Sample records for critical infrastructure components

  1. Service Modeling Language Applied to Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    Baldini, Gianmarco; Fovino, Igor Nai

    The modeling of dependencies in complex infrastructure systems is still a very difficult task. Many methodologies have been proposed, but a number of challenges still remain, including the definition of the right level of abstraction, the presence of different views on the same critical infrastructure and how to adequately represent the temporal evolution of systems. We propose a modeling methodology where dependencies are described in terms of the service offered by the critical infrastructure and its components. The model provides a clear separation between services and the underlying organizational and technical elements, which may change in time. The model uses the Service Modeling Language proposed by the W3 consortium for describing critical infrastructure in terms of interdependent services nodes including constraints, behavior, information flows, relations, rules and other features. Each service node is characterized by its technological, organizational and process components. The model is then applied to a real case of an ICT system for users authentication.

  2. Critical Infrastructure Vulnerability to Spatially Localized Failures with Applications to Chinese Railway System.

    PubMed

    Ouyang, Min; Tian, Hui; Wang, Zhenghua; Hong, Liu; Mao, Zijun

    2017-01-17

    This article studies a general type of initiating events in critical infrastructures, called spatially localized failures (SLFs), which are defined as the failure of a set of infrastructure components distributed in a spatially localized area due to damage sustained, while other components outside the area do not directly fail. These failures can be regarded as a special type of intentional attack, such as bomb or explosive assault, or a generalized modeling of the impact of localized natural hazards on large-scale systems. This article introduces three SLFs models: node centered SLFs, district-based SLFs, and circle-shaped SLFs, and proposes a SLFs-induced vulnerability analysis method from three aspects: identification of critical locations, comparisons of infrastructure vulnerability to random failures, topologically localized failures and SLFs, and quantification of infrastructure information value. The proposed SLFs-induced vulnerability analysis method is finally applied to the Chinese railway system and can be also easily adapted to analyze other critical infrastructures for valuable protection suggestions. © 2017 Society for Risk Analysis.

  3. 78 FR 73202 - Review and Revision of the National Critical Infrastructure Security and Resilience (NCISR...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-05

    ...This Request for Information (RFI) notice informs the public that the Department of Homeland Security's (DHS) Science and Technology Directorate (S&T) is currently developing a National Critical Infrastructure Security and Resilience Research and Development Plan (NCISR R&D Plan) to conform to the requirements of Presidential Policy Directive 21, Critical Infrastructure Security and Resilience. As part of a comprehensive national review process, DHS solicits public comment on issues or language in the NCISR R&D Plan that need to be included. Critical infrastructure includes both cyber and physical components, systems, and networks for the sixteen established ``critical infrastructures''.

  4. 49 CFR 15.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... DOT or DHS component or agency. (d) Additional requirements for critical infrastructure information. In the case of information that is both SSI and has been designated as critical infrastructure...

  5. 49 CFR 15.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... DOT or DHS component or agency. (d) Additional requirements for critical infrastructure information. In the case of information that is both SSI and has been designated as critical infrastructure...

  6. 49 CFR 15.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... DOT or DHS component or agency. (d) Additional requirements for critical infrastructure information. In the case of information that is both SSI and has been designated as critical infrastructure...

  7. Critical Infrastructure Protection II, The International Federation for Information Processing, Volume 290.

    NASA Astrophysics Data System (ADS)

    Papa, Mauricio; Shenoi, Sujeet

    The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

  8. Enhancing infrastructure resilience through business continuity planning.

    PubMed

    Fisher, Ronald; Norman, Michael; Klett, Mary

    2017-01-01

    Critical infrastructure is crucial to the functionality and wellbeing of the world around us. It is a complex network that works together to create an efficient society. The core components of critical infrastructure are dependent on one another to function at their full potential. Organisations face unprecedented environmental risks such as increased reliance on information technology and telecommunications, increased infrastructure interdependencies and globalisation. Successful organisations should integrate the components of cyber-physical and infrastructure interdependencies into a holistic risk framework. Physical security plans, cyber security plans and business continuity plans can help mitigate environmental risks. Cyber security plans are becoming the most crucial to have, yet are the least commonly found in organisations. As the reliance on cyber continues to grow, it is imperative that organisations update their business continuity and emergency preparedness activities to include this.

