Powered by Deep Web Technologies
Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

TCIP: Trustworthy CyberInfrastructure for the Power Grid | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid TCIP: Trustworthy CyberInfrastructure for the Power Grid The TCIP, or Trustworthy CyberInfrastructure for the Power Grid, project's vision is to provide the fundamental science and technology to create an intelligent, adaptive power grid which survives malicious adversaries, provides continuous delivery of power, and supports dynamically varying trust requirements. This goal may be reached by creating the cyber building blocks, architecture, and validation technology to quantify the amount of trust provided by a proposed approach. The presentation below was given by William H. Saunders at the Visualization and Controls Program Peer Review in October 2006. TCIP: Trustworthy CyberInfrastructure for the Power Grid

2

Data Diodes in Support of Trustworthy Cyber Infrastructure  

SciTech Connect

Interconnections between process control networks and en- terprise networks has resulted in the proliferation of stan- dard communication protocols in industrial control systems which exposes instrumentation, control systems, and the critical infrastructure components they operate to a variety of cyber attacks. Various standards and technologies have been proposed to protect industrial control systems against cyber attacks and to provide them with confidentiality, in- tegrity, and availability. Among these technologies, data diodes provide protection of critical systems by the means of physically enforcing traffic direction on the network. In order to deploy data diodes effectively, it is imperative to un- derstand the protection they provide, the protection they do not provide, their limitations, and their place in the larger security infrastructure. In this work, we briefly review the security challenges in an industrial control system, study data diodes, their functionalities and limitations, and pro- pose a scheme for their effective deployment in trusted pro- cess control networks (TPCNs.)

Sheldon, Frederick T [ORNL; Okhravi, Hamed [ORNL

2010-01-01T23:59:59.000Z

3

Data Diodes in Support of a Power Grid Trustworthy Cyber Infrastructure  

SciTech Connect

Industrial Control Systems (ICS) are an integral part of the industrial infrastructure providing for the national good. While sharing basic constructs with Information Technology (IT) business systems, ICSs are technically, administratively, and functionally more complex and unique than business IT systems. Critical infrastructure protection focuses on protecting and maintaining a safe and reliable supply of electric power, oil, water, gasoline, chemicals, food, etc. Cyber vul-nerabilities are important if they can affect the safe, functional performance of these systems and processes. The majority of ICS exhibit vulnerable devices with unsecured physical access and/or subject to insider attack. In this whitepaper, we advocate trusted process control networks as a way to address the serious cyber security flaws which combines both white/black listing into a design philosophy that addresses information warfare scenarios, software process monitoring and an attack recognition and management architecture.

Sheldon, Frederick T [ORNL; MacIntyre, Lawrence Paul [ORNL; Okhravi, Hamed [ORNL; Munson, Dr. John C. [Computer Measurement Laboratory, Inc.

2009-12-01T23:59:59.000Z

4

Cyber Infrastructure Group Home Page  

Science Conference Proceedings (OSTI)

Cyber Infrastructure Group. Welcome. The Cyber Infrastructure Group (775.04) addresses the integration and interoperability ...

2012-07-17T23:59:59.000Z

5

Guide to Critical Infrastructure Protection Cyber Vulnerability...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized...

6

Cyber and physical infrastructure interdependencies.  

Science Conference Proceedings (OSTI)

The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

2008-09-01T23:59:59.000Z

7

CYBER-RELATED CRITICAL INFRASTRUCTURE IDENTIFICATION AND PROTECTION...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER-RELATED CRITICAL INFRASTRUCTURE IDENTIFICATION AND PROTECTION MEASURES, IG-0545 CYBER-RELATED CRITICAL INFRASTRUCTURE IDENTIFICATION AND PROTECTION MEASURES, IG-0545 In...

8

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June 2012)

9

Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guide to Critical Infrastructure Protection Cyber Vulnerability Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards New No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards "Cybersecurity for State Regulators" - NARUC Primer (June

10

Optimizing investments in cyber-security for critical infrastructure  

Science Conference Proceedings (OSTI)

Investments in the cyber-security of critical infrastructure must balance preventing intrusion, detecting a cyber-attack, and mitigating the attacker's physical effects on computer controlled equipment. For this purpose, we outline a method for making ...

Ike Patterson; James Nutaro; Glenn Allgood; Teja Kuruganti; David Fugate

2013-01-01T23:59:59.000Z

11

Advanced Metering Infrastructure Cyber Security Risks  

Science Conference Proceedings (OSTI)

The deployment of advanced metering infrastructure (AMI) systems is introducing millions of components to the electric grid that support two-way communication for next-generation grid applications. Although these systems can increase operational efficiencies and enable new capabilities such as demand-response, they also increase the attack surface for potential adversaries. Utilities must address these new cyber security risks as part of their overall enterprise risk management strategy. These ...

2013-12-23T23:59:59.000Z

12

The Cyber Threat to National Critical Infrastructures: Beyond Theory  

Science Conference Proceedings (OSTI)

Adversary threats to critical infrastructures have always existed during times of conflict, but threat scenarios now include peacetime attacks from anonymous computer hackers. Current events, including examples from Israel and Estonia, prove that a certain ... Keywords: Estonia, business continuity and disaster recover planning, critical, cyber, infrastructure, security architecture and design, telecommunications and network security threat

Kenneth Geers

2009-01-01T23:59:59.000Z

13

Submission to NIST RFI for Critical Infrastructure Cyber ...  

Science Conference Proceedings (OSTI)

... Page 2 of 3 3. The forces that govern cyber security implementation, innovation and transformation are diffuse and widely distributed. ...

2013-04-10T23:59:59.000Z

14

CyberDesign & Infrastructure for Multiscale Modeling and Simulations  

Science Conference Proceedings (OSTI)

Multiscale cyber design methodology, which usually disparate entities such as material characterization, mechanical experimentation, material design, and ...

15

Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.  

Science Conference Proceedings (OSTI)

The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

Dawson, Lon Andrew; Stinebaugh, Jennifer A.

2010-04-01T23:59:59.000Z

16

Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor  

SciTech Connect

Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.

Ondrej Linda; Todd Vollmer; Jim Alves-Foss; Milos Manic

2011-08-01T23:59:59.000Z

17

Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research: Energy Infrastructure Cyber Protection  

Science Conference Proceedings (OSTI)

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Protecting and trusting information is not unique to the grid. Indeed, the information security market is worth tens of billions of dollars, almost exclusively in cyber security products and services. Yet, solutions designed for the Internet are often not appropriate for securing the energy grid, which has a different set of priorities and communication needs. Any viable information security solution must address those unique challenges and features. The discussion at the CSIIR Workshop was primarily focused about the Energy Infrastructure Cyber Protection (ENCyP) Initiative. ENCyP is a multidisciplinary strategic theme oriented on cyber protection for the most critical and most vulnerable components of Energy Delivery System (EDS). The initiative derived from ORNL's focus on energy and cyber-physical defenses. On this basis we received just over 100 submissions stemming from both novel theoretical and empirical research focused on the many different aspects of ENCyP. We encouraged the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the evolving context ENCyP. Topics included: Security assurance/interoperability for Energy Delivery Systems (EDS) Scalable/trusted control (cyber-physical) systems security Visual analytics for cyber security Next generation control systems vulnerability assessment Wireless Smart Grid security SCADA, EDS communications security test beds Use cases and attack scenarios for EDS Wide area monitoring, protection & control AMI, demand-response, distribution grid management security Electric transportation & distributed energy resources security Policy/standards driven architectures for EDS Anti-tamper device architectures Cryptographic key management for EDS Security risk assessment and management for EDS Insider and life-cycle threats Automated vulnerability detection Access control management and authentication services for EDS Secure information exchange gateway & watchdog switches Bio-Inspired technologies for enhancing EDS cybersecurity A principle goal of the workshop was to foster discussions and dialog among the 210 registered attendees from North and South America, Europe, Asia, and Africa. This goal was initiated and facilitated by 8 plenary keynote addresses including our banquet and reception speakers. There were also six invited speakers, including two panels of government and national laboratory representatives. A total of one hundred and three papers (i.e., extended abstracts [EAs]) were submitted involving over three hundred independent reviews from more than one hundred reviewers. Thirty two percent of the papers that were submitted received two reviews while all of the rest of the papers received three or more. Fifty-four EAs were accepted. Twenty-five posters were invited. All of the EAs, presentations and posters are included in our proceedings. The subject areas span the topics above and were organized into nine tracks: Security Assurance for EDS; Wide Area Mo

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [University of Idaho

2011-01-01T23:59:59.000Z

18

Understanding cyber threats and vulnerabilities  

Science Conference Proceedings (OSTI)

This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was ... Keywords: actor, critical infrastructure, cyber crime, cyber terrorism, cyber threat, cyber vulnerabilities

Eric Luiijf

2012-01-01T23:59:59.000Z

19

DOE to Provide Nearly $8 Million to Safeguard the Nation’s Energy Infrastructure from Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE))

U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically-advanced controls and cyber-security devices into our electric grid and energy infrastructure.

20

ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention  

Science Conference Proceedings (OSTI)

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

INL Cyber Security Research | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Research Cyber security research at INL will help protect critical infrastructure control system computers against worms and other viruses. INL Cyber Security Research More...

22

A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes  

E-Print Network (OSTI)

and operation of an embedded sensor network (57 wirelessoperations and man-made infrastructure. Chapter 2: Wireless

Kerkez, Branko

2012-01-01T23:59:59.000Z

23

Provenance-based trustworthiness assessment in sensor networks  

Science Conference Proceedings (OSTI)

As sensor networks are being increasingly deployed in decision-making infrastructures such as battlefield monitoring systems and SCADA (Supervisory Control and Data Acquisition) systems, making decision makers aware of the trustworthiness of the collected ... Keywords: data provenance, sensor network, trustworthiness

Hyo-Sang Lim; Yang-Sae Moon; Elisa Bertino

2010-09-01T23:59:59.000Z

24

DRAFT Outline - Preliminary Framework to Reduce Cyber ...  

Science Conference Proceedings (OSTI)

Page 1. 1 DRAFT Outline - Preliminary Framework to Reduce Cyber Risks to Critical Infrastructure, July 1, 2013 NOTES ...

2013-07-02T23:59:59.000Z

25

Cyber-infrastructure to Support Science and Data Management for the Dark Energy Survey  

E-Print Network (OSTI)

The Dark Energy Survey (DES; operations 2009-2015) will address the nature of dark energy using four independent and complementary techniques: (1) a galaxy cluster survey over 4000 deg2 in collaboration with the South Pole Telescope Sunyaev-Zel'dovich effect mapping experiment, (2) a cosmic shear measurement over 5000 deg2, (3) a galaxy angular clustering measurement within redshift shells to redshift=1.35, and (4) distance measurements to 1900 supernovae Ia. The DES will produce 200 TB of raw data in four bands, These data will be processed into science ready images and catalogs and co-added into deeper, higher quality images and catalogs. In total, the DES dataset will exceed 1 PB, including a 100 TB catalog database that will serve as a key science analysis tool for the astronomy/cosmology community. The data rate, volume, and duration of the survey require a new type of data management (DM) system that (1) offers a high degree of automation and robustness and (2) leverages the existing high performance computing infrastructure to meet the project's DM targets. The DES DM system consists of (1) a grid-enabled, flexible and scalable middleware developed at NCSA for the broader scientific community, (2) astronomy modules that build upon community software, and (3) a DES archive to support automated processing and to serve DES catalogs and images to the collaboration and the public. In the recent DES Data Challenge 1 we deployed and tested the first version of the DES DM system, successfully reducing 700 GB of raw simulated images into 5 TB of reduced data products and cataloguing 50 million objects with calibrated astrometry and photometry.

C. Ngeow; J. J. Mohr; T. Alam; W. A. Barkhouse; C. Beldica; D. Cai; G. Daues; R. Plante; J. Annis; H. Lin; D. Tucker; R. C. Smith

2006-08-11T23:59:59.000Z

26

M.: On the impact of network infrastructure parameters to the effectiveness of cyber attacks against industrial control systems  

E-Print Network (OSTI)

The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of SCADA systems, today we still lack the proper understanding of the effects that cyber attacks have on NICS. In this paper we identify the communication and control logic implementation parameters that influence the outcome of attacks against NICS and that could be used as effective measures for increasing the resilience of industrial installations. The implemented scenario involves a powerful attacker that is able to send legitimate Modbus packets/commands to control hardware in order to bring the physical process into a critical state, i.e. dangerous, or more generally unwanted state of the system. The analysis uses a Boiling Water Power Plant to show that the outcome of cyber attacks is influenced by network delays, packet losses, background traffic and control logic scheduling time. The main goal of this paper is to start an exploration of cyber-physical effects in particular scenarios. This study is the first of its kind to analyze cyber-physical systems and provides insight to the way that the cyber realm affects the physical realm.

B. Genge; C. Siaterlis; M. Hohenadel; Béla Genge; Christos Siaterlis; Marc Hohenadel

2012-01-01T23:59:59.000Z

27

ICME: Informatics and Infrastructure  

Science Conference Proceedings (OSTI)

Oct 18, 2010... interfaces and data management systems that can be read by computers are important to enable a cyber infrastructure, their use in materials ...

28

Development of the PowerCyber SCADA security testbed  

Science Conference Proceedings (OSTI)

Meeting current demands for critical infrastructure cyber security education and research will require accurate testbed development. The PowerCyber was designed to closely resemble power grid communication utilizing actual field devices and SCADA software. ...

Adam Hahn; Ben Kregel; Manimaran Govindarasu; Justin Fitzpatrick; Rafi Adnan; Siddharth Sridhar; Michael Higdon

2010-04-01T23:59:59.000Z

29

Trustworthiness of Information Sources and Information Pedigrees  

Science Conference Proceedings (OSTI)

To survive, and indeed thrive, in an open heterogenous information sharing environment, an agent's ability to evaluate the trustworthiness of other agents becomes crucial. In this paper, we investigate a procedure for evaluating an agent's trustworthiness ...

Wei Liu; Mary-Anne Williams

2001-08-01T23:59:59.000Z

30

Microsoft Word - OE Cyber Release 10 18 07.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE to Provide Nearly 8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for...

31

Obama's Call for Public-Private Cyber Security Collaboration...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the...

32

NIST Finalizes Initial Set of Smart Grid Cyber Security ...  

Science Conference Proceedings (OSTI)

... guidelines is intended to facilitate organization-specific Smart Grid cyber security ... the nation's electric infrastructure to make it smarter, more efficient ...

2010-09-29T23:59:59.000Z

33

Proposed Comprehensive Cyber Security Legislation, May 2011  

Science Conference Proceedings (OSTI)

The role of cyber security in the critical infrastructures of the United States has been recognized by the President and by members of Congress. To address potential cyber security threats and vulnerabilities, the Senate has proposed revisions to specific laws and regulations. This white paper includes a technical assessment of some of the key proposed revisions.

2011-10-26T23:59:59.000Z

34

Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber security and information intelligence challenges and strategies  

SciTech Connect

As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information, which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value. The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. The aim of this workshop (www.csiir.ornl.gov/csiirw) was to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. Topics include: Scalable trustworthy systems Enterprise-level metrics Coping with insider and life-cycle threats Coping with malware and polymorphism Phishing/whaling, spam and cyber crime High assurance system survivability Cyber security for the Smart Grid Digital provenance and data integrity Privacy-aware security and usable security Social networking models for managing trust and security A principle goal of the workshop was to foster discussions and dialog among the 150 registered attendees from North America, Europe, Asia, and Africa. This goal was initiated and facilitated by 14 plenary keynote addresses including a banquet presentation and the CIO / CTO perspectives panel. A total of 98 papers (i.e., extended abstracts [EAs]) were submitted and 54 EAs were accepted plus 11 posters were invited. All of the abstracts and either presentation materials or posters are included in the proceedings. The subject areas span the topics above and were organized into eight tracks: Trust, Design, Malware, Network, Privacy and Metrics, Enterprise, Survivability and Formal Methods.

Sheldon, Frederick T [ORNL; Prowell, Stacy J [ORNL; Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2010-01-01T23:59:59.000Z

35

Electric Drive Vehicle and Charging Infrastructure Demonstrations...  

NLE Websites -- All DOE Office Websites (Extended Search)

P t ti - Energy Critical Infrastructure Protection - Homeland Security and Cyber Security Nuclear 2 Hydropower Geothermal t t AVTA Participants and Goals P ti i t * Participants -...

36

A survey SCADA of and critical infrastructure incidents  

Science Conference Proceedings (OSTI)

In this paper, we analyze several cyber-security incidents involving critical infrastructure and SCADA systems. We classify these incidents based on Source Sector, Method of Operations, Impact, and Target Sector. Using this standardized taxonomy we can ... Keywords: critical infrastructure, cyber attack, cyber security, information assurance and security, scada, security

Bill Miller; Dale Rowe

2012-10-01T23:59:59.000Z

37

The detailed evaluation criteria for designation of critical information infrastructure in the field of broadcasting and communication  

Science Conference Proceedings (OSTI)

Increasing to dependency on information infrastructures involves various threats to cyber incidents. Most of nations or organizations work on protect to not only infrastructure but also information infrastructure. Korea established Critical Information ... Keywords: CII (critical information infrastructure), CIIP (CII protection), cyber incident, cyber security, designation criteria, information assets

Soontai Park; Wan S. Yi; Bong-Nam Noh

2010-02-01T23:59:59.000Z

38

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

39

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

40

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

42

Cyber Security and Resilient Systems  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

43

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

44

Collaborative Utility Task Force Partners with DOE to Develop Cyber  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Collaborative Utility Task Force Partners with DOE to Develop Cyber Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure The Advanced Metering Infrastructure Security (AMI-SEC) Task Force announces the release of the AMI System Security Requirements, a first-of-its-kind for the utility industry that will help utilities procure and implement secure components and systems using a common set of security requirements. Collaborative Utility Task Force Partners with DOE to Develop Cyber Security Requirements for Advanced Metering Infrastructure More Documents & Publications AMI System Security Requirements - v1_01-1 Before the Senate Energy and Natural Resources Committee

45

A Trustworthy Mobile Agent Infrastructure for Network Management  

E-Print Network (OSTI)

Koliousis,A. Sventek,J.S. Proceedings of the IFIP/IEEE Symposium on Integrated Management, Munich, Germany, May 2007

Koliousis, A.; Sventek, J.S.

46

A Trustworthy Mobile Agent Infrastructure for Network Management  

E-Print Network (OSTI)

Koliousis,A.K. Sventek,J.S. The Tenth IFIP/IEEE International Symposium on Integrated Network Management 2007 (IM'07) pp 383-390 IEEE

Koliousis, A.K.

47

Trustworthy Customer Services | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Trustworthy Customer Services Trustworthy Customer Services Trustworthy Customer Services January 15, 2014 8:30AM EST to January 16, 2014 4:00PM EST Registration link: CHRIS 002452/0001$400.00 Course Type: Classroom Course Location: Forrestal RM GH-043 Course Description: In this interactive course, participants learn how to improve their customer service skills to build stronger and more effective relationships with customers, and to improve their overall individual and organizational effectiveness. Participants learn how to identify customers and their needs, and learn the fundamental attributes of strong customer service skills. The course uses a series of mini case studies and individual assessments to help participants focus on the steps they need to take to provide exceptional customer service. Participants receive a set of

48

Cyber Incidents Involving Control Systems  

Science Conference Proceedings (OSTI)

The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).

Robert J. Turk

2005-10-01T23:59:59.000Z

49

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

50

Composition and evaluation of trustworthy web services  

Science Conference Proceedings (OSTI)

Web service technology seamlessly enables integration of different software to fulfil dynamic business demands in a platform-neutral fashion. By means of standard interfaces, service requesters can obtain their desired functionalities through certain ... Keywords: Petri nets, composite web services, ontology, trust, trustworthy web services, web service composition, web service evaluation

Stephen J. H. Yang; James S. F. Hsieh; Blue C. W. Lan; Jen-Yao Chung

2006-02-01T23:59:59.000Z

51

Cyberwarfare on the Electricity Infrastructure  

SciTech Connect

The report analyzes the possibility of cyberwarfare on the electricity infrastructure. The ongoing deregulation of the electricity industry makes the power grid all the more vulnerable to cyber attacks. The report models the power system information system components, models potential threats and protective measures. It therefore offers a framework for infrastructure protection.

Murarka, N.; Ramesh, V.C.

2000-03-20T23:59:59.000Z

52

Cyber sleuths face off  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber sleuths face off Cyber sleuths face off Computer specialists will meet for a grueling week that combines state-of-the-art training with opportunities to team up, solve...

53

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

54

2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop  

SciTech Connect

Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on rebalancing cyberspace to mitigate threats and maximize benefits, ensuring security and privacy in a constantly changing adversarial environment. Recognizing this great need, we requested original paper submissions in four general areas derived from the Federal Cybersecurity R&D program thrusts: Designed-In-Security (DIS) Builds the capability to design, develop, and evolve high-assurance, software-intensive systems predictably and reliably while effectively managing risk, cost, schedule, quality, and complexity. Tailored Trustworthy Spaces (TTS) Provides flexible, adaptive, distributed trust environments that can support functional and policy requirements arising from a wide spectrum of activities in the face of an evolving range of threats--recognizing the user's context and evolves as the context evolves. Moving Target (MT) Enables us to create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency. Cyber Economic Incentives (CEI) Develops effective incentives to make cybersecurity ubiquitous, including incentives affecting individuals and organizations.

Sheldon, Frederick T [ORNL; Giani, Annarita N. [Los Alamos National Laboratory (LANL); Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2013-01-01T23:59:59.000Z

55

2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop  

SciTech Connect

Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on rebalancing cyberspace to mitigate threats and maximize benefits, ensuring security and privacy in a constantly changing adversarial environment. Recognizing this great need, we requested original paper submissions in four general areas derived from the Federal Cybersecurity R&D program thrusts: Designed-In-Security (DIS) Builds the capability to design, develop, and evolve high-assurance, software-intensive systems predictably and reliably while effectively managing risk, cost, schedule, quality, and complexity. Tailored Trustworthy Spaces (TTS) Provides flexible, adaptive, distributed trust environments that can support functional and policy requirements arising from a wide spectrum of activities in the face of an evolving range of threats--recognizing the user's context and evolves as the context evolves. Moving Target (MT) Enables us to create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency. Cyber Economic Incentives (CEI) Develops effective incentives to make cybersecurity ubiquitous, including incentives affecting individuals and organizations.

Sheldon, Frederick T [ORNL; Giani, Annarita N. [Los Alamos National Laboratory (LANL); Krings, Axel [University of Idaho; Abercrombie, Robert K [ORNL

2013-01-01T23:59:59.000Z

56

Control Systems Cyber Security Standards Support Activities  

Science Conference Proceedings (OSTI)

The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

Robert Evans

2009-01-01T23:59:59.000Z

57

Cyber Security Solutions for Instrumentation and Control Systems  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced as a result of continual threats to business and process control networks. Many standards have been drafted, undergone revision, and are being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection standards requirements of the North American Electric Reliability Corporation and related requirements in the international community. Compliance with ...

