Powered by Deep Web Technologies
Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Assessment of Voltage Security Methods and Tools  

Science Conference Proceedings (OSTI)

To ensure voltage-secure operation of a power system, VAR control devices must be optimally placed and operated. This project assessed tools and methods that claim to help utilities meet these needs and recommended specific enhancements to these tools.

1995-10-26T23:59:59.000Z

2

Appendix B: California ISO Real Time Voltage Security Assessment...  

NLE Websites -- All DOE Office Websites (Extended Search)

B: California ISO Real Time Voltage Security Assessment (VSA) Summary Report Title Appendix B: California ISO Real Time Voltage Security Assessment (VSA) Summary Report Publication...

3

Appendix A: California ISO Real Time Voltage Security Assessment...  

NLE Websites -- All DOE Office Websites (Extended Search)

A: California ISO Real Time Voltage Security Assessment (VSA) Project: Summary of Survey Results on Methodologies for use in Real-Time Voltage Security Assessment Title Appendix A:...

4

Appendix C: California ISO Real Time Voltage Security Assessment...  

NLE Websites -- All DOE Office Websites (Extended Search)

C: California ISO Real Time Voltage Security Assessment (VSA) Prototype Functional SpecificationsPrototype Development Title Appendix C: California ISO Real Time Voltage Security...

5

California ISO Real-Time Voltage Security Assessment (VSA) Project...  

NLE Websites -- All DOE Office Websites (Extended Search)

Arnold Schwarzenegger Governor REAL-TIME GRID RELIABILITY MANAGEMENT California ISO Real-Time Voltage Security Assessment (VSA) Project: Summary of Survey Results on Methodologies...

6

A Hybrid Framework for Voltage Security Assessment Integrating Simulation and Measurement Based Approaches  

Science Conference Proceedings (OSTI)

Voltage stability is the ability of a power system to maintain adequate voltage magnitudes at buses, which is a major concern in daily power system operations and a leading factor to limit power transfers in a prevailing open-access environment. Currently, simulation-based voltage security assessment (VSA) tools are applied widely by electric utilities to analyze either steady-state or transient voltage stability issues. Those VSA tools can help operators foresee the next critical ...

2012-12-31T23:59:59.000Z

7

Voltage stability/security assessment and on-line control  

SciTech Connect

Project RP3040-1 was initiated in 1989, and concluded with the release of the Voltage Stability analysis program, VSTAB, in 1992. VSTAB is a production grade program for voltage stability assessment of large complex power systems. During the course of the RP3040-1, much effort was spent in developing a clear understanding of voltage stability and in defining the special modeling and analytical techniques required to accurately capture the phenomenon through simulation. The result was the development of new steady state methods which can complement the dynamic simulation methods currently available with EPRI's Extended Transient/Midterm Stability Program (ETMSP). VSTAB uses an enhanced powerflow combined with a specially developed modal analysis algorithm to provide information regarding both the proximity to, and mechanism of, voltage instability. The program is fast, easy to use, and comprehensive in both modeling and analysis features. This Programmer's Manual documents the structure and code details of VSTAB. It is intended as a reference document for those required to maintain or enhance the VSTAB program. For details on analytical techniques used in the program, readers are directed to the VSTAB Application Guide and Final Report for project RP3040-1.

Morison, G.K.; Gao, B.; Hamadanizadeh, H. (Ontario Hydro, Toronto, ON (Canada))

1993-04-01T23:59:59.000Z

8

California ISO Real-Time Voltage Security Assessment (VSA) Summary Report  

NLE Websites -- All DOE Office Websites (Extended Search)

Real-Time Real-Time Voltage Security Assessment (VSA) Summary Report Prepared For: California Energy Commission Public Interest Energy Research Program Prepared By: Lawrence Berkeley National Laboratory Consortium for Electric Reliability Technology Solutions APPENDIX B October 2008 CEC-500-2008-049-APB Prepared By: Lawrence Berkeley National Laboratory Joe Eto, Manu Parashar, Bernard Lesieutre, and Nancy Jo Lewis Berkeley, CA Administered by University of California, California Institute for Energy and Environment under 500-99-013, BOA-138. Jim Cole, Larry Miller Oakland, California 94612 Commission Contract No. 500-02-004 Commission Work Authorization No: MR-036 Prepared For: Public Interest Energy Research (PIER) California Energy Commission

9

Voltage Stability/Security Assessment and On-Line Control: Volumes 1-4  

Science Conference Proceedings (OSTI)

To address growing utility concerns of voltage instability and possible voltage collapse, EPRI has developed a new voltage stability analysis package for large power systems, VSTAB. This off-line planning tool provides information on a utility power system's proximity to and mechanism of voltage instability.

1993-05-01T23:59:59.000Z

10

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

11

Microsoft Word - Chemical Security Assessment Tool.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure Security Analysis Chemical Security Assessment Tool In support of chemical security regulation the Chemical Security Assessment Tool (CSAT) is the Department of...

12

Probabilistic voltage assessment and VAR compensation  

SciTech Connect

The system voltage profile subject to system elements' forced outage is accessed. Two system voltage reliability indexes are evaluated: the loss of voltage probability, and the expected voltage violation. A similar set of two voltage reliability indexes are also calculated for every load bus in the system. A simple VAR compensation approach is introduced. It enhances the voltage profile assuming a maximum of three overlapping element outages can occur. For purposes of demonstration, the system and load bus voltage reliability indexes are calculated for the AEP 30-bus system. Results of applying the proposed VAR compensation scheme to the 30-bus system are also presented and discussed.

Sharaf, T.A.M.; Berg, G.J.

1988-01-01T23:59:59.000Z

13

Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets  

E-Print Network (OSTI)

As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.

Nair, Nirmal-Kumar

2004-12-01T23:59:59.000Z

14

SECURITY RISK ASSESSMENT METHODOLOGIES (RAM)  

owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy’s National Nuclear Security Administration. SAND # 2010-5794P TECHNOLOGY

15

Assessing Power Substation Network Security and Survivability  

E-Print Network (OSTI)

This paper reports our experiences with identifying cyber-based threats to the survivability of power substation control networks. Observations from the initial application of vulnerability and hardening assessment techniques have been presented. The paper also discusses the state of the power industry cyber security, which appears to lag behind the state-ofthe-practice in both network security and ultrareliable systems design.

Carol Taylor; Paul Oman; Axel Krings

2003-01-01T23:59:59.000Z

16

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

17

Cyber Assessment Methods for SCADA Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

18

Independent Oversight Assessment, Y-12 National Security Complex- June 2012  

Energy.gov (U.S. Department of Energy (DOE))

Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project

19

The (In)Security of Drug Testing - Vulnerability Assessment Team...  

NLE Websites -- All DOE Office Websites (Extended Search)

Selected Papers > The (In)Security of Drug Testing VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security...

20

Analytical foundations of physical security system assessment  

E-Print Network (OSTI)

Physical security systems are intended to prevent or mitigate potentially catastrophic loss of property or life. Decisions regarding the selection of one system or configuration of resources over another may be viewed as design decisions within a risk theoretic setting. The problem of revealing a clear preference among design alternatives, using only a partial or inexact delineation of event probabilities, is examined. In this dissertation, an analytical framework for the assessment of the risk associated with a physical security system is presented. Linear programming is used to determine bounds on the expected utility of an alternative, and conditions for the separation of preferences among alternatives are shown. If distinguishable preferences do not exist, techniques to determine what information may help to separate preferences are presented. The linear programming approach leads to identification of vulnerabilities in a security system through an examination of the solution to the dual problem. Security of a hypothetical military forward operating base is considered as an illustrative example. For two alternative security schemes, the uncertainty inherent in the scenario is represented using probability assessments consisting of bounds on event probabilities and exact probability assignments. Application of the framework reveals no separation of preferences between the alternatives. Examination of the primal and dual solutions to the linear programming problems, however, reveals insights into information which, if obtained, could lead to a separation of preferences as well as information on vulnerabilities in one of the alternative security postures.

Graves, Gregory Howard

2006-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Y-12 National Security Complex Water Assessment  

Science Conference Proceedings (OSTI)

The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y-12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y-12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

Elam, Shana E.; Bassett, P.; McMordie-Stoughton, Katherine L.

2010-11-01T23:59:59.000Z

22

Security Risk Assessment Methodologies (RAM) for Critical ...  

IP Home; Search/Browse ... Lead Laboratory for development of physical security technology and funded Sandia to develop a technical capability in security modeling ...

23

Cyber Assessment Methods for SCADA Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment Methods for SCADA Security Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national

24

DOE completes environmental assessment on INL National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

icon Printer-Friendly April 17, 2007 DOE completes environmental assessment on INL National Security Test Range The U.S. Department of Energy has issued the final...

25

Security Assessment Simulation Toolkit (SAST) Final Report  

Science Conference Proceedings (OSTI)

The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

2009-11-15T23:59:59.000Z

26

The Journal of Physical Security - Vulnerability Assessment Team - Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Current Projects > The Journal of Physical Current Projects > The Journal of Physical Security VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms

27

Independent Oversight Assessment, Y-12 National Security Complex - June  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment, Y-12 National Security Complex - Assessment, Y-12 National Security Complex - June 2012 Independent Oversight Assessment, Y-12 National Security Complex - June 2012 June 2012 Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project The U.S. Department of Energy (DOE) Office of Enforcement and Oversight (Independent Oversight), within the Office of Health, Safety and Security (HSS), conducted an independent assessment of nuclear safety culture at the DOE Uranium Processing Facility Project (UPF). The primary objective of the evaluation was to provide information regarding the status of the safety culture at UPF project. The data collection phase of the assessment occurred from late February through March 2012. The safety culture evaluation performed by the external independent safety

28

Security Maxims - Vulnerability Assessment Team - Nuclear Engineering...  

NLE Websites -- All DOE Office Websites (Extended Search)

Tobias Maxim 5: Encryption is largely irrelevant. From Marc Weber Tobias. Red Herring Maxim: At some point in any challenging security application, somebody (or nearly...

29

Independent Oversight Assessment, Y-12 National Security Complex - June  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex - Y-12 National Security Complex - June 2012 Independent Oversight Assessment, Y-12 National Security Complex - June 2012 June 2012 Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project The U.S. Department of Energy (DOE) Office of Enforcement and Oversight (Independent Oversight), within the Office of Health, Safety and Security (HSS), conducted an independent assessment of nuclear safety culture at the DOE Uranium Processing Facility Project (UPF). The primary objective of the evaluation was to provide information regarding the status of the safety culture at UPF project. The data collection phase of the assessment occurred from late February through March 2012. The safety culture evaluation performed by the external independent safety

30

Strategies for Voltage Control and Transient Stability Assessment  

SciTech Connect

As wind generation grows, its influence on power system performance will becoming increasingly noticeable. Wind generation di#11;ffers from traditional forms of generation in numerous ways though, motivating the need to reconsider the usual approaches to power system assessment and performance enhancement. The project has investigated the impact of wind generation on transient stability and voltage control, identifying and addressing issues at three distinct levels of the power system: 1) at the device level, the physical characteristics of wind turbine generators (WTGs) are quite unlike those of synchronous machines, 2) at the wind-farm level, the provision of reactive support is achieved through coordination of numerous dissimilar devices, rather than straightforward generator control, and 3) from a systems perspective, the location of wind-farms on the sub-transmission network, coupled with the variability inherent in their power output, can cause complex voltage control issues. The project has sought to develop a thorough understanding of the dynamic behaviour of type-3 WTGs, and in particular the WECC generic model. The behaviour of such models is governed by interactions between the continuous dynamics of state variables and discrete events associated with limits. It was shown that these interactions can be quite complex, and may lead to switching deadlock that prevents continuation of the trajectory. Switching hysteresis was proposed for eliminating deadlock situations. Various type-3 WTG models include control blocks that duplicate integrators. It was shown that this leads to non-uniqueness in the conditions governing steady-state, and may result in pre- and post-disturbance equilibria not coinciding. It also gives rise to a zero eigenvalue in the linearized WTG model. In order to eliminate the anomalous behaviour revealed through this investigation, WECC has now released a new generic model for type-3 WTGs. Wind-farms typically incorporate a variety of voltage control equipment including tapchanging transformers, switched capacitors, SVCs, STATCOMs and the WTGs themselves. The project has considered the coordinated control of this equipment, and has addressed a range of issues that arise in wind-farm operation. The #12;first concerns the ability of WTGs to meet reactive power requirements when voltage saturation in the collector network restricts the reactive power availability of individual generators. Secondly, dynamic interactions between voltage regulating devices have been investigated. It was found that under certain realistic conditions, tap-changing transformers may exhibit instability. In order to meet cost, maintenance, fault tolerance and other requirements, it is desirable for voltage control equipment to be treated as an integrated system rather than as independent devices. The resulting high-level scheduling of wind-farm reactive support has been investigated. In addressing this control problem, several forms of future information were considered, including exact future knowledge and stochastic predictions. Deterministic and Stochastic Dynamic Programming techniques were used in the development of control algorithms. The results demonstrated that while exact future knowledge is very useful, simple prediction methods yield little bene#12;fit. The integration of inherently variable wind generation into weak grids, particularly subtransmission networks that are characterized by low X=R ratios, aff#11;ects bus voltages, regulating devices and line flows. The meshed structure of these networks adds to the complexity, especially when wind generation is distributed across multiple nodes. A range of techniques have been considered for analyzing the impact of wind variability on weak grids. Sensitivity analysis, based on the power-flow Jacobian, was used to highlight sections of a system that are most severely a#11;ffected by wind-power variations. A continuation power flow was used to determine parameter changes that reduce the impact of wind-power variability. It was also used to explore interactions betw

Hiskens, Ian A.

2013-09-25T23:59:59.000Z

31

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

Science Conference Proceedings (OSTI)

Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01T23:59:59.000Z

32

Assessing the Security of a Clean-Slate Internet Architecture  

E-Print Network (OSTI)

Assessing the Security of a Clean-Slate Internet Architecture Gowtham Boddapati John Day Ibrahim Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate a comprehensive approach to security. Most recently, there have been attempts to design clean- slate internet

Texas at Arlington, University of

33

Security risk assessment: toward a comprehensive practical risk management  

Science Conference Proceedings (OSTI)

This paper introduces a unique approach to a more integrated security risk assessment SRA. This is formalised based on the proven mathematical methods described in various articles in the literature and combined with the work developed by the author. ...

Danilo Valeros Bernardo

2012-01-01T23:59:59.000Z

34

Natural Resource Damages Assessment | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Council Report Calls for Official Natural Resource Damage Assessment for LANL NRDA PreAssessment Screen, January 2010 Factsheet: Los Alamos National Laboratory...

35

Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers  

NLE Websites -- All DOE Office Websites (Extended Search)

Performing Energy Security Assessments - Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers ii Contents EXECUTIVE SUMMARY ........................................................................................................ v 1. INTRODUCTION ............................................................................................................... 1 1.1 Facilities to be Assessed...........................................................................................................................1 2. BEGINNING THE ENERGY SECURITY ASSESSMENT PROCESS ............................... 2 2.1 Assign an Energy Security Manager .........................................................................................................2 2.2 Define the Mission of the Installation

36

Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Performing Energy Security Assessments - Performing Energy Security Assessments - A How-To Guide for Federal Facility Managers ii Contents EXECUTIVE SUMMARY ........................................................................................................ v 1. INTRODUCTION ............................................................................................................... 1 1.1 Facilities to be Assessed...........................................................................................................................1 2. BEGINNING THE ENERGY SECURITY ASSESSMENT PROCESS ............................... 2 2.1 Assign an Energy Security Manager .........................................................................................................2 2.2 Define the Mission of the Installation

37

Voltage Stability Studies for Southern Company Services  

Science Conference Proceedings (OSTI)

This report describes a study conducted under an EPRI Tailored Collaboration project to develop and demonstrate procedures for the assessment of voltage security of the Southern Electric System (SES). The contractor used EPRI steady-state analysis tools including VSTAB (Voltage STABility assessment program) to assess stability margins and verified them using EPRI dynamic tools including ETMSP (Extended Transient / Mid-term Stability Program).

1997-12-31T23:59:59.000Z

38

Integrated Safeguards and Security Management Self-Assessment 2004  

Science Conference Proceedings (OSTI)

In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the end of phase one (August 6, 2004) and phase two (November 1, 2004). The Self-Assessment confirmed that classified information is not held or processed at Berkeley Lab. The survey results also identified areas where increased employee knowledge and awareness of Laboratory policy would be beneficial, the two most prominent being password usage and wireless network service. Line management will be able to determine additional corrective actions based on the results of the Self-Assessment. Future assessments will raise the ratings bar for some existing program elements and add new elements to stimulate further improvements in Laboratory security.

Lunford, Dan; Ramsey, Dwayne

2005-04-01T23:59:59.000Z

39

Risk assessment of climate systems for national security.  

SciTech Connect

Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing [University of Illinois-Urbana; Conrad, Stephen Hamilton; Constantine, Paul [Stanford University; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael [National Center for Atmospheric Research; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

2012-10-01T23:59:59.000Z

40

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Election Security - Vulnerability Assessment Team - Nuclear Engineerin...  

NLE Websites -- All DOE Office Websites (Extended Search)

on LinkedIn The Vulnerability Assessment Team has demonstrated easy to execute, non-cyber attacks on two different kinds of electronic voting machines. We believe that too...

42

Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements  

Science Conference Proceedings (OSTI)

This paper proposes a new approach for assessing the organization's vulnerability to information-security breaches. Although much research has been done on qualitative approaches, the literature on numerical approaches to quantify information-security ... Keywords: Information security, Information-security measurement, Risk analysis, Security threats, Vulnerability measurement

Sandip C. Patel; James H. Graham; Patricia A. S. Ralston

2008-12-01T23:59:59.000Z

43

Technology Assessment and Application Guide for a Capacitor-Based Voltage Sag Compensator  

Science Conference Proceedings (OSTI)

Voltage sags and momentary interruptions result in a significant amount of process shutdowns for industrial customers. Voltage sag compensation devices help mitigate sags for susceptible devices and components, allowing for more reliable and robust process performance. This report provides a technology assessment and application guide for Marathon Power's Voltage Sag Compensator, a 120-V, 750-VA unit designed to provide AC backup power to sensitive electronic loads.