  9. Reliable Communication Models in Interdependent Critical Infrastructure Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, Sangkeun; Chinthavali, Supriya; Shankar, Mallikarjun

    Modern critical infrastructure networks are becoming increasingly interdependent where the failures in one network may cascade to other dependent networks, causing severe widespread national-scale failures. A number of previous efforts have been made to analyze the resiliency and robustness of interdependent networks based on different models. However, communication network, which plays an important role in today's infrastructures to detect and handle failures, has attracted little attention in the interdependency studies, and no previous models have captured enough practical features in the critical infrastructure networks. In this paper, we study the interdependencies between communication network and other kinds of critical infrastructuremore » networks with an aim to identify vulnerable components and design resilient communication networks. We propose several interdependency models that systematically capture various features and dynamics of failures spreading in critical infrastructure networks. We also discuss several research challenges in building reliable communication solutions to handle failures in these models.« less

  10. Developing measurement indices to enhance protection and resilience of critical infrastructure and key resources.

    PubMed

    Fisher, Ronald E; Norman, Michael

    2010-07-01

    The US Department of Homeland Security (DHS) is developing indices to better assist in the risk management of critical infrastructures. The first of these indices is the Protective Measures Index - a quantitative index that measures overall protection across component categories: physical security, security management, security force, information sharing, protective measures and dependencies. The Protective Measures Index, which can also be recalculated as the Vulnerability Index, is a way to compare differing protective measures (eg fence versus security training). The second of these indices is the Resilience Index, which assesses a site's resilience and consists of three primary components: robustness, resourcefulness and recovery. The third index is the Criticality Index, which assesses the importance of a facility. The Criticality Index includes economic, human, governance and mass evacuation impacts. The Protective Measures Index, Resilience Index and Criticality Index are being developed as part of the Enhanced Critical Infrastructure Protection initiative that DHS protective security advisers implement across the nation at critical facilities. This paper describes two core themes: determination of the vulnerability, resilience and criticality of a facility and comparison of the indices at different facilities.

  11. 49 CFR 1520.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... inform TSA or the applicable DOT or DHS component or agency. (d) Additional Requirements for Critical Infrastructure Information. In the case of information that is both SSI and has been designated as critical infrastructure information under section 214 of the Homeland Security Act, any covered person who is a Federal...

  12. 49 CFR 1520.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... inform TSA or the applicable DOT or DHS component or agency. (d) Additional Requirements for Critical Infrastructure Information. In the case of information that is both SSI and has been designated as critical infrastructure information under section 214 of the Homeland Security Act, any covered person who is a Federal...

  13. 49 CFR 1520.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... inform TSA or the applicable DOT or DHS component or agency. (d) Additional Requirements for Critical Infrastructure Information. In the case of information that is both SSI and has been designated as critical infrastructure information under section 214 of the Homeland Security Act, any covered person who is a Federal...

  14. 49 CFR 1520.9 - Restrictions on the disclosure of SSI.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... inform TSA or the applicable DOT or DHS component or agency. (d) Additional Requirements for Critical Infrastructure Information. In the case of information that is both SSI and has been designated as critical infrastructure information under section 214 of the Homeland Security Act, any covered person who is a Federal...

  15. Cyber-Physical Correlations for Infrastructure Resilience: A Game-Theoretic Approach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S; He, Fei; Ma, Chris Y. T.