2012-12-12T23:59:59.000Z

58

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

59

Microsoft Word - OE Cyber Release 10 18 07.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 Megan Barnett, (202) 586-4940 Thursday, October 18, 2007 DOE to Provide Nearly $8 Million to Safeguard the Nation's Energy Infrastructure from Cyber Attacks WASHINGTON, DC - U.S. Department of Energy (DOE) Assistant Secretary for Electricity Delivery and Energy Reliability Kevin M. Kolevar today announced five projects that have been selected for negotiation of awards of up to $7.9 million in DOE funding to develop and integrate technologically- advanced controls and cyber-security devices into our electric grid and energy infrastructure. These projects aim to protect our Nation's energy infrastructure from cyber attacks and seek to modernize our electricity grid, advancing the President's efforts to increase energy and economic security. These projects will

60

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Virtual Queue Based Distributed Data Traffic Scheduling for Cyber Physical Systems with Application in Smart Grid  

Science Conference Proceedings (OSTI)

Communication is needed in cyber physical system (CPS) to convey information from sensors to controllers. In this paper, a wireless network is considered to serve as the communication infrastructure in CPS. The data traffic scheduling problem is studied ... Keywords: Kalman filtering, cyber physical system, scheduling

Husheng Li

2012-06-01T23:59:59.000Z

62

Student Research Abstract: Trustworthy Remote Entities in the Smart Grid  

E-Print Network (OSTI)

Student Research Abstract: Trustworthy Remote Entities in the Smart Grid Andrew J. Paverd to enhance user privacy by introducing a novel element into the smart grid architecture. The Trustworthy a group of smart meters and the external smart grid entities. The TRE enhances user privacy by providing

Oxford, University of

63

Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions  

Science Conference Proceedings (OSTI)

Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

Maiden, Wendy M.

2009-12-01T23:59:59.000Z

64

Stability of a cyber-physical smart grid system using cooperating invariants  

Science Conference Proceedings (OSTI)

Cyber-Physical Systems (CPS) consist of computational components interconnected by computer networks that monitor and control switched physical entities interconnected by physical infrastructures. Ensuring stability and correctness (both logical and ...

Ashish Choudhari, Harini Ramaprasad, Tamal Paul, Jonathan W. Kimball, Maciej Zawodniok, Bruce McMillin, Sriram Chellappan

2013-04-01T23:59:59.000Z

65

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO)...

66

Slide 1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to develop new ones that collectively provide resilience in the nation's electric grid cyber infrastructure that ensures - Trustworthy and timely operations, - Survives malicious...

67

Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentatio...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program...

68

DOE Navigant Master Presentation | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

- Final Environmental Impact Statement Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Trustworthy Cyber Infrastructure for the Power Grid (TCIPG)...

69

sSCADA: securing SCADA infrastructure communications  

Science Conference Proceedings (OSTI)

Distributed control systems (DCS) and supervisory control and data acquisition (SCADA) systems were developed to reduce labour costs, and to allow system-wide monitoring and remote control from a central location. Control systems ... Keywords: DCS, SCADA, authenticated broadcast channels, authenticated emergency channels, authentication, critical infrastructures, cyber attacks, data acquisition, distributed control systems, infrastructure protection, secure channels, secure communications, smart grid security, supervisory control

Yongge Wang

2011-12-01T23:59:59.000Z

70

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

71

Innovating to Meet the Evolving Cyber Challenge | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge Innovating to Meet the Evolving Cyber Challenge September 19, 2013 - 12:02pm Addthis Innovating to Meet the Evolving Cyber Challenge Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability What are the key facts? Protecting critical energy infrastructure -- which makes reliable electricity transmission and robust national security possible -- is a top priority for the Energy Department. This week, the Energy Department announced more than $30 million in awards to cutting-edge energy sector stakeholders in seven states across the country. This funding will drive the development of new technologies that will help utilities and the oil and gas sectors further strengthen

72

Towards a trustworthy service marketplace for the future internet  

Science Conference Proceedings (OSTI)

Digital economy is moving towards offering advanced business services, integrated into different applications and consumed from heterogeneous devices. Considering the success of actual software marketplaces, it is possible to foresee that Service ... Keywords: security, service marketplace, trust, trustworthiness

Francesco Di Cerbo; Michele Bezzi; Samuel Paul Kaluvuri; Antonino Sabetta; Slim Trabelsi; Volkmar Lotz

2012-01-01T23:59:59.000Z

73

Ideal based cyber security technical metrics for control systems  

Science Conference Proceedings (OSTI)

Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provide the basis for management decisions that affect the protection of the ... Keywords: control system security, cyber security metrics

Wayne Boyer; Miles McQueen

2007-10-01T23:59:59.000Z

74

July 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a recent cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable...

75

January 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a recent cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of...

76

Organized Cyber Defense Competitions  

Science Conference Proceedings (OSTI)

The Cyber Defense Exercise (CDX), an annual competition between students at the five U.S. Service Academies has developed into an extraordinary educational experience for the participants. During the exercise students will design and implement a realistic ...

Ronald C. Dodge JR; Daniel J. Ragsdale

2004-08-01T23:59:59.000Z

77

July 2013 Cyber Incident  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information ...

78

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

79

Metaphors for cyber security.  

SciTech Connect

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

80

Cyber Security Testing and Training Programs for Industrial Control Systems  

DOE Green Energy (OSTI)

Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

Daniel Noyes

2012-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

The cyber-physical attacker  

Science Conference Proceedings (OSTI)

The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker ... Keywords: attacker model, cyber-physical systems, cyber-physical threats, security protocol verification

Roberto Vigo

2012-09-01T23:59:59.000Z

82

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

2005-10-01T23:59:59.000Z

83

Cyber threat metrics.  

SciTech Connect

Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

2012-03-01T23:59:59.000Z

84

Critical infrastructure systems of systems assessment methodology.  

Science Conference Proceedings (OSTI)

Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies that separately consider physical security and cyber security. This research has developed a risk assessment methodology that explicitly accounts for both physical and cyber security, while preserving the traditional security paradigm of detect, delay, and respond. This methodology also accounts for the condition that a facility may be able to recover from or mitigate the impact of a successful attack before serious consequences occur. The methodology uses evidence-based techniques (which are a generalization of probability theory) to evaluate the security posture of the cyber protection systems. Cyber threats are compared against cyber security posture using a category-based approach nested within a path-based analysis to determine the most vulnerable cyber attack path. The methodology summarizes the impact of a blended cyber/physical adversary attack in a conditional risk estimate where the consequence term is scaled by a ''willingness to pay'' avoidance approach.

Sholander, Peter E.; Darby, John L.; Phelan, James M.; Smith, Bryan; Wyss, Gregory Dane; Walter, Andrew; Varnado, G. Bruce; Depoy, Jennifer Mae

2006-10-01T23:59:59.000Z

85

Obama's Call for Public-Private Cyber Security Collaboration Reflected in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obama's Call for Public-Private Cyber Security Collaboration Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities May 29, 2009 - 4:08pm Addthis In releasing the results of his Administration's 60-day cyber security review, President Barack Obama today emphasized that partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the computer-based systems that monitor and control the nation's electric grid and oil and gas pipelines remains a shared challenge for the Department of Energy. As the industry quickly works to develop and demonstrate Smart Grid technologies to build a more reliable and resilient

86

21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 Steps to Improve Cyber Security of SCADA Networks 1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in cyber space today. By allowing the collection and analysis of data and control of equipment such as pumps and valves from remote locations, SCADA networks provide great efficiency and are widely used. However, they also present a security risk. 21 Steps to Improve Cyber Security of SCADA Networks

87

Chapter_14_Cyber_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

88

Cyber Friendly Fire  

Science Conference Proceedings (OSTI)

Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public. The network is essentially divided into a production component that hosts the web and network services, and a user component that hosts thirty employee workstations and other end devices. The organization's network is separated from the Internet by a Cisco ASA network security device that both firewalls and detects intrusions. Business sensitive information is stored in various servers. This includes data comprising thousands of internal documents, such as finance and technical designs, email messages for the organization's employees including the CEO, CFO, and CIO, the organization's source code, and Personally Identifiable client data. Release of any of this information to unauthorized parties would have a significant, detrimental impact on the organization's reputation, which would harm earnings. The valuable information stored in these servers pose obvious points of interest for an adversary. We constructed several scenarios around this environment to support studies in cyber SA and cyber FF that may be run in the test range. We describe mitigation strategies to combat cyber FF including both training concepts and suggestions for decision aids and visualization approaches. Finally, we discuss possible future research directions.

Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

2011-09-01T23:59:59.000Z

89

Cyber Security Solutions for Instrumentation and Control Systems, Topic 2: Patch Management and Automated Change Management  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced as a result of continual threats to business and process control networks. Many standards have been drafted, have undergone revision, and are being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection (CIP) standards requirements of the North American Electric Reliability Corporation (NERC) and related requirements in the international ...

2013-04-18T23:59:59.000Z

90

Cyber Security Solutions for Instrumentation and Control Systems, Topic 3: Security Status Monitoring  

Science Conference Proceedings (OSTI)

Cyber security standards have been produced in response to continual threats to business and process control networks. Many standards have been drafted and subsequently revised and are now being enforced for compliance. In recent years, electric utilities have established cyber security programs to ensure compliance with the requirements set forth in the North American Electric Reliability Corporation’s Critical Infrastructure Protection standards and related requirements in the international ...

2013-11-08T23:59:59.000Z

91

PACIFIC NORTHWEST CYBER SUMMIT  

SciTech Connect

On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energy’s (DOE’s) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOE’s Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.

Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.; Smith, Karen S.

2013-08-07T23:59:59.000Z

92

From a proven correct microkernel to trustworthy large systems  

Science Conference Proceedings (OSTI)

The seL4 microkernel was the world's first general-purpose operating system kernel with a formal, machine-checked proof of correctness. The next big step in the challenge of building truly trustworthy systems is to provide a framework for developing ...

June Andronick

2010-06-01T23:59:59.000Z

93

Logical attestation: an authorization architecture for trustworthy computing  

Science Conference Proceedings (OSTI)

This paper describes the design and implementation of a new operating system authorization architecture to support trustworthy computing. Called logical attestation, this architecture provides a sound framework for reasoning about run time behavior ... Keywords: credentials-based authorization, logic, trusted platform module

Emin Gün Sirer; Willem de Bruijn; Patrick Reynolds; Alan Shieh; Kevin Walsh; Dan Williams; Fred B. Schneider

2011-10-01T23:59:59.000Z

94

Advanced Metering Infrastructure (AMI) System Security Requirements  

Science Conference Proceedings (OSTI)

This report identifies key cyber security requirements and suggests basic security approaches for safeguarding the many interfaces of Advanced Metering Infrastructure (AMI) systems. These requirements, which were developed through a clearly defined security assessment procedure, are generic; but they can be used to develop more specific security requirements based on actual configurations and environments.

2009-12-21T23:59:59.000Z

95

CSCE Specialty Conference on Infrastructure Technologies, Management and Policy confrence spcialise sur la gestion, les politiques et les technologies des infrastructures  

E-Print Network (OSTI)

of the recent developments focused primarily on individual infrastructure assets, such as nuclear power plants Cities are complex and dynamic system of systems in which interconnected cyber, physical, social disasters requires designing cities that combine seemingly opposite characteristics, including redundancy

Hammad, Amin

96

Cyber Security Management Memorandum | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Management Memorandum Cyber Security Management Memorandum On December 7, 2009, the Deputy Secretary of Energy released this memorandum directing the creation of a...

97

THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002, IG-0569 THE FEDERAL ENERGY REGULATORY COMMISSION'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002,...

98

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

99

Building the Next Generation of Cyber Defenders  

Science Conference Proceedings (OSTI)

Page 1. Building the Next Generation of Cyber Defenders ... 19th Century 20th Century The Cyber Security Problem Space ? Historic Background ...

2013-03-28T23:59:59.000Z

100

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Technical Options to Address Cyber Security, Interoperability...  

NLE Websites -- All DOE Office Websites (Extended Search)

Technical Options to Address Cyber Security, Interoperability and Other Issues with ZigBee SEP Title Technical Options to Address Cyber Security, Interoperability and Other Issues...

102

Protecting Intelligent Distributed Power Grids Against Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a...

103

RFI Comments - Advanced Cyber Security Center  

Science Conference Proceedings (OSTI)

Page 1. Page 1 of 3 Advanced Cyber Security Center Rollout ... The Need The advanced cyber threat is real and growing. ...

2013-04-09T23:59:59.000Z

104

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

105

Security and Cyber Guidance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April...

106

Handling Overload Conditions In High Performance Trustworthy Information Retrieval Systems  

E-Print Network (OSTI)

Web search engines retrieve a vast amount of information for a given search query. But the user needs only trustworthy and high-quality information from this vast retrieved data. The response time of the search engine must be a minimum value in order to satisfy the user. An optimum level of response time should be maintained even when the system is overloaded. This paper proposes an optimal Load Shedding algorithm which is used to handle overload conditions in real-time data stream applications and is adapted to the Information Retrieval System of a web search engine. Experiment results show that the proposed algorithm enables a web search engine to provide trustworthy search results to the user within an optimum response time, even during overload conditions.

Ramachandran, Sumalatha; Paulraj, Sujaya; Ramaraj, Vetriselvi

2010-01-01T23:59:59.000Z

107

Infrastructural Optimism  

E-Print Network (OSTI)

means envisioning a new mobility network that incorporatesproposed plans for new public mobility infrastructure. Among2 For them, New Orleans’ damaged mobility infrastructure was

Samuels, Linda C.

2009-01-01T23:59:59.000Z

108

Protecting users of the cyber commons  

Science Conference Proceedings (OSTI)

Establish a global cyber "neighborhood watch" enabling users to take defensive action to protect their operations.

Stephen J. Lukasik

2011-09-01T23:59:59.000Z

109

DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS: CA DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS. Key Cyber...

110

The Department's Unclassified Cyber Security Program 2002, IG...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Unclassified Cyber Security Program 2002, IG-0567 The Department's Unclassified Cyber Security Program 2002, IG-0567 The Department's Unclassified Cyber Security Program 2002,...

111

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

NLE Websites -- All DOE Office Websites (Extended Search)

CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: CORE COMPETENCY...

112

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

113

Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor  

Science Conference Proceedings (OSTI)

Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.

Ondrej Linda; Todd Vollmer; Jason Wright; Milos Manic

2011-04-01T23:59:59.000Z

114

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

115

Simulating non-stationary congestion systems using splitting with applications to cyber security  

Science Conference Proceedings (OSTI)

According to the former counterterrorism czar, Richard A. Clarke (2010), our national infrastructure could be severely damaged in 15 minutes by a cyber attack. A worm attack on an Internet Protocol (IP) network is one type of attack that is possible. ...

Martin J. Fischer; Denise M. B. Masi; John F. Shortle; Chun-Hung Chen

2010-12-01T23:59:59.000Z

116

Strengthening Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

E E n E rgyB i z November/December 2008 » TECHNOLOGY FRONTIER (Guest OpiniOn) remOte attaCks On systems that control power production and distribution are no longer hypothetical events. At least four utilities have been subjected to extortion demands by criminals who used the Internet to infect the utilities' computers and caused or threatened power outages. Cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption caused a power outage affecting multiple cities. These are criminal acts, but nation-states are actively targeting utility computers, as well, so that in time of war they can turn off their adversary's power. While all this is happening, most executives in the

117

A nexus of Cyber-Geography and Cyber-Psychology: Topos/"Notopia" and identity in hacking  

Science Conference Proceedings (OSTI)

This paper explores the Cyber-Psychological and Cyber-Geographic aspects of hacking and hacktivism. An examination of the literature related to hackers and hacking reveals a complex nexus of spatial (including cyber-spatial such as ''Notopia'') and psychological ... Keywords: Cyber-Geography, Cyber-Identity, Cyber-Psychology, Hacking, Identity, Notopia

Fivos Papadimitriou

2009-11-01T23:59:59.000Z

118

Cyber-physical systems: imminent challenges  

Science Conference Proceedings (OSTI)

A German project is presented which was initiated in order to analyse the potential and risks associated with Cyber-Physical Systems. These have been recognised as the next wave of innovation in information and communication technology. Cyber-Physical ...

Manfred Broy; María Victoria Cengarle; Eva Geisberger

2012-03-01T23:59:59.000Z

119

The investigation of the structural properties of machines for the design of secure and trustworthy systems  

Science Conference Proceedings (OSTI)

In this paper, we investigate the problem of designing secure and trustworthy systems based on the notion of attack space. In particular, we consider the study of structural properties of a system at a design or architectural level. This preliminary ... Keywords: attack space, design for trustworthiness, secure systems, structure theory

Edward Jung; Chih-Cheng Hung; Guangzhi Ma; Seonho Choi

2011-11-01T23:59:59.000Z

120

Smart Manufacturing, Construction, and Cyber-Physical ...  

Science Conference Proceedings (OSTI)

Strategic Goal:Smart Manufacturing, Construction, and Cyber-Physical Systems. Enable the next generation of innovative ...

2013-01-03T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Booz Allen Hamilton Cyber Assurance Testing Laboratory  

Science Conference Proceedings (OSTI)

Booz Allen Hamilton Cyber Assurance Testing Laboratory. NVLAP Lab Code: 200423-0. Address and Contact Information: ...

2013-08-16T23:59:59.000Z

122

CIKR Cyber Information Sharing and Collaboration Program ...  

Science Conference Proceedings (OSTI)

Page 1. CIKR Cyber Information Sharing and Collaboration Program (CISCP) In order to meet the Department of Homeland ...

2013-07-16T23:59:59.000Z

123

Comprehensive National Cyber Security: Leap-Ahead ...  

Science Conference Proceedings (OSTI)

Comprehensive National Cyber Security: Leap-Ahead Security for Interconnected Systems (+10 FTE, +$5,500,000). Challenge. image: ...

2010-10-05T23:59:59.000Z

124

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

125

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

126

The economic impact of cyber terrorism  

Science Conference Proceedings (OSTI)

What is the economic impact of cyber terrorism? Can organizations achieve strategic advantage in the cyber terrorism game? A general game theoretical model is proposed to study the optimal information systems (ISs) security investment and then applied ... Keywords: Cyber terrorism, Game theory, Information systems security, Security investment

Jian Hua, Sanjay Bapna

2013-06-01T23:59:59.000Z

127

Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

Science Conference Proceedings (OSTI)

Our reliance on the cyber infrastructure has further grown and the dependencies have become more complex. The infrastructure and applications running on it are not generally governed by the rules of bounded systems and inherit the properties of unbounded systems, such as the absence of global control, borders and barriers. Furthermore, the quest for increasing functionality and ease of operation is often at the cost of controllability, potentially opening up avenues for exploitation and failures. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. In the presence of information explosion, i.e., the pervasive abundance of (public/private) information and the effects of such, intelligence has the potential to shift the advantages in the dynamic game of defense and attacks in cyber space. Gathering, analyzing, and making use of information constitutes a business-/sociopolitical-/military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace. The goal of the workshop is to establish, debate and challenge the far-reaching agenda that broadly and comprehensively outlines a strategy for cyber security and information intelligence that is founded on sound principles and technologies.

Sheldon, Frederick T [ORNL; Peterson, Greg D [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2009-01-01T23:59:59.000Z

128

Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies To Meet The Cyber Security And Information Intelligence Challenges Ahead  

Science Conference Proceedings (OSTI)

As our dependence on the cyber infrastructure grows ever larger, more complex and more distributed, the systems that compose it become more prone to failures and/or exploitation. Intelligence is information valued for its currency and relevance rather than its detail or accuracy. Information explosion describes the pervasive abundance of (public/private) information and the effects of such. Gathering, analyzing, and making use of information constitutes a business- / sociopolitical- / military-intelligence gathering activity and ultimately poses significant advantages and liabilities to the survivability of "our" society. The combination of increased vulnerability, increased stakes and increased threats make cyber security and information intelligence (CSII) one of the most important emerging challenges in the evolution of modern cyberspace "mechanization." The goal of the workshop was to challenge, establish and debate a far-reaching agenda that broadly and comprehensively outlined a strategy for cyber security and information intelligence that is founded on sound principles and technologies. We aimed to discuss novel theoretical and applied research focused on different aspects of software security/dependability, as software is at the heart of the cyber infrastructure.

Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Abercrombie, Robert K [ORNL; Mili, Ali [New Jersey Insitute of Technology

2008-01-01T23:59:59.000Z

129

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

130

Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms  

Science Conference Proceedings (OSTI)

Evolution in cloud services and infrastructure has been constantly reshaping the way we conduct business and provide services in our day to day lives. Tools and technologies created to improve such cloud services can also be used to impair them. By using ... Keywords: cloud computing infrastructure, cyber security, denial of service (DoS), game theory

Harkeerat Singh Bedi; Sajjan Shiva

2012-08-01T23:59:59.000Z

131

Towards a Distributed, Service-Oriented Control Infrastructure for Smart Grid  

Science Conference Proceedings (OSTI)

Smart Grid initiatives aim to overlay the existing power grid infrastructure with a communication and computation infrastructure to enable integration of renewable resources and increased efficiency and reliability of the electric power grid. This requires ... Keywords: Smart Grid, Cyber Physical Systems, Power System Informatics, Hard Real-Time Systems, Web Services, Model Transformation

Muhammad Umer Tariq; Santiago Grijalva; Marilyn Wolf

2011-04-01T23:59:59.000Z

132

Cyber Security Standards.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION NOVEMBER 2001 . DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF ENERGY Washington, DC 20585 November 13, 2001 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ Inspector General SUBJECT: INFORMATION: Report on "Inspection of Cyber Security Standards for Sensitive Personal Information" BACKGROUND The Office of Inspector General (OIG), U.S. Department of Energy (DOE), identified a concern relating to the cyber security of unclassified sensitive personal information maintained by the Department under the Privacy Act of 1974, and other personal information exempt from

133

DOE Issues Energy Sector Cyber Organization NOI  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues National Energy Sector Cyber Organization Notice of Intent Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. The cyber organization is expected to have the knowledge, expertise, capabilities, and capacity, at a minimum to: * Identify and prioritize cyber security research and development issues.

134

Built Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Built Infrastructure Print E-mail Climate change and its associated impacts, including thawing permafrost, changing sea-levels, rising temperatures, shifts in species distribution...

135

Cyber Incident Information | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Services » Guidance » Privacy » Cyber Incident Information Services » Guidance » Privacy » Cyber Incident Information Cyber Incident Information July 2013 Cyber Incident The Department of Energy has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information (PII). January 2013 Cyber Incident The Department of Energy (DOE) has confirmed a cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information (PII). Tips to Monitor Your Identity Here is a suggested list of tips to monitor and protect yourself. Assistive Technology Forms Guidance Capital Planning Information Collection Management

136

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Reports Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO),

137

Infrastructure as Landscape [Infrastructure as Landscape, Landscape as Infrastructure  

E-Print Network (OSTI)

for appropriating infrastructure as landscape offersPress, 1991). PLACES10:3 STRANG: INFRASTRUCTURE AS LANDSCAPEInfrastr Infrastructure and Landscape In 1964, cultural

Strang, Gary L

1996-01-01T23:59:59.000Z

138

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

139

A learning outcome driven cyber infrastructure for thermodynamics education  

Science Conference Proceedings (OSTI)

The Web portal TEST, the Expert System for Thermodynamics (www.thermofluids.net) is a courseware that is being used in Engineering Thermodynamics classes by more than 2000 registered educators around the world. The courseware combines a number of resources: ... Keywords: assessment, learning outcomes, problem solving, thermodynamics

Subrata Bhattacharjee; Christopher Paolini; Mahesh Kumar

2012-07-01T23:59:59.000Z

140

Ensuring a Secure and Robust Cyber Infrastructure (+$43.4 ...  

Science Conference Proceedings (OSTI)

... the Federal Information Security Management Act are ... the President's FY 2012 budget calls for ... National Program Office for the National Strategy for ...