2009-12-22T23:59:59.000Z

44

Assessing the Security of a CleanSlate Internet Architecture  

E-Print Network (OSTI)

designed a clean­slate Recursive INternet Architecture (RINA) [2]. In this paper, we show how, withoutAssessing the Security of a Clean­Slate Internet Architecture Gowtham Boddapati # John Day clean­ slate internet architectures. Our own investigations into the fundamental principles

Texas at Arlington, University of

45

PRIVACY IMPACT ASSESSMENT: INL PERSONNEL SECURITY SECIMS PIA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PERSONNEL PERSONNEL SECURITY - SECIMS PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element;& Site Name of Infonnatlon Syetemor Ilf Project Exhibit ProJect UIO NewPIA D Update ~ June 11, 2009 Idaho National Laboratory Willow Creek Building RIOT-Center INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE 311 DOE PIA - SECIMS Finallxw.doc N T 'tl I Contact Information arne I e . , Phone, Email

46

Random Dynamic Voltage Scaling Design to Enhance Security of NCL S-Box  

E-Print Network (OSTI)

component of symmetric key algorithms which performs substitution. In block ciphers, they are typically used to enhance the resistance against SCA in the way of randomly changing the supply voltage so that "random. The trade- offs between performance and energy efficiency are constant challenges that designers have

Ayers, Joseph

47

New NIST Pub Can Help IT Managers Assess Security ...  

Science Conference Proceedings (OSTI)

... the security controls in federal information systems ... with respect to meeting organizational security policies. ... the Departments of Energy, Justice and ...

2011-05-03T23:59:59.000Z

48

LPAT: An interactive simulation tool for assessing the lightning performance of Hellenic high voltage transmission lines  

Science Conference Proceedings (OSTI)

The paper presents the Lightning Performance Assessment Tool (LPAT), an interactive simulation tool which assesses the lightning performance of high voltage transmission lines. The LPAT design was based on a recently published methodology that has been ... Keywords: Lightning performance, Optical transient density, Overhead transmission lines, Simulation, Software tool, User interface

P. Karampelas; L. Ekonomou; S. Panetsos; G. E. Chatzarakis

2011-01-01T23:59:59.000Z

49

A total risk assessment methodology for security assessment.  

Science Conference Proceedings (OSTI)

Sandia National Laboratories performed a two-year Laboratory Directed Research and Development project to develop a new collaborative risk assessment method to enable decision makers to fully consider the interrelationships between threat, vulnerability, and consequence. A five-step Total Risk Assessment Methodology was developed to enable interdisciplinary collaborative risk assessment by experts from these disciplines. The objective of this process is promote effective risk management by enabling analysts to identify scenarios that are simultaneously achievable by an adversary, desirable to the adversary, and of concern to the system owner or to society. The basic steps are risk identification, collaborative scenario refinement and evaluation, scenario cohort identification and risk ranking, threat chain mitigation analysis, and residual risk assessment. The method is highly iterative, especially with regard to scenario refinement and evaluation. The Total Risk Assessment Methodology includes objective consideration of relative attack likelihood instead of subjective expert judgment. The 'probability of attack' is not computed, but the relative likelihood for each scenario is assessed through identifying and analyzing scenario cohort groups, which are groups of scenarios with comparable qualities to the scenario being analyzed at both this and other targets. Scenarios for the target under consideration and other targets are placed into cohort groups under an established ranking process that reflects the following three factors: known targeting, achievable consequences, and the resources required for an adversary to have a high likelihood of success. The development of these target cohort groups implements, mathematically, the idea that adversaries are actively choosing among possible attack scenarios and avoiding scenarios that would be significantly suboptimal to their objectives. An adversary who can choose among only a few comparable targets and scenarios (a small comparable target cohort group) is more likely to choose to attack the specific target under analysis because he perceives it to be a relatively unique attack opportunity. The opposite is also true. Thus, total risk is related to the number of targets that exist in each scenario cohort group. This paper describes the Total Risk Assessment Methodology and illustrates it through an example.

Aguilar, Richard; Pless, Daniel J.; Kaplan, Paul Garry; Silva, Consuelo Juanita; Rhea, Ronald Edward; Wyss, Gregory Dane; Conrad, Stephen Hamilton

2009-06-01T23:59:59.000Z

50

A collaborative framework for multi-area dynamic security assessment of large scale systems  

E-Print Network (OSTI)

that our knowledge of power system dynamics and the quality of available dynamic security analysis software- security assessment (load-flow computations) [4]­[10]. But there remain several open questions which have

Wehenkel, Louis

51

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

52

Business risks and security assessment for mobile devices  

Science Conference Proceedings (OSTI)

Technology advances over the past decade have elevated business risk from mobile devices to an unparalleled high. The relationships between security, business risks, and their corresponding costs are increasingly complex. Corporate security measures ... Keywords: PDA threat, business risk, malware, network threat, security, smart phone threat, wireless

Patricia Mayer Milligan; Donna Hutcheson

2007-06-01T23:59:59.000Z

53

A grid computing based approach for the power system dynamic security assessment  

Science Conference Proceedings (OSTI)

This paper addresses the problem of parallel dynamic security assessment applications from static homogeneous cluster environment to dynamic heterogeneous grid environment. Functional parallelism and data parallelism are supported by each of the message ... Keywords: Adaptive load balancing, Dynamic security assessment, Grid computing, Latency exploitation technique, Modularity

Xingzhi Wang; Zheng Yan; Li Li

2010-05-01T23:59:59.000Z

54

Plant Support Engineering: Failure Mechanism Assessment of Medium Voltage Ethylene Propylene Rubber Cables  

Science Conference Proceedings (OSTI)

This report presents the results of research that assessed failed ethylene propylene rubber (EPR) medium-voltage (MV) cables to determine the failure mechanism. This information will be used to identify appropriate electrical tests that can be performed on in-service cable. Assessed were a 34-year-old cable manufactured by Okonite with black EPR insulation and a 20-year-old Anaconda Uni-Shieldcable with pink EPR. Both had failed, and both had experienced long-term wetting during service.

2007-08-20T23:59:59.000Z

55

Plant Support Engineering: Failure Mechanism Assessment of Medium-Voltage Ethylene Propylene Rubber Cables - Revision 1  

Science Conference Proceedings (OSTI)

This report presents the results of research that assessed failed ethylene propylene rubber (EPR) medium-voltage (MV) cables to determine the failure mechanism. This information will be used to identify appropriate electrical tests that can be performed on in-service cable. Assessed were two 34-year-old cables manufactured by Okonite with black EPR insulation and a 25-year-old Anaconda UniShield cable with pink EPR. All three had failed and had experienced long-term wetting during service. This report is...

2009-05-28T23:59:59.000Z

56

A VIKOR technique based on DEMATEL and ANP for information security risk control assessment  

Science Conference Proceedings (OSTI)

As companies and organizations have grown to rely on their computer systems and networks, the issue of information security management has become more significant. To maintain their competitiveness, enterprises should safeguard their information and ... Keywords: Analytic network process (ANP), DEMATEL, Information security, Multiple criteria decision making (MCDM), Risk control assessment, VIKOR

Yu-Ping Ou Yang; How-Ming Shieh; Gwo-Hshiung Tzeng

2013-05-01T23:59:59.000Z

57

Quantitative Methodology for Assessing State-Level Nuclear Security Measures  

E-Print Network (OSTI)

The international community faces a growing threat from nuclear terrorism. The complexity of the threats of nuclear terrorism, the variety of nuclear security measures that States can devote resources towards to address the threats, and the limited resources States have to invest in these nuclear security measures make it imperative that resources are applied in the most effective way possible. In this dissertation, we develop a quantitative, risk-based methodology that States can employ to gain a better understanding of the nuclear threat they face, assist them in determining what nuclear security measures they should invest in, and facilitate communication to stake-holders to request and justify investment in these measures. The risk-based methodology has been developed employing a combination of pathways analysis, game-theory, multiple-attribute utility analysis, decision theory and risk analysis. The methodology was designed to account for the wide variety of nuclear security measures that States can invest in, the range of possible consequences from different nuclear threats, and the severity of these consequences to the State. In addition, the methodology models the adversary's strategic decision making while accounting for the capabilities, motivations, and disincentives that may influence which nuclear threat a terrorist group will attempt. The methodology is introduced into a Visual Basic for Applications code, which we demonstrate through verification and qualitative validation tests. We then develop three State nuclear infrastructures with varying levels of complexity, meant to provide a realistic representation of real-world States. We then utilize the code to evaluate the risk of nuclear terrorism against terrorist threats that have different motivations for nuclear terrorism to demonstrate how different motivations for nuclear terrorism may affect both State-level risk and the State's optimal risk-reduction strategy. These risk analyses are then used to both evaluate various nuclear security strategies and determine which nuclear security measures will have the greatest risk-reduction value. Finally, we conduct a sensitivity analysis on capabilities of terrorist groups to understand how changes in these capabilities affect the State-level risk from nuclear terrorism.

Myers, Christopher 1985-

2012-12-01T23:59:59.000Z

58

Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks  

E-Print Network (OSTI)

CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

Tilaro, F

2011-01-01T23:59:59.000Z

59

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

60

Technology Assessment and Application Guide for the Utility Systems Technologies Voltage Sag Fighter  

Science Conference Proceedings (OSTI)

Voltage sag, a disturbance in a power system defined as a decrease in root mean square (RMS) voltage magnitude lasting from 0.5 to 30 cycles, has been identified as the most prevalent power disturbance experienced by industrial customers. The higher frequency of voltage sages makes them inherently more costly than interruptions since fault-induced, short-duration voltage variations can result in costly loss of production, damaged materials, repair and cleaning of equipment, and lost business opportunitie...

2010-11-29T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

DOE/EA-1557; Final Envrionmental Assessment for the National Security Test Range  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Assessment for the National Security Test Range DOE/EA-1557 April, 2007 CONTENTS 1. PURPOSE AND NEED ..................................................................................................................... 1 2. ALTERNATIVES .............................................................................................................................. 3 2.1. Consolidate Testing on a New National Security Test Range at the INL (Preferred Alternative)3 2.1.1 Construction Activities ................................................................................................. 6 2.1.2 Operational Activities................................................................................................... 6 2.2 Alternatives Considered, but Eliminated from Detailed Analysis................................................

62

Lawrence Livermore National Security Cost Model Functional Management Assessment  

Science Conference Proceedings (OSTI)

The scope of the Functional Management Assessment of the cost model included a review of the plan and progress of the Cost Model Review Team. The review focused on processes in place to ensure simplicity, compliance with cost accounting standards and indirect cost allocation methodology, and the change management plan. This was intended to be a high-level initial review in order to provide recommendations for a subsequent more comprehensive review. The single document reviewed by the team during the assessment was the Indirect Cost Recovery Model Review, which describes how the indirect rate restructure and new organizational structure have resulted in streamlined charging practices to better understand and strategically manage costs. ISSUE 1: The cost model focuses heavily on rate structure but not on cost management. Significant progress has been made to simplify the rate structure. The number of indirect rates has been reduced from 67 different indirect rates used under the prior contract to 32 rates in the first year of the LLNS contract, with a goal of further reduction to 16 for FY09. The reductions are being recommended by a broad-based Working Group driven by Lab leadership desiring a simplified rate structure that would make it easier to analyze the true cost of overhead, be viewed as equitable, and ensure appropriate use of Service, i.e., operations, Centers. This has been a real challenge due to the significant change in approach from one that previously involved a very complex rate structure. Under this prior approach, the goal was to manage the rates, and rates were established at very detailed levels that would 'shine the light' on pools of overhead costs. As long as rates stayed constant or declined, not as much attention tended to be given to them, particularly with so many pools to review (184 indirect rate pools in FY05). However, as difficult and important as simplifying the rate structure has been, the fundamental reason for the simplification is to make it easier to analyze the true cost of overhead so the costs can be effectively managed. For the current year, the overall the goal of keeping the total cost of an FTE to FY07 levels. This approach reflects the past practice of managing to rates rather than focusing on costs, although streamlined with the more simplified rate structure. Given all the challenges being faced with the contract transition, this was a reasonable interim tactic for dealing with the known cost increases such as fees and taxes. Nonetheless, in order to take full advantage of the opportunities that exist for making sound decisions for further reducing the rates themselves, the Laboratory needs to implement an ongoing and disciplined approach to understanding and managing overhead cost. ISSUE 2: The NIF has a significantly different rate structure than other Laboratory work. Because of its significant size and unique organizational structure as a major construction project, the National Ignition Facility (NIF) has indirect charges that vary from the norm. These variations were reviewed and approved by and disclosed to the NNSA in the Laboratory's past annual Disclosure Statements. In mid-FY 09, NIF will begin transition from a construction line item to an operational center. The reallocation of costs when this occurs could significantly impact the Laboratory's rates and rate structure planning for that transition from a cost- and rate- impact standpoint should begin soon. ISSUE 3: The new rate model must be finalized shortly in order to implement the model beginning in FY 09. As noted in Issue No.1, a Working Group has developed a simplified rate structure for the Lab to use for FY09. The Working Group has evaluated the cost impacts of the simplified rate structure at the major program level and identified a disparate impact in the Safeguards and Security area where a substantial increase in overhead cost allocation may need to be mitigated. The simplified rate structure will need to be approved by the Laboratory Director and issued within the Laboratory to formulate detailed bu

Tevis, J; Hirahara, J; Thomas, B; Mendez, M

2008-06-12T23:59:59.000Z

63

A method for calculation of margins to voltage instability applied on the Norwegian system for maintaining required security level  

SciTech Connect

The paper describes a method for calculating margins to voltage instability. The method is based on sensitivity techniques. The measure to voltage instability can be given in terms of MW, MVAr or MVA depending on the components in the increase in load. The extensions to earlier publications of the method are the ability to increase the load and generation simultaneously on several buses without increasing the computation time. A single forward and backward substitution is sufficient to find the required sensitivities when the load is increased. The productions of the plant can be increased either by a specified profile or by using the turbine droop characteristics. A method for identification of contingencies needing an explicit reserve evaluation is briefly described.

Flataboe, N.; Fosso, O.B.; Ognedal, R.; Carlsen, T.; Heggland, K.R.

1993-08-01T23:59:59.000Z

64

PRIVACY IMPACT ASSESSMENT: SPRO Physical Security Major Application  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessments, for requirements and additional gUidance for conducting a PIA: http:www.directives.doe.govpdfsdoedoetexUneword206o2061.pdf MODULE I - PRIVACY NEEDS...

65

Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Urnaium Processing Facility Project, June 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex Y-12 National Security Complex Uranium Processing Facility Project May 2011 June 2012 Office of Safety and Emergency Management Evaluations Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Independent Oversight Assessment of Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project Table of Contents 1.0 Introduction ........................................................................................................................................... 1 2.0 Scope and Methodology ....................................................................................................................... 2 3.0 Results and Conclusions ....................................................................................................................... 3

66

Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Urnaium Processing Facility Project, June 2012  

NLE Websites -- All DOE Office Websites (Extended Search)

Y-12 National Security Complex Y-12 National Security Complex Uranium Processing Facility Project May 2011 June 2012 Office of Safety and Emergency Management Evaluations Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Independent Oversight Assessment of Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project Table of Contents 1.0 Introduction ........................................................................................................................................... 1 2.0 Scope and Methodology ....................................................................................................................... 2 3.0 Results and Conclusions ....................................................................................................................... 3

67

Energy technology assessments for energy security -- Working Group report  

DOE Green Energy (OSTI)

In the first phase of the evaluation process the group identified technology areas that are clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were then evaluated against the following specific criteria: Additions to world oil and gas reserves outside the Middle East; increase in efficiency in the oil consuming sectors; displacement of petroleum-based fuels; reduction in demand for oil-fueled transportation; increase in the ability to switch quickly away from petroleum based fuels; increases in domestic and international oil stocks; reduction in world oil demand; and additions to domestic, non-petroleum electrical generating capacity (important in the ultimate term). The technology areas deemed by the members of the working group to be most important are: (1) In the near term, technologies related to improved recovery of natural gas, the conversion of natural gas to liquids, advanced liquefaction of coal, the development of alternatively fueled vehicles, automobiles and light truck improvements to increase efficiency, and vehicles that operate on alternative fuels. (2) In the long term, these technologies, as well as those related to hydrogen production, storage and utilization, biomass derived fuels, electric and hybrid vehicles, building heating and cooling using solar energy, more efficient appliances, improved HVAC, and advanced building materials and envelopes were also judged to be most important. (3) In the ultimate term (>2030) other technologies have the possibility to join with these to increase energy security. These are improved oil and gas exploration and extraction, heavy oil and hydrocarbon conversion, gas recovery from unconventional sources, advanced fission reactors and fuel cycles, solar generation of electricity, and fusion energy. An increase in US electrical generating capacity is also thought to bear directly on energy security in this time-frame.

Lamont, A.D.; Schock, R.N.

1993-03-01T23:59:59.000Z

68

Assessment and Evaluation of Next Generation High-Voltage DC Technologies—Phase 2  

Science Conference Proceedings (OSTI)

As an established technology for bulk power transmission, high-voltage direct current (HVDC) power transmission is being used worldwide, and more than 100 schemes are operating at present. Advances in voltage sourced converter (VSC) technologies and power electronic devices with use of insulated-gate bipolar transistors (IGBTs) will provide improved system performance and reliability. Also, the present highest operating voltage is +/- 800 kV as China and India are building +/- 800-kV lines. Anticipating ...

2009-12-17T23:59:59.000Z

69

DOE/CX-00007 CATEGORICAL EXCLUSION SAFEGUARDS AND SECURITY ENHANCED ASSESSMENT SYSTEM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07 07 CATEGORICAL EXCLUSION SAFEGUARDS AND SECURITY ENHANCED ASSESSMENT SYSTEM (PROJECT S-221) HANFORD SITE, RICHLAND, WASHINGTON PROPOSED ACTION The U.S. Department of Energy (DOE) proposes to install six wooden utility poles to support the safeguards and security enhanced assessment system. LOCATION OF ACTION The locations of the proposed action are generally within and around 200 East Area of the Hanford Site. The specific locations cannot be disclosed due to their safeguards and security related nature, and the locations have been designated Official Use Only. It is the policy of the DOE to make records available to the public to the greatest extent possible, in keeping with the spirit of the Freedom of Information Act (FOIA), while at the same time

70

Assessment of research directions for high-voltage direct-current power systems. Final report  

Science Conference Proceedings (OSTI)

High voltage direct current (HVDC) power transmission continues to be an emerging technology nearly thirty years after its introduction into modern power systems. To date its use has been restricted to either specialized applications having identifiable economic advantages (e.g., breakeven distance) or, rarely, applications where decoupling is needed. Only recently have the operational advantages (e.g., power modulation) of HVDC been realized on operating systems. A research project whose objective was to identify hardware developments and, where appropriate, system applications which can exemplify cost and operational advantages of integrated ac/dc power systems is discussed. The three principal tasks undertaken were: assessment of equipment developments; quantification of operational advantages; and interaction with system planners. Interest in HVDC power transmission has increased markedly over the past several years, and many new systems are now being investigated. The dissemination of information about HVDC, including specifically the symposium undertaken for Task 3, is a critical factor in fostering an understanding of this important adjunct to ac power transmission.

