TRAINING, QUALIFICATION, AND CERTIFICATION REQUIREMENTS FOR DOE NUCLEAR FACILITIES  

Broader source: Energy.gov [DOE]

"To establish selection, training, qualification, and certification requirements for contractor personnel who can impact the safety basis through their involvement in the operation, maintenance,...

178

Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor  

SciTech Connect (OSTI)

Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.

Ondrej Linda; Todd Vollmer; Jason Wright; Milos Manic

2011-04-01T23:59:59.000Z

179

NERSC/DOE FES Requirements Workshop Worksheet - Doug McCune  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Doug McCune Participating Organizations Funding Agencies DOE SC DOE NSA NSF NOAA NIH Other: 2. Project Summary & Scientific Objectives for the Next 5 Years Please give a...

180

DOES YOUR VISITOR REQUIRE A CERTIFICATE OF SPONSORSHIP (COS)? Is your visitor  

E-Print Network [OSTI]

months? Yes Is the visitor a Bulgarian or Romanian national? Does the visitor have a registration card

Paxton, Anthony T.

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Cyber Security Audit and Attack Detection Toolkit  

SciTech Connect (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

182

DOE  

Gasoline and Diesel Fuel Update (EIA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"Click worksheet9,1,50022,3,,,,6,1,,781Title:DOBEIA-0202(83/4Q) Short-Term Energy Outlook QuarterlyDOE

183

Naval Postgraduate School Cyber Academic Group Graduation Checklist for MS Cyber Systems and Operations (CSO) Degree  

E-Print Network [OSTI]

Environment (3-2) ________ ___CY4700 Cyber Wargame: Blue Force Operations (2-5) ________ ___CY4710 Cyber Planned Qtr ___NW3230 Strategy & Policy (4-2) ________ ___NW3275 Joint Maritime Operations Part 1 (4-0) ________ ___NW3276 Joint Maritime Operations Part 2 (2-2) ________ ___NW3285 National Security Decision Making (4

184

Naval Postgraduate School Cyber Academic Group Graduation Checklist for MS Cyber Systems and Operations (CSO) Degree  

E-Print Network [OSTI]

Environment (3-2) ________ ___CY4700 Cyber Wargame: Blue Force Operations (2-5) ________ ___CY4710 Cyber Strategy & Policy (4-2) ________ ___NW3275 Joint Maritime Operations Part 1 (4-0) ________ ___NW3276 Joint and Operations (CSO) Degree 6208P Subspecialty Code (Effective for students commencing Fall AY11 to Winter AY13

185

Security Informatics Research Challenges for Mitigating Cyber Friendly Fire  

SciTech Connect (OSTI)

This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly re (FF). We dene cyber FF as intentional o*ensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission e*ectiveness of friendly or neutral forces. We describe examples of cyber FF and discuss how it ts within a general conceptual framework for cyber security failures. Because it involves human failure, cyber FF may be considered to belong to a sub-class of cyber security failures characterized as unintentional insider threats. Cyber FF is closely related to combat friendly re in that maintaining situation awareness (SA) is paramount to avoiding unintended consequences. Cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and o*ensive countermeasures that may be applied to thwart network attacks. We describe a test bed designed to support empirical research on factors a*ecting cyber FF. Finally, we discuss mitigation strategies to combat cyber FF, including both training concepts and suggestions for decision aids and visualization approaches.

Carroll, Thomas E.; Greitzer, Frank L.; Roberts, Adam D.

2014-09-30T23:59:59.000Z

186

cyber  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICE OF CIVILAMENDMENT OF0/%2A1/%2A2/%2A

187

Cyber Friendly Fire: Research Challenges for Security Informatics  

SciTech Connect (OSTI)

This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a system’s topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF— including both training concepts and suggestions for decision aids and visualization approaches—are discussed.

Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

2013-06-06T23:59:59.000Z

188

Status Report on Protected Domains for Cyber Infrastructure Management  

E-Print Network [OSTI]

through the use of distributed, highly secure, protected domains. Instead of creating a costly physically, Network Security, Information Assurance 1 Introduction Currently, our national cyber infrastructure to the President for Cyber Space Security and Chairman, President's Critical Infrastructure Protection Board

Irvine, Cynthia E.

189

Cyber-security Research Ethics Dialogue & Strategy Erin Kenneally  

E-Print Network [OSTI]

Cyber-security Research Ethics Dialogue & Strategy Workshop Erin Kenneally CAIDA/UC, San Diego La The inaugural Cyber-security Research Ethics Dialogue & Strat- egy Workshop was held on May 23, 2013

California at San Diego, University of

190

Fidelity-Aware Utilization Control for Cyber-Physical Surveillance Systems Jinzhu Chen1  

E-Print Network [OSTI]

environments. 1 Introduction Cyber-Physical System (CPS) is a new class of embed- ded systems that tightly fundamental requirement as many compu- tational tasks in a CPS must complete within tight deadlines in order computer for high-fidelity ob- ject detection and recognition. Both fidelity and timeliness are essential

191

Suspect/Counterfeit Items Guide for Use with 10 CFR 830 Subpart A, Quality Assurance Requirements, and DOE O 414.1B, Quality Assurance  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides guidance to assist DOE/NNSA and its contractors in mitigating the safety threat of suspect/counterfeit items (S/CIs). Cancels DOE G 440.1-6, Implementation Guide for use with Suspect/Counterfeit Items Requirements of DOE O 440.1, Worker Protection Management; 10 CFR 830.120; and DOE O 5700.6C, Quality Assurance, dated 6-30-97. Canceled by DOE G 414.1-2B.

2004-11-03T23:59:59.000Z

192

Developing a Power Measurement Framework for Cyber Defense  

E-Print Network [OSTI]

substations and hydroelectric facilities is a normal part of guerilla warfare [3]. Cyber attack of EDS systems, they have become more vulnerable to cyber-attacks as well. As part of a systems health monitoring approach, Experimentation, Security. Keywords Energy Delivery Systems, malware, rootkits, cyber-attacks, Power Distribution

Pouchard, Line

193

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-Print Network [OSTI]

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

194

INSTITUTE FOR CYBER SECURITY The PEI Framework for  

E-Print Network [OSTI]

not the right decision for securing distributed systems © Ravi Sandhu 5 #12;INSTITUTE FOR CYBER SECURITY PostINSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio May

Sandhu, Ravi

195

Mathematical and Statistical Opportunities in Cyber Security Scott Campbell  

E-Print Network [OSTI]

Mathematical and Statistical Opportunities in Cyber Security Juan Meza Scott Campbell David Bailey problems exist within cyber security research that can be helped by advanced mathematics and statistics large and complex systems like the Internet. Our second assumption is that many proposed cyber security

Bailey, David H.

196

INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for  

E-Print Network [OSTI]

-leading research with real-world impact! #12;INSTITUTE FOR CYBER SECURITY Super vs Micro-distribution in g-SIS 8INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Executive Director and Endowed Professor Institute for Cyber Security University of Texas at San Antonio

Sandhu, Ravi

197

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network [OSTI]

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director cai@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Squicciarini, Anna Cinzia

198

Center for Cyber-Security, Information Privacy, and Trust  

E-Print Network [OSTI]

Center for Cyber-Security, Information Privacy, and Trust http://cybersecurity.ist.psu.edu Dr. Peng Liu, Director pliu@ist.psu.edu Center for Cyber-Security, Information Privacy, and Trust 16802-6822 The Center for Cyber-Security, Information Privacy, and Trust, aka Lions Center

Giles, C. Lee

199

HEP Reporting Requirement | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-3624 F: (301) 903-2597 E: sc.hep@science.doe.gov More Information Funding Opportunities HEP Reporting...

200

Secure control systems with application to cyber-physical systems  

SciTech Connect (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

Dong, Jin [ORNL] [ORNL; Djouadi, Seddik M [ORNL] [ORNL; Nutaro, James J [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA Systems  

E-Print Network [OSTI]

SESSION: CYBER-PHYSICAL SYSTEM SECURITY IN A SMART GRID ENVIROMENT 1 Cyber-Security of SCADA of the power network. From another perspective the authors of [7] attempted to quantify the impact of a cyber is to identify the vulnerabilities of these safety critical infrastruc- tures, determine the impact that possible

Johansson, Karl Henrik

202

Evaluation Report on "The Department's Unclassified Cyber Security Program"  

SciTech Connect (OSTI)

Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

None

2009-10-01T23:59:59.000Z

203

Control Systems Cyber Security Standards Support Activities  

SciTech Connect (OSTI)

The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

Robert Evans

2009-01-01T23:59:59.000Z

204

The Clean Air Act Amendments of 1990: Hazardous Air Pollutant Requirements and the DOE Clean Coal Technology Program  

SciTech Connect (OSTI)

The purpose of the US Department of Energy -- Office of Fossil Energy (DOE FE) Clean Coal Technology Program (CCTP) is to provide the US energy marketplace with advanced, efficient, and environmentally sound coal-based technologies. The design, construction, and operation of Clean Coal Technology Demonstration Projects (CCTDP) will generate data needed to make informed, confident decisions on the commercial readiness of these technologies. These data also will provide information needed to ensure a proactive response by DOE and its industrial partners to the establishment of new regulations or a reactive response to existing regulations promulgated by the US Environmental Protection Agency (EPA). The objectives of this paper are to: (1) Present a preliminary examination of the potential implications of the Clean Air Act Amendments (CAAA) -- Title 3 Hazardous Air Pollutant requirements to the commercialization of CCTDP; and (2) help define options available to DOE and its industrial partners to respond to this newly enacted Legislation.

Moskowitz, P.D.; DePhillips, M.; Fthenakis, V.M. [Brookhaven National Lab., Upton, NY (United States); Hemenway, A. [USDOE Assistant Secretary for Fossil Energy, Washington, DC (United States)

1991-12-31T23:59:59.000Z

205

The Clean Air Act Amendments of 1990: Hazardous Air Pollutant Requirements and the DOE Clean Coal Technology Program  

SciTech Connect (OSTI)

The purpose of the US Department of Energy -- Office of Fossil Energy (DOE FE) Clean Coal Technology Program (CCTP) is to provide the US energy marketplace with advanced, efficient, and environmentally sound coal-based technologies. The design, construction, and operation of Clean Coal Technology Demonstration Projects (CCTDP) will generate data needed to make informed, confident decisions on the commercial readiness of these technologies. These data also will provide information needed to ensure a proactive response by DOE and its industrial partners to the establishment of new regulations or a reactive response to existing regulations promulgated by the US Environmental Protection Agency (EPA). The objectives of this paper are to: (1) Present a preliminary examination of the potential implications of the Clean Air Act Amendments (CAAA) -- Title 3 Hazardous Air Pollutant requirements to the commercialization of CCTDP; and (2) help define options available to DOE and its industrial partners to respond to this newly enacted Legislation.

Moskowitz, P.D.; DePhillips, M.; Fthenakis, V.M. (Brookhaven National Lab., Upton, NY (United States)); Hemenway, A. (USDOE Assistant Secretary for Fossil Energy, Washington, DC (United States))

1991-01-01T23:59:59.000Z

206

Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge  

SciTech Connect (OSTI)

The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

Ondrej Linda; Todd Vollmer; Milos Manic

2012-08-01T23:59:59.000Z

207

Cyber Security Through Science | More Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FY 2012 FYCustomer-Comments SignCyanideCYBER -Cyber

208

Norwich University Applied Research Institutes Cyber Security Education/Training and Exercises  

E-Print Network [OSTI]

Norwich University Applied Research Institutes Cyber Security Education/Training and Exercises October 18, 2013 ­ University of Memphis Cyber Security Expo #12;Training ­ Cyber Incident Awareness Training Emergency Management for IT Professionals Cyber Security Exercise Development Tools ­ Cyber Smart

Dasgupta, Dipankar

209

Cyber safety : a systems thinking and systems theory approach to managing cyber security risks  

E-Print Network [OSTI]

If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 Internet ...

Salim, Hamid M

2014-01-01T23:59:59.000Z

210

Implementation guide for use with suspect/counterfeit items: Requirements of DOE O 440.1, worker protection management; 10 CFR 830.120; and DOE 5700.6C, quality assurance  

SciTech Connect (OSTI)

Department of Energy (DOE) Order (O) 440.1, Worker Protection Management For DOE Federal and Contractors Employees, [7] sets forth requirements for DOE and its contractors to implement suspect and counterfeit items (S/CI) controls as part of the quality assurance (QA) programs required by 10 Code of Federal Regulations (CFR) 830.120 [8] or DOE 5700.6C, Quality Assurance [9]. DOE G-830.120, Implementation Guide for Use with 10 CFR Part 830.120, Quality Assurance, [10] provides additional guidance on establishing and implementing effective QA processes to control S/CIs. DOE O 232.1, Occurrence Reporting and Processing of Operations, [11] specifies requirements for reporting S/CIs under the DOE Occurrence Reporting and Processing System (ORPS). DOE promulgated the requirements and guidance to control or eliminate the hazards posed by S/CIs, which can lead to unexpected equipment failures and undue risks to the DOE mission, the environment, and personnel. This Guide is a compendium of information contained in the referenced DOE directives and other documents concerning S/CI controls. It incorporates, updates, and supersedes earlier guidance issued in Plan for the Suspect/Counterfeit Products Issue in the Department of Energy, dated October 1993, [4] and in memoranda issued by Defense Programs (DP) [12-16] and other DOE program offices. This guidance was developed to strengthen the procurement process, identify and eliminate S/CIs, and improve the reporting of S/CIs. The information in this Guide, when implemented by DOE and its contractors, will satisfy the S/CI requirements contained in the referenced DOE directives.