2011-02-14T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Framework for Reducing Cyber Risks to Critical Infrastructure  

Science Conference Proceedings (OSTI)

... Policies and standards are published on an ... Law enforcement and the Federal Bureau of ... Duke Energy comments for Developing a Framework to ...

2013-04-08T23:59:59.000Z

142

Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies  

SciTech Connect

The Annual Cyber Security and Information Intelligence Research Workshop [CSIIRW] was be held at Oak Ridge National Laboratory in Oak Ridge, TN on April 21 - 23, 2010. The aim of this workshop is to introduce and discuss novel theoretical and empirical research focused on (the many) different aspects of software security/dependability, because as we know, the heart of the cyber infrastructure is software. As our dependence on the cyber infrastructure grows more complex and more distributed, the systems that compose it become more prone to failures and exploitation. Intelligence refers to discrete or private information which possess currency and relevance. The ability to abstract, evaluate, and understand such information underlies its accuracy and true value (wiki). The collection, analysis and utilization of information constitutes a business-, sociopolitical-, military-intelligence activity that ultimately poses significant advantages and liabilities to the survivability of "our" society. Cyber crime is a very serious and growing problem which now has an annual global turnover in the criminal world of more than 1000 BUSD [recent numbers from an FBI white paper] with the hardest hit industries being the banks and the insurance companies. A recent EU study of the banking world showed that more than 60% of cyber crime in banks was carried out by insiders of which ~65% by senior managers. Moreover, cyber security practice and policy is largely heuristic, reactive, and increasingly cumbersome, struggling to keep pace with rapidly evolving threats. Advancing beyond this reactive posture will require a transformation in computing and communication systems architecture and new capabilities that do not merely solve today s plethora of security enigmas, but enable comprehensive game-changing strategies [A Scientific R&D Approach to Cyber Security, C. Catlett, et al., Community-driven report submitted to the DOE, Dec. 2008]. The aim of this workshop is to discuss (and publish) novel theoretical and empirical research focused on the many different aspects of cyber security and information intelligence. The scope will vary from methodologies and tools to systems and applications to more precise definition of the various problems and impacts. We encourage the participation of researchers and practitioners from a wide range of professional disciplines to ensure a comprehensive understanding of the needs, stakes and the ever evolving context of cyberspace.

Sheldon, Frederick T [ORNL; Prowell, Stacy J [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2010-01-01T23:59:59.000Z

143

Cyber Assessment Methods for SCADA Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

144

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

145

Lessons to Learn for U.S. Electric Grid Critical Infrastructure Protection: Organizational Challenges for Utilities in Identification of Critical Assets and Adequate Security Measures  

Science Conference Proceedings (OSTI)

The U.S. Federal Energy Regulatory Commission (FERC) approved the first critical infrastructure protection (CIP) standards for transmission and generation providers in January 2008. These standards require utilities to implement cyber security measures ...

Brian McKay

2011-01-01T23:59:59.000Z

146

Cyber Fit Pyramid for the home user. | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pyramid for the home user. Cyber Fit Pyramid for the home user. Cyber Fit Pyramid for the home user. Developed for Security Awareness materials for the Department Cyber Fit Pyramid...

147

Assessment of current cybersecurity practices in the public domain : cyber indications and warnings domain.  

SciTech Connect

This report assesses current public domain cyber security practices with respect to cyber indications and warnings. It describes cybersecurity industry and government activities, including cybersecurity tools, methods, practices, and international and government-wide initiatives known to be impacting current practice. Of particular note are the U.S. Government's Trusted Internet Connection (TIC) and 'Einstein' programs, which are serving to consolidate the Government's internet access points and to provide some capability to monitor and mitigate cyber attacks. Next, this report catalogs activities undertaken by various industry and government entities. In addition, it assesses the benchmarks of HPC capability and other HPC attributes that may lend themselves to assist in the solution of this problem. This report draws few conclusions, as it is intended to assess current practice in preparation for future work, however, no explicit references to HPC usage for the purpose of analyzing cyber infrastructure in near-real-time were found in the current practice. This report and a related SAND2010-4766 National Cyber Defense High Performance Computing and Analysis: Concepts, Planning and Roadmap report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

148

High energy physics experiment triggers and the trustworthiness of software  

SciTech Connect

For all the time and frustration that high energy physicists expend interacting with computers, it is surprising that more attention is not paid to the critical role computers play in the science. With large, expensive colliding beam experiments now dependent on complex programs working at startup, questions of reliability -- the trustworthiness of software -- need to be addressed. This issue is most acute in triggers, used to select data to record -- and data to discard -- in the real time environment of an experiment. High level triggers are built on codes that now exceed 2 million source lines -- and for the first time experiments are truly dependent on them. This dependency will increase at the accelerators planned for the new millennium (SSC and LHC), where cost and other pressures will reduce tolerance for first run problems, and the high luminosities will make this on-line data selection essential. A sense of this incipient crisis motivated the unusual juxtaposition to topics in these lectures. 37 refs., 1 fig.

Nash, T.

1991-10-01T23:59:59.000Z

149

Data Intensive Architecture for Scalable Cyber Analytics  

SciTech Connect

Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. It is necessary to have analytical tools to help analysts identify anomalies that span seconds, days, and weeks. Unfortunately, providing analytical tools effective access to the volumes of underlying data requires novel architectures, which is often overlooked in operational deployments. Our work is focused on a summary record of communication, called a flow. Flow records are intended to summarize a communication session between a source and a destination, providing a level of aggregation from the base data. Despite this aggregation, many enterprise network perimeter sensors store millions of network flow records per day. The volume of data makes analytics difficult, requiring the development of new techniques to efficiently identify temporal patterns and potential threats. The massive volume makes analytics difficult, but there are other characteristics in the data which compound the problem. Within the billions of records of communication that transact, there are millions of distinct IP addresses involved. Characterizing patterns of entity behavior is very difficult with the vast number of entities that exist in the data. Research has struggled to validate a model for typical network behavior with hopes it will enable the identification of atypical behavior. Complicating matters more, typically analysts are only able to visualize and interact with fractions of data and have the potential to miss long term trends and behaviors. Our analysis approach focuses on aggregate views and visualization techniques to enable flexible and efficient data exploration as well as the capability to view trends over long periods of time. Realizing that interactively exploring summary data allowed analysts to effectively identify events, we utilized multidimensional OLAP data cubes. The data cube structure supports interactive analysis of summary data across multiple dimensions, such as location, time, and protocol. Cube technology also allows the analyst to drill-down into the underlying data set, when events of interest are identified and detailed analysis is required. Unfortunately, when creating these cubes, we ran into significant performance issues with our initial architecture, caused by a combination of the data volume and attribute characteristics. Overcoming, these issues required us to develop a novel, data intensive computing infrastructure. In particular, we ended up combining a Netezza Twin Fin data warehouse appliance, a solid state Fusion IO ioDrive, and the Tableau Desktop business intelligence analytic software. Using this architecture, we were able to analyze a month's worth of flow records comprising 4.9B records, totaling approximately 600GB of data. This paper describes our architecture, the challenges that we encountered, and the work that remains to deploy a fully generalized cyber analytical infrastructure.

Olsen, Bryan K.; Johnson, John R.; Critchlow, Terence J.

2011-11-15T23:59:59.000Z

150

Social infrastructure  

E-Print Network (OSTI)

Current urbanization patterns and aging transportation infrastructures have marginalized millions of US citizens. The result is that 4 .5 million US residents live within 100 meters of a four-lane highway' and have become ...

Kurlbaum, Ryan E. (Ryan Edward)

2013-01-01T23:59:59.000Z

151

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

152

NNSA Seeking Comments on Consolidated IT and Cyber Security Support...  

NLE Websites -- All DOE Office Websites (Extended Search)

NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013...

153

THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519 THE DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM, IG-0519 Protecting unclassified information systems continues to...

154

DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY EBK: MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS MINIMUM CORE COMPETENCY TRAINING REQUIREMENTS DOE CYBER SECURITY...

155

INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION, IG-0531 INSPECTION OF CYBER SECURITY STANDARDS FOR SENSITIVE PERSONAL INFORMATION, IG-0531 The Office of Inspector...

156

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

157

Strategy for Improvements in Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strategy for Improvements in Cyber Security Strategy for Improvements in Cyber Security Brase-LLNL-SEAB.10.11.pdf More Documents & Publications Computational Advances in Applied...

158

A Scalable Framework for Cyber Attack Discovery and Situational...  

NLE Websites -- All DOE Office Websites (Extended Search)

Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

159

Office of Electricity Delivery and Energy Reliability Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On September 23, 2010, speaking at the inaugural GridWise...

160

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Report of the Cyber Security Research Needs for Open Science...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Cyber Security Research Needs for Open Science Workshop Report of the Cyber Security Research Needs for Open Science Workshop Protecting systems and users, while maintaining...

162

Evaluation Report on The Department's Unclassified Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report on The Department's Unclassified Cyber Security Program 2002, DOEIG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOEIG-0567 As...

163

Cyber Security Audit and Attack Detection Toolkit: Bandolier...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This...

164

Office of Cyber Security Evaluations - Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Evaluations Reports to the Independent Oversight Program Mission and Functions Mission The Office of Cyber Security Evaluations is responsible for the independent...

165

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee...

166

Cyber Tips Book Mark (2009 NCSA Month) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sites Power Marketing Administration Other Agencies You are here Home Cyber Tips Book Mark (2009 NCSA Month) Cyber Tips Book Mark (2009 NCSA Month) Training and Awareness...

167

Strategy for Improvements in Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Improvements in Cyber Security Strategy for Improvements in Cyber Security Brase-LLNL-SEAB.10.11.pdf More Documents & Publications Mobile Device Security Checklist Open...

168

Cyber Effects Analysis Using VCSE Promoting Control System Reliability...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Effects Analysis Using VCSE Promoting Control System Reliability Cyber Effects Analysis Using VCSE Promoting Control System Reliability This report describes the Virtual...

169

Common Cyber Security Vulnerabilities Observed in Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

170

Smart Grid Investment Grant Program (SGIG): Cyber Security Issues...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

(SGIG): Cyber Security Issues and Requirements, November 19, 2009 Smart Grid Investment Grant Program (SGIG): Cyber Security Issues and Requirements, November 19, 2009 Presentation...

171

Cyber Security Procurement Methodology, Rev. 1  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or unclear division of responsibilities between the utility and vendor can often result in costly retrofits to meet the ...

2013-12-17T23:59:59.000Z

172

Cyber Security Metrics and Measures abstract  

Science Conference Proceedings (OSTI)

Paul E. Black, Karen Scarfone, and Murugiah Souppaya, Cyber Security Metrics and Measures, in Wiley Handbook of Science and Technology for ...

2013-05-07T23:59:59.000Z

173

Computer Use Agreement, BNL Cyber Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Users Be aware of, knowledgeable about, and comply with the requirements of the BNL Cyber Security Program as described in SBMS. Follow BNL policy regarding the use and...

174

DOE Issues Energy Sector Cyber Organization NOI  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues National Energy Sector Cyber Organization Notice of Intent February 11, 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan....

175

Hiring and Managing a Cyber Security Workforce:  

Science Conference Proceedings (OSTI)

... DHS cyber security workers and others from outside of ... Sell the mission! • Protecting the US nuclear arsenal or the New York City water supply is a ...

2013-09-19T23:59:59.000Z

176

Cybersecurity for Cyber-Physical Systems  

Science Conference Proceedings (OSTI)

... The second day will focus on cyber security needs of CPSs in the electric Smart Grid. ... NIST - Smart Grid http://www.nist.gov/smartgrid/. ...

2013-01-11T23:59:59.000Z

177

Information and Communication Infrastructure  

Science Conference Proceedings (OSTI)

... The scope of cyber security spans many of the other ... Healthcare, Banking .and Finance., Emergency Services, Nuclear Reactors-Material-Waste ...

2011-08-02T23:59:59.000Z

178

Graph anomalies in cyber communications  

Science Conference Proceedings (OSTI)

Enterprises monitor cyber traffic for viruses, intruders and stolen information. Detection methods look for known signatures of malicious traffic or search for anomalies with respect to a nominal reference model. Traditional anomaly detection focuses on aggregate traffic at central nodes or on user-level monitoring. More recently, however, traffic is being viewed more holistically as a dynamic communication graph. Attention to the graph nature of the traffic has expanded the types of anomalies that are being sought. We give an overview of several cyber data streams collected at Los Alamos National Laboratory and discuss current work in modeling the graph dynamics of traffic over the network. We consider global properties and local properties within the communication graph. A method for monitoring relative entropy on multiple correlated properties is discussed in detail.

Vander Wiel, Scott A [Los Alamos National Laboratory; Storlie, Curtis B [Los Alamos National Laboratory; Sandine, Gary [Los Alamos National Laboratory; Hagberg, Aric A [Los Alamos National Laboratory; Fisk, Michael [Los Alamos National Laboratory

2011-01-11T23:59:59.000Z

179

Systems Infrastructure (SYS 18)  

E-Print Network (OSTI)

Networked Sensing Systems Infrastructure John Hicks, Karencomponents The Systems Infrastructure team assembles, tests,

Richard Guy; John Hicks; Karen Weeks

2006-01-01T23:59:59.000Z

180

SYS 5: Systems Infrastructure  

E-Print Network (OSTI)

Networked Sensing Systems Infrastructure Kevin Chang, Johnnents The Systems Infrastructure team assembles, tests, and

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Distribution System Cyber Security Architecture  

Science Conference Proceedings (OSTI)

The National Institute of Standards and Technology (NIST) has developed the NISTIR 7628: Guidelines for Smart Grid Cyber Security, while ASAP-SG has developed both the Security Profile for AMI (v2.0) and the Security Profile for Distribution Management. These documents are necessarily high level and generic, covering a broad range of smart grid assets, and focus exclusively on determining the security requirements. However, utilities and their vendors often cannot get a clear picture of what existing tec...

2010-12-31T23:59:59.000Z

182

Using trustworthy host-based information in the network  

Science Conference Proceedings (OSTI)

As hardware support for improved endhost security becomes ubiquitous, it is important to consider how network security and performance can benefit from these improvements. If portions of each endhost can be trusted, then network infrastructure no longer ... Keywords: host information, network security, trusted computing

Bryan Parno; Zongwei Zhou; Adrian Perrig

2012-10-01T23:59:59.000Z

183

Microgrid cyber security reference architecture.  

SciTech Connect

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

184

Integration of a system for critical infrastructure protection with the OSSIM SIEM platform: a dam case study  

Science Conference Proceedings (OSTI)

In recent years the monitoring and control devices in charge of supervising the critical processes of Critical Infrastructures have been victims of cyber attacks. To face such threat, organizations providing critical services are increasingly focusing ... Keywords: OSSIM, SIEM, critical infrastructure protection, dam

Luigi Coppolino; Salvatore D'Antonio; Valerio Formicola; Luigi Romano

2011-09-01T23:59:59.000Z

185

Cyber Security in Smart Grid Substations  

E-Print Network (OSTI)

Cyber Security in Smart Grid Substations Thijs Baars Lucas van den Bemd Michail Theuns Robin van.089 3508 TB Utrecht The Netherlands #12;CYBER SECURITY IN SMART GRID SUBSTATIONS Thijs Baars T.Brinkkemper@uu.nl Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands

Utrecht, Universiteit

186

NIST Improves Tool for Hardening Software Against Cyber ...  

Science Conference Proceedings (OSTI)

NIST Improves Tool for Hardening Software Against Cyber Attack. From NIST Tech Beat: November 22, 2011. ...

2011-11-22T23:59:59.000Z

187

Cyber Innovation Technology Summit | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Innovation Technology Summit Cyber Innovation Technology Summit Cyber Innovation Technology Summit November 5, 2013 8:00AM EST Course Title: Cyber Innovation Technology Summit Course Start/End Date: November 5, 2013 Start/End Time: 8:00AM-12:00 PM Course Type: Classrooom Course Location: Forrestal Large Auditorium Course Description: Every October and November, the Department of Energy (DOE) joins the Department of Homeland Security (DHS) and other federal, state and local agencies across the country in support of National Cybersecurity Awareness Month and the "Stop. Think. Connect." campaign. This year marks the tenth year of the cyber security awareness campaign. The theme for this year is Achieving Cybersecurity Together: It's Our Shared Responsibility. By consistently following simple

188

Transportation and its Infrastructure  

E-Print Network (OSTI)

Transport and its infrastructure Coordinating Lead Authors:5 Transport and its infrastructure Chandler, K. , E. Eberts,5 Transport and its infrastructure Sausen, R. , I. Isaksen,

2007-01-01T23:59:59.000Z

189

Transportation Infrastructure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Infrastructure Infrastructure New Technologies * Potential need for dual-use casks * DOE should look toward industry & international communities for innovations * Industry unclear about delivery & receipt locations * Advances in physical & tracking technologies need to be factored in * Cost-benefit analysis of new technology Training & Dry Runs * Begin as soon as possible * Suggested order: #1-demonstrations, #2-training, #3-dry-runs * Don't re-invent the wheel- look at international programs * Allows DOE to test POC info/training * Standardization of training & materials * DOE should consider centralized training center * Use real equipment in dry- runs * Need for regionalized dry runs Packages * Full-scale Testing - Funds requested in 2003, potential use of

190

Energy Infrastructure Events and Expansions Infrastructure Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Year-in-Review: 2010 Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability U.S....

191

National cyber defense high performance computing and analysis : concepts, planning and roadmap.  

SciTech Connect

There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

192

Cyber Security Evaluations Appraisal Process Guide - April 2008 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 April 2008 Cyber Security Evaluations Appraisal Process Guide was developed for the purpose of documenting the appraisal approach and techniques specific to evaluations of classified and unclassified cyber security programs throughout DOE. Office of Cyber Security Evaluations Appraisal Process Guide provides additional insight into the Office of Cyber Security Evaluations (HS-62) evaluation approach and processes associated with assessing classified and unclassified cyber security programs. The objective of this document is to establish a standard approach and methodology for conducting cyber security reviews that is well understood by all inspection participants.

193

Security and Cyber Evaluations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential

194

Definition: Cyber Security Incident | Open Energy Information  

Open Energy Info (EERE)

Security Incident Security Incident Jump to: navigation, search Dictionary.png Cyber Security Incident Any malicious act or suspicious event that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of a Critical Cyber Asset, or, Disrupts, or was an attempt to disrupt, the operation of a Critical Cyber Asset.[1] Related Terms Electronic Security Perimeter References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Cyber_Security_Incident&oldid=480296" Categories: Definitions ISGAN Definitions What links here Related changes Special pages Printable version

195

Definition: Critical Cyber Assets | Open Energy Information  

Open Energy Info (EERE)

Related Terms Cyber Assets References Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline...

196

Cyber-Physical Challenges for Space Systems  

Science Conference Proceedings (OSTI)

Modern space systems necessarily have a tight coupling between onboard cyber (processing, communication) and physical (sensing, actuation) elements to survive the harsh extraterrestrial environment and successfully complete ambitious missions. This article ... Keywords: attitude control, communication, robotics, space systems

Andrew T. Klesh; James W. Cutler; Ella M. Atkins

2012-04-01T23:59:59.000Z

197

AMI Cyber Security Incident Response Guidelines  

Science Conference Proceedings (OSTI)

This document is intended to be used by system and asset owners to assist in the preparation and response to AMI cyber security incidents. This document was developed by conducting interviews with EPRI members, AMI asset owners, and vendors, regarding practices involved in responding to AMI cyber security incidents and mapping the responses to requirements put forth by the Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Open Smart Grid (Open-SG) Working ...

2012-12-07T23:59:59.000Z

198

Cyber Security Audit and Attack Detection Toolkit  

Science Conference Proceedings (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

199

Cyber security exercises and competitions as a platform for cyber security experiments  

Science Conference Proceedings (OSTI)

This paper discusses the use of cyber security exercises and competitions to produce data valuable for security research. Cyber security exercises and competitions are primarily arranged to train participants and/or to offer competence contests for those ... Keywords: data collection, research method, security competitions, security exercises

Teodor Sommestad; Jonas Hallberg

2012-10-01T23:59:59.000Z

200

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Boot Camps The Cyber Boot Camp Program was developed to help make science and technology more exciting by treating students to hands-on experience and interaction with...

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical Systems Security for the Smart Grid...

202

Small Business Cyber Security Workshop for Portland, Oregon ...  

Science Conference Proceedings (OSTI)

Page 1. Portland District Office Small Business Cyber Security Workshop Portland District Office 601 SW Second Ave. Suite ...

2013-07-24T23:59:59.000Z

203

NISTIR 7628 Volume 3, Guidelines for Smart Grid Cyber ...  

Science Conference Proceedings (OSTI)

Page 1. NISTIR 7628 Guidelines for Smart Grid Cyber Security: Vol. 3, Supportive Analyses and References The Smart ...

2012-03-01T23:59:59.000Z

204

Transportation Infrastructure and Sustainable Development  

E-Print Network (OSTI)

Transportation Infrastructure AND Sustainable Developmentnext two decades, urban infrastructure will be under immenseboth expansions in infrastructure that supports automobile

Boarnet, Marlon G.

2008-01-01T23:59:59.000Z

205

Infrastructure sectors and the information infrastructure  

Science Conference Proceedings (OSTI)

The protection of Critical Information Infrastructures (CIIs) is usually framed in the larger context of protecting all the Critical Infrastructures (CIs) that a Nation or a group of Nations (as is the case of the European Union) consider as essential ...

Andrea Glorioso; Andrea Servida

2012-01-01T23:59:59.000Z

206

Security Issues and Challenges for Cyber Physical System  

Science Conference Proceedings (OSTI)

In this paper, we investigate the security challenges and issues of cyber-physical systems. (1)We abstract the general workflow of cyber physical systems, (2)identify the possible vulnerabilities, attack issues, adversaries characteristics and a set ... Keywords: Cyber-Physical System, Security, actuation, context-aware

Eric Ke Wang; Yunming Ye; Xiaofei Xu; S. M. Yiu; L. C. K. Hui; K. P. Chow

2010-12-01T23:59:59.000Z

207

Hydrogen and Infrastructure Costs  

NLE Websites -- All DOE Office Websites (Extended Search)

FUEL CELL TECHNOLOGIES PROGRAM Hydrogen and Infrastructure Costs Hydrogen Infrastructure Market Readiness Workshop Washington D.C. February 17, 2011 Fred Joseck U.S. Department of...

208

Location and Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Facts, Figures Location and Infrastructure Location and Infrastructure LANL's mission is to develop and apply science and technology to ensure the safety, security, and...

209

Microelectronics Manufacturing Infrastructure  

Science Conference Proceedings (OSTI)

... But the manufacturing infrastructure is aging. ... to create an integrated infrastructure for manufacturing ... will enhance the value and utility of portable ...

2011-10-19T23:59:59.000Z

210

East Coast Infrastructure  

U.S. Energy Information Administration (EIA)

East Coast Infrastructure. Uncheck or check an item to hide or show it in the map. ... Infrastructure—Energy Information Administration (GasTran System), ...