    In several critical infrastructures, the cyber and physical parts are correlated so that disruptions to one affect the other and hence the whole system. These correlations may be exploited to strategically launch components attacks, and hence must be accounted for ensuring the infrastructure resilience, specified by its survival probability. We characterize the cyber-physical interactions at two levels: (i) the failure correlation function specifies the conditional survival probability of cyber sub-infrastructure given the physical sub-infrastructure as a function of their marginal probabilities, and (ii) the individual survival probabilities of both sub-infrastructures are characterized by first-order differential conditions. We formulate a resiliencemore » problem for infrastructures composed of discrete components as a game between the provider and attacker, wherein their utility functions consist of an infrastructure survival probability term and a cost term expressed in terms of the number of components attacked and reinforced. We derive Nash Equilibrium conditions and sensitivity functions that highlight the dependence of infrastructure resilience on the cost term, correlation function and sub-infrastructure survival probabilities. These results generalize earlier ones based on linear failure correlation functions and independent component failures. We apply the results to models of cloud computing infrastructures and energy grids.« less

  16. Developing Your Evaluation Plans: A Critical Component of Public Health Program Infrastructure.

    PubMed

    Lavinghouze, S Rene; Snyder, Kimberly

    A program's infrastructure is often cited as critical to public health success. The Component Model of Infrastructure (CMI) identifies evaluation as essential under the core component of engaged data. An evaluation plan is a written document that describes how to monitor and evaluate a program, as well as how to use evaluation results for program improvement and decision making. The evaluation plan clarifies how to describe what the program did, how it worked, and why outcomes matter. We use the Centers for Disease Control and Prevention's (CDC) "Framework for Program Evaluation in Public Health" as a guide for developing an evaluation plan. Just as using a roadmap facilitates progress on a long journey, a well-written evaluation plan can clarify the direction your evaluation takes and facilitate achievement of the evaluation's objectives.

  17. Acoustic emission safety monitoring of intermodal transportation infrastructure.

    DOT National Transportation Integrated Search

    2015-09-01

    Safety and integrity of the national transportation infrastructure are of paramount importance and highway bridges are critical components of the highway system network. This network provides an immense contribution to the industry productivity and e...

  18. 7 CFR 624.8 - Assistance.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... important infrastructure components are threatened; (iv) When reviewing paragraphs (c)(3)(i) through (iii... containing federally designated critical habitat where the species or the critical habitat could be...

  19. 7 CFR 624.8 - Assistance.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... important infrastructure components are threatened; (iv) When reviewing paragraphs (c)(3)(i) through (iii... containing federally designated critical habitat where the species or the critical habitat could be...

  20. 17 CFR 39.18 - System safeguards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... physical infrastructure or personnel necessary for it to conduct activities necessary to the clearing and... transportation, telecommunications, power, water, or other critical infrastructure components in a relevant area... Division of Clearing and Risk promptly of: (1) Any hardware or software malfunction, cyber security...

  1. 17 CFR 39.18 - System safeguards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... physical infrastructure or personnel necessary for it to conduct activities necessary to the clearing and... transportation, telecommunications, power, water, or other critical infrastructure components in a relevant area... Division of Clearing and Risk promptly of: (1) Any hardware or software malfunction, cyber security...

  2. 17 CFR 39.18 - System safeguards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... physical infrastructure or personnel necessary for it to conduct activities necessary to the clearing and... transportation, telecommunications, power, water, or other critical infrastructure components in a relevant area... Division of Clearing and Risk promptly of: (1) Any hardware or software malfunction, cyber security...

  3. Modeling joint restoration strategies for interdependent infrastructure systems.

    PubMed

    Zhang, Chao; Kong, Jingjing; Simonovic, Slobodan P

    2018-01-01

    Life in the modern world depends on multiple critical services provided by infrastructure systems which are interdependent at multiple levels. To effectively respond to infrastructure failures, this paper proposes a model for developing optimal joint restoration strategy for interdependent infrastructure systems following a disruptive event. First, models for (i) describing structure of interdependent infrastructure system and (ii) their interaction process, are presented. Both models are considering the failure types, infrastructure operating rules and interdependencies among systems. Second, an optimization model for determining an optimal joint restoration strategy at infrastructure component level by minimizing the economic loss from the infrastructure failures, is proposed. The utility of the model is illustrated using a case study of electric-water systems. Results show that a small number of failed infrastructure components can trigger high level failures in interdependent systems; the optimal joint restoration strategy varies with failure occurrence time. The proposed models can help decision makers to understand the mechanisms of infrastructure interactions and search for optimal joint restoration strategy, which can significantly enhance safety of infrastructure systems.