Long, W F

1982-09-01T23:59:59.000Z

71

FACT SHEET: Fusion Center Assessment emergency response, public health and private sector security personnel to understand local intelligence  

E-Print Network (OSTI)

FACT SHEET: Fusion Center Assessment emergency response, public health and private sector security officials to better protect their communities. Fusion centers provide interdisciplinary expertise on Fusion Center Assessment: A mature, fully functioning national network of fusion centers is critical

72

Technology Assessment and Application Guide for an Active Voltage Conditioner with Storage Option (AVC-Store)  

Science Conference Proceedings (OSTI)

This report describes and documents the construction, performance, and application of an active voltage conditioner (AVC) with energy storage. The system8211called the AVC-Store8211is manufactured by Vectek in Napier, New Zealand. Composed of a novel power electronics module, the system is organized to mitigate voltage sags, phase shift, and outages. This report describes the various subsystems within the AVC-Store, its operation, results of characterization tests, and issues related to its application a...

2006-06-27T23:59:59.000Z

73

Spatially Informed Plant PRA Models for Security Assessment  

SciTech Connect

Traditional risk models can be adapted to evaluate plant response for situations where plant systems and structures are intentionally damaged, such as from sabotage or terrorism. This paper describes a process by which traditional risk models can be spatially informed to analyze the effects of compound and widespread harsh environments through the use of 'damage footprints'. A 'damage footprint' is a spatial map of regions of the plant (zones) where equipment could be physically destroyed or disabled as a direct consequence of an intentional act. The use of 'damage footprints' requires that the basic events from the traditional probabilistic risk assessment (PRA) be spatially transformed so that the failure of individual components can be linked to the destruction of or damage to specific spatial zones within the plant. Given the nature of intentional acts, extensive modifications must be made to the risk models to account for the special nature of the 'initiating events' associated with deliberate adversary actions. Intentional acts might produce harsh environments that in turn could subject components and structures to one or more insults, such as structural, fire, flood, and/or vibration and shock damage. Furthermore, the potential for widespread damage from some of these insults requires an approach that addresses the impacts of these potentially severe insults even when they occur in locations distant from the actual physical location of a component or structure modeled in the traditional PRA. (authors)

Wheeler, Timothy A. [Sandia National Laboratories, PO Box 5800, Albuquerque, NM 87185 (United States); Thomas, Willard [Omicron Safety and Risk Technologies, Inc., 2500 Louisiana Boulevard, Suite 410. Albuquerque, NM 87110 (United States); Thornsbury, Eric [U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001 (United States)

2006-07-01T23:59:59.000Z

74

Lawrence Livermore National Security CFO Processes Functional Management Assessment  

Science Conference Proceedings (OSTI)

The scope of the Functional Management Assessment of the CFO included a review of the CFO Organizational Structure, including deployed financial services and the division of responsibilities and internal controls between CFO and other organizations that perform financial functions across the Laboratory. In addition, the assessment team solicited input from end users and reviewers. Three issues discussed are: ISSUE 1: Financial activities and cash transactions are occurring outside the CFO organization. Approximately $200M of non-purchase order spending occurs in seven areas outside CFO control (travel, relocation, special disbursements, IPO, legal, risk management, and freight). NIF financial services have not been integrated into the CFO organization and operate outside CFO control. Business risks--There is no single point of financial accountably; Currently within the CFO and Business and Operations organizations there is a lack of clarity of roles and responsibilities for financial activities; Financial talent within the laboratory is fragmented; and Inefficiencies exist based on the current structure; An example of the above business risks associated with organizational structure can be observed in the process for reimbursement of relocation costs to employees. Currently, Human Resources and Travel both administer portions of an employee's relocation. Costs are reviewed for compliance with FAR travel guidelines and for compliance with the offer letter but there is no financial review for allowability of costs nor is there a single point where the total relocation costs are reviewed. Through the e-pay system the check is processed by the CFO organization but there is no review by that organization. ISSUE 2: Impact of involuntary separation on current and future activities. 3 risks are: (1) Loss of internal controls--with the upcoming involuntary reductions there will be a loss of personnel with institutional knowledge which will increase the risk of losing internal control on some processes. The organization needs to be cognizant of this risk and take measures to minimize financial risk and ensure on-going A-123 compliance. (2) Project Costing Implementation (PCI) delay--the implementation of PCI is key to achieving integration and reporting of financial data. Presently, business analysts spend half of their time collecting and compiling data and 94% of the labs financial management reports are created using spreadsheets. Currently, the PCI project is on schedule but the involuntary reductions may result in loss of support in this area. (3) Financial Performance Milestones not met--for FY-08 there are fixed, base and stretch financial performance milestones for the laboratory. With reductions in staff the risk of missing key milestones increases. ISSUE 3: Strategically growing the Work for Others (WFO) Portfolio. A key objective of the laboratory is to increase WFO. Greater reliance on WFO will result in additional funding sources and increase the number of control points and financial activities to be monitored thus increasing the level of financial complexity at the lab. The CFO organization should work now to improve controls and processes to accommodate these changes. In particular the following areas should be focused on: (1) Cost reporting needs to be streamlined; (2) Cost Transfer controls need to be increased; and (3) Timely monitoring and close out of contracts needs occur.

Sparks, A; Sampson, D; Thomas, B; Mendez, M

2008-06-12T23:59:59.000Z

75

Testing of Hydro-Quebec Cases with Dynamic Security Assessment Package  

Science Conference Proceedings (OSTI)

Transient stability contingencies provided by Hydro-Quebec (HQ) were evaluated by Siemens using two EPRI Dynamic Security Assessment (DSA) software components: Contingency Screening and Ranking and Time Domain Simulation. The main purpose of the HQ collaboration was to ascertain the performance of the EPRI on-line DSA system for the Hydro-Quebec network and test the contingency ranking methodology. During 1995 and 1996, comparing and matching transient stability modeling and ranking a list of HQ continge...

2000-12-11T23:59:59.000Z

76

Technology Assessment and Application Guide for Micro Dynamic Voltage Restorer (DVR)  

Science Conference Proceedings (OSTI)

This report describes and documents the construction, performance, and application of a micro dynamic voltage restorer (DVR). The system is a prototype developed by the researchers at the University of Săo Paulo located in Brazil, South America. The report describes the operation and performance evaluation results of the Micro DVR and issues related to application and installation.

2008-12-19T23:59:59.000Z

77

Security assessment of power systems including energy storage. Progress report, July 1, 1978--September 30, 1978  

DOE Green Energy (OSTI)

Progress in assessing the security of power systems is reviewed. Further evaluation has been performed on the previously developed simplified model of the current-fed force-commutated converter (CFFCC). Validation studies were performed using the CFFCC as a control interface between a one-machine, three-bus power system equivalent and a superconducting magnetic energy storage device. The highlights of this investigation are reported. The identification of power system electromechanical models from systems measurements, with only normal load variation as a disturbing input, is being studied. A maximum liklihood estimation procedure has been partly developed. The procedure uses auto correlation information as an input rather than the observed time series.

Carroll, D.P.; Triezenberg, D.M.

1978-10-01T23:59:59.000Z

78

Evaluation of the Los Alamos National Security Emergency Operations Divison Emergency Management Self-assessment Practices, June 2011  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06-08 06-08 Site: Los Alamos National Laboratory Subject: Office of Enforcement and Oversight's Office of Safety and Emergency Management Evaluations Activity Report for the Evaluation of the Los Alamos National Security Emergency Operations Division Emergency Management Self-assessment Practices Dates of Activity : 06/06/2011-06/08/2011 Report Preparer: John Bolling/Randy Griffin Activity Description/Purpose: Los Alamos National Security, LLC (LANS) and the Los Alamos Site Office (LASO) requested that the U.S. Department of Energy (DOE), Office of Health, Safety and Security (HSS), Office of Safety and Emergency Management Evaluations evaluate LANS's Emergency Operations Division emergency management self- assessment practices. Utilizing the self-assessment of the Los Alamos National Laboratory (LANL) emergency

79

Vulnerability assessment and security of scalable and bandwidth elastic next generation PONs  

Science Conference Proceedings (OSTI)

The next generation WDM/TDM-PON is scalable and delivers elastically ultra-high data rates to thousands of end-users, and therefore network security becomes particularly important. We identify different levels of security and responsibilities in the ... Keywords: FTTH, PON, network security, optical networks

Stamatios V. Kartalopoulos; Di Jin

2007-07-01T23:59:59.000Z

80

Voltage security assessment with high penetration levels of utility-scale doubly fed induction generator wind plants.  

E-Print Network (OSTI)

??The interconnection requirements set forth by FERC in order 661-A mandate the operation of wind plants within a power factor range of 0.95 leading /… (more)

Konopinski, Ryan

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

The Arctic as a test case for an assessment of climate impacts on national security.  

SciTech Connect

The Arctic region is rapidly changing in a way that will affect the rest of the world. Parts of Alaska, western Canada, and Siberia are currently warming at twice the global rate. This warming trend is accelerating permafrost deterioration, coastal erosion, snow and ice loss, and other changes that are a direct consequence of climate change. Climatologists have long understood that changes in the Arctic would be faster and more intense than elsewhere on the planet, but the degree and speed of the changes were underestimated compared to recent observations. Policy makers have not yet had time to examine the latest evidence or appreciate the nature of the consequences. Thus, the abruptness and severity of an unfolding Arctic climate crisis has not been incorporated into long-range planning. The purpose of this report is to briefly review the physical basis for global climate change and Arctic amplification, summarize the ongoing observations, discuss the potential consequences, explain the need for an objective risk assessment, develop scenarios for future change, review existing modeling capabilities and the need for better regional models, and finally to make recommendations for Sandia's future role in preparing our leaders to deal with impacts of Arctic climate change on national security. Accurate and credible regional-scale climate models are still several years in the future, and those models are essential for estimating climate impacts around the globe. This study demonstrates how a scenario-based method may be used to give insights into climate impacts on a regional scale and possible mitigation. Because of our experience in the Arctic and widespread recognition of the Arctic's importance in the Earth climate system we chose the Arctic as a test case for an assessment of climate impacts on national security. Sandia can make a swift and significant contribution by applying modeling and simulation tools with internal collaborations as well as with outside organizations. Because changes in the Arctic environment are happening so rapidly, a successful program will be one that can adapt very quickly to new information as it becomes available, and can provide decision makers with projections on the 1-5 year time scale over which the most disruptive, high-consequence changes are likely to occur. The greatest short-term impact would be to initiate exploratory simulations to discover new emergent and robust phenomena associated with one or more of the following changing systems: Arctic hydrological cycle, sea ice extent, ocean and atmospheric circulation, permafrost deterioration, carbon mobilization, Greenland ice sheet stability, and coastal erosion. Sandia can also contribute to new technology solutions for improved observations in the Arctic, which is currently a data-sparse region. Sensitivity analyses have the potential to identify thresholds which would enable the collaborative development of 'early warning' sensor systems to seek predicted phenomena that might be precursory to major, high-consequence changes. Much of this work will require improved regional climate models and advanced computing capabilities. Socio-economic modeling tools can help define human and national security consequences. Formal uncertainty quantification must be an integral part of any results that emerge from this work.

Taylor, Mark A.; Zak, Bernard Daniel; Backus, George A.; Ivey, Mark D.; Boslough, Mark Bruce Elrick

2008-11-01T23:59:59.000Z

82

Enforcement Regulations and Directives - Security | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Regulations and Directives - Security Classified Information Security 10 C.F.R Part 824 - Procedural Rules for the Assessment of Civil Penalties for Classified...

83

Fifth Annual Health Information Security Conference Runs ...  

Science Conference Proceedings (OSTI)

... conference is an opportunity for HIPAA security rule implementers; security, privacy and compliance officers; assessment teams and audit staff in ...

2012-04-17T23:59:59.000Z

84

Independent Oversight Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Sysetms Self-Assessment, November 2011  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada Site Office and National Security Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems Self-Assessment May 2011 November 2011 Office of Safety and Emergency Management Evaluations Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose ......................................................................................................................................1 2.0 Background ...............................................................................................................................1 3.0 Scope .........................................................................................................................................2

85

Independent Oversight Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Sysetms Self-Assessment, November 2011  

NLE Websites -- All DOE Office Websites (Extended Search)

Nevada Site Office and National Security Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems Self-Assessment May 2011 November 2011 Office of Safety and Emergency Management Evaluations Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose ......................................................................................................................................1 2.0 Background ...............................................................................................................................1 3.0 Scope .........................................................................................................................................2

86

Office of Secure Transportation Report for Appropriateness of Revisions to the Emergency Planning Hazards Assessment and Protective Action Recommendation Cards  

NLE Websites -- All DOE Office Websites (Extended Search)

Report Number: HIAR-OST-2011-03-04 Site: Office of Secure Transportation (OST) Subject: Office of Independent Oversight's Office of Emergency Management Oversight Independent Activity Report for Appropriateness of Revisions to the Emergency Planning Hazards Assessment and Protective Action Recommendation Cards Dates of Activity: 03/02/2011 - 03/04/2011 Report Preparer: Deborah Johnson Activity Description/Purpose: The Office of Emergency Management Oversight (HS-63) conducted a review of a new revision of the Office of Secure Transportation (OST) emergency planning hazards assessment (EPHA) and protective action recommendation (PAR) cards. The review was conducted at the Headquarters OST Albuquerque Office. The purpose of the visit was to evaluate the

87

Office of Secure Transportation Report for Appropriateness of Revisions to the Emergency Planning Hazards Assessment and Protective Action Recommendation Cards  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report Number: HIAR-OST-2011-03-04 Site: Office of Secure Transportation (OST) Subject: Office of Independent Oversight's Office of Emergency Management Oversight Independent Activity Report for Appropriateness of Revisions to the Emergency Planning Hazards Assessment and Protective Action Recommendation Cards Dates of Activity: 03/02/2011 - 03/04/2011 Report Preparer: Deborah Johnson Activity Description/Purpose: The Office of Emergency Management Oversight (HS-63) conducted a review of a new revision of the Office of Secure Transportation (OST) emergency planning hazards assessment (EPHA) and protective action recommendation (PAR) cards. The review was conducted at the Headquarters OST Albuquerque Office. The purpose of the visit was to evaluate the

88

Assessing and Enhancing the Security of Transmission Assets From International Physical Attack  

Science Conference Proceedings (OSTI)

Potential intentional attacks against electric power systems include sabotage; physical assault; disruption of sensors, information systems, computer networks, and fail-safe systems; tampering with process safety; and indirect attacks such as disruption of water, fuel, or key personnel. While outages from intentional attacks on the physical security of utility assets are rare, such outages can adversely impact the economy, the environment, public safety, and national security. This white paper ...

2013-12-03T23:59:59.000Z

89

Substation voltage upgrading  

SciTech Connect

Substation voltage uprating, i.e., conversion of a substation from a lower rated voltage to a higher rated voltage without a complete substation rebuild, can lead to excellent economic benefits. Utilization of the old substation layout and/or the existing equipment, to some extent, is the practical objective of such an uprating. The objective of this project was to assess the opportunities for substation uprating in the industry, to establish feasibility for such uprating and to study methods for accomplishing it. The final aim of the project was to provide guidance to utilities interested in uprating. 56 refs., 41 figs., 18 tabs.

Panek, J.; Elahi, H.; Sublich, M. (General Electric Co., Schenectady, NY (USA). Systems Development and Engineering Dept.)

1989-08-01T23:59:59.000Z

90

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

91

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

92

Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities IAJIT First Online Publication  

E-Print Network (OSTI)

Abstract: In order to perform the analysis and mitigation efforts related with the Information Security risks there exists quantitative and qualitative approaches, but the most critical shortcoming of these methods is the fact that the outcome mainly addresses the needs and priorities of the technical community rather than the management. For the enterprise management, this information is essentially required as a decision making aid for the asset allocation and the prioritization of mitigation efforts. So ideally the outcome of an information security risk method must be in synchronization with the enterprise objectives to act as a useful decision tool for the management. Also in the modelling of the threat domain, attack trees are frequently utilized. However the execution of attack tree modelling is costly from the effort and timing requirements and also has inherent scalability issues. So within this article our design-science research based work on an information security risk assessment method that addresses these two issues of enterprise objective inclusion and model scalability will be outlined.

Bugra Karabey; Nazife Baykal

2011-01-01T23:59:59.000Z

93

Impact of High-Penetration PV on Distribution System Performance: Assessment of Regulation Control Options for Voltage Mitigation  

Science Conference Proceedings (OSTI)

Photovoltaics are beginning to challenge distribution system power engineers nationwide. The impact photovoltaics (PV) has on the power system is directly tied to system characteristics which include but are not limited to voltage class, load, regulation, and short circuit capacity. In addition to the system characteristics, the solar characteristics also play a key role. These include details on the PV systems themselves in addition to the solar irradiance data. The correlation of PV output and ...

2012-12-31T23:59:59.000Z

94

Cooperative Monitoring Center Occasional Paper/8: Cooperative Border Security for Jordan: Assessment and Options  

SciTech Connect

This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of the intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.

Qojas, M.

1999-03-01T23:59:59.000Z

95

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

96

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

97

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

98

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

99

2012 Annual Planning Summary for National Nuclear Security Administrat...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration 2012 Annual Planning Summary for National Nuclear Security Administration The ongoing and projected Environmental Assessments and...

100

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Linear modeling and simulation of low-voltage electric system for single-point vulnerability assessment of military installation  

Science Conference Proceedings (OSTI)

This paper describes the formulation and development of a linear model to support the single-point vulnerability assessment of electric distribution systems at existing and future U.S. Department of Defense (DoD) military sites. The model uses flow sensitivity ...

Edgar C. Portante; Thomas N. Taxon; James A. Kavicky; Tarek Abdallah; Timothy K. Perkins

2008-12-01T23:59:59.000Z

102

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A – Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

103

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

104

Fiber-optic voltage sensor  

DOE Patents (OSTI)

A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities.

Wood, C.B.

1990-12-31T23:59:59.000Z

105

Fiber-optic voltage sensor  

DOE Patents (OSTI)

A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities.

Wood, C.B.