211

Los Alamos director echoes cyber concerns  

NLE Websites -- All DOE Office Websites (Extended Search)

Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Los Alamos director echoes cyber concerns Director Charlie McMillan told a gathering of energy executives that securing the electrical grid is a major concern now and it's only becoming more serious. May 21, 2013 Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Los Alamos National Laboratory Director Charlie McMillan (right), with, from left, Anthony Cugini of the National Energy Technology Laboratory, Thom Mason of Oak Ridge National Laboratory, and Tomas Diaz de la Rubia of Deloitte Consulting LLP. Contact Fred deSousa

212

Cyber Assessment Methods for SCADA Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

213

DOE Cyber Security Role, Competency and Functional Matrix  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź Enterprise Continuity â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź â—Ź

214

Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Power Grids Against Cyber Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cybersecurity. Protecting Intelligent Distributed Power Grids Again Cyber Attacks.pdf

215

The Department's Unclassified Cyber Security Program - 2012, IG-0877  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information technology resources continues to expand, the number of cyber security threats against Federal agencies has also increased. In fact, Federal cyber security officials have warned that the number of cyber attackers has increased and that the Nation's

216

A Mathematical Framework for the Analysis of Cyber-Resilient Control Systems  

Science Conference Proceedings (OSTI)

The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security (IT) techniques to control system networks. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective. Little research has focused on the design of closed-loop dynamics that are resilient to cyber-attack. The majority of control system protection measures are concerned with how to prevent unauthorized access and protect data integrity. We believe that the ability to analyze how an attacker can effect the closed loop dynamics of a control system configuration once they have access is just as important to the overall security of a control system. To begin to analyze this problem, consistent mathematical definitions of concepts within resilient control need to be established so that a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and configuration can be made. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.

Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Fugate, David L [ORNL; Kisner, Roger [ORNL

2013-01-01T23:59:59.000Z

217

NETL: Carbon Storage - Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Infrastructure Carbon Storage Infrastructure The Infrastructure Element of DOE's Carbon Storage Program is focused on research and development (R&D) initiatives to advance geologic CO2 storage toward commercialization. DOE determined early in the program's development that addressing CO2 mitigation on a regional level is the most effective way to address differences in geology, climate, population density, infrastructure, and socioeconomic development. This element includes the following efforts designed to support the development of regional infrastructure for carbon capture and storage (CCS). Click on Image to Navigate Infrastructure Content on this page requires a newer version of Adobe Flash Player. Get Adobe Flash player Regional Carbon Sequestration Partnerships (RCSP) - This

218

Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure  

SciTech Connect

Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

Suski, N; Wuest, C

2011-02-04T23:59:59.000Z

219

Simplifying cyber foraging for mobile devices  

Science Conference Proceedings (OSTI)

Cyber foraging is the transient and opportunistic use of compute servers bymobile devices. The short market life of such devices makes rapid modification of applications for remote execution an important problem. We describe a solution that combines ... Keywords: mobile computing, programmer productivity, rapid prototyping, retargeting applications, software engineering, user study

Rajesh Krishna Balan; Darren Gergle; Mahadev Satyanarayanan; James Herbsleb

2007-06-01T23:59:59.000Z

220

What are we teaching in cyber competitions?  

Science Conference Proceedings (OSTI)

Student competitions are widespread across all academic disciplines, and are often touted as a means to motivate and educate students. Competitions may be internal within a single class or course, or vie school against school as regional, national, or ... Keywords: Educational institutions,Computer security,Robots,Computers,Organizations,Programming,Security Education,Cyber,Competitions

Steven Fulton, Dino Schweitzer, Judson Dressler

2012-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to examine more than 30 DOE-supported or cost-shared projects designed to enhance the security and reliability of the nation's energy delivery infrastructure. Industry experts from the Energy Sector Control Systems Working Group provided technical feedback and recommendations to each project to ensure DOE continues to support robust projects that meet industry needs.

222

Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues  

SciTech Connect

This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

Wayne F. Boyer; Scott A. McBride

2009-04-01T23:59:59.000Z

223

Improving California’s Infrastructure Services: The California Infrastructure Initiative  

E-Print Network (OSTI)

in the US to improve infrastructure planning, provision andtool for improving infrastructure planning, provision andBuilding Canada: Modern infrastructure for a Strong Canada (

David E. Dowall; Robin Ried

2008-01-01T23:59:59.000Z

224

A Strategy for Infrastructure: The California Infrastructure Initiative  

E-Print Network (OSTI)

has an enormous backlog of infrastructure investment needs,proposed two critical infrastructure policy institutions:and the Performance- Based Infrastructure Initiative (PBI

Dowall, David E.; Ried, Robin

2008-01-01T23:59:59.000Z

225

Interdependence of Electricity System Infrastructure and Natural...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Interdependence of Electricity System Infrastructure and Natural Gas Infrastructure - EAC 2011 Interdependence of Electricity System Infrastructure and Natural Gas Infrastructure -...

226

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

227

The NIAC Convergence of Physical and Cyber Technbologies and Related  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The NIAC Convergence of Physical and Cyber Technbologies and The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC convened the Physical/Cyber Convergence Working Group (CWG), in October 2005, to investigate the ongoing convergence of physical and cyber technologies for Supervisory Control and Data Acquisition (SCADA) and process control systems and their consolidated network management. The Working Group convened a Study Group of subject matter experts to inform its work. The Working Group report informed the NIAC's deliberations. The NIAC Convergence of Physical and Cyber Technbologies and Related

228

Cyber Security and Information Intelligence Research Workshop (CSIIRW'11) Proceedings  

SciTech Connect

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Moreover, Massachusetts Institute of Technology (MIT) released the results of a two-year study, The Future of the Electric Grid.

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2011-01-01T23:59:59.000Z

229

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADAEMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADAEMS Cyber...

230

Cyber Framework NIST In Support of CIS 4-12-13  

Science Conference Proceedings (OSTI)

... April 12, 2013 Cyber Framework NIST ... Our state and local governments are on the front lines of the cyber battle every day. ...

2013-04-13T23:59:59.000Z

231

NSS Labs - NIST: Cyber Security Framework RFI  

Science Conference Proceedings (OSTI)

... All rights reserved. 8 Page 9. ... upon other critical physical and information infrastructures, including telecommunications, energy, financial services ...

2013-04-10T23:59:59.000Z

232

Cyber Security: Innovative Technologies for National Security  

Science Conference Proceedings (OSTI)

... infrastructures—transportation, financial, power grids, military ... is inherently an open network, these systems ... dollars in direct losses, downtime, stolen ...

2010-10-05T23:59:59.000Z

233

Russia's sorry infrastructure  

Science Conference Proceedings (OSTI)

The loss of the nuclear submarine Kursk and the fire in Moscow's TV tower are indications of an infrastructure in grievous disrepair. The outlook for Russia's technological infrastructure remains grim, experts insist. Almost 70 percent of the population ...

J. Oberg

2000-12-01T23:59:59.000Z

234

Financing infrastructure projects  

E-Print Network (OSTI)

Infrastructure is of great importance to the development and economic growth of communities. Due to the increased demand on sophisticated infrastructure, governments' budgets are not anymore able to satisfy this growing ...

Eid, Serge Emile

2008-01-01T23:59:59.000Z

235

Cyber Security Procurement Methodology for Power Delivery Systems  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new power delivery systems requires cyber security experts, power system engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly backfit to meet requirements.The Electric Power Research ...

2012-12-31T23:59:59.000Z

236

Training Module for Cyber Security in Nuclear Plant Digital Modifications  

Science Conference Proceedings (OSTI)

Nuclear power plants face increasing regulatory requirements from the U.S. Nuclear Regulatory Commission (NRC) and the Federal Energy Regulatory Commission (FERC) for cyber security of digital devices, components, and systems. The focus of these cyber security requirements is to protect plant digital computer systems, communications systems, and networks from cyber attacks that would affect reactor safety or generation reliability. This Electric Power Research Institute (EPRI) computer-based training mod...

2011-04-28T23:59:59.000Z

237

Biofuel Supply Chain Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Research Areas Freight Flows Passenger Flows Supply Chain Efficiency Transportation: Energy Environment Safety Security Vehicle Technologies The Infrastructure Challenge of...

238

Parking Infrastructure and the Environment  

E-Print Network (OSTI)

A B O U T how parking infrastructure affects energy demand,the extensive parking infrastructure, including the costs ofdata on parking infrastructure. For example, consider the

Chester, Mikhail; Horvath, Aprad; Madanat, Samer

2011-01-01T23:59:59.000Z

239

Enhancing NASA Cyber Security Awareness From the C-Suite ...  

Science Conference Proceedings (OSTI)

... » Leadership concerns with IT security impacts ? Cyber Security Summit » Full day of workshops / panel sessions on transformation of IT / IT security ...

2013-03-28T23:59:59.000Z

240

Cyber-Enabled Materials Simulations via NanoHUB.org  

Science Conference Proceedings (OSTI)

Symposium, Integrating and Leveraging Collaborative Efforts for ICME Education . Presentation Title, Cyber-Enabled Materials Simulations via NanoHUB.org.

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

The NIAC Convergence of Physical and Cyber Technbologies and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management Challenges Working Group Final Report and Recommendations The NIAC Convergence of Physical...

242

The Department of Energy Launches Cyber Security Initiative ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

launching an initiative to enhance cyber security on the electric grid. The initiative, led by the Department's Office of Electricity Delivery and Energy Reliability (OE), the...

243

DOE P 205.1, Departmental Cyber Security Management Policy  

Directives, Delegations, and Requirements

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security ...

2001-05-08T23:59:59.000Z

244

Lab hosts multi-lab cyber security games  

NLE Websites -- All DOE Office Websites (Extended Search)

Joint Cyber Coordination Center, or JC3. The JC3 is focused on improving the national response to threats, leveraging complex resources, and sharing information to meet...

245

CYBER SECURITY AWARENESS & TRAINING Program Plan of Activity...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Publications IM-31, Policy, Guidance, and Planning Division Course Catalogue Cyber Tips Book Mark (2009 NCSA Month) Protect Your Family Brochure (Training and Awareness Materail)...

246

NERSC Cyber Security Challenges That Require DOE Development and Support  

E-Print Network (OSTI)

network segments. Table 1. Network Comparison: NERSC vs.Large Corporation NERSC External Network Traffic patternsLBNL-62284 NERSC Cyber Security Challenges That Require DOE

Draney, Brent; Campbell, Scott; Walter, Howard

2008-01-01T23:59:59.000Z

247

Cyber Security Audit and Attack Detection Toolkit: National SCADA...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and...

248

Proceedings of the Cybersecurity in Cyber-Physical Workshop ...  

Science Conference Proceedings (OSTI)

... modes of operation (such as home health setting ... temperature, pressure, and cooling/heating rates. ... other cyber-physical domains (ie oil/ natural gas ...

2013-02-14T23:59:59.000Z

249

NISTIR 7628 Volume 2, Guidelines for Smart Grid Cyber ...  

Science Conference Proceedings (OSTI)

... Volume 1 – Smart Grid Cyber Security Strategy, Architecture, and High-Level ... Appendix F – Logical Architecture and Interfaces of the Smart Grid ...

2012-03-01T23:59:59.000Z

250

GAO-04-354, CRITICAL INFRASTRUCTURE PROTECTION: Challenges and Efforts to Secure Control Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report to Congressional Requesters Report to Congressional Requesters United States General Accounting Office GAO March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems GAO-04-354 www.gao.gov/cgi-bin/getrpt?GAO-04-354. To view the full product, including the scope and methodology, click on the link above. For more information, contact Robert F. Dacey at (202) 512-3317 or daceyr@gao.gov. Highlights of GAO-04-354, a report to congressional requesters March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems In addition to general cyber threats, which have been steadily increasing, several factors have contributed to the escalation of the risks of cyber attacks against control systems. These include the adoption of standardized

251

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Cyber Security Requirements Brookhaven Cyber Security Requirements Backup Data Sensitivity Physical Protection Computer Security Incidents Software Copyright Laws Virus Protection Passwords Accounts Backup Data ALWAYS BACKUP YOUR DATA. Keep the backups in a protected area. The more critical the data the more often you should backup. REQUIREMENTS: Users ("data owners") are responsible for determining what data requires protection and how their data is to be recovered if the online copy is destroyed (either by accidental or malicious damage). Users may choose not to back up data, but if so they must make sure they know how to recreate the lost data if needed. If backup is necessary then the users must coordinate a backup plan. This may either be an individual backup done by the users themselves or coordinated with the system managers into a regular system backup plan.

252

Office of Security and Cyber Evaluations  

NLE Websites -- All DOE Office Websites (Extended Search)

Welcome to the Office of Security and Cyber Evaluations The Office of Security and Cyber Evaluations within the Office of Enforcement and Oversight implements the independent security performance monitoring functions for DOE. The other half of the Independent Oversight Program is implemented by the Office of Safety and Emergency Management Evaluations for safety oversight. The independent oversight function performed by these two offices is delineated in DOE Order 227.1, Independent Oversight Program, issued on August 30, 2011. This recently revised Order reflects lessons learned in conducting inspections and incorporates earlier and more frequent line management involvement in the inspection planning process. We welcome an opportunity to discuss our inspection process and potential differences in approach since your last interaction with us.

253

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

254

Parallel digital forensics infrastructure.  

Science Conference Proceedings (OSTI)

This report documents the architecture and implementation of a Parallel Digital Forensics infrastructure. This infrastructure is necessary for supporting the design, implementation, and testing of new classes of parallel digital forensics tools. Digital Forensics has become extremely difficult with data sets of one terabyte and larger. The only way to overcome the processing time of these large sets is to identify and develop new parallel algorithms for performing the analysis. To support algorithm research, a flexible base infrastructure is required. A candidate architecture for this base infrastructure was designed, instantiated, and tested by this project, in collaboration with New Mexico Tech. Previous infrastructures were not designed and built specifically for the development and testing of parallel algorithms. With the size of forensics data sets only expected to increase significantly, this type of infrastructure support is necessary for continued research in parallel digital forensics. This report documents the implementation of the parallel digital forensics (PDF) infrastructure architecture and implementation.

Liebrock, Lorie M. (New Mexico Tech, Socorro, NM); Duggan, David Patrick

2009-10-01T23:59:59.000Z

255

Public Works Transportation Infrastructure Study  

E-Print Network (OSTI)

Public Works Transportation Infrastructure Study Minneapolis City of Lakes Minneapolis Public Works Transportation Infrastructure Study #12;Public Works Transportation Infrastructure Study Minneapolis City Works Transportation Infrastructure Study Minneapolis City of Lakes Background: · Currently, funding

Minnesota, University of

256

The Mind's Eye on Personal Profiles: A Cognitive Perspective on Profile Elements that Inform Initial Trustworthiness Assessments and Social Awareness in Virtual Project Teams  

Science Conference Proceedings (OSTI)

Collaboration in virtual project teams heavily relies on interpersonal trust, for which perceived professional trustworthiness is an important determinant. In face to face teams colleagues form a first impression of each others trustworthiness based ... Keywords: CSCW, groupware, online identity, presence, social awareness, trust, virtual teams

Ellen Rusman; Jan Bruggen; Peter Sloep; Martin Valcke; Rob Koper

2013-04-01T23:59:59.000Z

257

ICME Infrastructure Challenges and Opportunities  

Science Conference Proceedings (OSTI)

... industrial-standard, robust infrastructure. Challenges and opportunities relative to an ICME infrastructure will be presented. Proceedings Inclusion? Undecided ...

258

Fluxnet Synthesis Dataset Collaboration Infrastructure  

E-Print Network (OSTI)

Dataset Collaboration Infrastructure Deb Agarwal (LBNL),for the support infrastructure. As a result of this effort,

Agarwal, Deborah A.

2009-01-01T23:59:59.000Z

259

Discovering collaborative cyber attack patterns using social network analysis  

Science Conference Proceedings (OSTI)

This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle ... Keywords: collaborative attacks, degree centrality, hierarchical clustering, network security

Haitao Du; Shanchieh Jay Yang

2011-03-01T23:59:59.000Z

260

Theorem-based, data-driven, cyber event detection  

Science Conference Proceedings (OSTI)

Nonlinear dynamics and graph theory may provide a theorem-based path to improve design security and aid detection of anomalous events in cyber applications. Using side-channel information such as power taken from underlying computer components and analyzing ... Keywords: cyber anomaly detection, graph theory, nonlinear dynamics, phasespace analysis, power measurement

Lee M. Hively; J. Todd McDonald

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Time-based intrusion detection in cyber-physical systems  

Science Conference Proceedings (OSTI)

Embedded systems, particularly real-time systems with temporal constraints, are increasingly deployed in every day life. Such systems that interact with the physical world are also referred to as cyber-physical systems (CPS). These systems commonly find ... Keywords: cyber-physical systems, real-time systems, security, timing analysis

Christopher Zimmer; Balasubramanya Bhat; Frank Mueller; Sibin Mohan

2010-04-01T23:59:59.000Z

262

Cyber-physical energy systems: focus on smart buildings  

Science Conference Proceedings (OSTI)

Operating at the intersection of multiple sensing and control systems designed for occupant comfort, performability and operational efficiency, modern buildings represent a prototypical cyber-physical system with deeply coupled embedded sensing and networked ... Keywords: LEED, ZNEB, buildings, cyber-physical, embedded, energy management, energy metering, smart grid

Jan Kleissl; Yuvraj Agarwal

2010-06-01T23:59:59.000Z

263

Review: From wireless sensor networks towards cyber physical systems  

Science Conference Proceedings (OSTI)

In the past two decades, a lot of research activities have been dedicated to the fields of mobile ad hoc network (MANET) and wireless sensor networks (WSN). More recently, the cyber physical system (CPS) has emerged as a promising direction to enrich ... Keywords: Cyber physical system, Internet technology, Mobile ad hoc network, Pervasive computing, Sensing and actuation, Wireless sensor network

Fang-Jing Wu; Yu-Fen Kao; Yu-Chee Tseng

2011-08-01T23:59:59.000Z

264

Cyber-Terrorism and Ethical Journalism: A Need for Rationalism  

Science Conference Proceedings (OSTI)

Terrorism has been a constant threat in traditional and contemporary societies. Recently, it has been converged with new media technology and cyberspace, resulting in the modern tactic, cyber-terrorism, which has become most effective in achieving terrorist ... Keywords: Computer Security, Cyber-Terrorism, Decision-Making, Ethics, Game Theory, Journalism, Rationality

Mahmoud Eid

2010-10-01T23:59:59.000Z

265

Embedded Cyber-Physical Anomaly Detection in Smart Meters  

E-Print Network (OSTI)

Embedded Cyber-Physical Anomaly Detection in Smart Meters Massimiliano Raciti, Simin Nadjm vulnerabilities that arise from deployment of local cyber-physical attacks at a smart metering location at destabilisation. In this paper we study a smart metering device that uses a trusted platform for storage

266

Deception used for Cyber Defense of Control Systems  

Science Conference Proceedings (OSTI)

Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

Wayne F. Boyer; Miles A. McQueen

2009-05-01T23:59:59.000Z

267

The Department's Cyber Security Incident Management Program, IG-0787 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Incident Management Program, Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During Fiscal Year 2006, the Department experienced 132 incidents of sufficient severity to require reporting to law enforcement, an increase of 22 percent over the prior year. These statistics, troubling as they may be, are not unique to the Department; they are, in fact, reflective of a trend in cyber attacks throughout the government.

268

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

269

Cyber Effects Analysis Using VCSE Promoting Control System Reliability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Effects Analysis Using VCSE Promoting Control System Cyber Effects Analysis Using VCSE Promoting Control System Reliability Cyber Effects Analysis Using VCSE Promoting Control System Reliability This report describes the Virtual Control System Environment (VCSE) technology- developed at Sandia National Laboratories-to investigate Supervisory Control And Data Acquisition (SCADA) vulnerabilities associated with energy systems; and it describes a set of experiments with findings from using that environment. The report explains how VCSE can be used to analyze and develop an understanding of cyber attacks. Specific analyses in this report focus on unencrypted, unsecured data channels on Internet protocol (IP)-routed computer networks within electric power systems. Cyber Effects Analysis Using VCSE Promoting Control System Reliability

270

National Infrastructure Protection Plan  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Infrastructure Infrastructure Protection Plan 2006 Preface Preface i The ability to protect the critical infrastructure and key resources (CI/KR) of the United States is vital to our national security, public health and safety, economic vitality, and way of life. U.S. policy focuses on the importance of enhancing CI/KR protection to ensure that essential governmental missions, public services, and economic functions are maintained in the event of a

271

NCSec: a national cyber security referential for the development of a code of practice in national cyber security management  

Science Conference Proceedings (OSTI)

Governments worldwide have faced computer security challenges. These challenges are serious in a context where there is an absence of appropriate organizational and institutional structures to deal with incidents. But more important which agency or agencies ... Keywords: ISO27002, cyber criminality, cyber security, organizational structure, referential

Mohamed Dafir Ech-cherif el Kettani; Taieb Debbagh

2008-12-01T23:59:59.000Z

272

Infrastructure Operation Report  

E-Print Network (OSTI)

e-Infrastructures for scientific communitiesD4Science – No. 212488 www.d4science.eu DOCUMENT INFORMATION Project Project acronym: Project full title:

Dsa. B; Pedro Andrade; Pedro Andrade; Pasquale Pagano; Andrea Manieri

2009-01-01T23:59:59.000Z

273

Hydrogen Transition Infrastructure Analysis  

DOE Green Energy (OSTI)

Presentation for the 2005 U.S. Department of Energy Hydrogen Program review analyzes the hydrogen infrastructure needed to accommodate a transitional hydrogen fuel cell vehicle demand.

Melendez, M.; Milbrandt, A.

2005-05-01T23:59:59.000Z

274

Physical Infrastructure: Connections  

Science Conference Proceedings (OSTI)

... Due to years of limited investment and maintenance, the US transportation infrastructure network (including approximately 6.5 million kilometers of ...

2012-10-05T23:59:59.000Z

275

Extensible, Self-Optimizing Phase Equilibrium Infrastructure (ESPEI)  

Science Conference Proceedings (OSTI)

Cyber-Enabled Ab Initio Simulations in Nanohub.org: Simulation Tools and Learning Modules · Cyber-Enabled Materials Simulations Via Nanohub.org.

276

NIST Manuscript Publication Search  

Science Conference Proceedings (OSTI)

... Title: The Economic Benefits from Improved Cyber Security Infrastructure. ... Pages: 6 pp. Keywords: cyber security; economic; cyber infrastructure. ...

2013-05-22T23:59:59.000Z

277

An Advanced Decision Support Tool for Electricity Infrastructure Operations  

Science Conference Proceedings (OSTI)

Electricity infrastructure, as one of the most critical infrastructures in the U.S., plays an important role in modern societies. Its failure would lead to significant disruption of people’s lives, industry and commercial activities, and result in massive economic losses. Reliable operation of electricity infrastructure is an extremely challenging task because human operators need to consider thousands of possible configurations in near real-time to choose the best option and operate the network effectively. In today’s practice, electricity infrastructure operation is largely based on operators’ experience with very limited real-time decision support, resulting in inadequate management of complex predictions and the inability to anticipate, recognize, and respond to situations caused by human errors, natural disasters, or cyber attacks. Therefore, a systematic approach is needed to manage the complex operational paradigms and choose the best option in a near-real-time manner. This paper proposes an advanced decision support tool for electricity infrastructure operations. The tool has the functions of turning large amount of data into actionable information to help operators monitor power grid status in real time; performing trend analysis to indentify system trend at the regional level or system level to help the operator to foresee and discern emergencies, studying clustering analysis to assist operators to identify the relationships between system configurations and affected assets, and interactively evaluating the alternative remedial actions to aid operators to make effective and timely decisions. This tool can provide significant decision support on electricity infrastructure operations and lead to better reliability in power grids. This paper presents examples with actual electricity infrastructure data to demonstrate the capability of this tool.