  4. Operational models of infrastructure resilience.

    PubMed

    Alderson, David L; Brown, Gerald G; Carlyle, W Matthew

    2015-04-01

    We propose a definition of infrastructure resilience that is tied to the operation (or function) of an infrastructure as a system of interacting components and that can be objectively evaluated using quantitative models. Specifically, for any particular system, we use quantitative models of system operation to represent the decisions of an infrastructure operator who guides the behavior of the system as a whole, even in the presence of disruptions. Modeling infrastructure operation in this way makes it possible to systematically evaluate the consequences associated with the loss of infrastructure components, and leads to a precise notion of "operational resilience" that facilitates model verification, validation, and reproducible results. Using a simple example of a notional infrastructure, we demonstrate how to use these models for (1) assessing the operational resilience of an infrastructure system, (2) identifying critical vulnerabilities that threaten its continued function, and (3) advising policymakers on investments to improve resilience. © 2014 Society for Risk Analysis.

  5. Defense Strategies for Asymmetric Networked Systems with Discrete Components.

    PubMed

    Rao, Nageswara S V; Ma, Chris Y T; Hausken, Kjell; He, Fei; Yau, David K Y; Zhuang, Jun

    2018-05-03

    We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.

  6. Defense Strategies for Asymmetric Networked Systems with Discrete Components

    PubMed Central

    Rao, Nageswara S. V.; Ma, Chris Y. T.; Hausken, Kjell; He, Fei; Yau, David K. Y.

    2018-01-01

    We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models. PMID:29751588

  7. Defense strategies for asymmetric networked systems under composite utilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S.; Ma, Chris Y. T.; Hausken, Kjell

    We consider an infrastructure of networked systems with discrete components that can be reinforced at certain costs to guard against attacks. The communications network plays a critical, asymmetric role of providing the vital connectivity between the systems. We characterize the correlations within this infrastructure at two levels using (a) aggregate failure correlation function that specifies the infrastructure failure probability giventhe failure of an individual system or network, and (b) first order differential conditions on system survival probabilities that characterize component-level correlations. We formulate an infrastructure survival game between an attacker and a provider, who attacks and reinforces individual components, respectively.more » They use the composite utility functions composed of a survival probability term and a cost term, and the previously studiedsum-form and product-form utility functions are their special cases. At Nash Equilibrium, we derive expressions for individual system survival probabilities and the expected total number of operational components. We apply and discuss these estimates for a simplified model of distributed cloud computing infrastructure« less

  8. 17 CFR 39.34 - System safeguards for systemically important derivatives clearing organizations and subpart C...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... rely on the same critical transportation, telecommunications, power, water, or other critical infrastructure components the entity normally relies upon for such activities; (2) Personnel, who live and work...

  9. Managing Mission-Critical Infrastructure

    ERIC Educational Resources Information Center

    Breeding, Marshall

    2012-01-01

    In the library context, they depend on sophisticated business applications specifically designed to support their work. This infrastructure consists of such components as integrated library systems, their associated online catalogs or discovery services, and self-check equipment, as well as a Web site and the various online tools and services…

  10. Modeling joint restoration strategies for interdependent infrastructure systems

    PubMed Central

    Simonovic, Slobodan P.