1990-01-01T23:59:59.000Z

106

Security metrics for source code structures  

Science Conference Proceedings (OSTI)

Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been proposed. However, all the perspectives of a software system have not ... Keywords: code quality and security., metrics, security metrics

Istehad Chowdhury; Brian Chan; Mohammad Zulkernine

2008-05-01T23:59:59.000Z

107

Common Cyber Security Vulnerabilities Observed in Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

108

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

109

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

110

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

111

DOE/EA-1538; Environmental Assessment for the Safeguards and Security Upgrades for the Storage of Plutonium Materials at the Savannah River Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 8 December 2005 U. S. DEPARTMENT OF ENERGY SAVANNAH RIVER OPERATIONS OFFICE SAVANNAH RIVER SITE ENVIRONMENTAL ASSESSMENT FOR THE SAFEGUARDS AND SECURITY UPGRADES FOR STORAGE OF PLUTONIUM MATERIALS AT THE SAVANNAH RIVER SITE DOE/EA-1538 ENVIRONMENTAL ASSESSMENT FOR THE SAFEGUARDS AND SECURITY UPGRADES FOR STORAGE OF PLUTONIUM MATERIALS AT THE SAVANNAH RIVER SITE December 2005 U. S. DEPARTMENT OF ENERGY SAVANNAH RIVER OPERATIONS OFFICE SAVANNAH RIVER SITE ii This page is intentionally left blank iii TABLE OF CONTENTS Page 1.0 INTRODUCTION 1 1.1 Background 1 1.2 Purpose and Need for Action 3 2.0 PROPOSED ACTION AND ALTERNATIVES 3 2.1 Proposed Action 3 2.1.1 Modified Storage Capability within K Area for

112

PQ Encyclopedia: Understanding Voltage Unbalance  

Science Conference Proceedings (OSTI)

This PQ Encyclopedia examines voltage unbalance, methods to calculate line voltages and the degree of voltage unbalance, and mitigation techniques.

2009-12-11T23:59:59.000Z

113

Automating Network Security Assessment  

Science Conference Proceedings (OSTI)

... It's not host analysis It's not config analysis Page 6. ... Originally on ~$5K server (quad core, 32G RAM) Now running on Cisco UCS – much faster! ...

2012-10-26T23:59:59.000Z

114

Packaging and Transfer of Hazardous Materials and Materials of National Security Interest Assessment plan - Developed By NNSA/Nevada Site Office Facility Representative Division  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PACKAGING AND TRANSFER PACKAGING AND TRANSFER OF HAZARDOUS MATERIALS AND MATERIALS OF NATIONAL SECURITY INTEREST Assessment Plan NNSA/Nevada Site Office Facility Representative Division Performance Objective: Verify that packaging and transportation safety requirements of hazardous materials and materials of national security interest have been established and are in compliance with DOE Orders 461.1 and 460.1B Criteria: Verify that safety requirements for the proper packaging and transportation of DOE/NNSA offsite shipments and onsite transfers of hazardous materials and for modal transport have been established [DOE O 460.1B, 1, "Objectives"]. Verify that the contractor transporting a package of hazardous materials is in compliance with the requirements of the Hazardous Materials Regulations

115

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

116

HIGH VOLTAGE GENERATOR  

DOE Patents (OSTI)

This patent relates to high voltage supply circuits adapted for providing operating voltages for GeigerMueller counter tubes, and is especially directed to an arrangement for maintaining uniform voltage under changing conditions of operation. In the usual power supply arrangement for counter tubes the counter voltage is taken from across the power supply output capacitor. If the count rate exceeds the current delivering capaciiy of the capacitor, the capacitor voltage will drop, decreasing the counter voltage. The present invention provides a multivibrator which has its output voltage controlled by a signal proportional to the counting rate. As the counting rate increases beyond the current delivering capacity of the capacitor, the rectified voltage output from the multivibrator is increased to maintain uniform counter voltage.

Zito, G.V.

1959-04-21T23:59:59.000Z

117

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

118

Mitigation of different type voltage sags in low voltage distribution systems using dynamic voltage restorer  

Science Conference Proceedings (OSTI)

The main problems of the voltage sag in low voltage distribution systems due to sensitive loads. Voltage sags can caused malfunction in the distribution system. In order to protect voltage sags in the network a device which called Dynamic Voltage Restorer ... Keywords: custom device, dynamic voltage restorer (DVR), low voltage, power injected, voltage sag

Rosli Omar

2010-03-01T23:59:59.000Z

119

Advanced Metering Infrastructure (AMI) System Security Requirements  

Science Conference Proceedings (OSTI)

This report identifies key cyber security requirements and suggests basic security approaches for safeguarding the many interfaces of Advanced Metering Infrastructure (AMI) systems. These requirements, which were developed through a clearly defined security assessment procedure, are generic; but they can be used to develop more specific security requirements based on actual configurations and environments.

2009-12-21T23:59:59.000Z

120

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

122

V-186: Drupal Login Security Module Security Bypass and Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Drupal Login Security Module Security Bypass and Denial of 6: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June 26, 2013 - 1:28am Addthis PROBLEM: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability PLATFORM: Login Security 6.x-1.x versions prior to 6.x-1.2. Login Security 7.x-1.x versions prior to 7.x-1.2. ABSTRACT: A security issue and a vulnerability have been reported in the Login Security module for Drupal REFERENCE LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2013-053 Secunia Advisory SA53717 CVE-2013-2197 CVE-2013-2198 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The security issue is caused due to an unspecified error and can be exploited to bypass the module features. Successful exploitation requires the "soft blocking" feature to be

123

Automatic voltage imbalance detector  

DOE Patents (OSTI)

A device for indicating and preventing damage to voltage cells such as galvanic cells and fuel cells connected in series by detecting sequential voltages and comparing these voltages to adjacent voltage cells. The device is implemented by using operational amplifiers and switching circuitry is provided by transistors. The device can be utilized in battery powered electric vehicles to prevent galvanic cell damage and also in series connected fuel cells to prevent fuel cell damage.

Bobbett, Ronald E. (Los Alamos, NM); McCormick, J. Byron (Los Alamos, NM); Kerwin, William J. (Tucson, AZ)

1984-01-01T23:59:59.000Z

124

Constant voltage ultracapacitor  

Science Conference Proceedings (OSTI)

Ultracapacitors have attracted lots of attention recently due to their growing use in hybrid vehicles and in energy storage applications for the smart grid. A very undesirable feature of ultracapacitors is the fact that the voltage drops as the capacitor is discharged. DC-DC converters are employed at present to convert the voltage of the ultracapacitor to constant voltage; however

Ezzat G. Bakhoum

2012-01-01T23:59:59.000Z

125

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

126

SecureBox: National Security Through Secure Cargo – Team Members  

SecureBox: National Security Through Secure Cargo – Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

127

Chief Medical Officer: Occupational Medicine in Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Security requirements provide for the medical assessment of employees to identify potential threats against the nuclear information, materials, and weapons over which DOE holds jurisdiction. When effectively integrated with the services of personnel security, counterintelligence, and other allied security professionals, medical services contribute directly to national security. In addition, workplace violence has increasingly been recognized as safety and security concern which warrants organizational planning and response. The following policy, guidance, and additional resources may apply. 1. Access Authorization Programs 2. Human Reliability Programs 3. Physical Protection Programs 4. Workplace Violence Programs 5. Counterintelligence Programs

128

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: ModSecurity Multipart Message Parsing Security Bypass 5: ModSecurity Multipart Message Parsing Security Bypass Vulnerability V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability October 18, 2012 - 6:00am Addthis PROBLEM: ModSecurity Multipart Message Parsing Security Bypass Vulnerability PLATFORM: Modsecurity Versions prior to 2.70 ABSTRACT: SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions REFERENCE LINKS: SEC Consult Secunia Advisory SA49853 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when parsing multipart requests and can be exploited to bypass certain filtering rules. IMPACT: Remote Security Bypass SOLUTION: Update to version 2.70. Addthis Related Articles V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities

129

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

130

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

131

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

132

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

133

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

134

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

135

Seals Applications - Vulnerability Assessment Team - Nuclear...  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Maxims Read the Security Maxims Devil's Dictionary of Security Terms For more information: Vulnerability Assessment Section Sect. Manager: Roger G....

136

Seals References - Vulnerability Assessment Team - Nuclear Engineering...  

NLE Websites -- All DOE Office Websites (Extended Search)

VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure) The (In)Security of Drug Testing VAT in...

137

Optical voltage reference  

DOE Patents (OSTI)

An optical voltage reference for providing an alternative to a battery source is described. The optical reference apparatus provides a temperature stable, high precision, isolated voltage reference through the use of optical isolation techniques to eliminate current and impedance coupling errors. Pulse rate frequency modulation is employed to eliminate errors in the optical transmission link while phase-lock feedback is employed to stabilize the frequency to voltage transfer function. 2 figures.

Rankin, R.; Kotter, D.

1994-04-26T23:59:59.000Z

138

Optical voltage reference  

DOE Patents (OSTI)

An optical voltage reference for providing an alternative to a battery source. The optical reference apparatus provides a temperature stable, high precision, isolated voltage reference through the use of optical isolation techniques to eliminate current and impedance coupling errors. Pulse rate frequency modulation is employed to eliminate errors in the optical transmission link while phase-lock feedback is employed to stabilize the frequency to voltage transfer function.

Rankin, R.; Kotter, D.

1992-12-31T23:59:59.000Z

139

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

140

Automated Voltage Standard Ready  

Science Conference Proceedings (OSTI)

... “We wanted a standard that was ... as envisioned, then within our lifetimes there will no longer be a need for voltage transfer standards that have to be ...

2013-04-08T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

142

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

143

NREL: Measurements and Characterization - Current Versus Voltage  

NLE Websites -- All DOE Office Websites (Extended Search)

Current Versus Voltage Current Versus Voltage The National Renewable Energy Laboratory (NREL) Device Performance group uses current versus voltage (I-V) measurement systems to assess the main performance parameters for photovoltaic (PV) cells and modules. I-V measurement systems determine the output performance of devices, including: open-circuit voltage (Voc), short-circuit current (Isc), fill factor (FF), maximum power output of the device (Pmax), voltage at maximum power (Vmax), current at maximum power (Imax), and conversion efficiency of the device (η). Some I-V systems may also be used to perform dark I-V measurements to determine diode properties and series and shunt resistances. We use three I-V systems to measure performance of individual PV cells; and four for modules - two for measurements under simulated conditions; and

144

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

145

SUBJECT: National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration Sandia Site Ofce P. 0. Box 5400 Albuquerque, NM 87185 JAN O=P= ONP= Annual National Environmental Policy Act Planning Sumary 2013 Attached is: the Annual National Environmental Policy Act (NEPA) Planning Summary for the National Nuclear Security Administation, Sandia Site Ofce (SSO). Currently, there are two environmental assessments planned and one environmental impact statement in progess for the

146

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

147

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL), which is an indoor/outdoor facility designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including sensors, cameras, power generation, access control, remote communication, unmanned aerial, and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain including open grassy fields, hilly wooded areas, sand pits, and lakes and streams which approximate the actual challenges of border and facility applications. A critical facet of this facility is the ability to test systems year-round under the seasonal

148

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

149

Voltage Quality Improvement Using DVR  

Science Conference Proceedings (OSTI)

The problem of voltage sags and Swells and its severe impact on sensitive loads is well known. To solve this problem, custom power devices are used. One of those devices is the Dynamic Voltage Restorer (DVR), which is one of the most efficient and effective ... Keywords: Dynamic Voltage Restorer (DVR), Voltage sags, Voltage swells, Custom power, Power Quality

M. Arun Bhaskar; S. S. Dash; C. Subramani; M. Jagadeesh Kumar; P. R. Giresh; M. Varun Kumar

2010-03-01T23:59:59.000Z

150

Voltage balanced multilevel voltage source converter system  

SciTech Connect

A voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means.

Peng, Fang Zheng (Oak Ridge, TN); Lai, Jih-Sheng (Knoxville, TN)

1997-01-01T23:59:59.000Z

151

Voltage balanced multilevel voltage source converter system  

SciTech Connect

Disclosed is a voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means. 15 figs.

Peng, F.Z.; Lai, J.S.

1997-07-01T23:59:59.000Z

152

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

153

Performance Assessment Transport Modeling of Uranium at the Area 5 Radioactive Waste Management Site at the Nevada National Security Site  

SciTech Connect

Following is a brief summary of the assumptions that are pertinent to the radioactive isotope transport in the GoldSim Performance Assessment model of the Area 5 Radioactive Waste Management Site, with special emphasis on the water-phase reactive transport of uranium, which includes depleted uranium products.

NSTec Radioactive Waste

2010-10-12T23:59:59.000Z

154

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

155

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

156

devil's dictionary of security terms (nov 2013)  

NLE Websites -- All DOE Office Websites (Extended Search)

Devil's Dictionary of Security Terms November 2013 Roger Johnston Vulnerability Assessment Team Argonne National Laboratory Advanced Persistent Threat: (1) A buzzword to...

157

Current-Voltage and Capacitance-Voltage characteristics of Pd ...  

Science Conference Proceedings (OSTI)

Presentation Title, Current-Voltage and Capacitance-Voltage characteristics of Pd ... Nonlocal Modeling in High Rate Deformation and Ductile Fracture of ...

158

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

159

Nonproliferation and National Security Program - Nuclear Engineering  

NLE Websites -- All DOE Office Websites (Extended Search)

Major Programs > Nonproliferation and Major Programs > Nonproliferation and National Security Program Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program (NPNS)

160

High voltage DC power supply  

DOE Patents (OSTI)

A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively. 7 figs.

Droege, T.F.

1989-12-19T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

? Adjustable Output Voltage  

E-Print Network (OSTI)

The LM25010 features all the functions needed to implement a low cost, efficient, buck regulator capable of supplying in excess of 1A load current. This high voltage regulator integrates an N-Channel Buck Switch, and is available in thermally enhanced LLP-10 and TSSOP-14EP packages. The constant on-time regulation scheme requires no loop compensation resulting in fast load transient response and simplified circuit implementation. The operating frequency remains constant with line and load variations due to the inverse relationship between the input voltage and the on-time. The valley current limit detection is set at 1.25A. Additional features include: VCC under-voltage lock-out, thermal shutdown, gate drive under-voltage lock-out, and maximum duty cycle limiter.

Lmq Is Aec-q Grade

2008-01-01T23:59:59.000Z

162

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

163

2011 Annual Planning Summary for Health, Safety and Security (HSS)  

Energy.gov (U.S. Department of Energy (DOE))

The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2011 and 2012 within Health, Safety and Security (HSS).

164

2012 Annual Planning Summary for National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE))

The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2012 and 2013 within the National Nuclear Security Administration.

165

Low-voltage gyrotrons  

SciTech Connect

For a long time, the gyrotrons were primarily developed for electron cyclotron heating and current drive of plasmas in controlled fusion reactors where a multi-megawatt, quasi-continuous millimeter-wave power is required. In addition to this important application, there are other applications (and their number increases with time) which do not require a very high power level, but such issues as the ability to operate at low voltages and have compact devices are very important. For example, gyrotrons are of interest for a dynamic nuclear polarization, which improves the sensitivity of the nuclear magnetic resonance spectroscopy. In this paper, some issues important for operation of gyrotrons driven by low-voltage electron beams are analyzed. An emphasis is made on the efficiency of low-voltage gyrotron operation at the fundamental and higher cyclotron harmonics. These efficiencies calculated with the account for ohmic losses were, first, determined in the framework of the generalized gyrotron theory based on the cold-cavity approximation. Then, more accurate, self-consistent calculations for the fundamental and second harmonic low-voltage sub-THz gyrotron designs were carried out. Results of these calculations are presented and discussed. It is shown that operation of the fundamental and second harmonic gyrotrons with noticeable efficiencies is possible even at voltages as low as 5-10 kV. Even the third harmonic gyrotrons can operate at voltages about 15 kV, albeit with rather low efficiency (1%-2% in the submillimeter wavelength region).

Glyavin, M. Yu.; Zavolskiy, N. A.; Sedov, A. S. [Institute of Applied Physics RAS, N. Novgorod 603600 (Russian Federation); Nusinovich, G. S. [IREAP, University of Maryland, College Park, Maryland 20742-3511 (United States)

2013-03-15T23:59:59.000Z

166

Oak Ridge Reservation Needs Assessment  

Energy.gov (U.S. Department of Energy (DOE))

Needs Assessment for former Oak Ridge National Laboratory and Y-12 Nuclear Security Complex production workers.

167

Comparative High Voltage Impulse Measurement  

Science Conference Proceedings (OSTI)

... substrate and surrounded by insulating oil; the low ... the amplitudes of the voltage peaks that are ... The uncertainties in the peak output voltages for the ...

2013-04-19T23:59:59.000Z

168

Life Cycle Assessment of the Energy Independence and Security Act of 2007: Ethanol - Global Warming Potential and Environmental Emissions  

DOE Green Energy (OSTI)

The objective of this study is to use life cycle assessment (LCA) to evaluate the global warming potential (GWP), water use, and net energy value (NEV) associated with the EISA-mandated 16 bgy cellulosic biofuels target, which is assumed in this study to be met by cellulosic-based ethanol, and the EISA-mandated 15 bgy conventional corn ethanol target. Specifically, this study compares, on a per-kilometer-driven basis, the GWP, water use, and NEV for the year 2022 for several biomass feedstocks.

Heath, G. A.; Hsu, D. D.; Inman, D.; Aden, A.; Mann, M. K.

2009-07-01T23:59:59.000Z

169

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

170

Device for monitoring cell voltage  

SciTech Connect

A device for monitoring a rechargeable battery having a number of electrically connected cells includes at least one current interruption switch for interrupting current flowing through at least one associated cell and a plurality of monitoring units for detecting cell voltage. Each monitoring unit is associated with a single cell and includes a reference voltage unit for producing a defined reference threshold voltage and a voltage comparison unit for comparing the reference threshold voltage with a partial cell voltage of the associated cell. The reference voltage unit is electrically supplied from the cell voltage of the associated cell. The voltage comparison unit is coupled to the at least one current interruption switch for interrupting the current of at least the current flowing through the associated cell, with a defined minimum difference between the reference threshold voltage and the partial cell voltage.

Doepke, Matthias (Garbsen, DE); Eisermann, Henning (Edermissen, DE)

2012-08-21T23:59:59.000Z

171

Watching the watchdogs : assessing a First Amendment claim against the government's use of national security letters to track journalists' newsgathering activities.  

E-Print Network (OSTI)

??The FBI's use of National Security Letters (NSLs) to secretly demand customer records from communications providers in terrorism-related investigations has been criticized as an intrusion… (more)

Hoppenjans, Lisa.