NONE

1997-06-01T23:59:59.000Z

211

rtino is prof of Cyber Ce  

E-Print Network [OSTI]

Program Technolo Worksho Bertino is Compute systems Compute to secure rtino is prof of Cyber Ce internatio Database Indexing Intelligen Services the Very on the e Security& on Web, Program VLDB, A Data Eng distributed fessor of Co enter and R nce and Se mputer Scien EC laborator maden) in S ers Universi arch

Holland, Jeffrey

212

MODELING SECURITY IN CYBER-PHYSICAL SYSTEMS  

E-Print Network [OSTI]

network at the Davis-Besse nuclear power plant in Oak Harbor, Ohio, was infected [39]. There have been the behavior of the adversary is controlled by a threat model that captures both the cyber aspects (with-physical systems, threat models, protocols for treaty verification. 1. Introduction The rapid growth of information

Burmester, Mike

213

DOE Requires Air-Con International to Cease Sales of Inefficient...  

Broader source: Energy.gov (indexed) [DOE]

requiring Air-Con to submit detailed information about the energy consumption of its products and how Air-Con marketed and sold them in the United States. Based on Air-Con's...

214

Decisions Regarding Drug Testing for DOE Positions That Require Access Authorization (Security Clearances)  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power SystemsResources DOE Zero EnergyData Center Optimization Plan3Energy 4, 2007: NETL's

215

Control Systems Cyber Security:Defense in Depth Strategies  

SciTech Connect (OSTI)

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

David Kuipers; Mark Fabro

2006-05-01T23:59:59.000Z

216

Control Systems Cyber Security: Defense-in-Depth Strategies  

SciTech Connect (OSTI)

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

Mark Fabro

2007-10-01T23:59:59.000Z

217

6/16/13 New search tool developed to catch cyber thieves post.jagran.com/new-search-tool-developed-to-catch-cyber-thieves-1370602608 1/5  

E-Print Network [OSTI]

cyber thieves Montreal: A new search tool developed by researchers in Canada can now help crime Lifestyle News Desk Cyber thief child porn search tool Canada cyber crime #12;6/16/13 New search tool6/16/13 New search tool developed to catch cyber thieves post.jagran.com/new-search-tool

Fung, Benjamin C. M.

218

Notice of Intent to Revise Department of Energy Order 426.2 Change 1, Personnel Selection, Training, Qualification and Certification Requirements for DOE Nuclear Facilities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Office of Nuclear Safety consulted field and Headquarters (HQ) offices on whether or not a revision is warranted for DOE O 426.2. As a result, certain aspects of DOE O 426.2 were identified as needing clarification and revision. Based on this feedback, the revision is intended to clarify educational requirements, certification requirements, and applicability. Addressing these concerns should improve operating training programs, and result in less time focused on managing ambiguous or possibly unnecessary requirements.

219

Notice of Intent to Revise Department of Energy Order 426.2 Change 1, Personnel Selection, Training, Qualification and Certification Requirements for DOE Nuclear Facilities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Office of Nuclear Safety consulted field and Headquarters (HQ) offices on whether or not a revision is warranted for DOE O 426.2. As a result, certain aspects of DOE O 426.2 were identified as needing clarification and revision. Based on this feedback, the revision is intended to clarify educational requirements, certification requirements, and applicability. Addressing these concerns should improve operating training programs, and result in less time focused on managing ambiguous or possibly unnecessary requirements.

2015-02-19T23:59:59.000Z

220

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...  

Broader source: Energy.gov (indexed) [DOE]

and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber...

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Investigating the effectiveness of many-core network processors for high performance cyber protection systems. Part I, FY2011.  

SciTech Connect (OSTI)

This report documents our first year efforts to address the use of many-core processors for high performance cyber protection. As the demands grow for higher bandwidth (beyond 1 Gbits/sec) on network connections, the need to provide faster and more efficient solution to cyber security grows. Fortunately, in recent years, the development of many-core network processors have seen increased interest. Prior working experiences with many-core processors have led us to investigate its effectiveness for cyber protection tools, with particular emphasis on high performance firewalls. Although advanced algorithms for smarter cyber protection of high-speed network traffic are being developed, these advanced analysis techniques require significantly more computational capabilities than static techniques. Moreover, many locations where cyber protections are deployed have limited power, space and cooling resources. This makes the use of traditionally large computing systems impractical for the front-end systems that process large network streams; hence, the drive for this study which could potentially yield a highly reconfigurable and rapidly scalable solution.

Wheeler, Kyle Bruce; Naegle, John Hunt; Wright, Brian J.; Benner, Robert E., Jr.; Shelburg, Jeffrey Scott; Pearson, David Benjamin; Johnson, Joshua Alan; Onunkwo, Uzoma A.; Zage, David John; Patel, Jay S.

2011-09-01T23:59:59.000Z

222

Cyber Security Audit and Attack Detection Toolkit: National SCADA...  

Broader source: Energy.gov (indexed) [DOE]

project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event...

223

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Broader source: Energy.gov (indexed) [DOE]

This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection...

224

Cyber Fit Pyramid for the home user. | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Publications Microsoft Word - Resource MaterialsOct09.doc INL Cyber Security Research (2008) "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8...

225

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy Savers [EERE]

Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common...

226

A Game Theoretic Approach to Cyber Attack Prediction  

SciTech Connect (OSTI)

The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

Peng Liu

2005-11-28T23:59:59.000Z

227

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

228

Sandia National Laboratories: Cyber Security for Electric Infrastructu...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

advancements in phasor measurement units (PMUs), distributed energy resources (DER), smart-grid technologies, and cloud computing services represent significant cyber security...

229

Lessons Learned from Cyber Security Assessments of SCADA and...  

Broader source: Energy.gov (indexed) [DOE]

of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY...

230

Quality Assurance Management System Guide for Use with 10 CFR 830 Subpart A, Quality Assurance Requirements, and DOE O 414.1C, Quality Assurance  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides information on principles and practices used to establish and implement an effective quality assurance program or quality management system in accordance with the requirements of 10 CFR 830. Cancels DOE G 414.1-2. Canceled by DOE G 414.1-2B.

2005-06-17T23:59:59.000Z

231

Supplemental Requirements for the Use of Management and Operating or Other Facility Management Contractor Employees for Services to DOE in the Washington, D.C., Area  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice supplements review and approval requirements of DOE O 350.2A, Use of Management and Operating (M&O) or Other Facility Management Contractor Employees for Services to DOE in the Washington, D.C., Area, dated 10-29-03.

2005-10-19T23:59:59.000Z

232

Towards Efficient Collaboration in Cyber Security  

SciTech Connect (OSTI)

Cyber security analysts in different geographical and organizational domains are often largely tasked with similar duties, albeit with domain-specific variations. These analysts necessarily perform much of the same work independently— for instance, analyzing the same list of security bulletins released by largely the same set of software vendors. As such, communication and collaboration between such analysts would be mutually beneficial to the analysts involved, potentially reducing redundancy and offering the opportunity to preemptively alert each other to high-severity security alerts in a more timely fashion. However, several barriers to practical and efficient collaboration exist, and as such, no such framework exists to support such efforts. In this paper, we discuss the inherent difficulties which make efficient collaboration between cyber security analysts a difficult goal to achieve. We discuss preliminary ideas and concepts towards a collaborative cyber-security framework currently under development, whose goal is to facilitate analyst collaboration across these boundaries. While still in its early stages, we describe work-in-progress towards achieving this goal, including motivation, functionality, concepts, and a high-level description of the proposed system architecture.

Hui, Peter SY; Bruce, Joseph R.; Fink, Glenn A.; Gregory, Michelle L.; Best, Daniel M.; McGrath, Liam R.; Endert, Alexander

2010-06-03T23:59:59.000Z

233

A proliferation resistant hexagonal tight lattice BWR fueled core for increased burnup and reduced fuel storage requirements. Annual progress report: August, 1999 to July, 2000 [DOE NERI  

SciTech Connect (OSTI)

(OAK/B204) A proliferation resistant hexagonal tight lattice BWR fueled core for increased burnup and reduced fuel storage requirements. Annual progress report: August, 1999 to July, 2000 [DOE NERI

Hiroshi Takahashi; Upendra Rohatgi; T.J. Downar

2000-08-04T23:59:59.000Z

234

Safety Software Guide for Use with 10 CFR 830, Subpart A, Quality Assurance Requirements, and DOE O 414.1C, Quality Assurance  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides acceptable methods for implementing the safety software quality assurance requirements of draft DOE O 414.1C, Quality Assurance. Certified 11-3-10. No cancellation.

2005-06-17T23:59:59.000Z

235

Towards A Theory of Autonomous Reconstitution of Compromised Cyber-Systems  

SciTech Connect (OSTI)

The ability to maintain mission-critical operations in cyber-systems in the face of disruptions is critical. Faults in cyber systems can come from accidental sources (e.g., natural failure of a component) or deliberate sources (e.g., an intelligent adversary). Natural and intentional manipulation of data, computing, or coordination are the most impactful ways that an attacker can prevent an infrastructure from realizing its mission goals. Under these conditions, the ability to reconstitute critical infrastructure becomes important. Specifically, the question is: Given an intelligent adversary, how can cyber systems respond to keep critical infrastructure operational? In cyber systems, the distributed nature of the system poses serious difficulties in maintaining operations, in part due to the fact that a centralized command and control apparatus is unlikely to provide a robust framework for resilience. Resilience in cyber-systems, in general, has several components, and requires the ability to anticipate and withstand attacks or faults, as well as recover from faults and evolve the system to improve future resilience. The recovery effort (and any subsequent evolution) may require significant reconfiguration of the system (at all levels – hardware, software, services, permissions, etc.) if the system is to be made resilient to further attack or faults. This is especially important in the case of ongoing attacks, where reconfiguration decisions must be taken with care to avoid further compromising the system while maintaining continuity of operations. Collectively, we will label this recovery and evolution process as “reconstitution”. Currently, reconstitution is performed manually, generally after-the-fact, and usually consists of either standing up redundant systems, check-points (rolling back the configuration to a “clean” state), or re-creating the system using “gold-standard” copies. For enterprise systems, such reconstitution may be performed either directly on hardware, or using virtual machines. A significant challenge within this context is the ability to verify that the reconstitution is performed in a manner that renders the cyber-system resilient to ongoing and future attacks or faults. Fundamentally, the need is to determine optimal configuration of the cyber system when a fault is determined to be present. While existing theories for fault tolerance (for example, Byzantine fault tolerance) can guarantee resilience under certain conditions, in practice, these theories can break down in the face of an intelligent adversary. Further, it is difficult, in a dynamically evolving environment, to determine whether the necessary conditions for resilience have been met, resulting in difficulties in achieving resilient operation. In addition, existing theories do not sufficiently take into account the cost for attack and defense (the adversary is generally assumed to have infinite resources and time), hierarchy of importance (all network resources are assumed to be equally important), and the dynamic nature of some attacks (i.e., as the attack evolves, can resilience be maintained?). Alternative approaches to resilience based on a centralized command and control structure suffer from a single-point-failure. This paper presents preliminary research towards concepts for effective autonomous reconstitution of compromised cyber systems. We describe a mathematical framework as a first step towards a theoretical basis for autonomous reconstitution in dynamic cyber-system environments. We then propose formulating autonomous reconstitution as an optimization problem and describe some of the challenges associated with this formulation. This is followed by a brief discussion on potential solutions to these challenges.

Ramuhalli, Pradeep; Halappanavar, Mahantesh; Coble, Jamie B.; Dixit, Mukul

2013-11-12T23:59:59.000Z

236

Collaborative Utility Task Force Partners with DOE to Develop Cyber  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power Systems EngineeringDepartment of4CenterPointChristinaClayCoal to Liquids »CogentrixSecurity

237

Transmission and Distribution World March 2007: DOE Focuses on Cyber  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyThe SunMelissa Howell | DepartmentSecurity |

238

October 2014 Mid-South Cyber Security Summit  

E-Print Network [OSTI]

government, industry, and academia. *Source: FCW citation: http://fcw.com/articles/2011/11/10/cybersecurity-workforce-planOctober 2014 Mid-South Cyber Security Summit Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce Benjamin Scribner Department of Homeland Security (DHS) National Cybersecurity

Dasgupta, Dipankar

239

Deception used for Cyber Defense of Control Systems  

SciTech Connect (OSTI)

Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

Wayne F. Boyer; Miles A. McQueen

2009-05-01T23:59:59.000Z

240

Embedded Cyber-Physical Anomaly Detection in Smart Meters  

E-Print Network [OSTI]

Embedded Cyber-Physical Anomaly Detection in Smart Meters Massimiliano Raciti, Simin Nadjm vulnerabilities that arise from deployment of local cyber-physical attacks at a smart metering location at destabilisation. In this paper we study a smart metering device that uses a trusted platform for storage

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

COST FUNCTIONS FOR SCHEDULING TASKS IN CYBER-PHYSICAL SYSTEMS  

E-Print Network [OSTI]

COST FUNCTIONS FOR SCHEDULING TASKS IN CYBER-PHYSICAL SYSTEMS Abhinna Jain, C.M. Krishna, Israel, cost functions, controlled plant dynamics Abstract: In Cyber Physical Systems (CPS), computational response times are different. In this paper, we consider using cost functions of task response time

Massachusetts at Amherst, University of

242

Impact Analysis of Transient Stability Due to Cyber Attack on FACTS Devices  

E-Print Network [OSTI]

and distribution systems [2]. There- fore, cyber security is becoming an important R&D concern for smart grid. Many attack, cyber security, smart grids, SVC, STATCOM, FACTS, transient stability, voltage support device I are not designed to be adequately protected from cyber attack, these applications introduce numerous cyber security

Kundur, Deepa

243

DOE Testing Reveals Samsung Refrigerator Does Not Meet Energy...  