Chen, Yousu; Huang, Zhenyu; Wong, Pak C.; Mackey, Patrick S.; Allwardt, Craig H.; Ma, Jian; Greitzer, Frank L.

2010-01-31T23:59:59.000Z

278

The UNICORE Grid infrastructure  

Science Conference Proceedings (OSTI)

UNICORE (Uniform Interface to Computer Resources) is a software infrastructure supporting seamless and secure access to distributed resources. UNICORE allows uniform access to different hardware and software platforms as well as different organizational ... Keywords: Abstract Job, HPC portal, Java, UNICORE, grid infrastructure, seamless access

Mathilde Romberg

2002-04-01T23:59:59.000Z

279

Defending Critical Infrastructure  

Science Conference Proceedings (OSTI)

We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions ... Keywords: bilevel program, critical infrastructure protection, homeland defense, homeland security, mixed-integer program, trilevel program

Gerald Brown; Matthew Carlyle; Javier Salmerón; Kevin Wood

2006-11-01T23:59:59.000Z

280

CyberGIS software: a synthetic review and integration roadmap  

Science Conference Proceedings (OSTI)

CyberGIS defined as cyberinfrastructure-based geographic information systems (GIS) has emerged as a new generation of GIS representing an important research direction for both cyberinfrastructure and geographic information science. This study introduces a 5-year effort funded by the US National Science Foundation to advance the science and applications of CyberGIS, particularly for enabling the analysis of big spatial data, computationally intensive spatial analysis and modeling (SAM), and collaborative geospatial problem-solving and decision-making, simultaneously conducted by a large number of users. Several fundamental research questions are raised and addressed while a set of CyberGIS challenges and opportunities are identified from scientific perspectives. The study reviews several key CyberGIS software tools that are used to elucidate a vision and roadmap for CyberGIS software research. The roadmap focuses on software integration and synthesis of cyberinfrastructure, GIS, and SAM by defining several key integration dimensions and strategies. CyberGIS, based on this holistic integration roadmap, exhibits the following key characteristics: high-performance and scalable, open and distributed, collaborative, service-oriented, user-centric, and community-driven. As a major result of the roadmap, two key CyberGIS modalities gateway and toolkit combined with a community-driven and participatory approach have laid a solid foundation to achieve scientific breakthroughs across many geospatial communities that would be otherwise impossible.

Wang, Shaowen [University of Illinois, Urbana-Champaign; Anselin, Luc [Arizona State University; Bhaduri, Budhendra L [ORNL; Cosby, Christopher [University Navstar Consortium, Boulder, CO; Goodchild, Michael [University of California, Santa Barbara; Liu, Yan [University of Illinois, Urbana-Champaign; Nygers, Timothy L. [University of Washington, Seattle

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Agent-based Cyber Control Strategy Design for Resilient Control Systems: Concepts, Architecture and Methodologies  

SciTech Connect

The implementation of automated regulatory control has been around since the middle of the last century through analog means. It has allowed engineers to operate the plant more consistently by focusing on overall operations and settings instead of individual monitoring of local instruments (inside and outside of a control room). A similar approach is proposed for cyber security, where current border-protection designs have been inherited from information technology developments that lack consideration of the high-reliability, high consequence nature of industrial control systems. Instead of an independent development, however, an integrated approach is taken to develop a holistic understanding of performance. This performance takes shape inside a multiagent design, which provides a notional context to model highly decentralized and complex industrial process control systems, the nervous system of critical infrastructure. The resulting strategy will provide a framework for researching solutions to security and unrecognized interdependency concerns with industrial control systems.

Craig Rieger; Milos Manic; Miles McQueen

2012-08-01T23:59:59.000Z

282

Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks  

SciTech Connect

Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

Hartman, Steven M [ORNL

2012-01-01T23:59:59.000Z

283

Cyber Security in Smart Grid Substations  

E-Print Network (OSTI)

Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands, and the cyber security of substations in particular. The focus of this study is the perception of risks and threats in smart grid cyber security and the international standards implemented in smart grids. The created overview is based on semi-structured interviews with 13 experts originating from eight different European countries. These participants are employed at electricity producers, grid operators, technology consultants and technology providers in the utilities sector. Their expertise ranges from information security to electricity grids, specifically smart grid security. Some of them are members of smart grid security related standard committees. The key results of the state of practice are the following: 1. The interconnectivity of the smart grid with multiple stakeholders and European colleagues is indicated as the biggest threat to the security of the smart grid. 2. Another often mentioned threat is awareness. The experts generally indicate that awareness within top management is high. However, personnel on lower levels are reluctant to incorporate security in their processes. 3. All organizations are in a certain stage of implementing standards, the ISO27000 series

Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schönbeck; Sjaak Brinkkemper; Thijs Baars; Lucas Van Den Bemd; Michail Theuns; Robin Van Den Akker; Machiel Schönbeck; Sjaak Brinkkemper

2012-01-01T23:59:59.000Z

284

Primer Control System Cyber Security Framework and Technical Metrics  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

285

PNNL Electricity Infrastructure Operations Center | Open Energy...  

Open Energy Info (EERE)

Electricity Infrastructure Operations Center Jump to: navigation, search Logo: Electricity Infrastructure Operations Center Name Electricity Infrastructure Operations Center...

286

Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure  

Science Conference Proceedings (OSTI)

Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider design principals and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Cryptographic keys must be securely exchanged, then held and protected on either end of a communications link. This is challenging for a utility with numerous substations that must secure the intelligent electronic devices (IEDs) that may comprise complex control system of systems. For example, distribution and management of keys among the millions of intelligent meters within the Advanced Metering Infrastructure (AMI) is being implemented as part of the National Smart Grid initiative. Without a means for a secure cryptographic key management system (CKMS) no cryptographic solution can be widely deployed to protect the EDS infrastructure from cyber-attack. We consider 1) how security modeling is applied to key management and cyber security concerns on a continuous basis from design through operation, 2) how trusted models and key management architectures greatly impact failure scenarios, and 3) how hardware-enabled trust is a critical element to detecting, surviving, and recovering from attack.

Duren, Mike [Sypris Electronics, LLC; Aldridge, Hal [ORNL; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL

2013-01-01T23:59:59.000Z

287

Innovations in Nuclear Infrastructure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovations in Nuclear Infrastructure Innovations in Nuclear Infrastructure and Education (INIE) Innovations in Nuclear Infrastructure and Education (INIE) Presented to the Nuclear Energy Research Advisory Committee Crystal City, Virginia John Gutteridge Director, University Programs Office of Nuclear Energy, Science and Technology September 30 - October 1, 2002 Office of Nuclear Energy, Science and Technology Gutteridge/Sep-Oct_02 INIE-NERAC.ppt (2) INIE The Stimuli .... INIE The Stimuli .... 6 Declining number of operating university research/training reactors 6 Dwindling student population in nuclear engineering 6 Closing or loss of identity of university nuclear engineering programs 6 Looming shortage of nuclear engineering graduates 6 Threat of additional reactor closures -- Cornell, Michigan, MIT

288

Geographically-Based Infrastructure Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Infrastructure Analysis Margo Melendez & Keith Parks January 26, 2006 Geographically-Based Infrastructure Analysis (GIA) Utilizes GIS, geographically segregated data, and transition expertise to add the spatial component to infrastructure analysis NREL Core Competencies * Geographic data, tools, and expertise * Flexibility to address a wide array of transition issues NREL Capability Diagram Geographically-based Infrastructure Analysis GIS Transportation Technologies & Systems Electric & Hydrogen Technologies Energy Analysis Office GIA Activities Previous and Ongoing * HYDS ME - Evaluates best infrastructure options * Interstate Infrastructure Analysis - Minimal infrastructure to facilitate interstate travel during transition New Analyses * Quantifying transitional hydrogen demand

289

GIS-Based Infrastructure Modeling  

NLE Websites -- All DOE Office Websites (Extended Search)

GIS-Based Infrastructure Modeling Hydrogen Scenario Meeting August 9-10, 2006 Keith Parks, NREL GIS-Based Infrastructure Modeling * Station Analysis - Selection Criteria - Los...

290

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

291

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines NIST Finalizes Initial Set of Smart Grid Cyber Security Guidelines September 2, 2010 - 3:15pm Addthis WASHINGTON, D.C. - The National Institute of Standards and Technology (NIST) issued today its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors, and other threats. The product of two formal public reviews and the focus of numerous workshops and teleconferences over the past 17 months, the three-volume set

292

Office of Cyber Security Evaluations Appraisal Process Guide, April 2008  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CYBER SECURITY EVALUATIONS CYBER SECURITY EVALUATIONS APPRAISAL PROCESS GUIDE April 2008 Office of Health, Safety and Security U.S. Department of Energy Office of Cyber Security Evaluations Appraisal Process Guide Preface April 2008 i Preface Department of Energy (DOE) Order 470.2B, Independent Oversight and Performance Assurance Program, and Office of Health, Safety and Security (HSS) Standard Operating Procedure, SOP-10-01, Independent Oversight Appraisal Process Protocols, February 2008, provide direction for the Office of Independent Oversight (HS-60) to establish the requirements, responsibilities, and processes for the development and maintenance of Appraisal Process Protocols that describe the activities for evaluating the effectiveness of DOE safeguards and security; cyber security; emergency management; and

293

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

with the CCD have created a reputation on college campuses of Sandia as leader in cyber security. Interactions between the diverse group of students in the CCD has cultivated...

294

Sandia National Laboratories: The Center for Cyber Defenders...  

NLE Websites -- All DOE Office Websites (Extended Search)

Us Screen reader users: click here for plain HTML Go to Google Maps Home The Center for Cyber Defenders Loading... Still loading... Slow? Use the troubleshooting guide or basic...

295

CYBER SECURITY AWARENESS & TRAINING Program Plan of Activity...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

III. Theme The theme for the 2009 Summer Takin' It to the Streets awareness event is "Shape Up...Get Cyber Fit." 3 7222009 Last update: 5312011 IV. Audience The intended...

296

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeking Comments on Consolidated IT and Cyber Security Support Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

297

NNSA Seeking Comments on Consolidated IT and Cyber Security Support  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NNSA Seeking Comments on Consolidated IT and Cyber Security Support NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft NNSA Seeking Comments on Consolidated IT and Cyber Security Support Services Draft July 17, 2013 - 9:10am Addthis John Hale III John Hale III Director, Office of Small and Disadvantaged Business Utilization The National Nuclear Security Administration (NNSA) is currently seeking comments, now through July 29, on an opportunity for Consolidated IT and Cyber Security Support Services. Comments are sought from interested vendors holding active GSA Schedule 70 contracts (General Purpose Commercial Information Technology Equipment, Software, and Services) covering SIN 132-51 (Information Technology Professional Services) on draft performance-based scopes of work. The anticipated NAICS code is 541513 - Computer Facilities Management Services,

298

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC is offering a free, public webinar series from January to May 2012 entitled "Issues in Designing the...

299

UPBOT: a testbed for cyber-physical systems  

Science Conference Proceedings (OSTI)

Developing software for cyber-physical systems presents a unique challenge. These systems are not simply software; they are composed of software running on a collection of machines that present a risk to human safety if anything goes wrong. Researchers ...

Tanya L. Crenshaw; Steven Beyer

2010-08-01T23:59:59.000Z

300

Microsoft Word - Cyber Security Strat Plan final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

R R A A T T E E G G I I C C P P L L A A N N FEBRUARY 12, 2007 CYBER SECURITY STRATEGIC PLAN VERSION 1.0 2 Table of Contents INTRODUCTION ......

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Loosely time-triggered architectures for cyber-physical systems  

Science Conference Proceedings (OSTI)

Cyber-Physical Systems require distributed architectures to support safety critical real-time control. Kopetz' Time-Triggered Architectures (TTA) have been proposed as both an architecture and a comprehensive paradigm for systems architecture, for such ...

Albert Benveniste

2010-03-01T23:59:59.000Z

302

Towards A Network-of-Networks Framework for Cyber Security  

Science Conference Proceedings (OSTI)

Networks-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in this paper we build towards a three-layer NoN model for an enterprise cyber system. Each layer captures a different facet of a cyber system. We then discuss the potential benefits of graph-theoretic analysis enabled from such a model. Our goal is to provide a novel and powerful tool for modeling and analyzing problems in cyber security.

Halappanavar, Mahantesh; Choudhury, Sutanay; Hogan, Emilie A.; Hui, Peter SY; Johnson, John R.; Ray, Indrajit; Holder, Lawrence B.

2013-06-07T23:59:59.000Z

303

BNL | Cloud Lifecycle Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Cloud Life Cycle Infrastructure Cloud Life Cycle Infrastructure An important component of any long-term atmospheric measurement program is the quality control and maintenance of the datastreams from instrument systems. Further, the raw measurements from atmospheric remote sensing instrumentation are not directly useable by the majority of the scientific community. These raw measurements must be interpreted and converted to geophysical quantities that can be more readily used by a greater number of scientists to address important questions regarding the Earth's climate system. The cloud life cycle infrastructure group at BNL is led by Dr. Michael Jensen and is responsible for the development and production of cloud-related value-added products (VAPs). The cloud life cycle infrastructure group also provides mentorships for the millimeter cloud

304

IPHE Infrastructure Workshop Proceedings  

Fuel Cell Technologies Publication and Product Library (EERE)

This proceedings contains information from the IPHE Infrastructure Workshop, a two-day interactive workshop held on February 25-26, 2010, to explore the market implementation needs for hydrogen fuelin

305

Electric Vehicle Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure JOHN DAVIS: Nearly everyone who owns a plug-in electric vehicle has some capacity to replenish the battery at home, either with a dedicated 220-volt charger, or by...

306

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

307

Guidelines for Infrastructure Planning  

Science Conference Proceedings (OSTI)

There are already over 60,000 plug-in electric vehicles (PEVs) on the road, and PEVs sales are rapidly growing. Although several hundred million dollars have been invested in infrastructure to support PEVs, additional investment will be needed as the number of non-petroleum-fueled vehicles increases. This project attempted to answer the question: how much charging infrastructure is really required for PEVs? This question is difficult to answer due to significant differences between the way PEVs and ...

2012-12-07T23:59:59.000Z

308

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-12-20T23:59:59.000Z

309

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-10-01T23:59:59.000Z

310

Cyber Security Strategy Guidance for the Electric Sector  

Science Conference Proceedings (OSTI)

Smart grid technologies are introducing millions of new intelligent components to the electric grid that communicate in much more advanced ways (two-way communication, dynamic optimization, and wired and wireless communications) than in the past. Cyber security is important because the bi-directional flow of two-way communication and the control capabilities in the smart grid will enable an array of new functionalities and applications. Two areas of critical importance for the smart grid are cyber securi...

2012-05-30T23:59:59.000Z

311

Process Control System Cyber Security Standards - An Overview  

Science Conference Proceedings (OSTI)

The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

Robert P. Evans

2006-05-01T23:59:59.000Z

312

MFC Communications Infrastructure Study  

SciTech Connect

Unprecedented growth of required telecommunications services and telecommunications applications change the way the INL does business today. High speed connectivity compiled with a high demand for telephony and network services requires a robust communications infrastructure.   The current state of the MFC communication infrastructure limits growth opportunities of current and future communication infrastructure services. This limitation is largely due to equipment capacity issues, aging cabling infrastructure (external/internal fiber and copper cable) and inadequate space for telecommunication equipment. While some communication infrastructure improvements have been implemented over time projects, it has been completed without a clear overall plan and technology standard.   This document identifies critical deficiencies with the current state of the communication infrastructure in operation at the MFC facilities and provides an analysis to identify needs and deficiencies to be addressed in order to achieve target architectural standards as defined in STD-170. The intent of STD-170 is to provide a robust, flexible, long-term solution to make communications capabilities align with the INL mission and fit the various programmatic growth and expansion needs.

Michael Cannon; Terry Barney; Gary Cook; George Danklefsen, Jr.; Paul Fairbourn; Susan Gihring; Lisa Stearns

2012-01-01T23:59:59.000Z

313

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

314

Critical Foundations: Protecting America's Infrastructures  

Science Conference Proceedings (OSTI)

Page 1. CRITICAL FOUNDATIONS PROTECTING AMERICA'S INFRASTRUCTURES The Report of the President's Commission ...

315

Engineering cyber infrastructure for U-Pb geochronology: Tripoli and U-Pb_Redux  

E-Print Network (OSTI)

In the past decade, major advancements in precision and accuracy of U-Pb geochronology, which stem from improved sample pretreatment and refined measurement techniques, have revealed previously unresolvable discrepancies ...

Bowring, J. F.

316

A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes  

E-Print Network (OSTI)

1992), Estimating net solar radiation using Landsat Thematicand temperature sensor, (7) solar radiation sensor, (8) 10Wwith snow depth, solar radiation, and relative-humidity

Kerkez, Branko

2012-01-01T23:59:59.000Z

317

A cyber-infrastructure for the measurement and estimation of large-scale hydrologic processes  

E-Print Network (OSTI)

solar panel requirements, in which case radio power consumption would begin to play a larger role in overall energy efficiency.

Kerkez, Branko

2012-01-01T23:59:59.000Z

318

Experiences and Challenges with Using Cert Data to Analyze International Cyber Security  

E-Print Network (OSTI)

With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The ...

Madnick, Stuart

319

EV Charging Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Charging Infrastructure Charging Infrastructure JOHN DAVIS: Virtually anywhere in the U.S. you can bring light to a room with the flick of a finger. We take it for granted, but creating the national electric grid to make that possible took decades to accomplish. Now, in just a few years, we've seen the birth of a new infrastructure that allows electric vehicles to quickly recharge their batteries at home, work, or wherever they may roam. But this rapid growth has come with a few growing pains. Starting with less than 500 in 2009, there are now over 19,000 public-access charging outlets available to electric vehicles owners at commuter lots, parking garages, airports, retail areas and thousands of

320

Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry  

SciTech Connect

This document contains introductory material that discusses cyber security challenges in using cloud computing in the electric utility industry.

Akyol, Bora A.

2012-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Cyber Security Procurement—Application of the Methodology, Third Example: Digital Feedwater Control  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements to new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of cyber security controls due to lack of proper requirements and/or unclear division of responsibilities between the utility and vendor can result in costly retrofits to meet the ...

2013-12-19T23:59:59.000Z

322

Cyber Security Procurement - Application of the Methodology, Second Example: Feedpump Turbine Speed Control  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of cyber security controls owing to a lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly retrofits to meet the ...

2013-12-20T23:59:59.000Z

323

The ATLAS Simulation Infrastructure  

E-Print Network (OSTI)

The simulation software for the ATLAS Experiment at the Large Hadron Collider is being used for large-scale production of events on the LHC Computing Grid. This simulation requires many components, from the generators that simulate particle collisions, through packages simulating the response of the various detectors and triggers. All of these components come together under the ATLAS simulation infrastructure. In this paper, that infrastructure is discussed, including that supporting the detector description, interfacing the event generation, and combining the GEANT4 simulation of the response of the individual detectors. Also described are the tools allowing the software validation, performance testing, and the validation of the simulated output against known physics processes.

The ATLAS Collaboration

2010-05-25T23:59:59.000Z

324

Cumulative strategic capability and performance of early movers and followers in the cyber market  

Science Conference Proceedings (OSTI)

Today, the cyber market is evolving rapidly in the networked age. In the cyber market, the traditional competitive strategy appears to no longer be effective. This study investigates the strategic choice differences of online firms based on their strategic ... Keywords: Cyber market, Early mover, Follower, Porter's generic strategies, Sand Cone model

Sang-Gun Lee; Chulmo Koo; Kichan Nam

2010-06-01T23:59:59.000Z

325

On the impact of physical-cyber world interactions during unexpected events  

Science Conference Proceedings (OSTI)

Physical world events have a strong and direct impact on the communication activity seen in the cyber world. In this paper, we present three physical world events where we conducted passive network traffic measurements to study the interaction between ... Keywords: cyber world behavior, cyber-physical world interactions, emergency response, high network traffic deviation, non-invasive network measurement, unexpected events, wireless mesh networks

B. S. Manoj; Bheemarjuna Reddy Tamma; Ramesh R. Rao

2011-12-01T23:59:59.000Z

326

The virtual power system testbed and inter-testbed integration  

Science Conference Proceedings (OSTI)

The Virtual Power System Testbed (VPST) at University of Illinois at Urbana-Champaign is part of the Trustworthy Cyber Infrastructure for the Power Grid (TCIP) and is maintained by members of the Information Trust Institute (ITI). VPST is designed to ...

David C. Bergman; Dong Jin; David M. Nicol; Tim Yardley

2009-08-01T23:59:59.000Z

327

or are "Cyberspace " and "Cyber Space " the same?  

E-Print Network (OSTI)

This project has at least two facets to it: (1) advancing the algorithms in the sub-field of bibliometrics often referred to as "text mining " whereby hundreds of thousands of documents (such as journal articles) are scanned and relationships amongst words and phrases are established and (2) applying these tools in support of the Explorations in Cyber International Relations (ECIR) research effort. In international relations, it is important that all the parties understand each other. Although dictionaries, glossaries, and other sources tell you what words/phrases are supposed to mean (somewhat complicated by the fact that they often contradict each other), they do not tell you how people are actually using them. As an example, when we started, we assumed that "cyberspace " and "cyber space " were essentially the same word with just a minor variation in punctuation (i.e., the space, or lack thereof, between "cyber " and "space") and that the choice of the punctuation was a rather random occurrence. With that assumption in mind, we would expect that the taxonomies that would be constructed by our algorithms using "cyberspace " and "cyber space " as seed terms would be basically the same. As it turned out, they were quite different, both in overall shape and groupings within the taxonomy. Since the overall field of cyber international relations is so new, understanding the field and how people think about (as evidenced by their actual usage of terminology, and how usage changes over time) is an important goal as part of the overall ECIR project. 1.

Steven Camińa; Stuart Madnick; Nazli Choucri; Wei Lee Woon; Steven Camińa; Wei Lee Woon

2011-01-01T23:59:59.000Z

328

National Infrastructure Protection Plan  

E-Print Network (OSTI)

this context, our critical infrastructure and key resources (CIKR) may be directly exposed to the event themselves or indirectly exposed as a result of the dependencies and interde- pendencies among CIKR. Within the CIKR protection mission area, national priorities must include preventing catastrophic loss of life

Sen, Pradeep

329

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

330

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

331

Critical Infrastructure Modeling: An Approach to Characterizing Interdependencies of Complex Networks & Control Systems  

SciTech Connect

Critical infrastructure control systems face many challenges entering the 21st century, including natural disasters, cyber attacks, and terrorist attacks. Revolutionary change is required to solve many existing issues, including gaining greater situational awareness and resiliency through embedding modeling and advanced control algorithms in smart sensors and control devices instead of in a central controller. To support design, testing, and component analysis, a flexible simulation and modeling capability is needed. Researchers at Idaho National Laboratory are developing and evaluating such a capability through their CIPRsim modeling and simulation framework.