2010-01-01T23:59:59.000Z

172

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

173

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

174

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

175

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

176

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

177

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

178

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

179

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

180

Independent Oversight Review, Nevada National Security - May 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Security - May 2013 National Security - May 2013 Independent Oversight Review, Nevada National Security - May 2013 May 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure The U.S. Department of Energy (DOE) Office of Enforcement and Oversight (Independent Oversight), within the Office of Health, Safety and Security, conducted an independent review of the National Nuclear Security Administration (NNSA) Nevada Field Office (NFO) and National Security Technologies, LLC (NSTec) concurrent assessments to confirm the level of compliance with the closure actions of the NSTec corrective action plan (CAP) for nuclear criticality safety. Independent Oversight Review, Nevada National Security - May 2013 More Documents & Publications

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Contact the Vulnerability Assessment Team (VAT) - Nuclear Engineering...  

NLE Websites -- All DOE Office Websites (Extended Search)

VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure) The (In)Security of Drug Testing VAT in...

182

Electron launching voltage monitor  

DOE Patents (OSTI)

An electron launching voltage monitor measures MITL voltage using a relationship between anode electric field and electron current launched from a cathode-mounted perturbation. An electron launching probe extends through and is spaced from the edge of an opening in a first MITL conductor, one end of the launching probe being in the gap between the MITL conductor, the other end being adjacent a first side of the first conductor away from the second conductor. A housing surrounds the launching probe and electrically connects the first side of the first conductor to the other end of the launching probe. A detector detects the current passing through the housing to the launching probe, the detected current being representative of the voltage between the conductors.

Mendel, Clifford W. (Albuquerque, NM); Savage, Mark E. (Albuquerque, NM)

1992-01-01T23:59:59.000Z

183

Voltage controlled current source  

DOE Patents (OSTI)

A seven decade, voltage controlled current source is described for use in testing intermediate range nuclear instruments that covers the entire test current range of from 10 picoamperes to 100 microamperes. High accuracy is obtained throughout the entire seven decades of output current with circuitry that includes a coordinated switching scheme responsive to the input signal from a hybrid computer to control the input voltage to an antilog amplifier, and to selectively connect a resistance to the antilog amplifier output to provide a continuous output current source as a function of a preset range of input voltage. An operator controlled switch provides current adjustment for operation in either a real-time simulation test mode or a time response test mode.

Casne, Gregory M. (Pittsburgh, PA)

1992-01-01T23:59:59.000Z

184

High frequency breakdown voltage  

SciTech Connect

This report contains information about the effect of frequency on the breakdown voltage of an air gap at standard pressure and temperature, 76 mm Hg and O{degrees}C, respectively. The frequencies of interest are 47 MHz and 60 MHz. Additionally, the breakdown in vacuum is briefly considered. The breakdown mechanism is explained on the basis of collision and ionization. The presence of the positive ions produced by ionization enhances the field in the gap, and thus determines the breakdown. When a low-frequency voltage is applied across the gap, the breakdown mechanism is the same as that caused by the DC or static voltage. However, when the frequency exceeds the first critical value f{sub c}, the positive ions are trapped in the gap, increasing the field considerably. This makes the breakdown occur earlier; in other words, the breakdown voltage is lowered. As the frequency increases two decades or more, the second critical frequency, f{sub ce}, is reached. This time the electrons start being trapped in the gap. Those electrons that travel multiple times across the gap before reaching the positive electrode result in an enormous number of electrons and positive ions being present in the gap. The result is a further decrease of the breakdown voltage. However, increasing the frequency does not decrease the breakdown voltage correspondingly. In fact, the associated breakdown field intensity is almost constant (about 29 kV/cm).The reason is that the recombination rate increases and counterbalances the production rate, thus reducing the effect of the positive ions` concentration in the gap. The theory of collision and ionization does not apply to the breakdown in vacuum. It seems that the breakdown in vacuum is primarily determined by the irregularities on the surfaces of the electrodes. Therefore, the effect of frequency on the breakdown, if any, is of secondary importance.

Chu, Thanh Duy

1992-03-01T23:59:59.000Z

185

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

186

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration Finding of No Significant Impact for the Construction and Operation of a New Office Building and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area Office 528 35th Street Los Alamos, N M 8 7 5 4 4 DEPARTMENT OF ENERGY. NATIONAL NUCLEAR SECUIRTY ADMINISTRATION FINDING OF NO SIGNIFICANT INIPACT Construction and Operation of a New Office Building and Related Structures withinTA-3 at Los Alarnos National Laboratory, Los Alamos. New Mexico FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Construction and Operation of a New Office Building and Related Structures within TA-3 at L os Alamos National Laboratory, Los Alamos, New Mexico (DOE/EA- 7 375)

187

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

188

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

189

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

190

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

191

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

192

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

193

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

194

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

195

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

196

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

197

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

198

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

199

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

200

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Electronic security device  

DOE Patents (OSTI)

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

202

Electronic security device  

DOE Patents (OSTI)

The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

1992-01-01T23:59:59.000Z

203

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

204

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

205

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

206

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

207

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

208

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

209

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

210

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

211

High voltage pulse conditioning  

DOE Patents (OSTI)

Apparatus for conditioning high voltage pulses from particle accelerators in order to shorten the rise times of the pulses. Flashover switches in the cathode stalk of the transmission line hold off conduction for a determinable period of time, reflecting the early portion of the pulses. Diodes upstream of the switches divert energy into the magnetic and electrostatic storage of the capacitance and inductance inherent to the transmission line until the switches close.

Stringfield, R.M.; Wheat, R.M. Jr.

1989-02-21T23:59:59.000Z

212

High voltage pulse conditioning  

DOE Patents (OSTI)

Apparatus for conditioning high voltage pulses from particle accelerators in order to shorten the rise times of the pulses. Flashover switches in the cathode stalk of the transmission line hold off conduction for a determinable period of time, reflecting the early portion of the pulses. Diodes upstream of the switches divert energy into the magnetic and electrostatic storage of the capacitance and inductance inherent to the transmission line until the switches close.

Springfield, Ray M. (Sante Fe, NM); Wheat, Jr., Robert M. (Los Alamos, NM)

1990-01-01T23:59:59.000Z

213

HIGH VOLTAGE GENERATOR  

DOE Patents (OSTI)

A generator is presented for producing relatively large currents at high voltages. In general, the invention comprises a plurality of capacitors connected in series by a plurality of switches alternately disposed with the capacitors. The circuit is mounted for movement with respect to contact members and switch closure means so that a load device and power supply are connected across successive numbers of capacitors, while the other capacitors are successively charged with the same power supply.

Schwemin, A.J.

1959-03-17T23:59:59.000Z

214

HIGH VOLTAGE GENERATOR  

DOE Patents (OSTI)

A generator for producing relatively large currents at high voltages is described. In general, the invention comprises a plurality of capacitors connected in series by a plurality of switches alternately disposed with the capacitors. The above-noted circuit is mounted for movement with respect to contact members and switch closure means so that a load device and power supply are connected across successive numbers of capacitors, while the other capacitors are successively charged with the same power supply.

Schwemin, A.J.

1959-03-17T23:59:59.000Z

215

SECURITY RISK ASSESSMENT METHODOLOGIES (RAM)  

In the mid 1970s, the Department of Energy (DOE) designated ... For more information or licensing opportunities contact us at ip@sandia.gov or visit

216

Software Security Assessment Tools Review  

Science Conference Proceedings (OSTI)

... Table 1: Evaluation Summary of Analyses for Source ... in the dynamically allocated RAM of an ... impact determination is supported by artifact analysis. ...

2013-05-07T23:59:59.000Z

217

Automating Network Security Assessment Automating ...  

Science Conference Proceedings (OSTI)

... Remediation is more involved 3. Whole network analysis is the next level ... $5K server (quad core, 32G RAM) – Two weeks ...

2012-10-26T23:59:59.000Z

218

HIGH VOLTAGE ION SOURCE  

DOE Patents (OSTI)

A device is described for providing a source of molecular ions having a large output current and with an accelerated energy of the order of 600 kv. Ions are produced in an ion source which is provided with a water-cooled source grid of metal to effect maximum recombination of atomic ions to molecular ions. A very high accelerating voltage is applied to withdraw and accelerate the molecular ions from the source, and means are provided for dumping the excess electrons at the lowest possible potentials. An accelerating grid is placed adjacent to the source grid and a slotted, grounded accelerating electrode is placed adjacent to the accelerating grid. A potential of about 35 kv is maintained between the source grid and accelerating grid, and a potential of about 600 kv is maintained between the accelerating grid and accelerating electrode. In order to keep at a minimum the large number of oscillating electrons which are created when such high voltages are employed in the vicinity of a strong magnetic field, a plurality of high voltage cascaded shields are employed with a conventional electron dumping system being employed between each shield so as to dump the electrons at the lowest possible potential rather than at 600 kv.

Luce, J.S.

1960-04-19T23:59:59.000Z

219

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

220

T-599: Microsoft April 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

99: Microsoft April 2011 Security Bulletin Release 99: Microsoft April 2011 Security Bulletin Release T-599: Microsoft April 2011 Security Bulletin Release April 11, 2011 - 5:24am Addthis PROBLEM: Microsoft April 2011 Security Bulletin Release PLATFORM: Microsoft Windows, Microsoft Office, Microsoft Server Software, and Microsoft Developer Tools and Software ABSTRACT: Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. reference LINKS: Microsoft Security Bulletin Advance Notification for April 2011 Microsoft Security April Affected Software TechNet Webcast: Information About Microsoft April Security Bulletins IMPACT ASSESSMENT: High Discussion:

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Protocol, Security Assistance - January 2007 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 January 2007 Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security. The Assistance Program is comprised of technologists and subject matter experts from all the S&S disciplines and technical areas including Program Planning Management and Support, Advanced Security Technologies, Protective Force, Physical Security, Information Protection, Safeguards and Security Construction Projects, Vulnerability Assessments, and Nuclear Materials Control and Accountability. Our commitment is to continue to build an assistance program dedicated to serving the interests of the Department and our customers' S&S programs. Our emphasis remains

222

Complete Security Framework for Wireless Sensor Networks  

E-Print Network (OSTI)

Security concern for a Sensor Networks and level of security desired may differ according to application specific needs where the sensor networks are deployed. Till now, most of the security solutions proposed for sensor networks are layer wise i.e a particular solution is applicable to single layer itself. So, to integrate them all is a new research challenge. In this paper we took up the challenge and have proposed an integrated comprehensive security framework that will provide security services for all services of sensor network. We have added one extra component i.e. Intelligent Security Agent (ISA) to assess level of security and cross layer interactions. This framework has many components like Intrusion Detection System, Trust Framework, Key Management scheme and Link layer communication protocol. We have also tested it on three different application scenarios in Castalia and Omnet++ simulator.

Sharma, Kalpana; Kuldeep,

2009-01-01T23:59:59.000Z

223

Security management in Wireless Sensor Networks for healthcare  

Science Conference Proceedings (OSTI)

This paper first discusses emerging security threats, requirements and solutions for WSNs. In addition, the current applications and architectures of WSNs in healthcare systems are explained in detail. Then an assessment framework for WSN security for ...

Tae Oh; Young B. Choi; Jungwoo Ryoo; Kristian Stokes

2011-05-01T23:59:59.000Z

224

High voltage variable diameter insulator  

DOE Patents (OSTI)

A high voltage feedthrough assembly (10) having a tubular insulator (15) extending between the ground plane ring (16) and the high voltage ring (30). The insulator (15) is made of Pyrex and decreases in diameter from the ground plane ring (16) to the high voltage ring (30), producing equipotential lines almost perpendicular to the wall (27) of the insulator (15) to optimize the voltage-holding capability of the feedthrough assembly (10).

Vanecek, David L. (Martinez, CA); Pike, Chester D. (Pinole, CA)

1984-01-01T23:59:59.000Z

225

Automatic voltage-imbalance detector  

DOE Patents (OSTI)

A device is described for indicating and preventing damage to voltage cells such as galvanic cells and fuel cells connected in series by detecting sequential voltages and comparing these voltages to adjacent voltage cells. The device is implemented by using operational amplifiers and switching circuitry is provided by transistors. The device can be utilized in battery powered electric vehicles to prevent galvanic cell damage and also in series connected fuel cells to prevent fuel cell damage.

Bobbett, R.E.; McCormick, J.B.; Kerwin, W.J.

1981-05-20T23:59:59.000Z

226

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

227

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

228

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

229

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

230

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

231

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring … ...

2013-01-17T23:59:59.000Z

232

Cyber Security and Resilient Systems  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

233

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

234

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

235

V-001: Mozilla Security vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Mozilla Security vulnerabilities 1: Mozilla Security vulnerabilities V-001: Mozilla Security vulnerabilities October 12, 2012 - 6:00am Addthis PROBLEM: Mozilla Security vulnerabilities PLATFORM: Vulnerabilities are reported in Firefox and Thunderbird versions prior to 16.0.1 and SeaMonkey versions prior to 2.13.1. ABSTRACT: Mozilla Firefox / Thunderbird / SeaMonkey Multiple Vulnerabilities REFERENCE LINKS: Secunia Advisory SA50932 Mozilla Security Blog Mozilla Foundation Security Advisory 2012-88 Mozilla Foundation Security Advisory 2012-89 SecurityTracker Alert ID: 1027653 SecurityTracker Alert ID: 1027652 SecurityTracker Alert ID: 1027651 CVE-2012-4190 CVE-2012-4191 CVE-2012-4192 CVE-2012-4193 IMPACT ASSESSMENT: High DISCUSSION: 1) The protected "location" object is accessible by other domain objects,

236

U.S. Nuclear Command and Control System Support Staff, "Assessment Report: Department of Energy Nuclear Weapons-Related Security Oversight Process," March 1998  

E-Print Network (OSTI)

August 5, 1977 DOE, "Plutonium: The First 50 Years. United States Plutonium Production, Acquisition, and Utilization from 1944 Through 1994 GAO/RCED-92-39, "Nuclear Security: Safeguards and Security Weaknesses at DOE's Weapons Facilities," December 13, 1991 GAO/RCED/AIMD-95-5, "Nuclear Nonproliferation: U.S. International Nuclear Materials Tracking Capabilities are Limited," December 27, 1994 GAO/AIMD-95-165, "Department of Energy: Poor Management of Nuclear Materials Tracking Capabilities Are Limited," August 3, 1995 Classified DOE report.

Gao Rced- Major

1999-01-01T23:59:59.000Z

237

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

238

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

239

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

240

PowerSec Generic Security Analysis Report  

Science Conference Proceedings (OSTI)

During 2006 and 2007, EPRI developed and executed the PowerSec Program to assess utility cyber security and evaluate the gap between existing and recommended practices. Nine electric power companies (EPUs) participated in this program. Six of those EPUs participated in a project to determine their aggregate security posture. This report presents the results of that project.

2007-12-11T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Proposed Comprehensive Cyber Security Legislation, May 2011  

Science Conference Proceedings (OSTI)

The role of cyber security in the critical infrastructures of the United States has been recognized by the President and by members of Congress. To address potential cyber security threats and vulnerabilities, the Senate has proposed revisions to specific laws and regulations. This white paper includes a technical assessment of some of the key proposed revisions.

2011-10-26T23:59:59.000Z

242

Physical Security System Sensitivity to DBT Perturbations  

E-Print Network (OSTI)

This thesis examines how perturbing selected adversary capabilities in a design basis threat (DBT) may affect the assessment of a facility's security system performance. We found that using a strictly defined DBT to design and analytically test facility security systems can lead to invalid assessments that security measures are meeting standards. Design Basis Threats are intended to represent the most severe yet realistic attack a facility might face. However, the static nature of the standard DBT makes it unable to test the performance of a facility security system in the case where a specialized adversary may possess different capabilities than defined in the DBT. Our analysis of security system performance for various modeled facilities revealed significant vulnerabilities to certain perturbations of adversary capabilities. These vulnerabilities went undetected when the original strictly defined graded DBT was used in the assessment procedure. By maximizing one adversary capability at the expense of others, a specialized adversary force was able to efficiently defeat each facility. To address this problem, we proposed employing a so-called "point-based" DBT as an alternative to the existing strictly defined DBT. In a point-based DBT, multiple scenarios are assessed that test different sets of adversary capabilities to better uncover and understand any security system vulnerabilities that may exist. We believe the benefit of identifying these site-specific security vulnerabilities will outweigh the additional cost of generating a point-based DBT, especially if the vulnerabilities are identified during the initial design of the security system.

Conchewski, Curtis

2012-08-01T23:59:59.000Z

243

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

244

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

245

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

246

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

247

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

248

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

249

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

250

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

251

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

252

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

253

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

254

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

255

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

256

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

257

Environmental Security and Restoration | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Security & Restoration Environmental Security & Restoration Argonne's work in environmental security and restoration addresses soil, surface water, sediment, and groundwater at contaminated sites. Argonne's work in environmental restoration addresses soil, surface water, sediment, and groundwater at contaminated sites, starting with environmental evaluations and planning projects. Assessments are also conducted of approaches for long-term stewardship of remediated sites with residual contamination. Remedies range from precise excavations to innovative combinations of engineered wetlands and phytoremediation. Argonne researchers conduct approaches for long-term stewardship of remediated sites with residual contamination. The objective of environmental security programs is to support efforts to reduce national

258

Planning of distribution networks for medium voltage and low voltage.  

E-Print Network (OSTI)

??Determination of the placement and rating of transformers and feeders are the main objective of the basic distribution network planning. The bus voltage and the… (more)

Ziari, Iman

2011-01-01T23:59:59.000Z

259

High voltage feedthrough bushing  

DOE Patents (OSTI)

A feedthrough bushing for a high voltage diode provides for using compression sealing for all sealing surfaces. A diode assembly includes a central conductor extending through the bushing and a grading ring assembly circumferentially surrounding and coaxial with the central conductor. A flexible conductive plate extends between and compressively seals against the central conductor and the grading ring assembly, wherein the flexibility of the plate allows inner and outer portions of the plate to axially translate for compression sealing against the central conductor and the grading ring assembly, respectively. The inner portion of the plate is bolted to the central conductor for affecting sealing. A compression beam is also bolted to the central conductor and engages the outer portion of the plate to urge the outer portion toward the grading ring assembly to obtain compression sealing therebetween.

Brucker, J.P.