Broader source: Energy.gov (indexed) [DOE]

Testing Reveals Samsung Refrigerator Does Not Meet Energy Star Requirements DOE Testing Reveals Samsung Refrigerator Does Not Meet Energy Star Requirements March 16, 2010 - 4:28pm...

244

CyberGIS software: a synthetic review and integration roadmap  

SciTech Connect (OSTI)

CyberGIS defined as cyberinfrastructure-based geographic information systems (GIS) has emerged as a new generation of GIS representing an important research direction for both cyberinfrastructure and geographic information science. This study introduces a 5-year effort funded by the US National Science Foundation to advance the science and applications of CyberGIS, particularly for enabling the analysis of big spatial data, computationally intensive spatial analysis and modeling (SAM), and collaborative geospatial problem-solving and decision-making, simultaneously conducted by a large number of users. Several fundamental research questions are raised and addressed while a set of CyberGIS challenges and opportunities are identified from scientific perspectives. The study reviews several key CyberGIS software tools that are used to elucidate a vision and roadmap for CyberGIS software research. The roadmap focuses on software integration and synthesis of cyberinfrastructure, GIS, and SAM by defining several key integration dimensions and strategies. CyberGIS, based on this holistic integration roadmap, exhibits the following key characteristics: high-performance and scalable, open and distributed, collaborative, service-oriented, user-centric, and community-driven. As a major result of the roadmap, two key CyberGIS modalities gateway and toolkit combined with a community-driven and participatory approach have laid a solid foundation to achieve scientific breakthroughs across many geospatial communities that would be otherwise impossible.

Wang, Shaowen [University of Illinois, Urbana-Champaign; Anselin, Luc [Arizona State University; Bhaduri, Budhendra L [ORNL; Cosby, Christopher [University Navstar Consortium, Boulder, CO; Goodchild, Michael [University of California, Santa Barbara; Liu, Yan [University of Illinois, Urbana-Champaign; Nygers, Timothy L. [University of Washington, Seattle

2013-01-01T23:59:59.000Z

245

Primer Control System Cyber Security Framework and Technical Metrics  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

246

Advances in Materials Genomics: Making CyberSteels Fly | Argonne...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Events Upcoming Events Upcoming Events Advances in Materials Genomics: Making CyberSteels Fly January 7, 2015 3:00PM to 4:00PM Presenter Greg Olson, Northwestern University and...

247

Integration of wireless sensor networks in environmental monitoring cyber infrastructure  

E-Print Network [OSTI]

Integration of wireless sensor networks in environmental monitoring cyber infrastructure Jue Yang Ă? to revolutionize many science and engineering domains. We present a novel environmental monitoring system collection, management, visualization, dissemination, and exchange, conforming to the new Sensor Web

Huang, Yan

248

Real-Time SCADA Cyber Protection Using Compression Techniques  

SciTech Connect (OSTI)

The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

Lyle G. Roybal; Gordon H Rueff

2013-11-01T23:59:59.000Z

249

Good Things in Small Packages: Micro Worlds and Cyber Security  

SciTech Connect (OSTI)

Cyber events, as perpetrated by terrorists and nation states, have become commonplace as evidenced in national and international news media. Cyber attacks affect day-to-day activities of end users through exploitation of social networks, businesses such as banking and stock exchanges, and government entities including Departments of Defense. They are becoming more frequent and sophisticated. Currently, efforts are directed to understanding the methods employed by attackers and towards dissecting the planning and activities of the perpetrator, including review of psychosocial factors.

David I Gertman

2013-11-01T23:59:59.000Z

250

Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop  

SciTech Connect (OSTI)

The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

2006-01-01T23:59:59.000Z

251

Computer Recommendations for incoming students in 2012-2013 The college of Engineering and Computer Science does not require students to have their own  

E-Print Network [OSTI]

Computer Recommendations for incoming students in 2012-2013 The college of Engineering and Computer Science does not require students to have their own personal computer. Students will have access to computers through their department, college, and university here on campus. However we do feel that having

Wu, Shin-Tson

252

Lecture 13: Control System Cyber Security  

E-Print Network [OSTI]

Today, the industralized world lives in symbiosis with control systems: it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and outline why the presenter is still waiting for a change in paradigm. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and...

CERN. Geneva

2013-01-01T23:59:59.000Z

253

Experiences and Challenges with Using Cert Data to Analyze International Cyber Security  

E-Print Network [OSTI]

With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The ...

Madnick, Stuart

254

Workshop on Scalable Cyber-Security Challenges in Large-Scale Networks: Deployment Obstacles  

E-Print Network [OSTI]

Workshop on Scalable Cyber-Security Challenges in Large-Scale Networks: Deployment Obstacles Large, and Definitions of Cybersecurity.... 8 Conventional Wisdom is Inadequate....................................... 9 Directions in Scalable Cyber-Security in Large-Scale Networks: Deployment Obstacles." The workshop

Feigenbaum, Joan

255

On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem  

E-Print Network [OSTI]

1 On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson Abstract--This paper considers a smart grid cyber-security problem

Johansson, Karl Henrik

256

Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry  

SciTech Connect (OSTI)

This document contains introductory material that discusses cyber security challenges in using cloud computing in the electric utility industry.

Akyol, Bora A.

2012-09-01T23:59:59.000Z

257

Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation  

E-Print Network [OSTI]

Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation Shan Liu the need to develop intelligent models of cyber-physical attacks that produce salient disruptions. In this paper, we present a foundation for the development of a class of intelligent cyber-physical attacks

Kundur, Deepa

258

Cyber Security Companies, governments, and consumers depend on secure and reliable  

E-Print Network [OSTI]

Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

Hill, Wendell T.

259

Simulation of PKI-Enabled Communication for Identity Management Using CyberCIEGE  

E-Print Network [OSTI]

, authentication, provenance, and access control. Keywords-network cyber security; identity management; information environment, players1 are guided through a series of scenarios that highlight various cyber security education colleges. CyberCIEGE was created by the Center for Information Systems Security Studies and Research (CISR

260

RT-Based Administrative Models for Community Cyber Security Information Sharing  

E-Print Network [OSTI]

RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, and Ram Krishnan Institute for Cyber Security & Department of Computer Science Institute for Cyber Security & Department of Electrical and Computer Engineering University of Texas at San

Sandhu, Ravi

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Towards Efficient Collaboration in Cyber Security Peter Hui Joe Bruce Glenn Fink  

E-Print Network [OSTI]

. INTRODUCTION Although distributed geographically and often across different organizations, cyber-securityTowards Efficient Collaboration in Cyber Security Peter Hui Joe Bruce Glenn Fink Michelle Gregory University aendert@cs.vt.edu ABSTRACT Cyber security analysts in different geographical and organizational

262

CYSEP --A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao  

E-Print Network [OSTI]

1 of 9 CYSEP -- A CYBER-SECURITY PROCESSOR FOR 10GBPS NETWORKS AND BEYOND H. Jonathan Chao.2Interface Memory Controller Cyber-Security Processor SPI4.2Interface To PCI Bus To Memory ToFramer To NP or End Sy stem Figure 1. Cyber-Security Processor (CYSEP) architecture The Firewall and Intrusion

Chao, Jonathan

263

Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices  

E-Print Network [OSTI]

Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices Bo Chen--Cyber security is becoming a major concern of smart grids, as the functionality of a smart grid is highly on smart grids. This paper discusses several types of cyber attacks. Then, it presents results of studies

Kundur, Deepa

264

DOE-FLEX: DOE's Telework Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes the requirements and responsibilities for the Departments telework program. Cancels DOE N 314.1.

2013-02-11T23:59:59.000Z

265

Cyber Security Testing and Training Programs for Industrial Control Systems  

SciTech Connect (OSTI)

Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

Daniel Noyes

2012-03-01T23:59:59.000Z

266

Human dimensions in cyber operations research and development priorities.  

SciTech Connect (OSTI)

Within cyber security, the human element represents one of the greatest untapped opportunities for increasing the effectiveness of network defenses. However, there has been little research to understand the human dimension in cyber operations. To better understand the needs and priorities for research and development to address these issues, a workshop was conducted August 28-29, 2012 in Washington DC. A synthesis was developed that captured the key issues and associated research questions. Research and development needs were identified that fell into three parallel paths: (1) human factors analysis and scientific studies to establish foundational knowledge concerning factors underlying the performance of cyber defenders; (2) development of models that capture key processes that mediate interactions between defenders, users, adversaries and the public; and (3) development of a multi-purpose test environment for conducting controlled experiments that enables systems and human performance measurement. These research and development investments would transform cyber operations from an art to a science, enabling systems solutions to be engineered to address a range of situations. Organizations would be able to move beyond the current state where key decisions (e.g. personnel assignment) are made on a largely ad hoc basis to a state in which there exist institutionalized processes for assuring the right people are doing the right jobs in the right way. These developments lay the groundwork for emergence of a professional class of cyber defenders with defined roles and career progressions, with higher levels of personnel commitment and retention. Finally, the operational impact would be evident in improved performance, accompanied by a shift to a more proactive response in which defenders have the capacity to exert greater control over the cyber battlespace.

Forsythe, James Chris; Silva, Austin Ray; Stevens-Adams, Susan Marie; Bradshaw, Jeffrey [Institute for Human and Machine Cognition

2012-11-01T23:59:59.000Z

267

DOE Audit Guidance For-Profit Financial Assistance Awards (Part IV) Matrix of Compliance Requirements April 2012  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Deliciouscritical_materials_workshop_presentations.pdf MoreProgram | Department of Energy DOE Appoints Stephen Eule

268

Building Smart Communities with Cyber-Physical Systems  

E-Print Network [OSTI]

There is a growing trend towards the convergence of cyber-physical systems (CPS) and social computing, which will lead to the emergence of smart communities composed of various objects (including both human individuals and physical things) that interact and cooperate with each other. These smart communities promise to enable a number of innovative applications and services that will improve the quality of life. This position paper addresses some opportunities and challenges of building smart communities characterized by cyber-physical and social intelligence.

Xia, Feng

2012-01-01T23:59:59.000Z

269

Compliance with the Clean Air Act Title VI Stratospheric Ozone Protection Program requirements at U.S. DOE Oak Ridge Reservation Facilities  

SciTech Connect (OSTI)

The Title VI Stratospheric Ozone Protection Program of the Clean Air Act (CAA) requires promulgation of regulations to reduce and prevent damage to the earth's protective ozone layer. Regulations pursuant to Title VI of the CAA are promulgated in the Code of Federal Regulations (CFR) at Title 40 CFR, Part 822. The regulations include ambitious production phaseout schedules for ozone depleting substances (ODS) including chlorofluorocarbons (CFCs), hydrochlorofluorocarbons (HCFCs), halons, carbon tetrachloride, and methyl chloroform under 40 CFR 82, Subpart A. The regulations also include requirements for recycling and emissions reduction during the servicing of refrigeration equipment and technician certification requirements under Subpart F; provisions for servicing of motor vehicle air conditioners under Subpart B; a ban on nonessential products containing Class 1 ODS under Subpart C; restrictions on Federal procurement of ODS under Subpart D; labeling of products using ODS under Subpart E; and the Significant New Alternatives Policy Program under Subpart G. This paper will provide details of initiatives undertaken at US Department of Energy (DOE) Oak Ridge Reservation (ORR) Facilities for implementation of requirements under the Title VI Stratospheric Ozone Protection Program. The Stratospheric Ozone Protection Plans include internal DOE requirements for: (1) maintenance of ODS inventories; (2) ODS procurement practices; (3) servicing of refrigeration and air conditioning equipment; (4) required equipment modifications or replacement; (5) technician certification training; (6) labeling of products containing ODS; (7) substitution of chlorinated solvents; and (8) replacement of halon fire protection systems. The plans also require establishment of administrative control systems which assure that compliance is achieved and maintained as the regulations continue to develop and become effective.

Humphreys, M.P.; Atkins, E.M.