Stuart Walsh; Shane Cherry; Lyle Roybal

2009-05-01T23:59:59.000Z

332

Asset Management of Critical Infrastructure ur critical infrastructure--  

E-Print Network (OSTI)

Asset Management of Critical Infrastructure O ur critical infrastructure-- roads, bridges, transit-of-the-art approach to asset management of public infrastructure. ORNL's Capabilities · Simulation-based, optimization. · Innovative optimization tools to assess tradeoffs between construction, maintenance, and demolition over

333

A Cyber-Physical Experimentation Environment for the Security Analysis  

E-Print Network (OSTI)

Although many studies address the security of Networked Industrial Control Systems (NICS), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these systems. This paper presents an innovative framework for an experimentation environment that can reproduce concurrently physical and cyber systems. The proposed approach uses an emulation testbed based on Emulab to recreate cyber components and a real-time simulator, based on Simulink, to recreate physical processes. The main novelty of the proposed framework is that it provides a set of experimental capabilities that are missing from other approaches, e.g. safe experimentation with real malware, flexibility to use different physical processes. The feasibility of the approach is confirmed by the development of a fully functional prototype, while its applicability is proven through two case studies of industrial systems from the electrical and chemical domain.

Béla Genge; Christos Siaterlis; Igor Nai Fovino; Marcelo Masera

2012-01-01T23:59:59.000Z

334

Evaluation Report on The Department's Unclassified Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report on The Department's Unclassified Cyber Security Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 Evaluation Report on The Department's Unclassified Cyber Security Program 2002, DOE/IG-0567 As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security information. It requires agencies to conduct annual reviews and evaluations of unclassified and

335

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

336

Human dimensions in cyber operations research and development priorities.  

SciTech Connect

Within cyber security, the human element represents one of the greatest untapped opportunities for increasing the effectiveness of network defenses. However, there has been little research to understand the human dimension in cyber operations. To better understand the needs and priorities for research and development to address these issues, a workshop was conducted August 28-29, 2012 in Washington DC. A synthesis was developed that captured the key issues and associated research questions. Research and development needs were identified that fell into three parallel paths: (1) human factors analysis and scientific studies to establish foundational knowledge concerning factors underlying the performance of cyber defenders; (2) development of models that capture key processes that mediate interactions between defenders, users, adversaries and the public; and (3) development of a multi-purpose test environment for conducting controlled experiments that enables systems and human performance measurement. These research and development investments would transform cyber operations from an art to a science, enabling systems solutions to be engineered to address a range of situations. Organizations would be able to move beyond the current state where key decisions (e.g. personnel assignment) are made on a largely ad hoc basis to a state in which there exist institutionalized processes for assuring the right people are doing the right jobs in the right way. These developments lay the groundwork for emergence of a professional class of cyber defenders with defined roles and career progressions, with higher levels of personnel commitment and retention. Finally, the operational impact would be evident in improved performance, accompanied by a shift to a more proactive response in which defenders have the capacity to exert greater control over the cyber battlespace.

Forsythe, James Chris; Silva, Austin Ray; Stevens-Adams, Susan Marie; Bradshaw, Jeffrey [Institute for Human and Machine Cognition] Institute for Human and Machine Cognition

2012-11-01T23:59:59.000Z

337

Underground Infrastructure Research and Education  

E-Print Network (OSTI)

productivity, environmental improvement and renewal of the aging underground infrastructure. OrganizationalCenter for Underground Infrastructure Research and Education CUIRE Board Members Sam Arnaout Pipe Association Tim Kennedy, AMERON NOV Chad Kopecki, Dallas Water Utilities David Marshall, Tarrant

Texas at Arlington, University of

338

Infrastructure for Integrated Electronics Design & ...  

Science Conference Proceedings (OSTI)

Infrastructure for Integrated Electronics Design & Manufacturing (IIEDM) Project. ... designed to support distributed supply chain integration and e ...

2010-11-05T23:59:59.000Z

339

Refueling Infrastructure for Alternative Fuel Vehicles: Lessons...  

NLE Websites -- All DOE Office Websites (Extended Search)

NextEnergy (Detroit) Station Infrastructure Lessons Learned 4 UNITED STATES Department of Energy Infrastructure Lessons Learned Infrastructure Legal Contracts Legal agreements take...

340

Integrating Infrastructure Planning: The Role of Schools  

E-Print Network (OSTI)

Integrating Infrastructure Planning: The Role of Schools B Ypolice protection, and infrastructure that makes citiesplan to upgrade critical infrastructure. The plan calls for

McKoy, Deborah; Vincent, Jeffrey M.; Makarewicz, Carrie

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Intelligent Fluid Infrastructure for Embedded Networking  

E-Print Network (OSTI)

mobile element into the networking infrastructure.Our fluid infrastructure design saves significant energy inIntelligent Fluid Infrastructure for Embedded Networks Aman

Kansal, Aman; Somasundara, Arun; Jea, David C; Srivastava, Mani B; Estrin, D

2004-01-01T23:59:59.000Z

342

Re-imagining Infrastructure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Re-imagining Infrastructure Re-imagining Infrastructure Document was provided during March 4, 2011 DOE-QTR meeting Re-imagining Infrastructure More Documents & Publications INL...

343

Intelligent Fluid Infrastructure for Embedded Networks  

E-Print Network (OSTI)

Intelligent Fluid Infrastructure for Embedded Networks Amanto develop a fluid infrastructure: mobile components arebuilt into the system infrastructure for enabling specific

Aman Kansal; Arun Somasundara; David Jea; Mani Srivastava; Deborah Estrin

2004-01-01T23:59:59.000Z

344

Transit Infrastructure Finance Through Station Location Auctions  

E-Print Network (OSTI)

as the primary transit infrastructure finance method.Paper 2009-04 Transit Infrastructure Finance Through StationWP-2009-04 Transit Infrastructure Finance Through Station

Ian Carlton

2009-01-01T23:59:59.000Z

345

Middleware for Cooperative Vehicle-Infrastructure Systems  

E-Print Network (OSTI)

Cooperative vehicle-infrastructure systems." COM Safety:of Transportation. Vehicle-Infrastructure Integration (VII).for Cooperative Vehicle-Infrastructure Systems Christian

Manasseh, Christian; Sengupta, Raja

2008-01-01T23:59:59.000Z

346

Resilient Everyday Infrastructure [To Rally Discussion  

E-Print Network (OSTI)

and redundant civic infrastructure. Opposite: Users at theand gardens are users of infrastructure, demanding more andResilient Everyday Infrastructure William R. Morrish When a

Morrish, William R.

2008-01-01T23:59:59.000Z

347

The Department's Unclassified Cyber Security Program 2002, IG-0567  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT'S UNCLASSIFIED DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security

348

Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting Intelligent Distributed Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, efficiency, and reliability. But increased interconnection and automation over a large geographical area requires a distributed and hierarchical approach to cyber security. This two-year project will develop three security components unique to intelligent power grids. The first is an automated

349

Management of Naval Reactors' Cyber Security Program, OIG-0884  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Naval Reactors' Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 April 12, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval Reactors Program (Naval Reactors), an organization within the National Nuclear Security Administration, provides the military with safe and reliable nuclear propulsion plants to power warships and submarines. Naval Reactors maintains responsibility for activities supporting the United States Naval fleet nuclear propulsion systems, including research and

350

of Western Area Power Administration's Cyber Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Western Area Power Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 October 22, 2012 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Western Area Power Administration's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Department of Energy's Western Area Power Administration (Western) markets and delivers hydroelectric power and related services to 15 states within the central and western United States. As the largest U.S. Power Marketing Administration, millions of households and

351

Cyber Security Summer School: Lessons for the Modern Grid | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid Cyber Security Summer School: Lessons for the Modern Grid June 20, 2011 - 4:34pm Addthis Carol Hawk Program Manager, Cyber Security for Energy Delivery Systems What does this mean for me? Computer systems do more than store and share information. They help control our traffic lights, trains and specifically, our electric grid -- tasks for which continuous function is the primary concern. Protecting control systems on the grid from cyber attack requires a completely different approach to cyber security than information technology systems. The Cyber Summer School gave aspiring attendees a practical understanding of the connection between power systems and computer science required to secure a clean, reliable energy future.

352

NIST Issues Expanded Draft of Smart Grid Cyber Security ...  

Science Conference Proceedings (OSTI)

... including electric transportation, electric storage, advanced metering infrastructure, distribution grid management, energy management in homes ...

2010-12-07T23:59:59.000Z

353

Improving Utilization of Infrastructure Clouds  

Science Conference Proceedings (OSTI)

A key advantage of infrastructure-as-a-service (IaaS) clouds is providing users on-demand access to resources. To provide on-demand access, however, cloud providers must either significantly overprovision their infrastructure (and pay a high price for ... Keywords: Cloud Computing, Infrastructure-as-a-Service, High Throughput Computing

Paul Marshall; Kate Keahey; Tim Freeman

2011-05-01T23:59:59.000Z

354

Advanced Metering Infrastructure Technology  

Science Conference Proceedings (OSTI)

Revenue security is a major concern for utilities. Theft of electric service in the United States is widespread. In 2006, the revenue estimate for non-technical losses was 6.5 billion. Non-technical losses are associated with unidentified and uncollected revenue from pilferage, tampering with meters, defective meters, and errors in meter reading. In this report, revenue security describes the use of advanced metering infrastructure (AMI) technology to minimize non-technical losses.

2008-12-08T23:59:59.000Z

355

Synchrophasor Communication Infrastructure  

Science Conference Proceedings (OSTI)

This report details ongoing work begun in 2011 evaluating benefits of various wide-area communications approaches for transport of synchrophasor measurements, with a focus on latency. Recent discussions on synchrophasor use in the North American SynchroPhasor Initiative (NASPI) community have included consideration of automated closed-loop control over an Internet protocol (IP) network infrastructure.The project’s focus in 2012 has been twofold: NASPInet architecture design and ...

2012-11-26T23:59:59.000Z

356

Recommended Practice: Creating Cyber Forensics Plans for Control Systems  

SciTech Connect

Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are not comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.

Eric Cornelius; Mark Fabro

2008-08-01T23:59:59.000Z

357

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 22280 of 28,905 results. 71 - 22280 of 28,905 results. Download TCIP: Trustworthy CyberInfrastructure for the Power Grid The TCIP, or Trustworthy CyberInfrastructure for the Power Grid, project's vision is to provide the fundamental science and technology to create an intelligent, adaptive power grid which survives... http://energy.gov/oe/downloads/tcip-trustworthy-cyberinfrastructure-power-grid Download Reliability as a Public Good http://energy.gov/oe/downloads/reliability-public-good Download A Review of Market Monitoring Activities at U.S. Independent System Operators http://energy.gov/oe/downloads/review-market-monitoring-activities-us-independent-system-operators Download Microsoft PowerPoint- UAE Masdar 2-24-10 final for distribution.pptx http://energy.gov/downloads/microsoft-powerpoint-uae-masdar-2-24-10-final-distributionpptx

358

The development of cyber security warning, advice and report points  

Science Conference Proceedings (OSTI)

The threat to electronic information systems increasingly has origins in organised crime or nation-state sponsored or supported activity. Any successful cyber security programme relies upon the sharing of information. How this is achieved is a question ... Keywords: information sharing, security information, warning advice and reporting points

Tony Proctor

2012-10-01T23:59:59.000Z

359

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

This project provides ongoing updates on the status of research and development activities, federal and state policy and regulatory proposals, standards and guidance document development, key personnel, and organizations that are funding or executing smart grid cyber security and privacy activities.

2012-04-17T23:59:59.000Z

360

Cyber-sustainability: leaving a lasting legacy of human wellbeing  

Science Conference Proceedings (OSTI)

This paper presents a case for the importance of sustainability in HCI as it relates to the Web. So far, the discussion about sustainability in HCI has focused on environmental aspects. However, our belief is that cyber-sustainability is much greater ... Keywords: cyberspace, design, environment, sustainability, wellbeing, worldview

Bran Richards; Stuart Walker; Lynne Blair

2011-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Survey Cyber security in the Smart Grid: Survey and challenges  

Science Conference Proceedings (OSTI)

The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and evolutionary regime of existing power grids. More importantly, with the integration of advanced computing and communication technologies, ... Keywords: Attacks and countermeasures, Cryptography, Cyber security, Security protocols, Smart Grid

Wenye Wang; Zhuo Lu

2013-04-01T23:59:59.000Z

362

Overcoming performance collapse for 100Gbps cyber security  

Science Conference Proceedings (OSTI)

In this paper, we present a series of performance tests carried out on R-Scope Dominate-T (RDT), a 1U network security appliance configured with four Tilera Gx-36 processors and with an aggregated network IO capacity of 160Gbps. RDT is optimized with ... Keywords: cyber-security

Jordi Ros-Giralt; Bob Rotsted; Alan Commike

2013-06-01T23:59:59.000Z

363

Cyber-physical systems for next generation intelligent buildings  

Science Conference Proceedings (OSTI)

The proliferation of the smart grid creates new opportunities for large buildings to act as smart end-points that provide mutually beneficial services for building occupants and the grid. In this article we describe how Cyber-Physical systems that provide ...

Andreas Savvides; Ioannis Paschalidis; Michael Caramanis

2011-06-01T23:59:59.000Z

364

Cyber-Physical Systems Security for Smart Grid  

E-Print Network (OSTI)

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy, mitigation, and resilience ­ is among the most important R&D needs for the emerging smart grid. One

365

Cyber-Physical Systems Security for Smart Grid  

E-Print Network (OSTI)

Cyber-Physical Systems Security for Smart Grid Future Grid Initiative White Paper Power Systems-Physical Systems Security for Smart Grid Prepared for the Project "The Future Grid to Enable Sustainable Energy important R&D needs for the emerging smart grid. One of the overarching goals of the future research

366

Alternative Fuels Data Center: Alternative Fuel Infrastructure...  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Type Alternative Fuel Infrastructure Development Program The Tennessee Department of Environment and Conservation provides funding for alternative fueling infrastructure...

367

Before the House Transportation and Infrastructure Subcommittee...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transportation and Infrastructure Subcommittee on Economic Development, Public Buildings, and Emergency Management Before the House Transportation and Infrastructure Subcommittee...

368

Before the House Transportation and Infrastructure Subcommittee...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the House Transportation and Infrastructure Subcommittee on Economic Development, Public Buildings, and Emergency Management Before the House Transportation and Infrastructure...

369

Sustainable Buildings and Infrastructure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sustainable Buildings and Infrastructure Sustainable Buildings and Infrastructure Aviation Management Green Leases Executive Secretariat Energy Reduction at HQ Real Estate...

370

Advanced Metering Infrastructure Security Considerations | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Metering Infrastructure Security Considerations Advanced Metering Infrastructure Security Considerations The purpose of this report is to provide utilities implementing Advanced...

371

Civil Infrastructure - Advanced Sensing Technologies and ...  

Science Conference Proceedings (OSTI)

... Municipal utilities are not able to ... will complete the infrastructure manager's toolkit ... more effectively the challenges presented by aging infrastructure. ...

2011-03-01T23:59:59.000Z

372

Clean Cities: Electric Vehicle Infrastructure Training Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Electric Vehicle Infrastructure Training Program The Electric Vehicle Infrastructure Training Program (EVITP) provides training and certification for people installing electric...

373

Infrastructure and Operations | National Nuclear Security Administrati...  

NLE Websites -- All DOE Office Websites (Extended Search)

for Infrastructure and Operations develops and executes NNSA's infrastructure investment, maintenance, and operations programs and policies. Printer-friendly version...

374

Africa's Transport Infrastructure Mainstreaming Maintenance and...  

Open Energy Info (EERE)

icon Twitter icon Africa's Transport Infrastructure Mainstreaming Maintenance and Management Jump to: navigation, search Tool Summary Name: Africa's Transport Infrastructure...

375

California Hydrogen Infrastructure Project | Open Energy Information  

Open Energy Info (EERE)

Hydrogen Infrastructure Project Jump to: navigation, search Name California Hydrogen Infrastructure Project Place California Sector Hydro, Hydrogen Product String representation...

376

Pennsylvania Regional Infrastructure Project  

NLE Websites -- All DOE Office Websites (Extended Search)

CTC Team CTC Team 1 Pennsylvania Regional Infrastructure Project Presentation by: The Concurrent Technologies Corporation (CTC) Team January 6, 2004 The CTC Team 2 Presentation Outline Introduction of CTC Team CTC Background Technical Approach - CTC Team Member Presentations Conclusions The CTC Team 3 The CTC Project Team Concurrent Technologies Corporation Program Management and Coordination Hydrogen Delivery and Storage Material Development Hydrogen Sensors Concurrent Technologies Corporation Program Management and Coordination Hydrogen Delivery and Storage Material Development Hydrogen Sensors Air Products and Chemicals, Inc. Hydrogen Separation Hydrogen Sensors Air Products and Chemicals, Inc. Hydrogen Separation Hydrogen Sensors Resource Dynamics Corp. Tradeoff Analyses of Hydrogen

377

Cyber Criminals on the Internet Super Highways: A Technical Investigation of Different Shades and Colours within the Nigerian Cyber Space  

Science Conference Proceedings (OSTI)

The internet has impacted the lives of individuals, organisations, and governments all over the world. However, it is now viewed and adopted with caution due mainly to the criminal tendencies of some misguided elements within the society. The internet ... Keywords: Cyber Crimes, E-Mails, Internet, Nigeria, Stakeholders

Edwin Agwu

2013-04-01T23:59:59.000Z

378

California Hydrogen Infrastructure Project  

Science Conference Proceedings (OSTI)

Air Products and Chemicals, Inc. has completed a comprehensive, multiyear project to demonstrate a hydrogen infrastructure in California. The specific primary objective of the project was to demonstrate a model of a ���¢��������real-world���¢������� retail hydrogen infrastructure and acquire sufficient data within the project to assess the feasibility of achieving the nation���¢��������s hydrogen infrastructure goals. The project helped to advance hydrogen station technology, including the vehicle-to-station fueling interface, through consumer experiences and feedback. By encompassing a variety of fuel cell vehicles, customer profiles and fueling experiences, this project was able to obtain a complete portrait of real market needs. The project also opened its stations to other qualified vehicle providers at the appropriate time to promote widespread use and gain even broader public understanding of a hydrogen infrastructure. The project engaged major energy companies to provide a fueling experience similar to traditional gasoline station sites to foster public acceptance of hydrogen. Work over the course of the project was focused in multiple areas. With respect to the equipment needed, technical design specifications (including both safety and operational considerations) were written, reviewed, and finalized. After finalizing individual equipment designs, complete station designs were started including process flow diagrams and systems safety reviews. Material quotes were obtained, and in some cases, depending on the project status and the lead time, equipment was placed on order and fabrication began. Consideration was given for expected vehicle usage and station capacity, standard features needed, and the ability to upgrade the station at a later date. In parallel with work on the equipment, discussions were started with various vehicle manufacturers to identify vehicle demand (short- and long-term needs). Discussions included identifying potential areas most suited for hydrogen fueling stations with a focus on safe, convenient, fast-fills. These potential areas were then compared to and overlaid with suitable sites from various energy companies and other potential station operators. Work continues to match vehicle needs with suitable fueling station locations. Once a specific site was identified, the necessary agreements could be completed with the station operator and expected station users. Detailed work could then begin on the site drawings, permits, safety procedures and training needs. Permanent stations were successfully installed in Irvine (delivered liquid hydrogen), Torrance (delivered pipeline hydrogen) and Fountain Valley (renewable hydrogen from anaerobic digester gas). Mobile fueling stations were also deployed to meet short-term fueling needs in Long Beach and Placerville. Once these stations were brought online, infrastructure data was collected and reported to DOE using Air Products���¢�������� Enterprise Remote Access Monitoring system. Feedback from station operators was incorporated to improve the station user���¢��������s fueling experience.

Edward C. Heydorn

2013-03-12T23:59:59.000Z

379

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

380

NREL: Energy Analysis: Transmission Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Transmission Infrastructure Transmission Infrastructure Grid expansion and planning to allow large scale deployment of renewable generation Large scale deployment of renewable electricity generation will require additional transmission to connect renewable resources, which are wide-spread across the US, but regionally-constrained, to load centers. Long-term transmission planning, based on potential future growth in electric loads and generation resource expansion options, is critical to maintaining the necessary flexibility required for a reliable and robust transmission system. NREL's analyses support transmission infrastructure planning and expansion to enable large-scale deployment of renewable energy in the future. NREL's transmission infrastructure expansion and planning analyses show

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

IT Infrastructure for Strategic Agility  

E-Print Network (OSTI)

nvesting in IT infrastructure is one of the most challenging tasks facing senior managers who often feel ill equipped to make these decisions. Investing in the right ...

Weill, Peter

2003-02-24T23:59:59.000Z

382

Materials for Infrastructure Applications - TMS  

Science Conference Proceedings (OSTI)

Jun 18, 2008 ... This presentation was given as part of the special Materials in Society session " Materials for Infrastructure: Building Bridges in the Global ...

383

Infrastructure Failure - Types and Frequency  

U.S. Energy Information Administration (EIA)

Infrastructure Failure - Types and Frequency. Small events that have no impact on supplies Events that require supply/demand responses Events that result in a ...

384

Data Infrastructure - Programmaster.org  

Science Conference Proceedings (OSTI)

Software Infrastructure for First-Principles Electronic Structure Computations: Francois Gygi1; 1University of California Davis First-Principles simulations play an ...

385

ADVANCE TECHNOLOGIES FOR THE INFRASTRUCTURE ...  

Science Conference Proceedings (OSTI)

... relationship to a public utility operation is ... place an added stress on this aging infrastructure. ... management approaches by utilities, and is supporting ...

2011-08-02T23:59:59.000Z

386

Second Cybersecurity Infrastructure Framework Workshop ...  

Science Conference Proceedings (OSTI)

... framework to reduce cybersecurity risks for critical infrastructure from May 29 ... industry experts in all sectors—such as energy, finance, transportation ...

2013-05-01T23:59:59.000Z

387

Michigan E85 Infrastructure  

Science Conference Proceedings (OSTI)

This is the final report for a grant-funded project to financially assist and otherwise provide support to projects that increase E85 infrastructure in Michigan at retail fueling locations. Over the two-year project timeframe, nine E85 and/or flex-fuel pumps were installed around the State of Michigan at locations currently lacking E85 infrastructure. A total of five stations installed the nine pumps, all providing cost share toward the project. By using cost sharing by station partners, the $200,000 provided by the Department of Energy facilitated a total project worth $746,332.85. This project was completed over a two-year timetable (eight quarters). The first quarter of the project focused on project outreach to station owners about the incentive on the installation and/or conversion of E85 compatible fueling equipment including fueling pumps, tanks, and all necessary electrical and plumbing connections. Utilizing Clean Energy Coalition (CEC) extensive knowledge of gasoline/ethanol infrastructure throughout Michigan, CEC strategically placed these pumps in locations to strengthen the broad availability of E85 in Michigan. During the first and second quarters, CEC staff approved projects for funding and secured contracts with station owners; the second through eighth quarters were spent working with fueling station owners to complete projects; the third through eighth quarters included time spent promoting projects; and beginning in the second quarter and running for the duration of the project was spent performing project reporting and evaluation to the US DOE. A total of 9 pumps were installed (four in Elkton, two in Sebewaing, one in East Lansing, one in Howell, and one in Whitmore Lake). At these combined station locations, a total of 192,445 gallons of E85, 10,786 gallons of E50, and 19,159 gallons of E30 were sold in all reporting quarters for 2011. Overall, the project has successfully displaced 162,611 gallons (2,663 barrels) of petroleum, and reduced regional GHG emissions by 375 tons in the first year of station deployment.

Sandstrom, Matthew M.