    2018-01-01

    Life in the modern world depends on multiple critical services provided by infrastructure systems which are interdependent at multiple levels. To effectively respond to infrastructure failures, this paper proposes a model for developing optimal joint restoration strategy for interdependent infrastructure systems following a disruptive event. First, models for (i) describing structure of interdependent infrastructure system and (ii) their interaction process, are presented. Both models are considering the failure types, infrastructure operating rules and interdependencies among systems. Second, an optimization model for determining an optimal joint restoration strategy at infrastructure component level by minimizing the economic loss from the infrastructure failures, is proposed. The utility of the model is illustrated using a case study of electric-water systems. Results show that a small number of failed infrastructure components can trigger high level failures in interdependent systems; the optimal joint restoration strategy varies with failure occurrence time. The proposed models can help decision makers to understand the mechanisms of infrastructure interactions and search for optimal joint restoration strategy, which can significantly enhance safety of infrastructure systems. PMID:29649300

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Billings, Jay J.; Bonior, Jason D.; Evans, Philip G.

    Securely transferring timing information in the electrical grid is a critical component of securing the nation's infrastructure from cyber attacks. One solution to this problem is to use quantum information to securely transfer the timing information across sites. This software provides such an infrastructure using a standard Java webserver that pulls the quantum information from associated hardware.

  12. Game-Theoretic strategies for systems of components using product-form utilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S; Ma, Cheng-Yu; Hausken, K.

    Many critical infrastructures are composed of multiple systems of components which are correlated so that disruptions to one may propagate to others. We consider such infrastructures with correlations characterized in two ways: (i) an aggregate failure correlation function specifies the conditional failure probability of the infrastructure given the failure of an individual system, and (ii) a pairwise correlation function between two systems specifies the failure probability of one system given the failure of the other. We formulate a game for ensuring the resilience of the infrastructure, wherein the utility functions of the provider and attacker are products of an infrastructuremore » survival probability term and a cost term, both expressed in terms of the numbers of system components attacked and reinforced. The survival probabilities of individual systems satisfy first-order differential conditions that lead to simple Nash Equilibrium conditions. We then derive sensitivity functions that highlight the dependence of infrastructure resilience on the cost terms, correlation functions, and individual system survival probabilities. We apply these results to simplified models of distributed cloud computing and energy grid infrastructures.« less

  13. Maintaining Enterprise Resiliency via Kaleidoscopic Adaption and Transformation of Software Services (MEERKATS)

    DTIC Science & Technology

    2016-04-01

    infrastructure . The work is motivated by the fact that today’s clouds are very static, uniform, and predictable, allowing attackers who identify a...vulnerability in one of the services or infrastructure components to spread their effect to other, mission-critical services. Our goal is to integrate into...clouds by elevating continuous change, evolution, and misinformation as first-rate design principles of the cloud’s infrastructure . Our work is

  14. Game-theoretic strategies for asymmetric networked systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S.; Ma, Chris Y. T.; Hausken, Kjell

    Abstract—We consider an infrastructure consisting of a network of systems each composed of discrete components that can be reinforced at a certain cost to guard against attacks. The network provides the vital connectivity between systems, and hence plays a critical, asymmetric role in the infrastructure operations. We characterize the system-level correlations using the aggregate failure correlation function that specifies the infrastructure failure probability given the failure of an individual system or network. The survival probabilities of systems and network satisfy first-order differential conditions that capture the component-level correlations. We formulate the problem of ensuring the infrastructure survival as a gamemore » between anattacker and a provider, using the sum-form and product-form utility functions, each composed of a survival probability term and a cost term. We derive Nash Equilibrium conditions which provide expressions for individual system survival probabilities, and also the expected capacity specified by the total number of operational components. These expressions differ only in a single term for the sum-form and product-form utilities, despite their significant differences.We apply these results to simplified models of distributed cloud computing infrastructures.« less

  15. Public Health Emergency Operations Center - A critical component of mass gatherings management infrastructure.

    PubMed

    Elachola, Habidah; Al-Tawfiq, Jaffar A; Turkestani, Abdulhafiz; Memish, Ziad A

    2016-08-31

    Mass gatherings (MG) are characterized by the influx of large numbers of people with the need to have infrastructural changes to support these gatherings. Thus, Public Health Emergency Operations Center (PHEOC) is critical management infrastructure for both the delivery of public health functions and for mounting adequate response during emergencies. The recognition of the importance of PHEOC at the leadership and political level is foundational for the success of any public health intervention during MG. The ability of the PHEOC to effectively function depends on appropriate design and infrastructure, staffing and command structure, and plans and procedures developed prior to the event. Multi-ministerial or jurisdictional coordination will be required and PHEOC should be positioned with such authorities. This paper outlines the essential concepts, elements, design, and operational aspects of PHEOC during MG.