1999-07-01T23:59:59.000Z

270

Implementation of the Clean Air Act, Title V operating permit program requirements for the U.S. DOE Oak Ridge Reservation facilities  

SciTech Connect (OSTI)

Title V of the Clean Air Act (CAA) establishes a new permit program requiring major sources and sources subject to Title III (Hazardous Air Pollutants) to obtain a state operating permit. Historically, most states have issued operating permits for individual emission units. Under the Title V permit program, a single permit will be issued for all of the emission units at the facility much like the current National Pollutant Discharge Elimination System (NPDES) permit program. The permit will specify all reporting, monitoring, and record-keeping requirements for the facility. Sources required to obtain permits include (a) major sources that emit 100 tons per year or more of any criteria air contaminant, (b) any source subject to the HAP provisions of Title III, (c) any source subject to the acid rain provisions of Title IV, (d) any source subject to New Source Performance Standards, and (e) any source subject to new source review under the nonattainment or Prevention of Significant Deterioration provisions. The State of Tennessee Title V Operating Permit Program was approved by EPA on August 28, 1996. This paper will provide details of initiatives underway at US Department of Energy (DOE) Oak Ridge Reservation (ORR) Facilities for implementation of requirements under the Title V Operating Permit Program. The ORR encompasses three DOE Facilities: the Y-12 Plant, Oak Ridge National Laboratory (ORNL), and the East Tennessee Technology Park (ETTP). The Y-12 Plant manufactures component parts for the national nuclear weapons program; the ORNL is responsible for research and development activities including nuclear engineering, engineering technologies, and the environmental sciences; and the ETTP conducts a variety of research and development activities and is the home of a mixed waste incinerator. Each of the three DOE Facilities is considered a major source under Title V of the CAA.

Humphreys, M.P. [Dept. of Energy Oak Ridge Operations Office, TN (United States). Environmental Protection Div.

1998-12-31T23:59:59.000Z

271

Attack Detection and Identification in Cyber-Physical Systems  

E-Print Network [OSTI]

Attack Detection and Identification in Cyber-Physical Systems Fabio Pasqualetti, Florian D¨orfler, Florian D¨orfler, and Francesco Bullo are with the Center for Control, Dynamical Systems and Computation, University of California at Santa Barbara, {fabiopas,dorfler,bullo}@engineering.ucsb.edu. #12;appropriate

Bullo, Francesco

272

Cyber-Physical Energy Systems: Focus on Smart Buildings  

E-Print Network [OSTI]

of a deeply coupled system of energy usage, comfort and work derived. At a macroscale, buildings use approxi computers and laptops in offices and homes will exceed over 3x the energy use by all data centers combinedCyber-Physical Energy Systems: Focus on Smart Buildings Jan Kleissl Dept. of Mechanical

Gupta, Rajesh

273

Cyber-Vulnerability of Power Grid Monitoring and Control Systems  

E-Print Network [OSTI]

, a methodology is proposed for the evaluation of the impact of cyber attacks on the power grid-effect on the proposed method determines the likelihood of the consequence, which can be evaluated based on a substation networks can lead to undesirable switching operations executed by attackers, resulting in widespread power

Manimaran, Govindarasu

274

A Cooperative Cyber Defense for Securing Critical Infrastructures  

E-Print Network [OSTI]

networked relationships. At electrical substations, it is common to find equipment from several companies-state and terrorist cyber attacks further complicates the ad hoc arrangement until the complexity of the situation substations to reduce costs and improve cooperation. Regulatory agencies, equipment manufacturers

Fulp, Errin W.

275

Cyber Security via Minority Games with Epistatic Signaling (Extended Abstract)  

E-Print Network [OSTI]

Cyber Security via Minority Games with Epistatic Signaling (Extended Abstract) W. Casey, L. Metcalf occurs when deceptions are employed in order to breach the security of the system, thus making the entire profiles (e.g., the distribution of players employing various kinds of vulnerability and threat predictions

Mishra, Bud

276

Cyber Physical Systems: Design Challenges Edward A. Lee  

E-Print Network [OSTI]

, such as distributed micro power generation coupled into the power grid, where tim- ing precision and security issuesCyber Physical Systems: Design Challenges Edward A. Lee Electrical Engineering and Computer is granted without fee provided that copies are not made or distributed for profit or commercial advantage

277

Cyber-Physical Systems Security for Smart Grid  

E-Print Network [OSTI]

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy Acknowledgements This white paper was developed as one of nine white papers in the project "The Future Grid

278

Cyber-Physical Systems Security for Smart Grid  

E-Print Network [OSTI]

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy as one of nine white papers in the project "The Future Grid to Enable Sustainable Energy Systems

279

Cyber-Security of Networked Control Systems Karl Henrik Johansson  

E-Print Network [OSTI]

to cyber-threats with many poten@al points of aRacks · How systems · ARack on power network state es@mator · Stealthy minimum-effort a) but no disclosure resources ·If the zero is unstable, then the plant state can be moved

Johansson, Karl Henrik

280

A Deception Framework for Survivability Against Next Generation Cyber Attacks  

E-Print Network [OSTI]

to the electronic business domain. According to the asymmetric warfare theory, attack- ers have the advantage- rity, survivability 1. Introduction This is the era of cyber-warfare and it is no longer limited to military domain. Knapp and Boulton [12] have reviewed information warfare literature from 1990 to mid-2005

Upadhyaya, Shambhu

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security  

SciTech Connect (OSTI)

Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

2009-07-20T23:59:59.000Z

282

Comparison and Analysis of Regulatory and Derived Requirements for Certain DOE Spent Nuclear Fuel Shipments; Lessons Learned for Future Spent Fuel Transportation Campaigns  

SciTech Connect (OSTI)

Radioactive materials transportation is stringently regulated by the Department of Transportation and the Nuclear Regulatory Commission to protect the public and the environment. As a Federal agency, however, the U.S. Department of Energy (DOE) must seek State, Tribal and local input on safety issues for certain transportation activities. This interaction has invariably resulted in the imposition of extra-regulatory requirements, greatly increasing transportation costs and delaying schedules while not significantly enhancing the level of safety. This paper discusses the results an analysis of the regulatory and negotiated requirements established for a July 1998 shipment of spent nuclear fuel from foreign countries through the west coast to the Idaho National Engineering and Environmental Laboratory (INEEL). Staff from the INEEL Nuclear Materials Engineering and Disposition Department undertook the analysis in partnership with HMTC, to discover if there were instances where requirements derived from stakeholder interactions duplicate, contradict, or otherwise overlap with regulatory requirements. The study exhaustively lists and classifies applicable Department of Transportation (DOT) and Nuclear Regulatory Commission (NRC) regulations. These are then compared with a similarly classified list of requirements from the Environmental Impact Statements (EIS) and those developed during stakeholder negotiations. Comparison and analysis reveals numerous attempts to reduce transportation risk by imposing more stringent safety measures than those required by DOT and NRC. These usually took the form of additional inspection, notification and planning requirements. There are also many instances of overlap with, and duplication of regulations. Participants will gain a greater appreciation for the need to understand the risk-oriented basis of the radioactive materials regulations and their effectiveness in ensuring safety when negotiating extra-regulatory requirements.

Kramer, George L., Ph.D.; Fawcett, Rick L.; Rieke, Philip C.

2003-02-27T23:59:59.000Z

283

Cyber Security and Trust Research & DevelopmentCyber Security and Trust Research & Development http://www.ISTS.dartmouth.eduhttp://www.ISTS.dartmouth.edu  

E-Print Network [OSTI]

Cyber Security and Trust Research & DevelopmentCyber Security and Trust Research & Development http of a discrete distribution: www.ISTS.dartmouth.edu Entropy reminder INSTITUTE FOR SECURITY TECHNOLOGY STUDIES to packets & provide a visual summary? www.ISTS.dartmouth.edu Motivation INSTITUTE FOR SECURITY

Pellacini, Fabio

284

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

285

A cognitive and economic decision theory for examining cyber defense strategies.  

SciTech Connect (OSTI)

Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participants interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.

Bier, Asmeret Brooke

2014-01-01T23:59:59.000Z

286

Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches  

SciTech Connect (OSTI)

In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

Meyers, C A; Powers, S S; Faissol, D M

2009-10-08T23:59:59.000Z

287

Breaking into a computer : attack techniques and tools used by cyber-criminals  

SciTech Connect (OSTI)

Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

None

2010-06-24T23:59:59.000Z

288

Breaking into a computer : attack techniques and tools used by cyber-criminals  

ScienceCinema (OSTI)

Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

None

2011-10-06T23:59:59.000Z

289

Other Requirements - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Regionat CornellInternships,(SC) Laboratories

290

Other Requirements - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratorySpeedingOptimizing I/O performance

291

DOE-FLEX: DOE's Telework Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The directive establishes the requirements and responsibilities for the Department’s telework program. Canceled by DOE O 314.1.

2011-07-05T23:59:59.000Z

292

Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues  

SciTech Connect (OSTI)

This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

Wayne F. Boyer; Scott A. McBride

2009-04-01T23:59:59.000Z

293

A Comparison of Cross-Sector Cyber Security Standards  

SciTech Connect (OSTI)

This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

Robert P. Evans

2005-09-01T23:59:59.000Z

294

GridStat – Cyber Security and Regional Deployment Project Report  

SciTech Connect (OSTI)

GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStat’s cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

Clements, Samuel L.

2009-02-18T23:59:59.000Z

295

A co-simulation framework for design of time-triggered automotive cyber physical systems  

E-Print Network [OSTI]

A co-simulation framework for design of time-triggered automotive cyber physical systems Zhenkai Automotive control system SystemC a b s t r a c t Designing cyber-physical systems (CPS) is challenging due to the tight interactions between software, network/platform, and physical components. Automotive control sys

Koutsoukos, Xenofon D.

296

Taming Uncertainties in Wireless Messaging for Automotive Cyber-Physical-Systems  

E-Print Network [OSTI]

Taming Uncertainties in Wireless Messaging for Automotive Cyber-Physical-Systems Hongwei Zhang Wireless networking for automotive CPS Today's vehicles are much more than a mechanical device, and complex to the scalability of vehicular communication system, which is a basic element of automotive cyber-physical systems

Rajkumar, Ragunathan "Raj"

297

Cyber-Physical Systems under Attack Models, Fundamental limitations, and Monitor Design  

E-Print Network [OSTI]

Pasqualetti Florian D¨orfler Francesco Bullo Center for Control, Dynamical systems and Computation University, FL, Dec 11, 2011 F. Pasqualetti, F. D¨orfler, F. Bullo Cyber-Physical Systems Under Attack Security-efficient buildings (heat transfer) F. Pasqualetti, F. D¨orfler, F. Bullo Cyber-Physical Systems Under Attack Security

Hu, Fei

298

The Role of Signal Processing in meeting Cyber-Security and Privacy Challenges  

E-Print Network [OSTI]

1 The Role of Signal Processing in meeting Cyber-Security and Privacy Challenges Lalitha Sankar Spaces Image Classification/ Location Privacy Modify Control Messages Security Privacy Fig. 1. Illustration of several classes of cyber-security and privacy threats in networks and distributed data systems

Paris-Sud XI, Université de

299

National Center for Digital Government Reflections on The Fog of (Cyber)War  

E-Print Network [OSTI]

National Center for Digital Government Reflections on The Fog of (Cyber)War Diego. These assertions are: (a) Cyberspace is a new operational domain for waging war; (b) Cyber warfare can be as severe, it aims at reconnecting the idea of "fog of war" to its Clausewitzian roots, highlighting the importance

Schweik, Charles M.

300

Challenges for Cyber-Physical Systems: Security, Timing Analysis and Soft Error Protection  

E-Print Network [OSTI]

from cyber attacks. While this assumption may not be sound, substations themselves are a more likely link at a substation) could allow attackers to affect power devices. Some protection could be provided to invest in research on the protection of the power grid, both from the perspective of cyber attacks

Mueller, Frank

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network [OSTI]

and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack to remote power substations and control centers comes with the added risk of cyber attack by hackers andModeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack

Krings, Axel W.

302

EL Program: Smart Grid Program Manager: David Wollman, Smart Grid and Cyber-Physical Systems  

E-Print Network [OSTI]

EL Program: Smart Grid Program Manager: David Wollman, Smart Grid and Cyber-Physical Systems Program Office, Associate Program Manager: Dean Prochaska, Smart Grid and Cyber- Physical Systems Program [updated August 23, 2013] Summary: This program develops and demonstrates smart grid measurement science

303

Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid  

E-Print Network [OSTI]

Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid Deepa Kundur analysis of a smart grid. We focus on the model synthesis stage in which both cyber and physical grid-effect relationships can be conveniently expressed for both analysis and extension to large-scale smart grid systems. I

Kundur, Deepa

304

Emergent Behavior in Cybersecurity Example 2: Program VerificationExample 1: Cyber Epidemics  

E-Print Network [OSTI]

Emergent Behavior in Cybersecurity Example 2: Program VerificationExample 1: Cyber Epidemics Informal Definition and Implication Abstract We argue that emergent behavior is inherent to cybersecurity). Scenario: Illustration of cyber epidemics model (which is a specific kind of Cybersecurity Dynamics model

Xu, Shouhuai

305

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: Crude OilPublicDNA GridironDNA-DirectedMediaDOEDOEViews

306

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: Crude OilPublicDNA GridironDNA-DirectedMediaDOEDOEViewsJim

307

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: Crude OilPublicDNA

308

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: Crude OilPublicDNALost Password For security reasons, we

309

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASLNanoporousTestimonyContact UsHanfordORPDOEAdvanced search

310

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASLNanoporousTestimonyContact UsHanfordORPDOEAdvanced

311

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASLNanoporousTestimonyContact

312

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASLNanoporousTestimonyContactWebsite Administrator The

313

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASLNanoporousTestimonyContactWebsite Administrator Thecontent.