2012-03-30T23:59:59.000Z

388

Cyber Security and Information Intelligence Research Workshop (CSIIRW'11) Proceedings  

SciTech Connect

The energy industry is embarking upon an infrastructure transformation that will result in a national power grid that is more intelligent, robust, resilient, and secure. While the final form will not be known for quite some time, clearly a smarter grid will make better use of information. Whether an electric utility is making real-time adjustments in response to changing load conditions, or commercial and private consumers are making better choices, the timely availability of this information will become increasingly critical. Ultimately, the overall efficiency, reliability, and resilience of the grid is inextricably linked to information. Unfortunately, "the electric power sector is second from the bottom of all major U.S. industries in terms of R&D spending as a percentage of revenue, exceeding only pulp and paper [Amin2011]." Moreover, U.S. officials worry that cyber-spies could use their [demonstrated] access to shut down the grid or take control of power plants during a time of crisis or war [CIO09, WSJ09]. Moreover, Massachusetts Institute of Technology (MIT) released the results of a two-year study, The Future of the Electric Grid.

Sheldon, Frederick T [ORNL; Abercrombie, Robert K [ORNL; Krings, Axel [ORNL

2011-01-01T23:59:59.000Z

389

Energy Transmission and Infrastructure  

SciTech Connect

The objective of Energy Transmission and Infrastructure Northern Ohio (OH) was to lay the conceptual and analytical foundation for an energy economy in northern Ohio that will: • improve the efficiency with which energy is used in the residential, commercial, industrial, agricultural, and transportation sectors for Oberlin, Ohio as a district-wide model for Congressional District OH-09; • identify the potential to deploy wind and solar technologies and the most effective configuration for the regional energy system (i.e., the ratio of distributed or centralized power generation); • analyze the potential within the district to utilize farm wastes to produce biofuels; • enhance long-term energy security by identifying ways to deploy local resources and building Ohio-based enterprises; • identify the policy, regulatory, and financial barriers impeding development of a new energy system; and • improve energy infrastructure within Congressional District OH-09. This objective of laying the foundation for a renewable energy system in Ohio was achieved through four primary areas of activity: 1. district-wide energy infrastructure assessments and alternative-energy transmission studies; 2. energy infrastructure improvement projects undertaken by American Municipal Power (AMP) affiliates in the northern Ohio communities of Elmore, Oak Harbor, and Wellington; 3. Oberlin, OH-area energy assessment initiatives; and 4. a district-wide conference held in September 2011 to disseminate year-one findings. The grant supported 17 research studies by leading energy, policy, and financial specialists, including studies on: current energy use in the district and the Oberlin area; regional potential for energy generation from renewable sources such as solar power, wind, and farm-waste; energy and transportation strategies for transitioning the City of Oberlin entirely to renewable resources and considering pedestrians, bicyclists, and public transportation as well as drivers in developing transportation policies; energy audits and efficiency studies for Oberlin-area businesses and Oberlin College; identification of barriers to residential energy efficiency and development of programming to remove these barriers; mapping of the solar-photovoltaic and wind-energy supply chains in northwest Ohio; and opportunities for vehicle sharing and collaboration among the ten organizations in Lorain County from the private, government, non-profit, and educational sectors. With non-grant funds, organizations have begun or completed projects that drew on the findings of the studies, including: creation of a residential energy-efficiency program for the Oberlin community; installation of energy-efficient lighting in Oberlin College facilities; and development by the City of Oberlin and Oberlin College of a 2.27 megawatt solar photovoltaic facility that is expected to produce 3,000 megawatt-hours of renewable energy annually, 12% of the College’s yearly power needs. Implementation of these and other projects is evidence of the economic feasibility and technical effectiveness of grant-supported studies, and additional projects are expected to advance to implementation in the coming years. The public has benefited through improved energydelivery systems and reduced energy use for street lighting in Elmore, Oak Harbor, and Wellington; new opportunities for assistance and incentives for residential energy efficiency in the Oberlin community; new opportunities for financial and energy savings through vehicle collaboration within Lorain County; and decreased reliance on fossil fuels and expanded production of renewable energy in the region. The dissemination conference and the summary report developed for the conference also benefited the public, but making the findings and recommendations of the regional studies broadly available to elected officials, city managers, educators, representatives of the private sector, and the general public.

Mathison, Jane

2012-12-31T23:59:59.000Z

390

Cyber Security Procurement - Application of the Methodology, First Example: Single Loop  

Science Conference Proceedings (OSTI)

Determining how to apply cyber security requirements for new instrumentation and control (I&C) systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly backfits to meet the requirements.The ...

2013-07-29T23:59:59.000Z

391

Technical Guideline for Cyber Security Requirements and Life Cycle Implementation Guidelines for Nuclear Plant Digital Systems  

Science Conference Proceedings (OSTI)

Nuclear power plants face increasing regulatory requirements from the U.S. Nuclear Regulatory Commission (NRC) and the Federal Energy Regulatory Commission (FERC) for cyber security of digital devices, components, and systems. The focus of these cyber security requirements is to protect plant digital computer systems, communications systems, and networks from cyber attacks that would affect reactor safety or generation reliability. This EPRI guideline document provides technical guidance for addressing c...

2010-10-29T23:59:59.000Z

392

Cyber-Enabled Ab Initio Simulations in Nanohub.org: Simulation ...  

Science Conference Proceedings (OSTI)

This presentation describes recent progress in cyber-enabling ab initio codes and in the development and deployment of supporting material and learning ...

393

Agenda for the Designed-in Cybersecurity for Cyber-Physical ...  

Science Conference Proceedings (OSTI)

Page 1. Designed-in Cybersecurity for Cyber-Physical Systems Workshop Thursday, April 4, 2013 8:00 Breakfast 9:00 Plenary ...

2013-04-03T23:59:59.000Z

394

DOE O 205.1B Chg 2, Department of Energy Cyber Security Program  

Directives, Delegations, and Requirements

The order sets forth requirements and responsibilities for a Departmental Cyber Security Program that protects information and information systems for DOE. ...

2011-05-16T23:59:59.000Z

395

Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation.  

E-Print Network (OSTI)

??While smart grid technologies are deployed to help achieve improved grid resiliency and efficiency, they also present an increased dependency on cyber resources which may… (more)

Hahn, Adam

2013-01-01T23:59:59.000Z

396

GAO Information Security Update  

Science Conference Proceedings (OSTI)

... infrastructures • Detecting, responding to, and mitigating cyber incidents ... Supporting cyber research and development ...

2013-06-04T23:59:59.000Z

397

Critical infrastructure security curriculum modules  

Science Conference Proceedings (OSTI)

Critical infrastructures have succumbed to the demands of greater connectivity. Although the scheme of connecting these critical equipment and devices to cyberspace has brought us tremendous convenience, it also enabled certain unimaginable risks and ... Keywords: SCADA, control systems, course modules, critical infrastructures, cybersecurity, programmable logic controllers, security, vulnerability

Guillermo A. Francia, III

2011-09-01T23:59:59.000Z

398

Wireless Policy, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Brookhaven Wireless Access Policy Brookhaven Wireless Access Policy Title: Deployment and Management of 802.11 and Related Wireless Standards Applicability: All Employees, Guests, System Administrators, and Management General Approved Technology Authentication Setting the Service Set Identifier (SSID) Exceptions Responsibilities of Requestor Responsibilities of the ITD WAP System Administrator Responsibility of Chief of Cyber Security Wireless Policy Definitions Standards-Based Management System (SBMS) Subject Area: Cyber Security, Unclassified Using Computing Resources (Steps 7-11 apply to BNL's wireless networks) General The purpose of the wireless policy and related standards and guidelines is to assure that Brookhaven National Laboratory's (BNL's) employees, guests, and contractors have access to a reliable, robust, and integrated wireless network, and to increase the security of the campus wireless network to the extent possible.

399

Department of Energy's July 2013 Cyber Security Breach  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Department of Energy's July The Department of Energy's July 2013 Cyber Security Breach DOE/IG-0900 December 2013 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 December 6, 2013 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Special Review of the "Department of Energy's July 2013 Cyber Security Breach" BACKGROUND To facilitate its administrative and operational needs, the Department of Energy maintains a substantial amount of personally identifiable information (PII). The Department's Management Information System (MIS) provides a gateway for users to access a system known as the DOE Employee Data Repository (DOEInfo) database. That system was implemented in 1994, and

400

Clean Cities: Electric Vehicle Infrastructure Training Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Electric Vehicle Infrastructure Electric Vehicle Infrastructure Training Program to someone by E-mail Share Clean Cities: Electric Vehicle Infrastructure Training Program on Facebook Tweet about Clean Cities: Electric Vehicle Infrastructure Training Program on Twitter Bookmark Clean Cities: Electric Vehicle Infrastructure Training Program on Google Bookmark Clean Cities: Electric Vehicle Infrastructure Training Program on Delicious Rank Clean Cities: Electric Vehicle Infrastructure Training Program on Digg Find More places to share Clean Cities: Electric Vehicle Infrastructure Training Program on AddThis.com... Goals & Accomplishments Partnerships National Clean Fleets Partnership National Parks Initiative Electric Vehicle Infrastructure Training Program Advanced Vehicle Technology Competitions

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Cyber Security and Privacy Industry Tracking Newsletter, April 2012  

Science Conference Proceedings (OSTI)

EPRI’s tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-04-11T23:59:59.000Z

402

Cyber Security and Privacy Industry Tracking Newsletter, April, 2013  

Science Conference Proceedings (OSTI)

EPRI’s tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-03-26T23:59:59.000Z

403

Cyber Security and Privacy Industry Tracking Newsletter, July 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-06-25T23:59:59.000Z

404

Cyber Security and Privacy Industry Tracking Newsletter: December 2012  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute (EPRI) remains committed to supporting the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts, EPRI works diligently to stay abreast of the present state of standards and guideline developments, as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups and insights into future activities.This ...

2012-12-28T23:59:59.000Z

405

A Comparison of Cross-Sector Cyber Security Standards  

Science Conference Proceedings (OSTI)

This report presents a review and comparison (commonality and differences) of three cross-sector cyber security standards and an internationally recognized information technology standard. The comparison identifies the security areas covered by each standard and reveals where the standards differ in emphasis. By identifying differences in the standards, the user can evaluate which standard best meets their needs. For this report, only cross-sector standards were reviewed.

Robert P. Evans

2005-09-01T23:59:59.000Z

406

Cyber Security and Privacy Industry Tracking Newsletter, October 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-10-11T23:59:59.000Z

407

Framework for Evaluating Cyber Security Posture for Power Delivery Systems  

Science Conference Proceedings (OSTI)

While many asset owners and operators are performing self-assessments of their control systems, the methods used vary widely across the electric sector. This lack of consistent criteria and metrics makes it difficult to benchmark and compare the cyber security posture of power delivery systems.The objective of this technical update is to develop an evaluation framework that uses both the Department of Energy (DOE) Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) ...

2013-11-28T23:59:59.000Z

408

Cyber Security and Privacy Industry Tracking Newsletter, October 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-09-26T23:59:59.000Z

409

Cyber Security and Privacy Industry Tracking Newsletter, July 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-07-02T23:59:59.000Z

410

Distributed Data Integration Infrastructure  

SciTech Connect

The Internet is becoming the preferred method for disseminating scientific data from a variety of disciplines. This can result in information overload on the part of the scientists, who are unable to query all of the relevant sources, even if they knew where to find them, what they contained, how to interact with them, and how to interpret the results. A related issue is keeping up with current trends in information technology often taxes the end-user's expertise and time. Thus instead of benefiting from this information rich environment, scientists become experts on a small number of sources and technologies, use them almost exclusively, and develop a resistance to innovations that can enhance their productivity. Enabling information based scientific advances, in domains such as functional genomics, requires fully utilizing all available information and the latest technologies. In order to address this problem we are developing a end-user centric, domain-sensitive workflow-based infrastructure, shown in Figure 1, that will allow scientists to design complex scientific workflows that reflect the data manipulation required to perform their research without an undue burden. We are taking a three-tiered approach to designing this infrastructure utilizing (1) abstract workflow definition, construction, and automatic deployment, (2) complex agent-based workflow execution and (3) automatic wrapper generation. In order to construct a workflow, the scientist defines an abstract workflow (AWF) in terminology (semantics and context) that is familiar to him/her. This AWF includes all of the data transformations, selections, and analyses required by the scientist, but does not necessarily specify particular data sources. This abstract workflow is then compiled into an executable workflow (EWF, in our case XPDL) that is then evaluated and executed by the workflow engine. This EWF contains references to specific data source and interfaces capable of performing the desired actions. In order to provide access to the largest number of resources possible, our lowest level utilizes automatic wrapper generation techniques to create information and data wrappers capable of interacting with the complex interfaces typical in scientific analysis. The remainder of this document outlines our work in these three areas, the impact our work has made, and our plans for the future.

Critchlow, T; Ludaescher, B; Vouk, M; Pu, C

2003-02-24T23:59:59.000Z

411

GridStat – Cyber Security and Regional Deployment Project Report  

Science Conference Proceedings (OSTI)

GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStat’s cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

Clements, Samuel L.

2009-02-18T23:59:59.000Z

412

A Novel Cyber-Insurance for Internet Security  

E-Print Network (OSTI)

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In reality, an Internet user faces risks due to security attacks as well as risks due to non-security related failures (e.g., reliability faults in the form of hardware crash, buffer overflow, etc.) . These risk types are often indistinguishable by a naive user. However, a cyber-insurance agency would most likely insure risks only due to security attacks. In this case, it becomes a challenge for an Internet user to choose the right type of cyber-insurance contract as standard optimal contracts, i.e., contracts under security attacks only, might prove to be sub-optimal for ...

Pal, Ranjan; Psounis, Konstantinos

2011-01-01T23:59:59.000Z

413

Smart Grid Cyber Security Strategy and Requirements  

E-Print Network (OSTI)

(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Interagency Report discusses ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Interagency Report 7628 (draft) 305 pages (February 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. Acknowledgments

The Smart; Grid Interoperability

2010-01-01T23:59:59.000Z

414

Advanced Metering Infrastructure  

SciTech Connect

The report provides an overview of the development of Advanced Metering Infrastructure (AMI). Metering has historically served as the cash register for the utility industry. It measured the amount of energy used and supported the billing of customers for that usage. However, utilities are starting to look at meters in a whole different way, viewing them as the point of contact with customers in supporting a number of operational imperatives. The combination of smart meters and advanced communications has opened up a variety of methods for utilities to reduce operating costs while offering new services to customers. A concise look is given at what's driving interest in AMI, the components of AMI, and the creation of a business case for AMI. Topics covered include: an overview of AMI including the history of metering and development of smart meters; a description of the key technologies involved in AMI; a description of key government initiatives to support AMI; an evaluation of the current market position of AMI; an analysis of business case development for AMI; and, profiles of 21 key AMI vendors.

NONE

2007-10-15T23:59:59.000Z

415

Infrastructure Time: Long-term Matters in Collaborative Development  

E-Print Network (OSTI)

Creating information infrastructure through communitymythology and infrastructure. In L. Bud-Frierman (Ed. ),Towards information infrastructure studies: Ways of knowing

Karasti, Helena; Baker, Karen S.; Millerand, Florence

2010-01-01T23:59:59.000Z

416

Planning a sustainable community: infrastructure development and natural areas management  

E-Print Network (OSTI)

associated with county infrastructure projects. Despiteby transportation infrastructure. Field-investigationfor innovative design of infrastructure, land-acquisition

Swanson, Sherri R.; Kurz, Raymond C.

2005-01-01T23:59:59.000Z

417

Networks, deregulation, and risk : the politics of critical infrastructure protection  

E-Print Network (OSTI)

Standards for Critical Infrastructure Protection. Docket RMStandards for Critical Infrastructure Protection. Docket RM2- 13; GAO. ?Critical Infrastructure Protection: Multiple

Ellis, Ryan Nelson

2011-01-01T23:59:59.000Z

418

Designing and embedding reliable virtual infrastructures  

Science Conference Proceedings (OSTI)

In a virtualized infrastructure where physical resources are shared, a single physical server failure will terminate several virtual servers and crippling the virtual infrastructures which contained those virtual servers. In the worst case, more failures ... Keywords: infrastructure virtualization

Wai-Leong Yeow; Cédric Westphal; Ula? Kozat

2010-09-01T23:59:59.000Z

419

The Fermilab data storage infrastructure  

SciTech Connect

Fermilab, in collaboration with the DESY laboratory in Hamburg, Germany, has created a petabyte scale data storage infrastructure to meet the requirements of experiments to store and access large data sets. The Fermilab data storage infrastructure consists of the following major storage and data transfer components: Enstore mass storage system, DCache distributed data cache, ftp and Grid ftp for primarily external data transfers. This infrastructure provides a data throughput sufficient for transferring data from experiments' data acquisition systems. It also allows access to data in the Grid framework.

Jon A Bakken et al.

2003-02-06T23:59:59.000Z

420

Chinese Attack Tools: Chinese cyber-attack tools continue to evolve  

Science Conference Proceedings (OSTI)

Cyber-attacks from China are on the rise. In September 2008, SecureWorks, a leading security services provider, published a report citing the locations of the computers from which the greatest number of cyber attacks were attempted against its clients. ...

Dennis Dwyer

2009-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Toward a cyber-physical topology language: applications to NERC CIP audit  

Science Conference Proceedings (OSTI)

Our Cyber-Physical Topology Language (CPTL) provides a language that utilities can use to programmatically analyze current and future cyber-physical architectures. The motivation for our research emerged from the importance and limitations of several ... Keywords: NERC CIP, audit, graph theory

Gabriel A. Weaver, Carmen Cheh, Edmond J. Rogers, William H. Sanders, Dennis Gammel

2013-11-01T23:59:59.000Z

422

Modeling Effects of Physical Factors on Controller Area Network in Cyber-physical Systems  

Science Conference Proceedings (OSTI)

Cyber-physical systems (CPS) are becoming a promising research field to integrate the computing components, the physical processes, and the communication networks. A primary challenge in designing CPS is to understand the effect of physical factors on ... Keywords: Cyber-physical systems (CPS), Controller Area Network (CAN), performance analysis, temperature, electromagnetic interference

Bo Shen, Xingshe Zhou, Ru Wang

2013-08-01T23:59:59.000Z

423

Routing in Cyber Physical Systems with Application for Voltage Control in Microgrids: A Hybrid System Approach  

Science Conference Proceedings (OSTI)

A key challenge of cyber physical system is how to design the communication system. In this paper, the framework of hybrid system which consists of both continuous and discrete system states is adopted for the communication system design, particularly ... Keywords: cyber physical system, hybrid systems, routing

Husheng Li; Robert C. Qiu; Zhiqiang Wu

2012-06-01T23:59:59.000Z

424

Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems  

Science Conference Proceedings (OSTI)

This volume contains the papers presented at the Fourth IEEE/ACM International Conference on Cyber-Physical Systems (ICCPS 2013), which was held with the Cyber- Physical Systems Week in Philadelphia, USA, on 8-11 April 2013. ICCPS has been the flagship ...

Chenyang Lu, P. R. Kumar, R. Stoleru

2013-04-01T23:59:59.000Z

425

Cybercrime and cyber-security issues associated with China: some economic and institutional considerations  

Science Conference Proceedings (OSTI)

China is linked to cybercrimes of diverse types, scales, motivations and objectives. The Chinese cyberspace thus provides an interesting setting for the study of cybercrimes. In this paper, we first develop typology, classification and characterization ... Keywords: China, Cyber-security, Cyber-security related alliances, Cybercrime, International relations, International trade, Intrinsic and extrinsic motivations

Nir Kshetri

2013-03-01T23:59:59.000Z

426

Integrating CyberGIS gateway with Windows Azure: a case study on MODFLOW groundwater simulation  

Science Conference Proceedings (OSTI)

The CyberGIS Gateway represents a cutting-edge cyberin-frastructure-based geographic information system that facilitates computationally intensive and collaborative spatial analysis and modeling. As more and more geospatial problems are becoming increasingly ... Keywords: CyberGIS, MODFLOW, Windows Azure, cloud computing, science gateway

Babak Behzad; Anand Padmanabhan; Yong Liu; Yan Liu; Shaowen Wang

2011-11-01T23:59:59.000Z

427

Survey Paper Cyber security in the Smart Grid: Survey and challenges q  

E-Print Network (OSTI)

Survey Paper Cyber security in the Smart Grid: Survey and challenges q Wenye Wang , Zhuo Lu Accepted 29 December 2012 Available online 17 January 2013 Keywords: Smart Grid Cyber security Attacks and countermeasures Cryptography Security protocols a b s t r a c t The Smart Grid, generally referred to as the next

Wang, Wenye

428

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network (OSTI)

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

Krings, Axel W.

429

Federal Energy Management Program: Infrastructure Institutional Change  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Infrastructure Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Infrastructure Institutional Change Principle on Facebook Tweet about Federal Energy Management Program: Infrastructure Institutional Change Principle on Twitter Bookmark Federal Energy Management Program: Infrastructure Institutional Change Principle on Google Bookmark Federal Energy Management Program: Infrastructure Institutional Change Principle on Delicious Rank Federal Energy Management Program: Infrastructure Institutional Change Principle on Digg Find More places to share Federal Energy Management Program: Infrastructure Institutional Change Principle on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Greenhouse Gases

430

Offshore Infrastructure Associates Inc | Open Energy Information  

Open Energy Info (EERE)

Infrastructure Associates Inc Jump to: navigation, search Name Offshore Infrastructure Associates Inc Sector Marine and Hydrokinetic Website http:http:www.offinf.com Region...

431

State Experience in Hydrogen Infrastructure in California  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Infrastructure in California Gerhard H Achtelik Jr. February 17, 2011 Hydrogen Infrastructure Market Readiness Workshop California Environmental Protection Agency Air...

432

DOE Hydrogen Analysis Repository: Infrastructure Costs Associated...  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Costs Associated with Central Hydrogen Production from Biomass and Coal Project Summary Full Title: Infrastructure Costs Associated with Central Hydrogen Production...

433

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

434

Facilities and Infrastructure | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Facilities and Infrastructure Facilities and Infrastructure Aviation Management Green Leases Executive Secretariat Energy Reduction at HQ Real Estate Approvals Documents and...

435

Fuel Cell Technologies Office: IPHE Infrastructure Workshop  

NLE Websites -- All DOE Office Websites (Extended Search)

IPHE Infrastructure Workshop to someone by E-mail Share Fuel Cell Technologies Office: IPHE Infrastructure Workshop on Facebook Tweet about Fuel Cell Technologies Office: IPHE...

436

DOE Hydrogen Analysis Repository: Hydrogen Infrastructure Costs  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Costs Project Summary Full Title: Fuel Choice for Fuel Cell Vehicles: Hydrogen Infrastructure Costs Previous Title(s): Guidance for Transportation Technologies: Fuel...

437

SLAC National Accelerator Laboratory - Infrastructure and Safety  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure and Safety Photo - Aerial view of the klystron gallery. The Infrastructure and Safety directorate is committed to creating, operating and sustaining world-class,...

438

Department of Energy Cites Parsons Infrastructure & Technology...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Parsons Infrastructure & Technology Group, Inc. for Worker Safety and Health Violations Department of Energy Cites Parsons Infrastructure & Technology Group, Inc. for Worker Safety...

439

Fuel Cell Technologies Office: Hydrogen Infrastructure Market...  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Market Readiness Workshop The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL) hosted the Hydrogen Infrastructure Market Readiness...

440

DOE Hydrogen Analysis Repository: Hydrogen Refueling Infrastructure...  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Refueling Infrastructure Cost Analysis Project Summary Full Title: Hydrogen Refueling Infrastructure Cost Analysis Project ID: 273 Principal Investigator: Marc Melaina...