  16. Defense strategies for cloud computing multi-site server infrastructures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S.; Ma, Chris Y. T.; He, Fei

    We consider cloud computing server infrastructures for big data applications, which consist of multiple server sites connected over a wide-area network. The sites house a number of servers, network elements and local-area connections, and the wide-area network plays a critical, asymmetric role of providing vital connectivity between them. We model this infrastructure as a system of systems, wherein the sites and wide-area network are represented by their cyber and physical components. These components can be disabled by cyber and physical attacks, and also can be protected against them using component reinforcements. The effects of attacks propagate within the systems, andmore » also beyond them via the wide-area network.We characterize these effects using correlations at two levels using: (a) aggregate failure correlation function that specifies the infrastructure failure probability given the failure of an individual site or network, and (b) first-order differential conditions on system survival probabilities that characterize the component-level correlations within individual systems. We formulate a game between an attacker and a provider using utility functions composed of survival probability and cost terms. At Nash Equilibrium, we derive expressions for the expected capacity of the infrastructure given by the number of operational servers connected to the network for sum-form, product-form and composite utility functions.« less

  17. Sea level rise impacts on wastewater treatment systems along the U.S. coasts

    NASA Astrophysics Data System (ADS)

    Hummel, M.; Berry, M.; Stacey, M. T.

    2017-12-01

    As sea levels rise, coastal communities will experience more frequent and persistent nuisance flooding, and some low-lying areas may be permanently inundated. Critical components of lifeline infrastructure networks in these areas are also at risk of flooding, which could cause significant service disruptions that extend beyond the flooded zone. Thus, identifying critical infrastructure components that are vulnerable to sea level rise is an important first step in developing targeted investment in protective actions and enhancing the overall resilience of coastal communities. Wastewater treatment plants are typically located at low elevations near the coastline to minimize the cost of collecting consumed water and discharging treated effluent, which makes them particularly susceptible to coastal flooding. For this analysis, we used geographic information systems to assess the vulnerability of wastewater infrastructure to various sea level rise projections at the national level. We then estimated the number of people who would lose wastewater services, which could be more than three times as high as previous predictions of the number of people at risk of direct flooding due to sea level rise. We also considered several case studies of wastewater infrastructure in mid-sized cities to determine how topography and system configuration (centralized versus distributed) impact vulnerability. Overall, this analysis highlights the widespread vulnerability of wastewater infrastructure in the U.S. and demonstrates that local disruptions to infrastructure networks may have far-ranging impacts on areas that do not experience direct flooding.

  18. Volcanic hazards at distant critical infrastructure: A method for bespoke, multi-disciplinary assessment

    NASA Astrophysics Data System (ADS)

    Odbert, H. M.; Aspinall, W.; Phillips, J.; Jenkins, S.; Wilson, T. M.; Scourse, E.; Sheldrake, T.; Tucker, P.; Nakeshree, K.; Bernardara, P.; Fish, K.