314

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASLNanoporousTestimonyContactWebsite Administrator

315

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASLNanoporousTestimonyContactWebsite AdministratorSite map An

316

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FY MiddlePLAN-46847ApprovedDOEDOETraining

317

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FY MiddlePLAN-46847ApprovedDOEDOETraining

318

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FY MiddlePLAN-46847ApprovedDOEDOETrainingAndrew

319

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FY

320

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FYBeau Newman Select a document from the list below

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FYBeau Newman Select a document from the list

322

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FYBeau Newman Select a document from the listDebbie

323

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FYBeau Newman Select a document from the

324

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FYBeau Newman Select a document from theJennifer

325

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FYBeau Newman Select a document from theJenniferJay

326

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FYBeau Newman Select a document from

327

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FYBeau Newman Select a document fromKathy McCarty

328

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FYBeau Newman Select a document fromKathy

329

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FYBeau Newman Select a document fromKathyPranab

330

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FYBeau Newman Select a document

331

DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

by this user Oct 16, 2014 Personal Property Oct 25, 2012 Department of Energy Personal Property Management Program Oct 01, 2001 Annual Confidential Financial Disclosure Report...

332

Cyber Science and Security - An R&D Partnership at LLNL  

SciTech Connect (OSTI)

Lawrence Livermore National Laboratory has established a mechanism for partnership that integrates the high-performance computing capabilities of the National Labs, the network and cyber technology expertise of leading information technology companies, and the long-term research vision of leading academic cyber programs. The Cyber Science and Security Center is designed to be a working partnership among Laboratory, Industrial, and Academic institutions, and provides all three with a shared R&D environment, technical information sharing, sophisticated high-performance computing facilities, and data resources for the partner institutions and sponsors. The CSSC model is an institution where partner organizations can work singly or in groups on the most pressing problems of cyber security, where shared vision and mutual leveraging of expertise and facilities can produce results and tools at the cutting edge of cyber science.

Brase, J; Henson, V

2011-03-11T23:59:59.000Z

333

ANNUAL HEATING AND COOLING REQUIREMENTS AND DESIGN DAY PERFORMANCE FOR A RESIDENTIAL MODEL IN SIX CLIMATES: A COMPARISON OF NBSLD, BLAST 2, AND DOE-2.1  

E-Print Network [OSTI]

detailed heat-balance approach f or load calculations, DOE-Loads for Computerized Energy Calculations: Algorithms for Building Heat

Carroll, William L.

2011-01-01T23:59:59.000Z

334

ANNUAL HEATING AND COOLING REQUIREMENTS AND DESIGN DAY PERFORMANCE FOR A RESIDENTIAL MODEL IN SIX CLIMATES: A COMPARISON OF NBSLD, BLAST 2, AND DOE-2.1  

E-Print Network [OSTI]

COMPARISON - HOURLY INTERNAL LOAD PROFILES LightingA Comparison of NBSLD, BLAST 2. and DOE-2.1 (b) Lighting:

Carroll, William L.

2011-01-01T23:59:59.000Z

335

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect (OSTI)

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

336

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

Ragsdale, G.

337

Probabilistic Characterization of Adversary Behavior in Cyber Security  

SciTech Connect (OSTI)

The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

Meyers, C A; Powers, S S; Faissol, D M

2009-10-08T23:59:59.000Z

338

INL Cyber Security Research (2008) | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf11-161-LNG | Department ofHTS Cable ProjectsHistoryia/802871 IAINFOGRAPHIC:INL Cyber

339

Fact Sheet: Cyber Security Audit and Attack Detection Toolkit  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeat PumpRecord ofESPCofConstructionofFYOxideof Energy Clean Coal TechnologyCyber

340

Cyber - Security focus of conference ... | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phases onOrganization FY 2012 FYCustomer-Comments SignCyanideCYBER -

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

DOE Explosives Safety Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual describes DOE's explosives safety requirements applicable to operations involving the development, testing, handling, and processing of explosives or assemblies containing explosives.

1996-03-29T23:59:59.000Z

342

Comparison of two methods to quantify cyber and physical security effectiveness.  

SciTech Connect (OSTI)

With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

Wyss, Gregory Dane; Gordon, Kristl A.

2005-11-01T23:59:59.000Z

343

Radiological Protection for DOE Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes radiological protection program requirements that, combined with 10 CFR 835 and its associated implementation guidance, form the basis for a comprehensive program for protection of individuals from the hazards of ionizing radiation in controlled areas. Extended by DOE N 441.3. Cancels DOE 5480.11, DOE 5480.15, DOE N 5400.13, DOE N 5480.11; please note: the DOE radiological control manual (DOE/EH-0256T)

1995-09-29T23:59:59.000Z

344

Safety Software Guide for Use with 10 CFR 830, Subpart A, Quality Assurance Requirements, and DOE O 414.1C, Quality Assurance  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The revision to DOE G 414.1-4 will conform to the revised DOE O 414.1D and incorporate new information and lessons learned since 2005, including information gained as a result of the February 2011, Government Accountability Office (GAO) report, GAO-11-143.

2013-07-17T23:59:59.000Z

345

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network [OSTI]

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

346

Researchers develop new search tool to help fight child porn, catch cyber  

E-Print Network [OSTI]

Researchers develop new search tool to help fight child porn, catch cyber thieves Canada Standard a comment... Post to Facebook 0 0 New #12;Researchers develop new search tool to help fight child porn

Fung, Benjamin C. M.

347

ModelPlex: Verified Runtime Validation of Verified Cyber-Physical System Models  

E-Print Network [OSTI]

dynamics. In CPS, models are essential; but any model we could possibly build necessarily deviates from. In CPS, models are essential; but a cyber- physical systems (CPS) safe. Formal methods make strong guarantees about the system behavior

Platzer, André

348

Integrating Neuromuscular and Cyber Systems for Neural Control of Artificial Legs  

E-Print Network [OSTI]

and computer system is essential. This integration leads to a cyber- physical system (CPS), in which a complex (CPS) for neurally controlled artificial legs. The key to the new CPS system is the neural

Yang, Qing "Ken"

349

Synthesis of Distributed Execution Platforms for Cyber-Physical Systems with Applications to  

E-Print Network [OSTI]

of the behavior, such as time, that are essential to CPSs. For this reason, CPS designers are forced to extensive are just a few examples of Cyber-Physical Systems (CPS) [1], [2], [3], [4], [5], [6]. The characterizing

Carloni, Luca

350

A quantitative man-machine model for cyber security efficiency analysis  

E-Print Network [OSTI]

The analysis of security defense processes is of utmost importance in the management of various cyber-security attacks, which are increasing in scope and rapidity. Organizations need to optimize their resources based on a sound understanding...

Jung, Sung-Oh

2007-04-25T23:59:59.000Z

351

Multiple Tenure/Tenure-Track Faculty Positions Software Engineering Focus: CyberSecurity and Big Data  

E-Print Network [OSTI]

Multiple Tenure/Tenure-Track Faculty Positions Software Engineering Focus: CyberSecurity and Big to cybersecurity and big data. Outstanding candidates from all areas of software engineering and computer science

Carver, Jeffrey C.

352

DOE standard: Radiological control  

SciTech Connect (OSTI)

The Department of Energy (DOE) has developed this Standard to assist line managers in meeting their responsibilities for implementing occupational radiological control programs. DOE has established regulatory requirements for occupational radiation protection in Title 10 of the Code of Federal Regulations, Part 835 (10 CFR 835), ``Occupational Radiation Protection``. Failure to comply with these requirements may lead to appropriate enforcement actions as authorized under the Price Anderson Act Amendments (PAAA). While this Standard does not establish requirements, it does restate, paraphrase, or cite many (but not all) of the requirements of 10 CFR 835 and related documents (e.g., occupational safety and health, hazardous materials transportation, and environmental protection standards). Because of the wide range of activities undertaken by DOE and the varying requirements affecting these activities, DOE does not believe that it would be practical or useful to identify and reproduce the entire range of health and safety requirements in this Standard and therefore has not done so. In all cases, DOE cautions the user to review any underlying regulatory and contractual requirements and the primary guidance documents in their original context to ensure that the site program is adequate to ensure continuing compliance with the applicable requirements. To assist its operating entities in achieving and maintaining compliance with the requirements of 10 CFR 835, DOE has established its primary regulatory guidance in the DOE G 441.1 series of Guides. This Standard supplements the DOE G 441.1 series of Guides and serves as a secondary source of guidance for achieving compliance with 10 CFR 835.

Not Available

1999-07-01T23:59:59.000Z

353

Cyber in the Cloud -- Lessons Learned from INL's Cloud E-Mail Acquisition  

SciTech Connect (OSTI)

As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.

Troy Hiltbrand; Daniel Jones

2012-12-01T23:59:59.000Z

354

ANNUAL HEATING AND COOLING REQUIREMENTS AND DESIGN DAY PERFORMANCE FOR A RESIDENTIAL MODEL IN SIX CLIMATES: A COMPARISON OF NBSLD, BLAST 2, AND DOE-2.1  

E-Print Network [OSTI]

Comparison of NBSLD, BLAST 2. and Effect of Selected Changessignificant effect on annual heating loads, BLAST 2 predictsComparison of NBSLD, BLAST 2, and DOE~2.1 Effect of Climate

Carroll, William L.

2011-01-01T23:59:59.000Z

355

ANNUAL HEATING AND COOLING REQUIREMENTS AND DESIGN DAY PERFORMANCE FOR A RESIDENTIAL MODEL IN SIX CLIMATES: A COMPARISON OF NBSLD, BLAST 2, AND DOE-2.1  

E-Print Network [OSTI]

glass. The thermal resistance is equivalent to a V-value ofequivalent to the DOE-2.1 parameter GLASS-CONDUCTANCE '" 1.39, when the inside film resistance

Carroll, William L.

2011-01-01T23:59:59.000Z

356

BROOKHAVEN NATIONAL LABORATORYS CAPABILITIES FOR ADVANCED ANALYSES OF CYBER THREATS  

SciTech Connect (OSTI)

BNL has several ongoing, mature, and successful programs and areas of core scientific expertise that readily could be modified to address problems facing national security and efforts by the IC related to securing our nation’s computer networks. In supporting these programs, BNL houses an expansive, scalable infrastructure built exclusively for transporting, storing, and analyzing large disparate data-sets. Our ongoing research projects on various infrastructural issues in computer science undoubtedly would be relevant to national security. Furthermore, BNL frequently partners with researchers in academia and industry worldwide to foster unique and innovative ideas for expanding research opportunities and extending our insights. Because the basic science conducted at BNL is unique, such projects have led to advanced techniques, unlike any others, to support our mission of discovery. Many of them are modular techniques, thus making them ideal for abstraction and retrofitting to other uses including those facing national security, specifically the safety of the nation’s cyber space.

DePhillips M. P.

2014-06-06T23:59:59.000Z

357

Ideal Based Cyber Security Technical Metrics for Control Systems  

SciTech Connect (OSTI)

Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provide the basis for management decisions that affect the protection of the infrastructure. A cyber security technical metric is the security relevant output from an explicit mathematical model that makes use of objective measurements of a technical object. A specific set of technical security metrics are proposed for use by the operators of control systems. Our proposed metrics are based on seven security ideals associated with seven corresponding abstract dimensions of security. We have defined at least one metric for each of the seven ideals. Each metric is a measure of how nearly the associated ideal has been achieved. These seven ideals provide a useful structure for further metrics development. A case study shows how the proposed metrics can be applied to an operational control system.

W. F. Boyer; M. A. McQueen

2007-10-01T23:59:59.000Z

358

Cyber-Security Considerations for the Smart Grid  

SciTech Connect (OSTI)

The electrical power grid is evolving into the “smart grid”. The goal of the smart grid is to improve efficiency and availability of power by adding more monitoring and control capabilities. These new technologies and mechanisms are certain to introduce vulnerabilities into the power grid. In this paper we provide an overview of the cyber security state of the electrical power grid. We highlight some of the vulnerabilities that already exist in the power grid including limited capacity systems, implicit trust and the lack of authentication. We also address challenges of complexity, scale, added capabilities and the move to multipurpose hardware and software as the power grid is upgraded. These changes create vulnerabilities that did not exist before and bring increased risks. We conclude the paper by showing that there are a number mitigation strategies that can help keep the risk at an acceptable level.

Clements, Samuel L.; Kirkham, Harold

2010-07-26T23:59:59.000Z

359

Minimum State Awareness for Resilient Control Systems Under Cyber-Attack  

SciTech Connect (OSTI)

State awareness for a control system is the accurate knowledge of the internal states of the system realization. To maintain stable operation, a controller requires a certain degree of state awareness. By definition, a cyber-attacker decreases the state awareness by modifying or removing the information available to the operator and control system. By doing so, the attacker can directly cause damage to the physical system through the control system, or indirectly by causing the operator to react in a damaging manner to the false information. In a number of recent papers, detection and mitigation strategies have been proposed that assume state awareness. The goal of the attacker to reduce or remove state awareness makes this assumption invalid for most situations. One of the central problems of resilient control is developing methods to retain sufficient state awareness to continue operation during a cyberattack. In this paper, we will define state awareness, discuss the consequences of loss of state awareness, and some potential research directions for maintaining state awareness.