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

DOE Hydrogen Analysis Repository: Hydrogen Infrastructure Market...  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Infrastructure Market Readiness Analysis Project Summary Full Title: Hydrogen Infrastructure Market Readiness Analysis Project ID: 268 Principal Investigator: Marc Melaina...

442

Microsoft Word - Infrastructure_Introduction_2011.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

Carbon Sequestration Program - Infrastructure Element U.S. Department of Energy - National Energy Technology Laboratory The Infrastructure Element of DOE's Carbon Sequestration...

443

Hydrogen Infrastructure Transition Analysis: Milestone Report  

DOE Green Energy (OSTI)

This milestone report identifies a minimum infrastructure that could support the introduction of hydrogen vehicles and develops and evaluates transition scenarios supported by this infrastructure.

Melendez, M.; Milbrandt, A.

2006-01-01T23:59:59.000Z

444

IPHE Infrastructure Workshop - Workshop Proceedings, February...  

NLE Websites -- All DOE Office Websites (Extended Search)

plan *Identify risks and benefits *Allocate equity Responsible Parties *Program management office *All stakeholders E-16 IPHE INFRASTRUCTURE WORKSHOP E-17 IPHE INFRASTRUCTURE...

445

Geographically Based Infrastructure Margo Melendez & Keith Parks  

E-Print Network (OSTI)

Diagram Geographically-based Infrastructure Analysis GIS Transportation Technologies & Systems Electric resulting H2 demand and changing demand ­ Estimate infrastructure needs and usage ­ Predict transition

446

Webinar: International Hydrogen Infrastructure Challenges-NOW...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Webinar: International Hydrogen Infrastructure Challenges-NOW, DOE, and NEDO Webinar: International Hydrogen Infrastructure Challenges-NOW, DOE, and NEDO December 16, 2013 8:00AM...

447

DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Issues Energy Sector Cyber Organization NOI, Feb 2010 Issues Energy Sector Cyber Organization NOI, Feb 2010 DOE Issues Energy Sector Cyber Organization NOI, Feb 2010 The Department of Energy's (DOE) National Energy Technology Laboratory (NETL) announced on Jan. 7 that it intends to issue a Funding Opportunity Announcement (FOA) for a National Energy Sector Cyber Organization, envisioned as a partnership between the federal government and energy sector stakeholders to protect the bulk power electric grid and aid the integration of smart grid technology to enhance the security of the grid. DOE Issues Energy Sector Cyber Organization NOI More Documents & Publications FAQ: Funding Opportunity Announcement-Smart Grid Investment Grants Grantsdown.xls Before the House Science and Technology Subcommittee on Energy and

448

Cyber Science and Security - An R&D Partnership at LLNL  

Science Conference Proceedings (OSTI)

Lawrence Livermore National Laboratory has established a mechanism for partnership that integrates the high-performance computing capabilities of the National Labs, the network and cyber technology expertise of leading information technology companies, and the long-term research vision of leading academic cyber programs. The Cyber Science and Security Center is designed to be a working partnership among Laboratory, Industrial, and Academic institutions, and provides all three with a shared R&D environment, technical information sharing, sophisticated high-performance computing facilities, and data resources for the partner institutions and sponsors. The CSSC model is an institution where partner organizations can work singly or in groups on the most pressing problems of cyber security, where shared vision and mutual leveraging of expertise and facilities can produce results and tools at the cutting edge of cyber science.

Brase, J; Henson, V

2011-03-11T23:59:59.000Z

449

Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse  

SciTech Connect

The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

Czejdo, Bogdan [ORNL; Ferragut, Erik M [ORNL; Goodall, John R [ORNL; Laska, Jason A [ORNL

2012-01-01T23:59:59.000Z

450

Hydrogen Delivery Infrastructure Options Analysis  

Fuel Cell Technologies Publication and Product Library (EERE)

This report, by the Nexant team, documents an in-depth analysis of seven hydrogen delivery options to identify the most cost-effective hydrogen infrastructure for the transition and long term. The pro

451

Towards Manageable Mobile Agent Infrastructures  

Science Conference Proceedings (OSTI)

This paper addresses the problem of managing distributed mobile agent infrastructures. First, the weaknesses of current mobile agent implementations will be discussed and identified from the manageability viewpoint. The solutions devised and experimented ...

Paulo Simőes; Paulo Marques; Luís Moura Silva; Joăo Gabriel Silva; Fernando Boavida

2001-07-01T23:59:59.000Z

452

Towards an Infrastructure for Authorization  

E-Print Network (OSTI)

In recent years, there has been a great deal of debate about whether a large-scale "publickey infrastructure" is needed for electronic commerce and, if so, whether the technical difficulty of building and deploying such an infrastructure will impede the growth of electronic commerce. We argue here that much of the controversy is attributable to the fact that the term "public-key infrastructure" has not been clearly and correctly defined. We explain why the informal definition most often associated with the term, i.e., that of a global mapping between users' identities and public keys, is not the right definition for electronic commerce and hence that whether such a mapping can and will be built and deployed with available resources is not an especially pressing question. Finally, we describe an alternative type of infrastructural development that we believe really would enable electronic commerce. 1

Position Paper Joan; Joan Feigenbaum

1998-01-01T23:59:59.000Z

453

Modeling hydrogen fuel distribution infrastructure  

E-Print Network (OSTI)

This thesis' fundamental research question is to evaluate the structure of the hydrogen production, distribution, and dispensing infrastructure under various scenarios and to discover if any trends become apparent after ...

Pulido, Jon R. (Jon Ramon), 1974-

2004-01-01T23:59:59.000Z

454

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

monitor and control critical infrastructure equipment, ranging from valves in oil and gas pipelines to switches and breakers in the national electric grid. If compromised, these...

455

Strategic plan for infrastructure optimization  

SciTech Connect

This document represents Fluor Daniel Hanford`s and DynCorp`s Tri-Cities Strategic Plan for Fiscal Years 1998--2002, the road map that will guide them into the next century and their sixth year of providing safe and cost effective infrastructure services and support to the Department of Energy (DOE) and the Hanford Site. The Plan responds directly to the issues raised in the FDH/DOE Critical Self Assessment specifically: (1) a strategy in place to give DOE the management (systems) and physical infrastructure for the future; (2) dealing with the barriers that exist to making change; and (3) a plan to right-size the infrastructure and services, and reduce the cost of providing services. The Plan incorporates initiatives from several studies conducted in Fiscal Year 1997 to include: the Systems Functional Analysis, 200 Area Water Commercial Practices Plan, $ million Originated Cost Budget Achievement Plan, the 1OO Area Vacate Plan, the Railroad Shutdown Plan, as well as recommendations from the recently completed Review of Hanford Electrical Utility. These and other initiatives identified over the next five years will result in significant improvements in efficiency, allowing a greater portion of the infrastructure budget to be applied to Site cleanup. The Plan outlines a planning and management process that defines infrastructure services and structure by linking site technical base line data and customer requirements to work scope and resources. The Plan also provides a vision of where Site infrastructure is going and specific initiatives to get there.

Donley, C.D.

1998-05-27T23:59:59.000Z

456

Probabilistic Characterization of Adversary Behavior in Cyber Security  

SciTech Connect

The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

Meyers, C A; Powers, S S; Faissol, D M

2009-10-08T23:59:59.000Z

457

2012 Annual Report Research Reactor Infrastructure Program  

SciTech Connect

The content of this report is the 2012 Annual Report for the Research Reactor Infrastructure Program.

Douglas Morrell

2012-11-01T23:59:59.000Z

458

Controlled Hydrogen Fleet and Infrastructure Analysis (Presentation)  

SciTech Connect

This presentation summarizes controlled hydrogen fleet & infrastructure analysis undertaken for the DOE Fuel Cell Technologies Program.

Wipke, K.; Sprik, S.; Kurtz, J.; Ramsden, T.

2010-06-10T23:59:59.000Z

459

Alternative Fuels Data Center: Alternative Fueling Infrastructure  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Alternative Fueling Alternative Fueling Infrastructure Development to someone by E-mail Share Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Facebook Tweet about Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Twitter Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Google Bookmark Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Delicious Rank Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on Digg Find More places to share Alternative Fuels Data Center: Alternative Fueling Infrastructure Development on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

460

Infrastructure and Facilities Management | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Infrastructure and Facilities Management | National Nuclear Security Infrastructure and Facilities Management | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Infrastructure and Facilities Management Home > content > Infrastructure and Facilities Management Infrastructure and Facilities Management NNSA restores, rebuilds, and revitalizes the physical infrastructure of the

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Alternative Fuels Data Center: Ethanol Infrastructure Funding  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Ethanol Infrastructure Ethanol Infrastructure Funding to someone by E-mail Share Alternative Fuels Data Center: Ethanol Infrastructure Funding on Facebook Tweet about Alternative Fuels Data Center: Ethanol Infrastructure Funding on Twitter Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Funding on Google Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Funding on Delicious Rank Alternative Fuels Data Center: Ethanol Infrastructure Funding on Digg Find More places to share Alternative Fuels Data Center: Ethanol Infrastructure Funding on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol Infrastructure Funding The Ethanol Infrastructure Incentive Program provides funding to offset the cost of installing ethanol blender pumps at retail fueling stations

462

Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Year-in-Review: 2010 Year-in-Review: 2010 Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability U.S. Department of Energy August 2011 OE/ISER Report 8/31/11 i For Further Information This report was prepared by the Office of Electricity Delivery and Energy Reliability under the direction of Patricia Hoffman, Assistant Secretary, and William Bryan, Deputy Assistant Secretary. Specific questions about information in this report may be directed to Alice Lippert, Senior Technical Advisor (alice.lippert@hq.doe.gov). Contributors include Mindi Farber-DeAnda, Robert Laramey, Carleen Lewandowski, Max

463

Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department's Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates numerous networks and systems to help accomplish its strategic missions in the areas of energy, defense, science and the environment. The systems are frequently subjected to sophisticated cyber attacks that could impact the Department's

464

Alternative Fuels Data Center: Ethanol Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Ethanol Infrastructure Ethanol Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Ethanol Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Ethanol Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Ethanol Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Ethanol Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol Infrastructure Grants The Kentucky Corn Growers' Association (KyCGA) offers grants of $5,000 per pump to retailers installing new E85 dispensers in Kentucky. For more

465

Alternative Fuels Data Center: Biofuels Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Biofuels Biofuels Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Biofuels Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Biofuels Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Biofuels Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Biofuels Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Biofuels Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Biofuels Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Biofuels Infrastructure Grants The Renewable Fuel Infrastructure Program provides financial assistance to qualified E85 and biodiesel retailers. Cost-share grants are available for

466

Alternative Fuels Data Center: Ethanol Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Ethanol Infrastructure Ethanol Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Ethanol Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Ethanol Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Ethanol Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Ethanol Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Ethanol Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol Infrastructure Grants The Colorado Corn Blender Pump Pilot Program provides funding assistance for each qualified station dispensing mid-level ethanol blends. Projects

467

Alternative Fuels Data Center: Biofuel Infrastructure Grants  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Biofuel Infrastructure Biofuel Infrastructure Grants to someone by E-mail Share Alternative Fuels Data Center: Biofuel Infrastructure Grants on Facebook Tweet about Alternative Fuels Data Center: Biofuel Infrastructure Grants on Twitter Bookmark Alternative Fuels Data Center: Biofuel Infrastructure Grants on Google Bookmark Alternative Fuels Data Center: Biofuel Infrastructure Grants on Delicious Rank Alternative Fuels Data Center: Biofuel Infrastructure Grants on Digg Find More places to share Alternative Fuels Data Center: Biofuel Infrastructure Grants on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Biofuel Infrastructure Grants The Arizona Biofuel Conversion Program distributes grants to encourage the use of biofuels in the state and to promote the development of fueling

468

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure, 1st edition  

Science Conference Proceedings (OSTI)

Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission ...

Eric D. Knapp, Raj Samani

2013-04-01T23:59:59.000Z

469

BUILDING INSPECTION Building, Infrastructure, Transportation  

E-Print Network (OSTI)

BUILDING INSPECTION Building, Infrastructure, Transportation City of Redwood City 1017 Middlefield Sacramento, Ca 95814-5514 Re: Green Building Ordinance and the Building Energy Efficiency Standards Per of Redwood City enforce the current Title 24 Building Energy Efficiency Standards as part

470

Hydrogen Fueling Systems and Infrastructure  

E-Print Network (OSTI)

Hydrogen Fueling Systems and Infrastructure Storage & Delivery Production Conversion & Application emissions: renewable based feedstock · Flexibility #12;Targets and Status Hydrogen Delivery 858280%Energyk1.2M1.4M$/mileTrunk lines Hydrogen Gas Pipelines 877065%Energy efficiency 0.531.011.11$/kg H2Cost

471

Smart Grid Cyber Security Strategy and Requirements The Cyber Security Coordination Task Group  

E-Print Network (OSTI)

(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Interagency Report discusses ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Interagency Report 7628 (draft) 236 pages (September 2009) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. Acknowledgments

Annabelle Lee Lead; Tanya Brewer; Annabelle Lee Lead; Tanya Brewer

2009-01-01T23:59:59.000Z

472

Network and System Management for Reliability and Cyber Security  

Science Conference Proceedings (OSTI)

The evolving control of the electric power grid is increasingly dependent on information technology and telecommunication infrastructures, which, like the grid itself, must be managed in a holistic way to ensure reliability and security. The management of this information infrastructure requires connectivity and analytics to support both information technology (IT) and operational technology (OT) assets in a unified manner.This project utilized a telecommunications modeled network ...

2012-11-28T23:59:59.000Z

473

ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed More Documents & Publications Security is Not an Option ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004)

474

Leadership Development Series: "A Holistic Look at Cyber Security" |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" Leadership Development Series: "A Holistic Look at Cyber Security" January 30, 2014 10:30AM to 12:00PM EST Registration link: By e-mail, $0 Course type: Classroom/Auditorium, Video Cast & Teleconference Course Location: DOE Headquarters, Forrestal Building, Washington, DC/ Main Auditorium Course Description: Dr. Steven Bucci, Director, Douglas and Sarah Allison Center for Foreign Policy Studies. The sheer volume of cyber activity is masking serious threats that impact government, business and our personal lives every day. Incidents are now ubiquitous, pervasive and constitute the new "normal". These day to day threats are not existential, but if not addressed, will hinder our

475

A cyber-physical experimentation environment for the security analysis of networked industrial control systems  

Science Conference Proceedings (OSTI)

Although many studies address the security of Networked Industrial Control Systems (NICSs), today we still lack an efficient way to conduct scientific experiments that measure the impact of attacks against both the physical and the cyber parts of these ...

BéLa Genge; Christos Siaterlis; Igor Nai Fovino; Marcelo Masera

2012-09-01T23:59:59.000Z

476

Effective real-world project collaboration: Strategies from a cyber security degree program  

Science Conference Proceedings (OSTI)

The undergraduate degree of computer and cyber security has been offered at the School of Information Technology, Phetchaburi Rajabhat University, Thailand since 2005. Our program requires direct field experience when students are taking upper-level ...

Wajee Chookittikul; Peter E. Maher

2011-05-01T23:59:59.000Z

477

PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC Webinar Series: Issues in Designing the Future Grid - Cyber-Physical Systems Security for the Smart Grid - February 7, 2012 PSERC is offering a free, public webinar series from January to May 2012 entitled "Issues in Designing the Future Grid," focusing on the information hierarchy for the future grid and grid enablers of sustainable energy systems. The second webinar, Cyber-Physical Systems Security for the Smart Grid, will be held on Fecruary 7, 2012 by Manimaran Govindarasu, Professor if Electrical and Computer Engineering at Iowa State University. Govindarasu_PSERC_Webinar_Feb_2012.pdf More Documents & Publications April 2012 PSERC Webinars on Issues in Designing the Future Grid

478

Multimodal Gumdo Game: The Whole Body Interaction with an Intelligent Cyber Fencer  

Science Conference Proceedings (OSTI)

This paper presents an immersive multimodal Gumdo simulation game that allows a user to experience the whole body interaction with an intelligent cyber fencer. The proposed system consists of three modules: (i) a nondistracting multimodal interface with ...

Jungwon Yoon; Sehwan Kim; Jeha Ryu; Woontack Woo

2002-12-01T23:59:59.000Z

479

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network (OSTI)

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

480

Researchers develop new search tool to help fight child porn, catch cyber  

E-Print Network (OSTI)

Researchers develop new search tool to help fight child porn, catch cyber thieves Canada Standard a comment... Post to Facebook 0 0 New #12;Researchers develop new search tool to help fight child porn

Fung, Benjamin C. M.

Note: This page contains sample records for the topic "trustworthy cyber infrastructure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Pricing and Investments in Internet Security: A Cyber-Insurance Perspective  

E-Print Network (OSTI)

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing the idea of cyber-insurance. In this regard, an important research problem is the analysis of optimal user self-defense investments and cyber-insurance contracts under the Internet environment. In this paper, we investigate two problems and their relationship: 1) analyzing optimal self-defense investments in the Internet, under optimal cyber-insurance coverage, where optimality is an insurer objective and 2) designing optimal cyber-insurance contracts for Internet users, where a contract is a (premium, coverage) pair.

Pal, Ranjan

2011-01-01T23:59:59.000Z

482

SU?FF?T?388: Secondary Radiation Doses From CyberKnife SRS/RT  

Science Conference Proceedings (OSTI)

Purpose: Because of extensive use of conventional x?rays in CyberKnife SRS/RT for treatment tracking and large number of monitor units (MU) in beam delivery

C Yu

2006-01-01T23:59:59.000Z

483

CyberShake 3.0: Physics-based Probabilistic Seismic Hazard Analysis...  

NLE Websites -- All DOE Office Websites (Extended Search)

CyberShake 3.0: Physics-based Probabilistic Seismic Hazard Analysis PI Name: Thomas Jordan PI Email: tjordan@usc.edu Institution: University of Southern California Allocation...

484

CyberShake3.0: Physics-Based Probabilistic Seismic Hazard Analysis...  

NLE Websites -- All DOE Office Websites (Extended Search)

CyberShake3.0: Physics-Based Probabilistic Seismic Hazard Analysis PI Name: Thomas Jordan PI Email: tjordan@usc.edu Institution: University of Southern California Allocation...

485

Analyzing resiliency of the smart grid communication architectures under cyber attack  

Science Conference Proceedings (OSTI)

Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an ...

Anas AlMajali; Arun Viswanathan; Clifford Neuman

2012-08-01T23:59:59.000Z

486

Towards an Experimental Testbed Facility for Cyber-Physical Security Research  

Science Conference Proceedings (OSTI)

Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

2012-01-07T23:59:59.000Z

487

New TCIPG Research Program Builds on Past Successes with Nearly $18.8  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TCIPG Research Program Builds on Past Successes with Nearly TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE Award New TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE Award A new award of nearly $18.8 million over a five-year period from the Department of Energy (DOE) and contributions from the Department of Homeland Security (DHS) will fund the new Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project, an expanded effort of the current project TCIP. New TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE Award More Documents & Publications Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Cybersecurity for Energy Delivery Systems 2010 Peer Review

488

Cyber Security and Privacy Landscape of the Electric Sector: Release 2  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies, such as the Department of Energy (DOE), the Department of Homeland Security (DHS), the Department of Defense (DOD), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the eff...

2012-07-02T23:59:59.000Z

489

Cyber Security and Privacy Landscape of the Electric Sector, Release 5  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2013-03-27T23:59:59.000Z

490

Cyber in the Cloud -- Lessons Learned from INL's Cloud E-Mail Acquisition  

Science Conference Proceedings (OSTI)

As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.

Troy Hiltbrand; Daniel Jones

2012-12-01T23:59:59.000Z

491

A Trustworthy Proof Checker  

Science Conference Proceedings (OSTI)

Proof-carrying code (PCC) and other applications in computer security require machine-checkable proofs of properties of machine-language programs. The main advantage of the PCC approach is that the amount of code that must be explicitly trusted is very ... Keywords: proof checker, proof-carrying code

Andrew W. Appel; Neophytos Michael; Aaron Stump; Roberto Virga

2004-01-01T23:59:59.000Z

492

Towards Trustworthy Spatial Messaging  

Science Conference Proceedings (OSTI)

Spatial messaging is a term that defines the virtual publication of data in physical places. Generally, anyone in the neighborhood of such a publication point gets the message. Frameworks allowing the users to publish freely spatial messages already ... Keywords: security, spatial messaging, tag, trust

Michel Deriaz; Jean-Marc Seigneur

2007-07-01T23:59:59.000Z

493

Microsoft Word - Cyber Effects Analysis Using VCSE 09.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8-5954 8-5954 Unlimited Release Printed September 2008 Cyber Effects Analysis Using VCSE Promoting Control System Reliability Michael J. McDonald, Gregory N. Conrad, Travis C. Service, Regis H. Cassidy Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of

494

Cyber-Security Considerations for the Smart Grid  

Science Conference Proceedings (OSTI)

The electrical power grid is evolving into the “smart grid”. The goal of the smart grid is to improve efficiency and availability of power by adding more monitoring and control capabilities. These new technologies and mechanisms are certain to introduce vulnerabilities into the power grid. In this paper we provide an overview of the cyber security state of the electrical power grid. We highlight some of the vulnerabilities that already exist in the power grid including limited capacity systems, implicit trust and the lack of authentication. We also address challenges of complexity, scale, added capabilities and the move to multipurpose hardware and software as the power grid is upgraded. These changes create vulnerabilities that did not exist before and bring increased risks. We conclude the paper by showing that there are a number mitigation strategies that can help keep the risk at an acceptable level.

Clements, Samuel L.; Kirkham, Harold

2010-07-26T23:59:59.000Z

495

Grant Helps Efficiently Rebuild Ohio Infrastructure | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Grant Helps Efficiently Rebuild Ohio Infrastructure Grant Helps Efficiently Rebuild Ohio Infrastructure February 22, 2010 - 11:12am Addthis Joshua DeLung What are the key facts?...

496

Geographically Based Hydrogen Demand & Infrastructure Analysis (Presentation)  

DOE Green Energy (OSTI)

Presentation given at the 2006 DOE Hydrogen, Fuel Cells & Infrastructure Technologies Program Annual Merit Review in Washington, D.C., May 16-19, 2006, discusses potential future hydrogen demand and the infrastructure needed to support hydrogen vehicles.

Melendez, M.

2006-05-18T23:59:59.000Z

497

Vish Wind Infrastructure Ltd | Open Energy Information  

Open Energy Info (EERE)

Vish Wind Infrastructure Ltd Jump to: navigation, search Name Vish Wind Infrastructure Ltd Place India Sector Wind energy Product Plans to set up 4.6GW of wind power projects in...

498

Vehicle Technologies Office: Research on Biofuels Infrastructure...  

NLE Websites -- All DOE Office Websites (Extended Search)

Research on Biofuels Infrastructure and End-Use to someone by E-mail Share Vehicle Technologies Office: Research on Biofuels Infrastructure and End-Use on Facebook Tweet about...

499

Resilient Everyday Infrastructure [To Rally Discussion  

E-Print Network (OSTI)

conservation, public safety, and the specific needs of individual tenants. The infrastructure systems that support such buildings—

Morrish, William R.

2008-01-01T23:59:59.000Z

500

Measurement Science Needs for Advancing Infrastructure ...  

Science Conference Proceedings (OSTI)

Page 1. Measurement Science Needs for Advancing Infrastructure Delivery Industry Sector Baseline Profiles: Bridges, Roads, Power, and Water ...

2012-10-30T23:59:59.000Z