    2015-12-01

    Societies rely on critical services such as power, water, transport networks and manufacturing. Infrastructure may be sited to minimise exposure to natural hazards but not all can be avoided. The probability of long-range transport of a volcanic plume to a site is comparable to other external hazards that must be considered to satisfy safety assessments. Recent advances in numerical models of plume dispersion and stochastic modelling provide a formalized and transparent approach to probabilistic assessment of hazard distribution. To understand the risks to critical infrastructure far from volcanic sources, it is necessary to quantify their vulnerability to different hazard stressors. However, infrastructure assets (e.g. power plantsand operational facilities) are typically complex systems in themselves, with interdependent components that may differ in susceptibility to hazard impact. Usually, such complexity means that risk either cannot be estimated formally or that unsatisfactory simplifying assumptions are prerequisite to building a tractable risk model. We present a new approach to quantifying risk by bridging expertise of physical hazard modellers and infrastructure engineers. We use a joint expert judgment approach to determine hazard model inputs and constrain associated uncertainties. Model outputs are chosen on the basis of engineering or operational concerns. The procedure facilitates an interface between physical scientists, with expertise in volcanic hazards, and infrastructure engineers, with insight into vulnerability to hazards. The result is a joined-up approach to estimating risk from low-probability hazards to critical infrastructure. We describe our methodology and show preliminary results for vulnerability to volcanic hazards at a typical UK industrial facility. We discuss our findings in the context of developing bespoke assessment of hazards from distant sources in collaboration with key infrastructure stakeholders.

  19. Robotic Sensitive-Site Assessment

    DTIC Science & Technology

    2015-09-04

    annotations. The SOA component is the backend infrastructure that receives and stores robot-generated and human-input data and serves these data to several...Architecture Server (heading level 2) The SOA server provides the backend infrastructure to receive data from robot situational awareness payloads, to archive...incapacitation or even death. The proper use of PPE is critical to avoiding exposure. However, wearing PPE limits mobility and field of vision, and

  20. Sea Level Rise Impacts on Wastewater Treatment Systems Along the U.S. Coasts

    NASA Astrophysics Data System (ADS)

    Hummel, Michelle A.; Berry, Matthew S.; Stacey, Mark T.

    2018-04-01

    As sea levels rise, coastal communities will experience more frequent and persistent nuisance flooding, and some low-lying areas may be permanently inundated. Critical components of lifeline infrastructure networks in these areas are also at risk of flooding, which could cause significant service disruptions that extend beyond the flooded zone. Thus, identifying critical infrastructure components that are exposed to sea level rise is an important first step in developing targeted investment in protective actions and enhancing the overall resilience of coastal communities. Wastewater treatment plants are typically located at low elevations near the coastline to minimize the cost of collecting consumed water and discharging treated effluent, which makes them particularly susceptible to coastal flooding. For this analysis, we used geographic information systems to assess the exposure of wastewater infrastructure to various sea level rise projections at the national level. We then estimated the number of people who would lose wastewater services, which could be more than five times as high as previous predictions of the number of people at risk of direct flooding due to sea level rise. We also performed a regional comparison of wastewater exposure to marine and groundwater flooding in the San Francisco Bay Area. Overall, this analysis highlights the widespread exposure of wastewater infrastructure in the United States and demonstrates that local disruptions to infrastructure networks may have far-ranging impacts on areas that do not experience direct flooding.

  1. ITS strategic plan for Texas.

    DOT National Transportation Integrated Search

    2016-07-01

    The purpose of this research was to provide a framework to guide the development and deployment of an : integrated statewide program for Intelligent Transportation Systems (ITS). ITS is a critical component of the : transportation infrastructure that...

  2. A national clinical decision support infrastructure to enable the widespread and consistent practice of genomic and personalized medicine.