Kisner, Roger [ORNL; Fugate, David L [ORNL; McIntyre, Timothy J [ORNL

2012-01-01T23:59:59.000Z

360

DOE-STD-1104-96 CN-1; Review and Approval of Nuclear Facility Safety Basis Documents (Documented Safety Analyses and Technical Safety Requirements)  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Deliciouscritical_materials_workshop_presentations.pdfSTD-1040-93 DOE-STD-1040-9395-95 December 1995 DOE-STD-1104-96

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Transportation Perspectives on Automotive Cyber Physical System: Integrating Hardware-in-the-Loop, Software-in-the-Loop and Human-in-the-Loop Simulations  

E-Print Network [OSTI]

1 Transportation Perspectives on Automotive Cyber Physical System: Integrating Hardware and development environment to evaluate automotive cyber physical system (CPS) as well as its components foundation of the automotive CPS for developing and testing vehicular networking and sensing technologies

Rajkumar, Ragunathan "Raj"

362

Promulgating Nuclear Safety Requirements  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Applies to all Nuclear Safety Requirements Adopted by the Department to Govern the Conduct of its Nuclear Activities. Cancels DOE P 410.1. Canceled by DOE N 251.85.

1996-05-15T23:59:59.000Z

363

DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomenthe HouseStudents2.2at Multipleorder supplies orMilestone |EnergyThis

364

Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 3rd A Frame Problem Approach for Adaptive Cyber Security Design  

E-Print Network [OSTI]

Problem Approach for Adaptive Cyber Security Design R. Shaikh, T. Bryla, and S. Ahmed Pace University entails the motivation and efforts to integrate the Frame Problem approach to the distributed cyber in the context of network security counteraction against cyber-attacks. A simple simulator is designed

Tappert, Charles

365

Assessment of current cybersecurity practices in the public domain : cyber indications and warnings domain.  

SciTech Connect (OSTI)

This report assesses current public domain cyber security practices with respect to cyber indications and warnings. It describes cybersecurity industry and government activities, including cybersecurity tools, methods, practices, and international and government-wide initiatives known to be impacting current practice. Of particular note are the U.S. Government's Trusted Internet Connection (TIC) and 'Einstein' programs, which are serving to consolidate the Government's internet access points and to provide some capability to monitor and mitigate cyber attacks. Next, this report catalogs activities undertaken by various industry and government entities. In addition, it assesses the benchmarks of HPC capability and other HPC attributes that may lend themselves to assist in the solution of this problem. This report draws few conclusions, as it is intended to assess current practice in preparation for future work, however, no explicit references to HPC usage for the purpose of analyzing cyber infrastructure in near-real-time were found in the current practice. This report and a related SAND2010-4766 National Cyber Defense High Performance Computing and Analysis: Concepts, Planning and Roadmap report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

366

The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know  

E-Print Network [OSTI]

In recent years, researchers have proposed \\emph{cyber-insurance} as a suitable risk-management technique for enhancing security in Internet-like distributed systems. However, amongst other factors, information asymmetry between the insurer and the insured, and the inter-dependent and correlated nature of cyber risks have contributed in a big way to the failure of cyber-insurance markets. Security experts have argued in favor of operating system (OS) platform switching (ex., from Windows to Unix-based OSs) or secure OS adoption as being one of the techniques that can potentially mitigate the problems posing a challenge to successful cyber-insurance markets. In this regard we model OS platform switching dynamics using a \\emph{social gossip} mechanism and study three important questions related to the nature of the dynamics, for Internet-like distributed systems: (i) which type of networks should cyber-insurers target for insuring?, (ii) what are the bounds on the asymptotic performance level of a network, wher...

Pal, Ranjan

2012-01-01T23:59:59.000Z

367

A Case Study on the Model-Based Design and Integration of Automotive Cyber-Physical Systems  

E-Print Network [OSTI]

A Case Study on the Model-Based Design and Integration of Automotive Cyber-Physical Systems Di--Cyber-physical systems (CPS), such as automotive systems, are very difficult to design due to the tight interactions of an integrated automotive control system. The system is composed of two independently designed controllers

Koutsoukos, Xenofon D.

368

Automotive Cyber Physical Systems in the Context of Human Mobility Daniel Work, Alexandre Bayen, and Quinn Jacobson  

E-Print Network [OSTI]

Automotive Cyber Physical Systems in the Context of Human Mobility Daniel Work, Alexandre Bayen with other technologies. In the larger context of human mobility, the automotive CPS must become more open in the surrounding physical environment. II. FUNDAMENTAL LIMITATIONS OF THE EXISTING AUTOMOTIVE CYBER PHYSICAL SYSTEM

369

CS3600 Lab Manual CyberCIEGE is an information assurance (IA) training tool that illustrates computer and  

E-Print Network [OSTI]

CS3600 Lab Manual Lab SSL CyberCIEGE is an information assurance (IA) training tool. The CyberCIEGE SSL scenario illustrates the use of SSL to authenticate the identity of web servers. This scenario explores the following concepts: · SSL is a means of authenticating a server (e.g., a web server

370

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for the Smart Grid Adam Hahn, Student Member, IEEE, and Manimaran Govindarasu, Senior Member, IEEE Abstract--The smart grid's heavy reliance on cyber resources introduces numerous security concerns

Manimaran, Govindarasu

371

DOE Explosives Safety Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual describes the Departments explosive safety requirements applicable to operations involving the development, testing, handling, and processing of explosives or assemblies containing explosives. Cancels DOE M 440.1-1. Canceled by DOE O 440.1B Chg 1.

2006-01-09T23:59:59.000Z

372

Protecting Intelligent Distributed Power Grids against Cyber Attacks  

SciTech Connect (OSTI)

Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

2010-12-31T23:59:59.000Z

373

A Proposed Framework For Planning Deactivation And Decommissioning Engineering And Design Activities To Meet The Requirements Of DOE Order 413.3A, Program And Project Management For The Acquisition Of Capital Assets  

SciTech Connect (OSTI)

This paper applies the DOE O 413.3A Design/Engineering requirements to Deactivation and Decommissioning (D and D) projects. A list of 41 activities for which Design/Engineering is generally required and which are relevant and common to many D and D projects was generated. For several activities in this list, examples of the level of development and/or types of deliverables that might be expected at the completion of the conceptual, preliminary and final project design phases described in the Order are provided. This paper also discusses tailoring the application of the Order to a facility based on the complexity of the facility's engineered systems and the hazards existing in the facility. DOE D and D projects are expected to meet the requirements of DOE O 413.3A. For D and D engineering and design activities only, this paper provides guidance for applying these requirements to the Order. A list of 41 typical D and D engineering and design activities has been provided. The Order divides projects into conceptual, preliminary and final design phases. Development of each of the 41 activities can also be organized in conceptual, preliminary and final levels. In general, at the conceptual level project engineers should be determining the what (i.e., the scope) for each activity. At the preliminary level they should be resolving how the activity will be accomplished. At the final level, all the engineering and design details for the activity should be completed so that the activity is ready to implement in the field. It may not be appropriate that development of each individual activity correspond to the current phase of the project. For example, at CD-2 (end of the preliminary design phase) not all activities need be developed to the same level of detail. Only those that are truly significant to the project baseline must be developed to the level of detail necessary to create a reliable project baseline. (authors)

Santos, J.K.; Gladden, J.B. [Savannah River National Laboratory (SRNL), Savannah River Site, Aiken, SC (United States); Szilagyi, A.P. [United States Department of Energy (DOE), Washington, DC (United States); Negin, C.; Urland, C. [Project Enhancement Corporation, Germantown, MD (United States)

2008-07-01T23:59:59.000Z

374

Transuranic Waste Requirements  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The guide provides criteria for determining if a waste is to be managed in accordance with DOE M 435.1-1, Chapter III, Transuranic Waste Requirements.

1999-07-09T23:59:59.000Z

375

Cyber Security Indications and Warning System (SV): CRADA 1573.94 Project Accomplishments Summary  

SciTech Connect (OSTI)

As the national focus on cyber security increases, there is an evolving need for a capability to provide for high-speed sensing of events, correlation of events, and decision-making based on the adverse events seen across multiple independent large-scale network environments. The purpose of this Shared Vision project, Cyber Security Indications and Warning System, was to combine both Sandia's and LMC's expertise to discover new solutions to the challenge of protecting our nation's infrastructure assets. The objectives and scope of the proposal was limited to algorithm and High Performance Computing (HPC) model assessment in the unclassified environment within funding and schedule constraints. The interest is the identification, scalability assessment, and applicability of current utilized cyber security algorithms as applied in an HPC environment.

Hu, Tan Chang (PI, Sandia); Robinson, David G. (Technical PI)

2011-09-08T23:59:59.000Z

376

A Secured Health Care Application Architecture for Cyber-Physical Systems  

E-Print Network [OSTI]

Cyber-physical systems (CPS) can be viewed as a new generation of systems with integrated control, communication and computational capabilities. Like the internet transformed how humans interact with one another, cyber-physical systems will transform how people interact with the physical world. Currently, the study of CPS is still in its infancy and there exist many research issues and challenges ranging from electricity power, health care, transportation and smart building etc. In this paper, an introduction of CPeSC3 (cyber physical enhanced secured wireless sensor networks (WSNs) integrated cloud computing for u-life care) architecture and its application to the health care monitoring and decision support systems is given. The proposed CPeSC3 architecture is composed of three main components, namely 1) communication core, 2) computation core, and 3) resource scheduling and management core. Detailed analysis and explanation are given for relevant models such as cloud computing, real time scheduling and secu...

Wang, Jin; Lee, Sungyoung; Shu, Lei; Xia, Feng

2012-01-01T23:59:59.000Z

377

DOE Approved Technical Standards | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

for, Lockouts and Tagouts, Chapter IX of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities 07261998 DOE-STD-1036-93 Guide to...

378

DOE Cooperative Research and Development Agreements  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes policy, requirements, and responsibilities for the oversight, management, and administration of Cooperative Research and Development Agreement (CRADA) activities at DOE facilities. Cancels DOE O 483.1 Admin Chg 1 and DOE M 483.1-1.

2013-11-06T23:59:59.000Z

379

Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.  

SciTech Connect (OSTI)

The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

Dawson, Lon Andrew; Stinebaugh, Jennifer A.

2010-04-01T23:59:59.000Z

380

Implementation of a Cyber Secure Control System, Critical Elements, Requirements and Controls  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensionalthe U.S. Department-2023 Idaho4FuelImplementationto:Major

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Integrated Management Requirements mapping  

SciTech Connect (OSTI)

This document contains five appendices documenting how Sandia implemented the DOE Conduct of Operations (5480.19) and DOE Quality Assurance (5700.6C) orders. It provides a mapping of the Sandia integrated requirements to the specific requirements of each Order and a mapping to Sandia`s approved program for implementing the Conduct of Operations Order.

Holmes, J.T.; Andrews, N.S.

1992-06-01T23:59:59.000Z

382

Integrated Management Requirements mapping  

SciTech Connect (OSTI)

This document contains five appendices documenting how Sandia implemented the DOE Conduct of Operations (5480.19) and DOE Quality Assurance (5700.6C) orders. It provides a mapping of the Sandia integrated requirements to the specific requirements of each Order and a mapping to Sandia's approved program for implementing the Conduct of Operations Order.

Holmes, J.T.; Andrews, N.S.

1992-06-01T23:59:59.000Z

383

General Responsibilities and Requirements  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The material presented in this guide provides suggestions and acceptable ways of implementing DOE M 435.1-1 and should not be viewed as additional or mandatory requirements. The objective of the guide is to ensure that responsible individuals understand what is necessary and acceptable for implementing the requirements of DOE M 435.1-1.

1999-07-09T23:59:59.000Z

384

Reliability Modeling of Cyber-Physical Electric Power Systems: A System-Theoretic Framework  

E-Print Network [OSTI]

1 Reliability Modeling of Cyber-Physical Electric Power Systems: A System-Theoretic Framework systematic reliability analysis tools to address planning and operation challenges of future electric power and the introduction of new sources of uncertainty in systems already inherently complex. Current reliability analysis

Liberzon, Daniel

385

Verifiable Active Safety for Automotive Cyber-Physical Systems with Humans in the Loop  

E-Print Network [OSTI]

Verifiable Active Safety for Automotive Cyber-Physical Systems with Humans in the Loop Francesco-6925 A recent trend in the automotive industry is the rapid inclusion of electronics, computers and controls that focus entirely on improved functionality and overall system robustness. This makes the automotive sector

Rajkumar, Ragunathan "Raj"

386

Improved Power Grid Stability and Efficiency with a Building-Energy Cyber-Physical System  

E-Print Network [OSTI]

, or for sporadic reasons, for example a power plant goes offline unexpectedly (e.g., due to an earthquake or stagnant winds to propel wind turbines). Dur- ing an episode, the power grid operators must contend1 Improved Power Grid Stability and Efficiency with a Building-Energy Cyber-Physical System Mary

387

Cyber-Physical Security via Geometric Control: Distributed Monitoring and Malicious Attacks  

E-Print Network [OSTI]

Pasqualetti, Florian D¨orfler, and Francesco Bullo Abstract-- Cyber-physical systems are ubiquitous in power. Fabio Pasqualetti, Florian D¨orfler, and Francesco Bullo are with the Center for Control, Dynamical Systems and Computation, University of California at Santa Barbara, {fabiopas,dorfler

Bullo, Francesco

388

Gaussian Process Learning for Cyber-Attack Early Warning Jian Zhang1  

E-Print Network [OSTI]

Gaussian Process Learning for Cyber-Attack Early Warning Jian Zhang1 , Phillip Porras1 , Johannes- gressive attack sources, as such information can help to proactively defend their networks. For this pur of attacks observed by others. However, the total number of reported attackers is huge in these systems. Thus

Zhang, Jian

389

Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems  

SciTech Connect (OSTI)

The consolidation of cyber communications networks and physical control systems within the energy smart grid introduces a number of new risks. Unfortunately, these risks are largely unknown and poorly understood, yet include very high impact losses from attack and component failures. One important aspect of risk management is the detection of anomalies and changes. However, anomaly detection within cyber security remains a difficult, open problem, with special challenges in dealing with false alert rates and heterogeneous data. Furthermore, the integration of cyber and physical dynamics is often intractable. And, because of their broad scope, energy grid cyber-physical systems must be analyzed at multiple scales, from individual components, up to network level dynamics. We describe an improved approach to anomaly detection that combines three important aspects. First, system dynamics are modeled using a reduced order model for greater computational tractability. Second, a probabilistic and principled approach to anomaly detection is adopted that allows for regulation of false alerts and comparison of anomalies across heterogeneous data sources. Third, a hierarchy of aggregations are constructed to support interactive and automated analyses of anomalies at multiple scales.

Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Melin, Alexander M [ORNL; Czejdo, Bogdan [ORNL

2013-01-01T23:59:59.000Z

390

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network [OSTI]

attacks has become a critical issue, yet different from that of traditional physical attacks. Current behavior, hacking methods, and network vulnerabilities. This is different from traditional physical attacks by traditional physical attacks. The question then is how good a cyber threat assessment algorithm one should

Jay Yang, Shanchieh

391

Minimax Control For Cyber-Physical Systems under Network Packet Scheduling Attacks  

E-Print Network [OSTI]

Minimax Control For Cyber-Physical Systems under Network Packet Scheduling Attacks Yasser Shoukry. Unfortunately, this re- liance on networks also brings new security vulnerabilities for con- trol systems. We and distribute reprints for Governmental purposes notwith- standing any copyright notation thereon. The views

Johansson, Karl Henrik

392

Approaches for scalable modeling and emulation of cyber systems : LDRD final report.  

SciTech Connect (OSTI)

The goal of this research was to combine theoretical and computational approaches to better understand the potential emergent behaviors of large-scale cyber systems, such as networks of {approx} 10{sup 6} computers. The scale and sophistication of modern computer software, hardware, and deployed networked systems have significantly exceeded the computational research community's ability to understand, model, and predict current and future behaviors. This predictive understanding, however, is critical to the development of new approaches for proactively designing new systems or enhancing existing systems with robustness to current and future cyber threats, including distributed malware such as botnets. We have developed preliminary theoretical and modeling capabilities that can ultimately answer questions such as: How would we reboot the Internet if it were taken down? Can we change network protocols to make them more secure without disrupting existing Internet connectivity and traffic flow? We have begun to address these issues by developing new capabilities for understanding and modeling Internet systems at scale. Specifically, we have addressed the need for scalable network simulation by carrying out emulations of a network with {approx} 10{sup 6} virtualized operating system instances on a high-performance computing cluster - a 'virtual Internet'. We have also explored mappings between previously studied emergent behaviors of complex systems and their potential cyber counterparts. Our results provide foundational capabilities for further research toward understanding the effects of complexity in cyber systems, to allow anticipating and thwarting hackers.

Mayo, Jackson R.; Minnich, Ronald G.; Armstrong, Robert C.; Rudish, Don W.

2009-09-01T23:59:59.000Z

393

An Abrupt Change Detection Heuristic with Applications to Cyber Data Attacks on Power Systems  

E-Print Network [OSTI]

hardware and software components such as smart meters, Phasor Measurement Units (PMUs), intelligent Borhan dynamics have been traditionally considered as a result of meter aging and malfunctioning, electrical of a designated cyber data attack to the system. In particular, with the emergence of smart grids and its smart

Sanandaji, Borhan M.

394

CYBER SECURITY THREATS TO SAFETY-CRITICAL, SPACE-BASED INFRASTRUCTURES  

E-Print Network [OSTI]

role in national critical infrastructures. The certification of Global Navigation Satellite SystemsCYBER SECURITY THREATS TO SAFETY-CRITICAL, SPACE-BASED INFRASTRUCTURES C.W. Johnson (1) , A-based systems play an important role within national critical infrastructures. They are being integrated

Johnson, Chris

395

MAR-CPS: Measurable Augmented Reality for Prototyping Cyber-Physical Systems  

E-Print Network [OSTI]

MAR-CPS: Measurable Augmented Reality for Prototyping Cyber-Physical Systems Shayegan Omidshafiei in CPSs, hardware-in-the-loop experiments are an essential step for transitioning from simulations to real in the Aerospace Controls Laboratory at the Massachusetts Institute of Technology. This system, referred to as MAR-CPS

Reif, Rafael

396

ITL BULLETIN FOR OCTOBER 2010 CYBER SECURITY STRATEGIES FOR THE SMART GRID: PROTECTING THE  

E-Print Network [OSTI]

ITL BULLETIN FOR OCTOBER 2010 CYBER SECURITY STRATEGIES FOR THE SMART GRID: PROTECTING THE ADVANCED, reduce greenhouse gas emissions, and create new employment opportunities. Called the Smart Grid in the development process to assure a smooth transition to the Smart Grid. Under the Energy Independence

397

Cyber Security in the Smart Grid: Survey and Challenges$ Wenye Wanga,  

E-Print Network [OSTI]

Cyber Security in the Smart Grid: Survey and Challenges$ Wenye Wanga, , Zhuo Lua a The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and communication technologies, the Smart Grid is expected to greatly enhance efficiency and reliability of future

Wang, Wenye

398

Certification for DOE M 441.1-1 and DOE O 5480.30  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

On the basis of our review, we have determined that DOE M 441.1-1 and DOE O 5480.30 continue to be relevant and effective. They remain a necessary part of the DOE nuclear safety requirements system.

2010-11-18T23:59:59.000Z

399

Department of Energy Office of Nuclear Safety and Environmental Policy Technical Position NSEP-TP-2007- 1, Technical Position on the Requirement in DOE 0 420.1B to Use National Consensus Industry Standards and the Model Building CodesTechnical Position NS  

Broader source: Energy.gov [DOE]

All new construction required to follow the provisions of Department of Energy(DOE) Order 420. lB, Facility Safety, must comply with national consensus industrystandards and the model building...

400

NNSA Seeking Comments on Consolidated IT and Cyber Security Support...  

Energy Savers [EERE]

search criteria, click on the down arrow and select "Reference Number". Type in,DE-SOL-0005569. Addthis Related Articles DOE Issues Draft Request for Proposals for Hanford Site...

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

PARS II New Contractor Information for Interconnection Security...  

Office of Environmental Management (EM)

V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System...

402

DOE Onboarding  

Broader source: Energy.gov (indexed) [DOE]

First Six Months First Year *Continual Learning *Fraud Awareness *eOPF & ePerformance *ESS & Workflow *DOE Social Media *Networking Opportunity GETTING SETTLED ADJUSTMENT &...

403

DOE PAGES  

Office of Scientific and Technical Information (OSTI)

a useful reference. Find out more Do you have questions about DOE PAGESBeta content, procedures, or policies? More information is available at OSTI's Public Access Policy page and...

404

Certificate in Cyber Operations Pre-Application Form  

E-Print Network [OSTI]

, sex, age, marital status, parental status, physical disability, learning disability, political & SELF-LEARNING 1.What it your highest level of education?* High School Trade School College these systems (i.e. document editing, spreadsheets, email, web applications, databases, etc). If this does

Maryland, Baltimore County, University of

405

DOE explosives safety manual  

SciTech Connect (OSTI)

The Department of Energy (DOE) policy requires that all DOE activities be conducted in a manner that protects the safety of the public and provides a safe and healthful workplace for employees. DOE has also prescribed that all personnel be protected in any explosives operation undertaken. The level of safety provided shall be at least equivalent to that of the best industrial practice. The risk of death or serious injury shall be limited to the lowest practicable minimum. DOE and contractors shall continually review their explosives operations with the aim of achieving further refinements and improvements in safety practices and protective features. This manual describes the Department's explosive safety requirements applicable to operations involving the development, testing, handling, and processing of explosives or assemblies containing explosives. It is intended to reflect the state-of-the-art in explosives safety. In addition, it is essential that applicable criteria and requirements for implementing this policy be readily available and known to those responsible for conducting DOE programs.

Not Available

1991-10-01T23:59:59.000Z

406

Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design  

E-Print Network [OSTI]

Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malicious attacks so that specific analysis tools and monitoring mechanisms need to be developed to enforce system security and reliability. This paper builds upon the results presented in our companion paper [1] and proposes centralized and distributed monitors for attack detection and identification. First, we design optimal centralized attack detection and identification monitors. Optimality refers to the ability of detecting (respectively identifying) every detectable (respectively identifiable) attack. Second, we design an optimal distributed attack detection filter based upon a waveform relaxation technique. Third, we show that the attack identification problem is computationally hard, and we design a sub-optimal distributed attack identification procedure with performance guarantees. Finally, we illustr...

Pasqualetti, Fabio; Bullo, Francesco

2012-01-01T23:59:59.000Z

407

Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design  

E-Print Network [OSTI]

Future power networks will be characterized by safe and reliable functionality against physical malfunctions and cyber attacks. This paper proposes a unified framework and advanced monitoring procedures to detect and identify network components malfunction or measurements corruption caused by an omniscient adversary. We model a power system under cyber-physical attack as a linear time-invariant descriptor system with unknown inputs. Our attack model generalizes the prototypical stealth, (dynamic) false-data injection and replay attacks. We characterize the fundamental limitations of both static and dynamic procedures for attack detection and identification. Additionally, we design provably-correct (dynamic) detection and identification procedures based on tools from geometric control theory. Finally, we illustrate the effectiveness of our method through a comparison with existing (static) detection algorithms, and through a numerical study.

Pasqualetti, Fabio; Bullo, Francesco

2011-01-01T23:59:59.000Z

408

Machine Learning for Power System Disturbance and Cyber-attack Discrimination  

SciTech Connect (OSTI)

Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

Borges, Raymond Charles [ORNL; Beaver, Justin M [ORNL; Buckner, Mark A [ORNL; Morris, Thomas [Mississippi State University (MSU); Adhikari, Uttam [ORNL; Pan, Shengyi [Mississippi State University (MSU)

2014-01-01T23:59:59.000Z

409

Microsoft Word - Directives Requiring Additional Documentation...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Chg 2 Radiation Protection of the Public and the Environment 24 DOE O 5480.19, Chg 2 Conduct of Operations Requirements for DOE Facilities 25 DOE O 5480.20A, Chg 1 Personnel...

410

DOE Cooperative Research and Development Agreements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements to supplement DOE O 483.1, DOE Cooperative Research and Development Agreements, dated 1-12-01, which establishes requirements for the performance of technology transfer through the use of Cooperative Research and Development Agreements (CRADAs). Canceled by DOE O 483.1A.

2001-01-12T23:59:59.000Z

411

Modeling and simulation for cyber-physical system security research, development and applications.  

SciTech Connect (OSTI)

This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

2010-02-01T23:59:59.000Z

412

A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING Received 24 March 2013; revised 8 August 2013 and 14 November 2013; accepted 21 November 2013. Date of publication 2 January 2014; date of current version 21 January 2014. Digital Object Identifier... AUTHOR: S. LIU (liushan2009@gmail.com) This work was supported by the National Science Foundation under NSF Grant EECS-1028246 and the Norman Hackerman Advanced Research Program under Project 000512-0111-2009. ABSTRACT Security issues in cyber...

Liu, Shan; Mashayekh, Salman; Kundur, Deepa; Zourntos, Takis; Butler-Purry, Karen

2014-01-02T23:59:59.000Z

413

Bullying and Cyber-Bullying in Higher Education: Current Institutional Practice and Prevention  

E-Print Network [OSTI]

. (2010) believes bullying, especially cyber-bullying, is a real 21st century concern and that it must be addressed by those in power. 8 Chapter 2 Bullying of all forms continues to plague the educational system, with no clear methods... report that bullying exists in their schools and it largely through electronic means. Students believe they are anonymous through electronic means and now feel an aura of power and a willingness to say something they would never say in person...

Early, Jeremy Scott

2014-05-31T23:59:59.000Z

414

FES Science Network Requirements  

E-Print Network [OSTI]

FES Science Network Requirements Report of the Fusion Energy Sciences Network Requirements Workshop Conducted March 13 and 14, 2008 #12;FES Science Network Requirements Workshop Fusion Energy Sciences Program Office, DOE Office of Science Energy Sciences Network Gaithersburg, MD ­ March 13 and 14, 2008 ESnet

Geddes, Cameron Guy Robinson

415

Maintenance Management Program for DOE Nuclear Facilities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To define the program for the management of cost-effective maintenance of Department of Energy (DOE) nuclear facilities. Guidance for compliance with this Order is contained in DOE G 433.1-1, Nuclear Facility Maintenance Management Program Guide for use with DOE O 433.1, which references Federal regulations, DOE directives, and industry best practices using a graded approach to clarify requirements and guidance for maintaining DOE-owned Government property. (Cancels DOE 4330.4B, Chapter II, Maintenance Management Program, dated 2-10-94.) Cancels DOE 4330.4B (in part). Canceled by DOE O 433.1A.