1991-12-31T23:59:59.000Z

260

Substation voltage upgrading  

SciTech Connect

This report addresses specific issues to support sound yet not unduly conservative uprating practices for substations. The main parts of the report cover the insulation withstand and overvoltage protection aspects, environmental measurements, reliability criteria, and industry experience. First the insulation design concerns are addressed. Substation stress by a backflashover of the line insulation due to lightning in the vicinity of the substation is recognized as a critical stress. A representative part of a 550 kV BIL substation was erected at the EPRI High Voltage Transmission Research Center, where also a special test circuit was assembled to produce a fast front, slow tail (0.2/200 {mu}s) wave. The substation as well as some special configurations were tested for line-to-ground and line-to-line withstand. Computer studies were performed to complement the test results. A number of important conclusions was reached. The most prominent result in that the high frequency oscillations, as caused by reflections within the substation, do not effect the Critical Flashover Voltage (CFO). The present practice, based on the highest peak is therefore very conservative. The slow tail of the wave appears to dictate the CFO. An arrester model for computer studies to represent very fast as well as slow phenomena was derived. It is based on full scale arrester test data, made available in this project. The computer program to calculate arrester model parameters is also a part of the report. The electric environmental measurements are reported for the tested substation at the HVTRC and for the uprated substation of Public Service Company of Colorado, both before and after the uprating. The performance is satisfactory when corona free hardware is used. Insulation design criteria are analyzed based on substation reliability, the system viewpoint and consequences of the failure. Utility experience with uprated substations is reviewed.

Panek, J.; Elahi, H.; Lux, A.; Imece, A.F. (General Electric Co., Schenectady, NY (United States). Power Systems Engineering Dept.); LaPanse, R.A.; Stewart, J.R. (Public Service Co. of Colorado, Denver, CO (United States))

1992-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

262

Abstract--This paper investigates how to detect a dynamic voltage collapse situation. The generator and governor dynamics  

E-Print Network (OSTI)

to an interest in maintaining an optimum, secure and reliable power system operation. One such security issue instability detection and mitigation features to maintain an acceptable level of system reliability power flow model. This analysis has been practically viable because of the view that the voltage

263

Student Experiential Opportunities in National Security Careers  

Science Conference Proceedings (OSTI)

This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

None

2007-12-31T23:59:59.000Z

264

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

265

Current Projects: GPS Spoofing - Vulnerability Assessment Team...  

NLE Websites -- All DOE Office Websites (Extended Search)

References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure) The...

266

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

267

Voltage Vehicles | Open Energy Information  

Open Energy Info (EERE)

Sector Vehicles Product Voltage Vehicles is a nascent, full-service alternative fuel vehicle distributor specializing in the full spectrum of electric vehicles (EV) and...

268

Humidity, Temperature, and Voltage (Presentation)  

SciTech Connect

An update is given on the work of the PV Quality Assurance Task Force; Group 3: studying the effects of humidity, temperature, and voltage bias.

Wohlgemuth, J.

2012-03-01T23:59:59.000Z

269

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

270

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

271

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

272

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

273

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

274

A security-centric ring-based software architecture  

Science Conference Proceedings (OSTI)

Software architectures that are centered on security historically contain layers to implement security controls, with the layered structure tending towards a series of rings. John Warden devised a five-ring model to assess enemy systems for strategic ... Keywords: Warden's five-ring model, computer security, software architecture

Jay-Evan J. Tevis; John A. Hamilton, Jr.

2007-03-01T23:59:59.000Z

275

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

276

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

277

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management • Architecture security focus • Physical interaction ... Cybersecurity • Cybersecurity Framework • Smart Grid Program ...

2013-06-05T23:59:59.000Z

278

Interactions Between Energy Security and Climate Change: A Focus...  

Open Energy Info (EERE)

Morgan Bazilian, Benjamin F. Hobbs, Will Blyth, Iain MacGill, Mark Howells Partner: Energy Policy Sector: Energy, Climate Topics: Co-benefits assessment, - Energy Security...

279

V-237: TYPO3 Security Bypass Vulnerabilities | Department of...  

NLE Websites -- All DOE Office Websites (Extended Search)

SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors when handling file actions can be exploited to bypass file action permission restrictions and...

280

ITL Bulletin Information Security in the System Development ...  

Science Conference Proceedings (OSTI)

... 800-17) c. CC product reevaluation (Additional References: CC) d. Assessment ... Security into the Capital Planning and Investment Control Process ...

2012-04-05T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Guidelines for System Security and Information System Management  

Science Conference Proceedings (OSTI)

This document provides a concise set of guidelines and best practices for performing risk assessment, security management, and system management within utility automation networks.

2008-06-09T23:59:59.000Z

282

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

283

Cyber Security Evaluations Appraisal Process Guide - April 2008 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April 2008 April 2008 Cyber Security Evaluations Appraisal Process Guide was developed for the purpose of documenting the appraisal approach and techniques specific to evaluations of classified and unclassified cyber security programs throughout DOE. Office of Cyber Security Evaluations Appraisal Process Guide provides additional insight into the Office of Cyber Security Evaluations (HS-62) evaluation approach and processes associated with assessing classified and unclassified cyber security programs. The objective of this document is to establish a standard approach and methodology for conducting cyber security reviews that is well understood by all inspection participants.

284

Mitigations for Security Vulnerabilities Found in Control System Networks |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mitigations for Security Vulnerabilities Found in Control System Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in

285

Developing a Taxonomy for Various Types of Security Force Positions  

NLE Websites -- All DOE Office Websites (Extended Search)

UR 04-7226 Security Assignments 1 UR 04-7226 Security Assignments 1 Journal of Security Administration 26(2): 1-11 (2003) A TAXONOMY FOR SECURITY ASSIGNMENTS Edward G. Bitzer III, M.A. and Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Los Alamos National Laboratory LA-UR 04-7226 Security Assignments 2 Abstract Despite its importance in most security plans, the position of security guard has undergone very little systematic examination. In response this paper proposes a formal taxonomy of security guard positions as a starting point for research. A number of procedures that could be used to test the taxonomy are proposed. Finally, implications of this work are discussed for both researchers and practitioners in the security field.

286

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

287

Identification of Critical Voltage Control Areas and Determination of Required Reactive Power Reserves  

Science Conference Proceedings (OSTI)

The objective of this research project is to investigate and devise a methodology for identifying areas in power systems that are prone to voltage instability under particular operating conditions and contingencies. These areas, which are prone to instability due to their lack of reactive power reserves, are referred to as critical voltage control areas (VCAs). Once VCAs are identified, methods of determining their adequate reactive power reserve requirements to ensure secure system operation under all c...

2008-12-09T23:59:59.000Z

288

Strain-optic voltage monitor  

DOE Patents (OSTI)

A voltage monitor which uses the shift in absorption edge of crystalline material to measure strain resulting from electric field-induced deformation of piezoelectric or electrostrictive material, providing a simple and accurate means for measuring voltage applied either by direct contact with the crystalline material or by subjecting the material to an electric field.

Weiss, J.D.

1995-12-31T23:59:59.000Z

289

Technologies for Remote Monitoring of Substation Assets: Physical Security  

Science Conference Proceedings (OSTI)

This report assesses the benefits of including remote monitoring with the various security technologies used for providing physical security to substation facilities and equipment. This remote monitoring provides near-real-time security information on the access points to substation facilities as well as the status and health of equipment to determine if the equipment has been tampered with or is otherwise not functioning correctly. The types of security technologies include locks at gates and doors, vid...

2006-03-13T23:59:59.000Z

290

From Promoting Security to Enforcing It: The Integration of the European Security Strategy during the Solana Era.  

E-Print Network (OSTI)

??This dissertation seeks to assess the degree of integration in the sector of security and defense of the European Union. The emphasis is brought on… (more)

Larivé, Maxime H. A.

2012-01-01T23:59:59.000Z

291

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

292

Elevated Neutral to Earth and Contact Voltages in Distribution Systems  

Science Conference Proceedings (OSTI)

Perceptible voltage potentials at publicly and privately accessible human and animal contact locations pose concerns for utilities, regulators, and the public. Each year since 2004, EPRI research in this area has considered the most important concerns associated with these perceptible voltages by promoting consistent and repeatable assessment methodologies, sponsoring workshops, and creating a repository of case studies and general information. These and other project efforts are geared toward expediting...

2008-12-18T23:59:59.000Z

293

Cable Aging Management Training Course for Low-Voltage Cables  

Science Conference Proceedings (OSTI)

The "EPRI PSE Cable Aging Training Course for Low-Voltage Cables" provides a basis for understanding of the aging of the insulation and jackets of electrical cables used in low-voltage systems. Practical techniques for determining which cables are prone to premature aging and for evaluating their condition are described. The course contains 11 modules. The first 9 modules describe the body of the cable aging management process. The last two modules, "Cable Failure Assessment" and "Performing a Walkdown o...

2003-11-24T23:59:59.000Z

294

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

295

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

296

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

297

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

298

Philosophy on Vulnerability Assessments  

NLE Websites -- All DOE Office Websites (Extended Search)

capabilities/vat/assess/ capabilities/vat/assess/ ARGONNE NATIONAL LABORATORY, Nuclear Engineering Division, 9700 South Cass Ave., Argonne, IL Philosophy on Vulnerability Assessments Argonne Vulnerability Assessment Team Roger G. Johnston, Ph.D., CPP , 630-252-6168 1. There are a number of conventional tools for finding security vulnerabilities. These include security surveys, risk management, design basis threat, CARVER Method, Delphi Method, software vulnerability assessment tools, infrastructure modeling, etc. 2. These tools have some value, and indeed we have used them all. 3. Experience has shown, however, that these methods do not usually result in dramatic improvements to security, nor do they reliably predict catastrophic security incidents that

299

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

300

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Two terminal line voltage thermostat  

Science Conference Proceedings (OSTI)

A two terminal line voltage thermostat includes a switch which effectively connects line voltage to a heater load. The entire process is controlled by an integrated circuit microcontroller which is powered by a rectified voltage from a transformer secondary connected to a primary which is in series with the heater load. Backup battery power is provided to maintain limited functions of the microcontroller in the event of overall power loss. The microcontroller is programmed to meet the temperature sensing and control requirements specific to a two terminal electric baseboard heating installation. 7 figs.

Stalsberg, K.J.; Ingalls, J.E.; Hoglund, S.R.

1995-10-10T23:59:59.000Z

302

Nonproliferation and National Security Multimedia - Argonne National  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation and National Security Nonproliferation and National Security > Multimedia Multimedia Nuclear Systems Analysis Engineering Analysis Nonproliferation and National Security Detection & Diagnostic Systems Engineering Development & Applications Argonne's Nuclear Science & Technology Legacy Other Multimedia Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Bookmark and Share Nonproliferation and National Security: Multimedia Related Resources Nonproliferation and National Security Vulnerability Assessment Team (VAT) Click on the "Date" header to sort the videos/podcasts in chronological order (ascending or descending). You may also search for a specific keyword; click on the reset button refresh to remove the keyword filter and show again all the Videos/Podcasts.

303

Y-12 National Security Complex - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Y-12 National Security Complex Review Reports 2013 Independent Oversight Appraisal of the Uranium Processing Facility Safety Basis Preliminary Safety Design Report Process at the Y-12 National Security Complex, May 2013 Review Reports 2012 Review of the Long Lead Procurement Processed Used by Babcock & Wilcox Technical Services Y-12, LLC for the Uranium Processing Facility Project, July 2012 Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project, June 2012 Review of the Y-12 Implementation Verification Review Processes, June 2012 Targeted Review of Site Preparedness for Severe Natural Phenomena Events at the Y-12 National Security Complex, February 2012 Office of Nuclear Safety Enforcement Regulatory Assistance Review of B&W Technical Services Y-12, LLC at the Y-12 National Security Complex, January 20, 2012

304

V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue 0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue July 2, 2013 - 12:38am Addthis PROBLEM: ASUS RT-N66U Router AiCloud Security Bypass Security Issue PLATFORM: ASUS RT-N66U Router firmware versions 3.0.0.4.270 and 3.0.0.4.354. ABSTRACT: A security issue in ASUS RT-N66U Router has been reported REFERENCE LINKS: Secunia Advisory SA53931 neohapsis IMPACT ASSESSMENT: Medium DISCUSSION: The security issue is caused due to the device not properly restricting access when processing certain HTTPS requests and can be exploited to gain access to otherwise restricted functionality and e.g. disclose the contents of arbitrary files and directories. Successful exploitation requires the AiCloud web service to be enabled.

305

Information Security Policy & Guidelines and provides minimum policies and  

E-Print Network (OSTI)

guidelines for agencies to follow in their implementation of the Tasmanian Government Information Security Charter. This document outlines a Risk Assessment and Management process agencies can use to support their information security planning. The methodology expands on AS/NZS 4360:2004 Risk Management to provide a consistent framework for agencies to assess their information security risks. The standard is an essential reference document to the methodology.

unknown authors

2005-01-01T23:59:59.000Z

306

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

307

The Security Epidemic  

NLE Websites -- All DOE Office Websites (Extended Search)

5-1130 5-1130 A different version of this appeared in Security Management 50, pp. 88-94 (2006). Turnkey Turnover Solutions: Powerful Tools and Experts are Available! Eddie G. Bitzer III, M.A. and Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Los Alamos National Laboratory Introduction It's early in World War II, and the US is scrambling to put together an effective fighting force. But how to you select and place millions of former civilians into military positions that will suit their abilities and temperament? The Army turned to industrial/organizational (I/O) psychologists. To solve this problem, the I/O psychologists developed the Army General Classification Test (AGCT), which later evolved into the Armed Services Vocational Aptitude Battery (ASVAB) still used

308

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

309

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in today’s software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

310

Definition: Automated Voltage Regulators | Open Energy Information  

Open Energy Info (EERE)

Regulators Regulators Jump to: navigation, search Dictionary.png Automated Voltage Regulators Voltage regulators are transformers that can increase or decrease the voltage on a distribution circuit to help keep the voltage within a pre-determined band. Unlike capacitor banks, voltage regulators cannot adjust power factor. These devices typically monitor the voltage at the location where they are connected, and compare it to a programmed set point. If the voltage deviates too far from the set point, the voltage regulator can increase or decrease its output voltage by moving the tap on the secondary side up or down. An automated voltage regulator can operate with remote control signals, or in concert with other area voltage control devices, to help regulate distribution voltage in a coordinated fashion.

311

High-voltage-compatible, fully depleted CCDs  

E-Print Network (OSTI)

result of this high-voltage requirement, we have taken a di?voltage is necessary in order to meet the PSF requirementsrequirements for SNAP have resulted in a need to operate at substrate bias voltages

2006-01-01T23:59:59.000Z

312

Chapter 4 - Understanding Voltage Sags  

Science Conference Proceedings (OSTI)

This chapter of the EPRI Solutions PQ Encyclopedia provides information for understanding the voltage sag, which is the single most potent cause of end user power quality (PQ) problems.

2005-12-31T23:59:59.000Z

313

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix Secure Gateway Unspecified Vulnerability 6: Citrix Secure Gateway Unspecified Vulnerability T-566: Citrix Secure Gateway Unspecified Vulnerability February 28, 2011 - 11:22pm Addthis PROBLEM: Citrix Secure Gateway Unspecified Vulnerability. PLATFORM: Citrix Secure Gateway version 3.1.4 ABSTRACT: A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia Advisory SA43497 Citrix Support IMPACT ASSESSMENT: High Discussion: This vulnerability only affects Secure Gateway version 3.1.4. Secure Gateway version 3.2.0 is not affected by this vulnerability, but Citrix recommends that customers currently using this version upgrade their deployments to version 3.2.1 in line with the guidance provided in

314

T-687: Microsoft Security Bulletin Advance Notification for August 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

87: Microsoft Security Bulletin Advance Notification for August 87: Microsoft Security Bulletin Advance Notification for August 2011 T-687: Microsoft Security Bulletin Advance Notification for August 2011 August 8, 2011 - 3:50pm Addthis PROBLEM: This is an advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Advance Notification for August 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: An advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. 12 Bulletin updates and two are considered 'Critical'. Impact: This advance notification provides a number as the bulletin identifier,

315

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

316

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

317

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

318

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

319

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

320

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

323

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

324

Oversight Reports - Y-12 National Security Complex | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Y-12 National Security Complex Y-12 National Security Complex Oversight Reports - Y-12 National Security Complex Independent Oversight Appraisal, Y-12 National Security Complex - May 2013 Appraisal of the Uranium Processing Facility Safety Basis Preliminary Safety Design Report Process at the Y-12 National Security Complex Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02] Independent Oversight Assessment, Y-12 National Security Complex - June 2012 Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project Independent Oversight Review, Babcock & Wilcox Technical Services Y-12, LLC

325

Index of Energy Security Risk | Open Energy Information  

Open Energy Info (EERE)

Index of Energy Security Risk Index of Energy Security Risk Jump to: navigation, search Tool Summary Name: Index of Energy Security Risk Agency/Company /Organization: United States Chamber of Commerce, Institute for 21st Century Energy Sector: Energy Focus Area: Non-renewable Energy, Renewable Energy Topics: Co-benefits assessment, - Energy Security Resource Type: Publications Website: www.energyxxi.org/images/Energy_Index_2011_FINAL.pdf Cost: Free Index of Energy Security Risk Screenshot References: Index of Energy Security Risk[1] "This 2011 edition of the Index incorporates the most current energy data, including the Energy Information Administration's (EIA) Annual Energy Outlook 2011 (AEO 2011), to provide an up-to-date assessment of the trends having the greatest impact on energy security since the first Index was

326

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

327

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

328

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

329

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

330

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

331

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

332

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

333

Performance of Dynamic Voltage Restorer (DVR) against Voltage Sags and Swells Using Space Vector PWM Technique  

Science Conference Proceedings (OSTI)

Due to increasing complexity in the power system, voltage sags are now becoming one of the most significant power quality problems. Voltage sag is a short reduction voltage from nominal voltage, occurs in a short time. Short-lived voltage sags may not ... Keywords: Custom power, power quality, voltage sag, SPWM, SVPWM, DVR, PSCAD/EMTDC.

Palaparthi Ananthababu; Burle Trinadha; K. Ram Charan

2009-12-01T23:59:59.000Z

334

A CMOS threshold voltage reference source for very-low-voltage applications  

Science Conference Proceedings (OSTI)

This paper describes a CMOS voltage reference that makes use of weak inversion CMOS transistors and linear resistors, without the need for bipolar transistors. Its operation is analogous to the bandgap reference voltage, but the reference voltage is ... Keywords: Threshold voltage, Ultra-low-power, Very-low-voltage, Voltage reference

Luis H. C. Ferreira; Tales C. Pimenta; Robson L. Moreno

2008-12-01T23:59:59.000Z

335

Surge voltage suppression in residential power circuits  

Science Conference Proceedings (OSTI)

... Tran- sients in Low Voltage Supply Systems,'' The ... a high-voltage transformer for an oil furnace ... of service entrance SPD of 1960-1970 vintage were ...