2001-06-01T23:59:59.000Z

416

DOE Form  

National Nuclear Security Administration (NNSA)

1991) PROJECT: U.S. Department of Energy Requirements Change Notice Baseline List of Required Compliance Documents CONTRACTOR: Babcock & Wilcox Technical Services Y-12, LLC...

417

DOE Form  

National Nuclear Security Administration (NNSA)

11991) PROJECT: U.S. Department of Energy Requirements Change Notice Baseline List of Required Compliance Documents CONTRACTOR: Babcock & Wilcox Technical Services Y-12, LLC...

418

National cyber defense high performance computing and analysis : concepts, planning and roadmap.  

SciTech Connect (OSTI)

There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

419

Experience with the CyberKnife for intracranial stereotactic radiosurgery: Analysis of dosimetry indices  

SciTech Connect (OSTI)

We evaluated coverage, dose homogeneity, dose conformity, and dose gradient in CyberKnife VSI treatment plans. Several dosimetric indices were calculated, and the results were compared with those of previous publications. The effect of target volume on the radiosurgical treatment indices selected was also investigated. The study population comprised the first 40 patients treated at our department from March 2011 to September 2012. Dosimetric indices were calculated and compared with published results for other frame-based and frameless intracranial stereotactic radiotherapy techniques. A comparison of the indices confirmed the ability of the CyberKnife VSI system to provide very high-quality dosing plans. The results were independent of target volume for coverage, homogeneity, and dose conformity. However, a dependence on target volume was observed for the dose-gradient indices analyzed. Based on the indices proposed, CyberKnife provides very good treatment plans and compares favorably with other techniques in most cases. However, greater consensus on the radiosurgery indices calculated would be desirable to facilitate comparison of the various techniques or the same techniques when applied by different users.

Floriano, Alejandro, E-mail: afloriano@grupoimo.com; Santa-Olalla, Iciar; Sanchez-Reyes, Alberto

2014-04-01T23:59:59.000Z

420

A Mathematical Framework for the Analysis of Cyber-Resilient Control Systems  

SciTech Connect (OSTI)

The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security (IT) techniques to control system networks. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective. Little research has focused on the design of closed-loop dynamics that are resilient to cyber-attack. The majority of control system protection measures are concerned with how to prevent unauthorized access and protect data integrity. We believe that the ability to analyze how an attacker can effect the closed loop dynamics of a control system configuration once they have access is just as important to the overall security of a control system. To begin to analyze this problem, consistent mathematical definitions of concepts within resilient control need to be established so that a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and configuration can be made. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.

Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Fugate, David L [ORNL; Kisner, Roger [ORNL

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

SuperIdentity: Fusion of Identity across Real and Cyber Domains  

SciTech Connect (OSTI)

Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single 'SuperIdentity'. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factors being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the 'distribution of identity' across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threat.

Black, Sue; Creese, Sadie; Guest, Richard; Pike, William A.; Saxby, Steven; Stanton Fraser, Danae; Stevenage, Sarah; Whitty, Monica

2012-04-23T23:59:59.000Z

422

NERSC/DOE HEP Requirements Review Participants  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Peter Nugent Lawrence Berkeley National Laboratory Discovery and observation of supernovae, computational cosmology Michele Papucci Lawrence Berkeley National Laboratory...

423

NERSC/DOE BER Requirements Workshop Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Author(s): Victor Markowitz | Proteomics and BLAST Scaling May 7, 2009 | Author(s): Lee Ann McCue | Rough Draft of Day-1 Summary May 7, 2009 | Author(s): NERSC staff | Analysis...

424

NERSC/DOE BER Requirements Workshop Agenda  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NERSC) 10:15 am - Break 10:30 pm - Case Studies: Climate Science (Lawrence Buja, David Randall, Co-leads) Noon - Working Lunch 1:00 pm - Case Studies: Climate Science, continued...

425

NERSC/DOE ASCR Requirements Workshop Participants  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Manager Alok Choudhary Northwestern University Parallel IO Erich Strohmaier LBNL Computer Science & Performance Evaluation Esmond Ng LBNL Math Software Arie Shoshani...

426

NERSC/DOE HEP Requirements Workshop Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Advanced Modeling for Particle Accelerators November 12, 2009 | Author(s): Lie-Quan Lee | Astrophysical Data Analysis November 12, 2009 | Author(s): Alex Szalay | Astrophysical...

427

Delegation Procedures - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Delegation Procedures Text Delegation Procedures Delegation Template Text Redelegation Procedures Redelegation Template Delegation Procedures Redelegation Procedures...

428

Updates - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Updates by Diane Johnson Email Alerts Subscribe to automatic e-mail notification about updates to the portal. Email Alerts...

429

NERSC/DOE HEP Requirements Review Participants  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for ASCR Stefan Hoeche SLAC National Accelerator Laboratory Particle physics phenomenology, in particular perturbative QCD and the construction of Monte Carlo event...

430

Startup Costs - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and environmental projects, and estimating guidance for startup costs. g4301-1chp8.pdf -- PDF Document, 8 KB Writer: John Makepeace Subjects: Administration Management...

431

Escalation - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

discusses how escalation is calculated and how escalation indices are applied. g4301-1chp10.pdf -- PDF Document, 15 KB Writer: John Makepeace Subjects: Administration Management...

432

Operating Costs - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

that all elements of the project have been considered and properly estimated. g4301-1chp9.pdf -- PDF Document, 14 KB Writer: John Makepeace Subjects: Administration Management...

433

Contingency - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and improve the understanding of contingency in the project management process. g4301-1chp11.pdf -- PDF Document, 53 KB Writer: John Makepeace Subjects: Administration Management...

434

Project Controls - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

description of project controls and the role the cost estimation package plays. g4301-1chp14.pdf -- PDF Document, 6 KB Writer: John Makepeace Subjects: Administration Management...

435

Estimating Methods - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

direct costs, and other estimating considerations are discussed in this chapter. g4301-1chp15.pdf -- PDF Document, 28 KB Writer: John Makepeace Subjects: Administration Management...

436

Learning Curve - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

This chapter discusses the development and application of the learning curve. g4301-1chp21.pdf -- PDF Document, 28 KB Writer: John Makepeace Subjects: Administration Management...

437

NERSC/DOE BER Requirements Workshop Participants  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Gilbert Compo University of Colorado Climate Robert Egan Joint Genome Institute Genomics David Goodstein Joint Genome Institute Genomics Ruby Leung Pacific Northwest National...

438

Help - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr FlickrGuidedCH2M HILL SecretaryHazmat workFAQsHelium IonContact form

439

Directives Tools - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phasesDataTranslocation ofthe APS User Office New usersDirections


440

Diversity - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phasesDataTranslocationDiurnal Cycle of Convection at the ARM

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Drafts - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phasesDataTranslocationDiurnalCommittee Draft Advice9 1Accessibility Text

442

Quality Assurance - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromising Science for1 2011 Publications Wood,Quadrennial4.1D Admin

443

Redelegation Procedures - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromising ScienceRecent SRELRecycling Programs

444

References - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromising ScienceRecent SRELRecyclingProjects &Lack of Iron The

445

Rescinded Delegations - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromisingStories » Removing

446

NERSC/DOE ASCR Requirements Workshop Agenda  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSCWins1 NERSCNERSC

447

NERSC/DOE ASCR Requirements Workshop Logistics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSCWins1 NERSCNERSCLogistics Workshop

448

NERSC/DOE ASCR Requirements Workshop Participants  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSCWins1

449

NERSC/DOE ASCR Requirements Workshop Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSCWins1Presentations Workshop

450

NERSC/DOE BER Requirements Meeting Logistics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSCWins1PresentationsLogistics Hotel

451

NERSC/DOE BER Requirements Review Agenda  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSCWins1PresentationsLogistics

452

NERSC/DOE BER Requirements Workshop Agenda  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC Logos NERSCWins1PresentationsLogisticsAgenda

453

NERSC/DOE BER Requirements Workshop Participants  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC LogosAttendees Attendees Large Scale

454

NERSC/DOE BER Requirements Workshop Participants  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC LogosAttendees Attendees Large

455

NERSC/DOE BER Requirements Workshop Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC LogosAttendees Attendees LargePresentations

456

NERSC/DOE BES Requirements Workshop Agenda  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC LogosAttendees AttendeesAgenda Workshop

457

NERSC/DOE BES Requirements Workshop Logistics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC LogosAttendees AttendeesAgendaLogistics

458

NERSC/DOE BES Requirements Workshop Participants  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC LogosAttendeesParticipants Participants Large

459

NERSC/DOE BES Requirements Workshop Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSC LogosAttendeesParticipants Participants

460

NERSC/DOE FES Requirements Workshop Agenda  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffrey B. Neaton JeffreyTony Ladd Tony

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

NERSC/DOE FES Requirements Workshop Logistics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffrey B. Neaton JeffreyTony LaddLogistics

462

NERSC/DOE FES Requirements Workshop Participants  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffrey B. Neaton JeffreyTonyParticipants

463

NERSC/DOE FES Requirements Workshop Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffrey B. Neaton

464

NERSC/DOE HEP Requirements Review Participants  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffrey B.Stephen Jardin

465

NERSC/DOE HEP Requirements Workshop Agenda  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffrey B.Stephen JardinAgenda Workshop Agenda

466

NERSC/DOE HEP Requirements Workshop Logistics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffrey B.Stephen JardinAgenda Workshop

467

NERSC/DOE HEP Requirements Workshop Participants  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffrey B.Stephen JardinAgendaParticipants

468

NERSC/DOE HEP Requirements Workshop Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffrey B.Stephen

469

NERSC/DOE HPC Requirements Workshops Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffrey B.StephenReference Materials

470

NERSC/DOE NP Requirements Workshop Agenda  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffrey B.StephenReference MaterialsAgenda

471

NERSC/DOE NP Requirements Workshop Logistics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffrey B.StephenReference

472

NERSC/DOE NP Requirements Workshop Participants  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challengeMultiscaleLogos NERSCJeffrey B.StephenReferenceOrganizing

473

Legal - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces and Interfaces Sample6, 2011 LawrenceE C H N I CLegacy Claims, PIA,

474

Home - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformation InExplosion Monitoring:Home| Visitors|Upcoming EventsFriday,

475

References - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearch Welcome to theNewsCenterandGas SeparationsRelevant

476

Top 10 - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System BurstLongTitan Titan is a two-beamTools

477

Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and Defense

478

Health - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Bigfront.jpgcommunity200cell 9Harvey Brooks,Programs »Health

479

Help - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Bigfront.jpgcommunity200cellHeat Transfer inHeikoAccessibility Text

480

SUBSCRIBE - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwards SAGEComplainant, V.STCObjectivethe items you wish

Note: This page contains sample records for the topic "requirements doe cyber" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

SUBSCRIBE - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwards SAGEComplainant, V.STCObjectivethe items you

482

Safety - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and Security Systems SHARESafer

483

Acronyms - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the EffectsAcknowledgment StatementGuidance »

484

Physical Protection - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006Photovoltaic Theory and Modeling Los AlamosAerosol. | EMSL2A,

485

NERSC/DOE NP Requirements Workshop Logistics  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Physics May 26-27, 2011 Location The workshop will be held at Hyatt Regency Bethesda One Bethesda Metro Center (7400 Wisconsin Ave) Bethesda, Maryland, USA 20814 Tel: +1...

486

NERSC/DOE NP Requirements Workshop Agenda  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for Nuclear Physics May 26-27, 2011 Chesapeak Suites Wireless Network: Hyatt Bethesda Meeting Room Meeting Room: Embassy Group Name: NERSC Passcode: As given in handout at...

487

Miscellaneous - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment SurfacesResource Program PreliminaryA3,0 AlabamaYearEnergyMiraPEAK OIL DEBATE

488

DRB Liaison - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINL is a U.S.11-26-2013 1 2 3 4 5 6DRB

489

Delegation Procedures - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security |CreatingA Sign2 0

490

Delegations - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security |CreatingA Sign2

491

Directives - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOfficeNERSCDiesel pricesDirections

492

Directives Templates - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct:Directives Templates by Website Administrator Directives

493

Facility Safety - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicy andExsolutionFES6FY 2011Facility Engineering

494

DOE-STD-1104 Requirements Crosswalk  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergy Cooperation |South42.2ConsolidatedDepartment2-932-24562 Revision4-935-9451-96

495

Updates - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates by Diane Johnson Email Alerts Subscribe to

496

Human Capital - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun withconfinement plasmas inPortalAllBPA addressesHowHugh ChenH-modeHuman

497

Finance - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicyFeasibilityField Office Final Tank Closure andREMEDIATE

498

Fire Protection - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicyFeasibilityField Office FinalFinancingFingerprintingFinite66-2012,

499

Email Notification - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4: Networking for the‹ElectronicElizabeth CaseEmailAccessibility

500

Radiological Control - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298, and 323Program AccomplishmentsScience