2013-05-17T23:59:59.000Z

336

Control Systems Security Test Center - FY 2004 Program Summary  

Science Conference Proceedings (OSTI)

In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

Robert E. Polk; Alen M. Snyder

2005-04-01T23:59:59.000Z

337

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

338

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

339

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

340

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

342

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

343

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

344

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

345

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

346

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

347

Situated Usability Testing for Security Systems  

Science Conference Proceedings (OSTI)

While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused on matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.

Greitzer, Frank L.

2011-03-02T23:59:59.000Z

348

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

349

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

350

Security Sciences Field Lab (SSFL) | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Science Nuclear Science Research Areas Research Highlights Facilities and Capabilities Educational Outreach Publications and Reports News and Awards Nuclear Science Home | Science & Discovery | Nuclear Science | Facilities and Capabilities SHARE Security Sciences Field Laboratory May 30, 2013 The Security Sciences Field Laboratory (SSFL) is designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including: sensors; cameras; alarm communication and display; power generation; access control; unattended stand-alone, remote communication; unmanned aerial and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain such as open grassy fields, hilly wooded areas, sand

351

National Nuclear Security Administration Contractor Governance, IG-0881  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Contractor Governance DOE/IG-0881 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 February 19, 2013 MEMORANDUM FOR THE ACTING ADMINISTRATOR, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "National Nuclear Security Administration Contractor Governance" INTRODUCTION Since July 2007, the Department of Energy (Department) and the National Nuclear Security Administration (NNSA) have required contractors to implement self-assessment systems to measure performance and help ensure effective and efficient mission accomplishment. Each

352

Enforcement of DOE Classified Information Security Requirements Under Title  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of DOE Classified Information Security Requirements of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 Enforcement of DOE Classified Information Security Requirements Under Title 10, Code of Federal Regulations, Part 824 In publishing 10 CFR Part 824, DOE has determined that civil penalties under Part 824 will only be assessed for violations of requirements for the protection of classified information (Restricted Data, Formerly Restricted Data and National Security Information). The rule does not include civil penalties relating to failure to protect sensitive but unclassified information. IMPLEMENTATION GUIDANCE More Documents & Publications Safety and Security Enforcement Process Overview Preliminary Notice, Battelle Energy Alliance, LLC, SEA-2011-01

353

Independent Oversight Review, Nevada Site Office and National Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Site Office and National Site Office and National Security Technologies, LLC - November 2011 Independent Oversight Review, Nevada Site Office and National Security Technologies, LLC - November 2011 November 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems Self-Assessment The purpose of this independent oversight review by the U.S. Department of Energy (DOE) Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), was to shadow the Nevada Site Office (NSO) and the National Security Technologies, LLC (NSTec), line oversight and contractor assurance systems (LOCAS) self-assessment conducted September 19 - 23, 2011, at the Nevada National Security Site (NNSS). The NSO/NSTec self-assessment focused on:

354

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

355

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

356

Homeland Security Issues for Facilities  

E-Print Network (OSTI)

The events of September 11, 2001, along with the Oklahoma City bombing and Washington, DC area sniper attacks have forever changed America's sense of security. Federal, state, and local governments, businesses, and individual homeowners have become more aware of safety, security, and protecting property and people should similar incidents occur in the future. The initial steps in facility protection are identifying potential threats and evaluating the condition of existing building infrastructure and systems. After assessments are complete, the results should be compared with guidelines and recommendations produced by government agencies or professional organizations. Areas to address to enhance security and safety include ventilation, control systems, air filtration, alarm systems, building access, and surveillance. This paper will look at the objectives of task forces, sources of information, and measures owners can take in schools and other facilities. Although actions involving increased awareness, structural reinforcement, and emergency water supplies are important, this discussion will focus on mechanical and security systems and related items. The authors' experiences in assisting Texas school districts will also be shared.

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

357

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

358

Automated Voltage Control in LHCb  

E-Print Network (OSTI)

LHCb is one of the 4 LHC experiments. In order to ensure the safety of the detector and to maximize efficiency, LHCb needs to coordinate its own operations, in particular the voltage configuration of the different subdetectors, according to the accelerator status. A control software has been developed for this purpose, based on the Finite State Machine toolkit and the SCADA system used for control throughout LHCb (and the other LHC experiments). This software permits to efficiently drive both the Low Voltage (LV) and High Voltage (HV) systems of the 10 different sub-detectors that constitute LHCb, setting each sub-system to the required voltage (easily configurable at run-time) based on the accelerator state. The control software is also responsible for monitoring the state of the Sub-detector voltages and adding it to the event data in the form of status-bits. Safe and yet flexible operation of the LHCb detector has been obtained and automatic actions, triggered by the state changes of the ...

Granado Cardoso, L; Jacobsson, R

2011-01-01T23:59:59.000Z

359

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

360

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

362

Portec Voltage Regulators: for Emergency Diesel Generators  

Science Conference Proceedings (OSTI)

This report contains information to help utilities address emergency diesel generator voltage regulator issues.

2004-12-15T23:59:59.000Z

363

A voltage controlled current source  

DOE Patents (OSTI)

A seven decade, voltage controlled current source is described for use in testing intermediate range nuclear instruments that covers the entire test current range of from 10 picoampers to 100 microamperes. High accuracy is obtained throughout the entire seven decades of output current with circuitry that includes a coordinated switching scheme responsive to the input signal from a hybrid computer to control the input voltage to an antilog amplifier, and to selectively connect a resistance to the antilog amplifier output to provide a continuous output current source as a function of a preset range of input voltage. An operator controlled switch provides current adjustment for operation in either a real-time simulation test mode or a time response test mode.

Casne, G.M.

1990-12-21T23:59:59.000Z

364

Ancillary service details: Voltage control  

SciTech Connect

Voltage control is accomplished by managing reactive power on an alternating-current power system. Reactive power can be produced and absorbed by both generation and transmission equipment. Reactive-power devices differ substantially in the magnitude and speed of response and in their capital costs. System operators, transmission owners, generators, customers, power marketers, and government regulators need to pay close attention to voltage control as they restructure the U.S. electricity industry. Voltage control can affect reliability and commerce in three ways: (1) Voltages must be maintained within an acceptable range for both customer and power-system equipment to function properly. (2) The movement of reactive power consumes transmission resources, which limits the ability to move real power and worsens congestion. (3) The movement of reactive power results in real-power losses. When generators are required to supply excessive amounts of reactive power, their real-power production must be curtailed. These opportunity costs are not currently compensated for in most regions. Current tariffs are based on embedded costs. These embedded-cost tariffs average about $0.51/MWh, equivalent to $1.5 billion annually for the United States as a whole. Although this cost is low when compared with the cost of energy, it still aggregates to a significant amount of money. This report takes a basic look at why the power system requires reactive power (an appendix explains the fundamentals of real and reactive power). The report then examines the various types of generation and transmission resources used to supply reactive power and to control voltage. Finally it discusses how these resources are deployed and paid for in several reliability regions around the country. As the U.S. electricity industry is restructured, the generation, transmission, and system-control equipment and functions that maintain voltages within the appropriate ranges are being deintegrated.

Kirby, B.; Hirst, E.

1997-12-01T23:59:59.000Z

365

287 Security Blunders You Should Avoid  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Blunders ! Security Blunders ! You Should Avoid" Jon S. Warner, Ph.D. Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Argonne National Laboratory 630-252-6168 rogerj@anl.gov http://www.ne.anl.gov/capabilities/vat Presentation for the ASIS International Annual Meeting! Anaheim, CA, September 21-24, 2009! Sponsors! *! DHS! *! DoD! *! DOS! *! IAEA! *! Euratom! *! DOE/NNSA! *! private companies! *! intelligence agencies! *! public interest organizations! The VAT has done detailed ! vulnerability assessments on! hundreds of different security! devices, systems, & programs.! Vulnerability Assessment Team (VAT)" The greatest of faults, I should say, is to be conscious of none. -- Thomas Carlyle (1795-1881) A multi-disciplinary team of physicists,

366

T-628: Debian APR Library Security Update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update May 23, 2011 - 3:35pm Addthis PROBLEM: Debian APR Library Security Update. PLATFORM: APR packages: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0 ABSTRACT: A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. reference LINKS: Debian Security Advisory DSA-2237-2 Security Database Adviory Security Focus Advisory CVE-2011-1928 CVE-2011-0419 Secunia Advisory SA44574 IMPACT ASSESSMENT: Medium Discussion: A directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack.

367

U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |  

NLE Websites -- All DOE Office Websites (Extended Search)

97: Cisco Adaptive Security Appliances Denial of Service 97: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability is caused due to an unspecified error when handling IPv6 transit traffic and can be exploited to cause a reload of the affected device. reference LINKS: Vendor Advisory Secunia ID 49647 CVE-2012-3058 IMPACT ASSESSMENT: High Discussion: Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) and Cisco

368

T-717: Microsoft Security Bulletin Summary for September 2011 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Microsoft Security Bulletin Summary for September 2011 7: Microsoft Security Bulletin Summary for September 2011 T-717: Microsoft Security Bulletin Summary for September 2011 September 14, 2011 - 9:30am Addthis PROBLEM: Summary of Microsoft security bulletins released on September 13, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Summary for September 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: CVE-2011-1984 - MS11-070 WINS Local Elevation of Privilege Vulnerability CVE-2011-1991 - MS11-071 Windows Components Insecure Library Loading Vulnerability CVE-2011-1986 - MS11-072 Excel Use after Free WriteAV Vulnerability CVE-2011-1987 - MS11-072 Excel Out of Bounds Array Indexing Vulnerability

369

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

370

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

371

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

372

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

373

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

374

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

375

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

376

Independent Activity Report, Office of Secure Transportation - March 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Activity Report, Office of Secure Transportation - Activity Report, Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the Emergency Planning Hazards Assessment and Protection Action Recommendation Cards for the Office of Secure Transportation [HIAR-OST-2011-03-04] The Office of Emergency Management Oversight (HS-63) conducted a review of a new revision of the Office of Secure Transportation (OST) emergency planning hazards assessment (EPHA) and protective action recommendation (PAR) cards. The review was conducted at the Headquarters OST Albuquerque Office. The purpose of the visit was to evaluate the appropriateness of OST's path forward in revising the EPHA and PAR cards. Independent Activity Report, Office of Secure Transportation - March 2011

377

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

378

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

379

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

380

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

382

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

383

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

384

Strategic Insights on Security, Quality, Reliability, and Availability  

Science Conference Proceedings (OSTI)

This report provides security criteria and performance metrics for assessing the electric power system. It is part of a larger project on the strategy for managing security, quality, reliability, and availability (SQRA) performance of electric power systems. The main focus of this update is measurement of the security component. It also addresses emerging North American Electric Reliability Council (NERC) operating and planning standards and their roles in managing SQRA performance. This report is intend...

2005-03-31T23:59:59.000Z

385

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

386

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

387

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

388

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

389

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

390

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

391

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

392

Vulnerability Assessment Team (VAT) - Nuclear Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

Vulnerability Assessment Team Vulnerability Assessment Team VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms

393

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

394

V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. REFERENCE LINKS: Cisco Security Notice CVE-2013-1172 Cisco Security Notice CVE-2013-1173 SecurityTracker Alert ID: 1028425 CVE-2013-1172 CVE-2013-1173 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger a heap overflow in the Cisco Host Scan component to execute arbitrary code on the target system with System privileges

395

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

396

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

397

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

398

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

399

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

400

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

402

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow… (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

403

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

404

High voltage photovoltaic power converter  

DOE Patents (OSTI)

An array of independently connected photovoltaic cells on a semi-insulating substrate contains reflective coatings between the cells to enhance efficiency. A uniform, flat top laser beam profile is illuminated upon the array to produce electrical current having high voltage. An essentially wireless system includes a laser energy source being fed through optic fiber and cast upon the photovoltaic cell array to prevent stray electrical signals prior to use of the current from the array. Direct bandgap, single crystal semiconductor materials, such as GaAs, are commonly used in the array. Useful applications of the system include locations where high voltages are provided to confined spaces such as in explosive detonation, accelerators, photo cathodes and medical appliances.

Haigh, Ronald E. (Arvada, CO); Wojtczuk, Steve (Cambridge, MA); Jacobson, Gerard F. (Livermore, CA); Hagans, Karla G. (Livermore, CA)

2001-01-01T23:59:59.000Z

405

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

406

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Bürkle; Alice Hertel; Wilmuth Müller; Martin Wieser

2006-09-01T23:59:59.000Z

407

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

408

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

409

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

410

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

411

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

412

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

413

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

414

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

415

TRANSISTOR HIGH VOLTAGE POWER SUPPLY  

DOE Patents (OSTI)

High voltage, direct current power supplies are described for use with battery powered nuclear detection equipment. The particular advantages of the power supply described, are increased efficiency and reduced size and welght brought about by the use of transistors in the circuit. An important feature resides tn the employment of a pair of transistors in an alternatefiring oscillator circuit having a coupling transformer and other circuit components which are used for interconnecting the various electrodes of the transistors.

Driver, G.E.

1958-07-15T23:59:59.000Z

416

Nonproliferation and National Security - Nuclear Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation and Nonproliferation and National Security CAPABILITIES Overview Nuclear Systems Modeling and Design Analysis Nuclear Systems Technologies Risk and Safety Assessments Nonproliferation and National Security Materials Testing Engineering Computation & Design Engineering Experimentation Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Celebrating the 70th Anniversary of Chicago Pile 1 (CP-1) Argonne OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Capabilities Nonproliferation and National Security Bookmark and Share Nuclear Export Controls Nuclear Exports Controls We provide technical advisory services to DOE in the implementation of U.S. nonproliferation policy. This includes assessments of proliferation risks presented by emerging technologies and

417

Rescuing of intelligence and electronic security core applications (RIESCA)  

Science Conference Proceedings (OSTI)

There are number of systems, such as transport and logistic, power and telecommunication, hydropower and nuclear power stations; that are critical systems for the functioning of day-to-day life of the society in Finland. When assessing possible risks, ... Keywords: critical infrastructure, critical process and societal security, critical system, data maining, method development, security core application

Rauno Pirinen; Jyri Rajamäki; Lili Aunimo

2008-10-01T23:59:59.000Z

418

WWWeeesssttteeerrrnnn CCCaaarrrooollliiinnnaaa UUUnnniiivvveeerrrsssiiitttyyy Annual Security and Fire Safety Report  

E-Print Network (OSTI)

Annual Security and Fire Safety Report 2012 #12;Page | 2 TTAABBLLEEOOFFCCOONNTTEENNTTSS The Office of Equal Opportunity & Diversity Programs o Behavioral Assessment Team o Campus Security for those with a Substance Abuse Problem · Weapons on Campus · Preventing and Responding to Sex Offenses

Holliday, Mark A.

419

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

420

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

422

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

423

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

424

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

425

Status of Educational Efforts in National Security Workforce  

Science Conference Proceedings (OSTI)

This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

None

2008-03-31T23:59:59.000Z

426

Voltage unbalance effects on induction motor performance  

Science Conference Proceedings (OSTI)

The reliability of electric drives and driven motors depends on the quality of the power supply voltage especially in the critical industrial process. In this work, a theoretical study of the effects of voltage unbalances, sags and swells on induction ... Keywords: efficiency, power losses and derating factor, sags, symmetrical components, voltage unbalance

L. Refoufi; H. Bentarzi; F. Z. Dekhandji

2006-09-01T23:59:59.000Z

427

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

428

Public key infrastructure for DOE security research  

SciTech Connect

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

429

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

430

T-724: Microsoft Security Advisory: Fraudulent digital certificates could  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

724: Microsoft Security Advisory: Fraudulent digital certificates 724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing T-724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing September 22, 2011 - 12:45pm Addthis PROBLEM: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing. PLATFORM: Microsoft Untrusted Certificate Store: DigiNotar root certificates ABSTRACT: Microsoft has released a Microsoft security advisory about this issue for IT professionals. reference LINKS: MS Article ID: 2616676 Microsoft Security Advisory: 2607712 DOE-CIRC Tech Bulletin: T-706 IMPACT ASSESSMENT: Medium Discussion: The Microsoft update revokes the trust of the following DigiNotar root certificates by putting them in the Microsoft Untrusted Certificate Store:

431

Independent Oversight Inspection, Y-12 National Security Complex, Volume  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Independent Oversight Inspection, Y-12 National Security Complex, Independent Oversight Inspection, Y-12 National Security Complex, Volume III - November 2001 Independent Oversight Inspection, Y-12 National Security Complex, Volume III - November 2001 November 2001 Inspection of Emergency Management at the Y-12 National Security Complex The Secretary of Energy's Office of Independent Oversight and Performance Assurance (OA) conducted an emergency management program review at the Y-12 National Security Complex (Y-12) in October 2001. The purpose of this inspection was to assess Y-12's readiness to protect site personnel and the public from the consequences of onsite events that could result in the release of hazardous materials from site facilities and activities. Independent Oversight Inspection, Y-12 National Security Complex, Volume

432

Interactions Between Energy Security and Climate Change: A Focus on  

Open Energy Info (EERE)

Interactions Between Energy Security and Climate Change: A Focus on Interactions Between Energy Security and Climate Change: A Focus on Developing Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Interactions Between Energy Security and Climate Change: A Focus on Developing Countries Agency/Company /Organization: Morgan Bazilian, Benjamin F. Hobbs, Will Blyth, Iain MacGill, Mark Howells Partner: Energy Policy Sector: Energy, Climate Topics: Co-benefits assessment, - Energy Security Resource Type: Publications Website: www.sciencedirect.com/science?_ob=MImg&_imagekey=B6V2W-52SN633-5-1&_cd Cost: Free Interactions Between Energy Security and Climate Change: A Focus on Developing Countries Screenshot References: Interactions Between Energy Security and Climate Change: A Focus on Developing Countries[1]

433

Compliance Order, Los Alamos National Security, LLC - July 12, 2007 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Compliance Order, Los Alamos National Security, LLC - July 12, 2007 Compliance Order, Los Alamos National Security, LLC - July 12, 2007 Compliance Order, Los Alamos National Security, LLC - July 12, 2007 July 12, 2007 Issued to Los Alamos National Security, LLC related to the Unauthorized Reproduction and Removal of Classified Matter from the Los Alamos National Laboratory The Compliance Order directs LANS to implement specific corrective actions to remediate both the laboratory management deficiencies that contributed to the thumb drive security incident at Los Alamos National Laboratory (LANL) discovered in October 2006 and, more broadly, longstanding deficiencies in the classified information and cyber security programs at LANL. Violation of the Compliance Order would subject LANS to issuance of a notice of violation and assessment of civil penalties up to S100,000 per

434

Compliance Order, Los Alamos National Security, LLC - July 12, 2007 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Compliance Order, Los Alamos National Security, LLC - July 12, 2007 Compliance Order, Los Alamos National Security, LLC - July 12, 2007 Compliance Order, Los Alamos National Security, LLC - July 12, 2007 July 12, 2007 Issued to Los Alamos National Security, LLC related to the Unauthorized Reproduction and Removal of Classified Matter from the Los Alamos National Laboratory The Compliance Order directs LANS to implement specific corrective actions to remediate both the laboratory management deficiencies that contributed to the thumb drive security incident at Los Alamos National Laboratory (LANL) discovered in October 2006 and, more broadly, longstanding deficiencies in the classified information and cyber security programs at LANL. Violation of the Compliance Order would subject LANS to issuance of a notice of violation and assessment of civil penalties up to S100,000 per

435

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

436

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

437

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

438

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

439

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

440

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

442

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

443

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

444

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

445

Influence of voltage drop to electric drive with induction motor and voltage sourced inverter  

Science Conference Proceedings (OSTI)

This paper solves problematic of immunity from the voltage drop of the power supply of the electric drive with induction motor with Voltage-Fed inverter. There are reflected opportune control algorithms for the quickly to change of working regime from ... Keywords: electric drive with induction motor, electric drive with voltage sourced inverter, voltage drop

P. Beneš; J. Fo?t; M. Pittermann

2011-09-01T23:59:59.000Z

446

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

447

High voltage RF feedthrough bushing  

DOE Patents (OSTI)

Described is a multi-element, high voltage radio frequency bushing for trmitting RF energy to an antenna located in a vacuum container. The bushing includes a center conductor of complex geometrical shape, an outer coaxial shield conductor, and a thin-walled hollow truncated cone insulator disposed between central and outer conductors. The shape of the center conductor, which includes a reverse curvature portion formed of a radially inwardly directed shoulder and a convex portion, controls the uniformity of the axial surface gradient on the insulator cone. The outer shield has a first substantially cylindrical portion and a second radially inwardly extending truncated cone portion.

Grotz, Glenn F. (Huntington Station, NY)

1984-01-01T23:59:59.000Z

448

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

449

Low power, scalable multichannel high voltage controller  

DOE Patents (OSTI)

A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

Stamps, James Frederick (Livermore, CA); Crocker, Robert Ward (Fremont, CA); Yee, Daniel Dadwa (Dublin, CA); Dils, David Wright (Fort Worth, TX)

2006-03-14T23:59:59.000Z

450

Low power, scalable multichannel high voltage controller  

DOE Patents (OSTI)

A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

Stamps, James Frederick (Livermore, CA); Crocker, Robert Ward (Fremont, CA); Yee, Daniel Dadwa (Dublin, CA); Dils, David Wright (Fort Worth, TX)

2008-03-25T23:59:59.000Z

451

Security Evaluation for Software System with Vulnerability Life Cycle and User Profiles  

Science Conference Proceedings (OSTI)

This paper proposes the definition of a security criterion and security assessment based on the criterion. More precisely, we present a stochastic model with a vulnerability life-cycle model and a user profile using continuous-time Markov chains. The ... Keywords: vulnerability, security evaluation, user profile

Hiroyuki Okamura; Masataka Tokuzane; Tadashi Dohi

2012-11-01T23:59:59.000Z

452

Dynamic Voltage Regulation Using Distributed Energy Resources  

Science Conference Proceedings (OSTI)

Many distributed energy resources (DE) are near load centres and equipped with power electronics converters to interface with the grid, therefore it is feasible for DE to provide ancillary services such as voltage regulation, nonactive power compensation, and power factor correction. A synchronous condenser and a microturbine with an inverter interface are implemented in parallel in a distribution system to regulate the local voltage. Voltage control schemes of the inverter and the synchronous condenser are developed. The experimental results show that both the inverter and the synchronous condenser can regulate the local voltage instantaneously, while the dynamic response of the inverter is faster than the synchronous condenser; and that integrated voltage regulation (multiple DE perform voltage regulation) can increase the voltage regulation capability, increase the lifetime of the equipment, and reduce the capital and operation costs.

Xu, Yan [ORNL; Rizy, D Tom [ORNL; Li, Fangxing [ORNL; Kueck, John D [ORNL

2007-01-01T23:59:59.000Z

453

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

454

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

455

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

456

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

457

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

458

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

459

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

460

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

462

Security Resiliency Testing  

Science Conference Proceedings (OSTI)

An accepted practice within the electric sector is to pre-stage and test equipment before deployment. Verification of functionality, operating parameters, and interoperability of equipment to be deployed can often be incorporated into predeployment testing. This testing may also support the selection of features responsible for the security of the host equipment. However, some security features and many aspects of resiliency testing may require activation, interaction, and interoperability with an ...

2013-12-02T23:59:59.000Z

463

Transportation Security Update  

Science Conference Proceedings (OSTI)

The U.S. Department of Transportation (DOT) final rules issued in 2003 required persons who offer for transportation or transport certain hazardous materials to develop and implement security plans. The Electric Power Research Institute (EPRI) formed a Transportation Security Implementation Working Group, which included representation from the Nuclear Energy Institute (NEI), to identify key projects, which were documented in the original report in 2005. This report updates information in the original rep...

2011-07-27T23:59:59.000Z

464

Data port security lock  

DOE Patents (OSTI)

In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

2008-06-24T23:59:59.000Z

465

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

466

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

467

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

468

Publicly Submitted White Papers - Security  

Science Conference Proceedings (OSTI)

... Security Threats, Exploits, Vulnerabilites, Incidents, and Responses; ... CAHV); Critical Incident Response and Disaster Recovery Assistance; ...

2011-08-02T23:59:59.000Z

469

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

470

News: IBM launches security offensive  

Science Conference Proceedings (OSTI)

IBM has announced a major security push, representing a US$1.5 billion investment in security-related projects next year. It will partner with other security vendors to offer a set of security services targeting information assets. The services will ...

2007-11-01T23:59:59.000Z

471

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

472

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

473

Security-oriented program transformations  

Science Conference Proceedings (OSTI)

Security experts generally believe that, "security cannot be added on, it must be designed from the beginning" [1]. This is because the typical way of improving system security by patches is ad hoc and has not produced good results. My work shows that ... Keywords: program transformation, security

Munawar Hafiz; Ralph E. Johnson

2009-04-01T23:59:59.000Z

474

Secure Windows Dr. Bernd Borchert  

E-Print Network (OSTI)

Secure Windows Dr. Bernd Borchert WSI fĂĽr Informatik Univ. TĂĽbingen #12;Problem: Trojans Server Windows" Server (encoding) Internet #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows

Borchert, Bernd

475

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

476

Security Outreach and Integration Group  

Science Conference Proceedings (OSTI)

Security Outreach and Integration Group. Welcome. The US economy, citizens, and government rely on information technology. ...

2013-01-17T23:59:59.000Z

477

UH Mnoa Contacts: Campus Security  

E-Print Network (OSTI)

UH Mnoa Contacts: Campus Security 956-6911 Security Escort Service 956-SAFE Women's Center 956 pauvaw@hawaii.edu University Health Services 956-8965 www.hawaii.edu/shs/ Mlama Pono | www.hawaii.edu/security if you think you have been drugged. Police and Campus Security are trained in assisting with these types

478

Brief No. 9 WATER SECURITY,  

E-Print Network (OSTI)

Brief No. 9 WATER SECURITY, RISK & SOCIETY 1 of 4 Water Security and Federal Rivers March 2012 Australian National University Key messages · Water security in a hydroclimatic risk society. Climate risks interact with rapidly changing social, demographic and economic forces to position water security

New, Mark

479

Assessment  

NLE Websites -- All DOE Office Websites (Extended Search)

Genetic Genetic Variability of Cell Wall Degradability for the Selection of Alfalfa with Improved Saccharification Efficiency Marc-Olivier Duceppe & Annick Bertrand & Sivakumar Pattathil & Jeffrey Miller & Yves Castonguay & Michael G. Hahn & Réal Michaud & Marie-Pier Dubé # Her Majesty the Queen in Right of Canada 2012 Abstract Alfalfa (Medicago sativa L.) has a high potential for sustainable bioethanol production, particularly because of its low reliance on N fertilizer. We assessed near-infrared reflec- tance spectroscopy (NIRS) as a high-throughput technique to measure cell wall (CW) degradability in a large number of lignified alfalfa stem samples. We also used a powerful immu- nological approach, glycome profiling, and chemical analyses to increase our knowledge of the composition of CW poly- saccharides of alfalfa stems with various levels

480

Designation Order No. 00-08.00A to the Chief Health, Safety and Security Officer  

Directives, Delegations, and Requirements

Designated as the DOE official responsible for enforcement of 10 CFR 824 pertaining to the assessment of civil penalties for classified information security ...

2007-07-20T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

482

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

483

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

484

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

485

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

486

2012 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses  

SciTech Connect

The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC 2007a) requires an annual review to assess the adequacy of the performance assessments (PAs) and composite analyses (CAs), with the results submitted to the U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE 1999a, 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2012. This annual summary report presents data and conclusions from the FY 2012 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2012 include the following: ? Release of a special analysis for the Area 3 RWMS assessing the continuing validity of the PA and CA ? Development of a new Area 5 RWMS closure inventory estimate based on disposals through FY 2012 ? Evaluation of new or revised waste streams by special analysis ? Development of version 4.114 of the Area 5 RWMS GoldSim PA model The Area 3 RWMS has been in inactive status since July 1, 2006, with the last shipment received in April 2006. The FY 2012 review of operations, facility design, closure plans, monitoring results, and R&D results for the Area 3 RWMS indicates no changes that would impact PA validity. A special analysis using the Area 3 RWMS v2.102 GoldSim PA model was prepared to update the PA results for the Area 3 RWMS in FY 2012. The special analysis concludes that all performance objectives can be met and the Area 3 RWMS PA remains valid. There is no need to the revise the Area 3 RWMS PA. Review of Area 5 RWMS operations, design, closure plans, monitoring results, and R&D activities indicates no significant changes other than an increase in the inventory disposed. The FY 2012 PA results, generated with the Area 5 RWMS v4.114 GoldSim PA model, indicate that there continues to be a reasonable expectation of meeting all performance objectives. The results and conclusions of the Area 5 RWMS PA are judged valid, and there is no need to the revise the PA. A review of changes potentially impacting the CAs indicates that no significant changes occurred in FY 2012. The continuing adequacy of the CAs was evaluated with the new models, and no significant changes that would alter CA results or conclusions were found. The revision of the Area 3 RWMS CA, which will include the Underground Test Area source term (Corrective Action Unit [CAU] 97), is scheduled for FY 2024, following the completion of the Yucca Flat CAU 97 Corrective Action Decision Document/Corrective Action Plan in FY 2016. Inclusion of the Frenchman Flat CAU 98 results in the Area 5 RWMS CA is scheduled for FY 2016, pending the completion of the CAU 98 closure report in FY 2015. Near-term R&D efforts will focus on continuing development of the Area 3 and Area 5 RWMS GoldSim PA/CA and inventory models.

Shott, G. [National Security Technologies, LLC

2013-03-18T23:59:59.000Z

487

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

488

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

489

Characterisation of the VELO High Voltage System  

E-Print Network (OSTI)

The high voltage system supplies the bias voltage to the 88 silicon sensors which comprise the LHCb Vertex Locator (VELO). This note describes the results of the tests which have been performed on the hardware of the high voltage system of the VELO. Each individual test detailed in this note corresponds to a specific requirement of the system. These requirements arise primarily from ensuring the safety of the silicon sensors and the quality of the data taken from the VELO modules. The tests performed are in four categories: normal operation of the high voltage system; verification of its stability under operation; discussion of its behaviour in failure modes; and details of operation at low voltage. Noteworthy issues, identified through the tests, include the behaviour of the high voltage modules at voltages below 9V, the current limit that can be applied during ramping of the voltage, and the speed with which the voltage is cut during failures of the system. The results of these tests provide high confidence that the high voltage system can be safely used and demonstrate that low noise is produced by the power supplies. LHCb Public Note, LHCb-2008-009Contents 1

Barinjaka Rakotomiaramanana; Chris Parkes; Lars Eklund

2008-01-01T23:59:59.000Z

490

DOE/EA-1471: Environmental Assessment for the Transportation of Highly Enriched Uranium from the Russian Federation to the Y-12 National Security Complex and Finding of No Significant Impact (January 2004)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EA for the Transportation of Highly Enriched Uranium from the Russian Federation to the Y-12 National Security Complex EA for the Transportation of Highly Enriched Uranium from the Russian Federation to the Y-12 National Security Complex i FINDING OF NO SIGNIFICANT IMPACT FOR THE TRANSPORTATION OF HIGHLY ENRICHED URANIUM FROM THE RUSSIAN FEDERATION TO THE Y-12 NATIONAL SECURITY COMPLEX ISSUED BY: United States Department of Energy ACTION: Finding of No Significant Impact SUMMARY: The United States (U.S.) Department of Energy (DOE) proposes to transport highly enriched uranium (HEU) from Russia to a secure storage facility in Oak Ridge, TN. This proposed action would allow the United States and Russia to accelerate the disposition of excess nuclear weapons materials in the interest of promoting nuclear disarmament, strengthening nonproliferation, and combating terrorism. The HEU

491

SUMMARY REPORT ON INSPECTION OF ALLEGATIONSRELATING TO THE ALBUQUERQUE OPERATIONS OFFICESECURITY SURVEY PROCESS AND THE SECURITY OPERATIONS’SELF-ASSESSMENTS AT LOS ALAMOS NATIONAL LABORATORY, DOE/IG-0471  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Inspector General received allegations regarding the conduct of security reviews at the Department of Energy’s (DOE) Los Alamos National Laboratory (LANL). Specifically, it was...

492

Definitions, Seals - Vulnerability Assessment Team - Nuclear Engineering  

NLE Websites -- All DOE Office Websites (Extended Search)

Definitions Definitions VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

493

Safety - Vulnerability Assessment Team - Nuclear Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety Safety VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

494

Useful Resources- Vulnerability Assessment Team - Nuclear Engineering  

NLE Websites -- All DOE Office Websites (Extended Search)

Selected Publications Selected Publications VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

495

2011 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses  

Science Conference Proceedings (OSTI)

The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC, 2007a) requires an annual review to assess the adequacy of the Performance Assessments (PAs) and Composite Analyses (CAs), with the results submitted annually to U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE, 1999a; 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2011. This annual summary report presents data and conclusions from the FY 2011 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R and D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R and D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2011 include the following: (1) Operation of a new shallow land disposal unit and a new Resource Conservation and Recovery Act (RCRA)-compliant lined disposal unit at the Area 5 RWMS; (2) Development of new closure inventory estimates based on disposals through FY 2011; (3) Evaluation of new or revised waste streams by special analysis; (4) Development of version 2.102 of the Area 3 RWMS GoldSim PA model; and (5) Development of version 4.113 of the Area 5 RWMS GoldSim PA model. Analysis of the latest available data using the Area 5 RWMS v4.113 GoldSim PA model indicates that all performance objectives can be met. The results and conclusions of the Area 5 RWMS PA are judged valid, and there is no need to the revise the PA. The Area 3 RWMS has been in inactive status since July 1, 2006, with the last shipment received in April 2006. In FY 2011, there were no operational changes, monitoring results, or R and D results for the Area 3 RWMS that would impact PA validity. Despite the increase in waste volume and inventory at the Area 3 RWMS since 1996 when the PA was approved, the facility performance evaluated with the Area 3 RWMS PA GoldSim model, version 2.0 (with the final closure inventory), remains well below the performance objectives set forth in U.S. Department of Energy Order DOE O 435.1, 'Radioactive Waste Management' (DOE, 2001). The conclusions of the Area 3 RWMS PA remain valid. A special analysis was prepared to update the PA and CA results for the Area 3 RWMS in FY 2011. Release of the special analysis is planned for FY 2012. The continuing adequacy of the CAs was evaluated with the new models, and no significant changes that would alter CA results or conclusions were found. Inclusion of the Frenchman Flat Underground Test Area (UGTA) results in the Area 5 RWMS CA is scheduled for FY 2016, pending the completion of the closure report for the Frenchman Flat UGTA corrective action unit (CAU) in FY 2015. An industrial site, CAU 547, with corrective action sites near the Area 3 RWMS was found to have a significant plutonium inventory in 2009. CAU 547 will be evaluated for inclusion of future revisions or updates of the Area 3 RWMS CA. The revision of the Area 3 RWMS CA, which will include the UGTA source terms, is expected in FY 2024, following the completion of the Yucca Flat CAU Corrective Action Decision Document, scheduled for FY 2023. Near-term R and D efforts will focus on continuing development of the Are

NSTec Environmental Management

2012-03-20T23:59:59.000Z

496

Fiber-optic voltage sensor with cladded fiber and evanescent wave variation detection  

DOE Patents (OSTI)

A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities.

Wood, Charles B. (Lakewood, CO)

1992-01-01T23:59:59.000Z

497

Fiber-optic voltage sensor with cladded fiber and evanescent wave variation detection  

DOE Patents (OSTI)

A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities. 3 figs.

Wood, C.B.

1992-12-15T23:59:59.000Z

498

The effect of DVR location for enhancing voltage sag  

Science Conference Proceedings (OSTI)

Recently, Dynamic Voltage Restorer (DVR) has become a popular power electronic device as a protection for sensitive loads from voltage sag. Voltage sag widely known as one of the major problem in power quality, it is defined as a short reduction of voltage ... Keywords: dynamic voltage restorer, power quality, voltage sag

Rohanim Ibrahim; Ahmed M. A. Haidar; M. Zahim; Herbert Iu

2010-03-01T23:59:59.000Z

499

AMI Risk Assessment and Security Requirements  

Science Conference Proceedings (OSTI)

Advanced Metering Infrastructure (AMI) is a transforming technology that has broad impact on the energy market and its consumers. AMI allows utilities to balance supply, demand, and capacity making a smarter, more efficient, grid by pushing aspects of grid monitoring and control out to the endpoints of delivery. Stakeholders are implementing the systems and technologies required to deploy AMI today. AMI systems promise to provide advanced energy monitoring and recording, sophisticated tariff/rate program...

2009-12-18T23:59:59.000Z

500

Security Risk Assessment Methodologies (RAM) for Critical ...  

Technology Marketing Summary In the mid 1970s, the Department of Energy (DOE) designated Sandia as the Lead Laboratory for development of physical ...