    PubMed

    Kawamoto, Kensaku; Lobach, David F; Willard, Huntington F; Ginsburg, Geoffrey S

    2009-03-23

    In recent years, the completion of the Human Genome Project and other rapid advances in genomics have led to increasing anticipation of an era of genomic and personalized medicine, in which an individual's health is optimized through the use of all available patient data, including data on the individual's genome and its downstream products. Genomic and personalized medicine could transform healthcare systems and catalyze significant reductions in morbidity, mortality, and overall healthcare costs. Critical to the achievement of more efficient and effective healthcare enabled by genomics is the establishment of a robust, nationwide clinical decision support infrastructure that assists clinicians in their use of genomic assays to guide disease prevention, diagnosis, and therapy. Requisite components of this infrastructure include the standardized representation of genomic and non-genomic patient data across health information systems; centrally managed repositories of computer-processable medical knowledge; and standardized approaches for applying these knowledge resources against patient data to generate and deliver patient-specific care recommendations. Here, we provide recommendations for establishing a national decision support infrastructure for genomic and personalized medicine that fulfills these needs, leverages existing resources, and is aligned with the Roadmap for National Action on Clinical Decision Support commissioned by the U.S. Office of the National Coordinator for Health Information Technology. Critical to the establishment of this infrastructure will be strong leadership and substantial funding from the federal government. A national clinical decision support infrastructure will be required for reaping the full benefits of genomic and personalized medicine. Essential components of this infrastructure include standards for data representation; centrally managed knowledge repositories; and standardized approaches for leveraging these knowledge repositories to generate patient-specific care recommendations at the point of care.

  3. 0-6672 : ITS strategic plan for Texas : project summary.

    DOT National Transportation Integrated Search

    2013-08-01

    The purpose of this research was to provide a : framework to guide the development and : deployment of an integrated statewide program for : intelligent transportation systems (ITS).ITS is a : critical component of the transportation : infrastructure...

  4. Demonstration and Validation of Corrosion-Mitigation Technologies for Mechanical Room Utility Piping and Cooling-Tower Pumps

    DTIC Science & Technology

    2015-05-01

    Infrastructure, Task 2.1” ERDC/CERL TR-15-5 ii Abstract Two critical infrastructure corrosion issues at Fort Bragg, NC, are the cor- rosion of steel utility...piping union joints in mechanical rooms and the cor- rosion of steel pump housings in cooling tower systems. Reliable operation of these components...pump 5 incorporating 316 stainless steel housing. .................................... 19 Figure 13. New pump 5 being installed

  5. A sensor network system for the health monitoring of the Parkview bridge deck.

    DOT National Transportation Integrated Search

    2010-01-31

    Bridges are a critical component of the transportation infrastructure. There are approximately 600,000 bridges in : the United State according to the Federal Highway Administration. Four billion vehicles traverse these bridges daily. : Regular inspec...

  6. Accelerated determination of ASR susceptibility during concrete prism testing through nonlinear impact resonance ultrasonic spectroscopy.

    DOT National Transportation Integrated Search

    2013-10-01

    "Accurate, reliable, and timely laboratory assessment of concrete mixturesaggregates combined with : cementitious materialsis a critical component in ensuring the durability of concrete infrastructure from the : adverse effects of the alkali-si...

  7. An Exploration of Professional Culture Differentials and Their Potential Impact on the Information Assurance Component of Optical Transmission Networks Design

    ERIC Educational Resources Information Center

    Cuthrell, Michael Gerard

    2011-01-01

    Optical transmission networks are an integral component of the critical infrastructures for many nations. Many people believe that optical transmission networks are impenetrable. In actuality, these networks possess weaknesses that can be exploited to bring about harm. An emerging Information Assurance (IA) industry has as its goals: to…

  8. Increasing impacts of climate extremes on critical infrastructures in Europe

    NASA Astrophysics Data System (ADS)

    Forzieri, Giovanni; Bianchi, Alessandra; Feyen, Luc; Silva, Filipe Batista e.; Marin, Mario; Lavalle, Carlo; Leblois, Antoine

    2016-04-01

    The projected increases in exposure to multiple climate hazards in many regions of Europe, emphasize the relevance of a multi-hazard risk assessment to comprehensively quantify potential impacts of climate change and develop suitable adaptation strategies. In this context, quantifying the future impacts of climatic extremes on critical infrastructures is crucial due to their key role for human wellbeing and their effects on the overall economy. Critical infrastructures describe the existing assets and systems that are essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact as a result of the failure to maintain those functions. We assess the direct damages of heat and cold waves, river and coastal flooding, droughts, wildfires and windstorms to energy, transport, industry and social infrastructures in Europe along the 21st century. The methodology integrates in a coherent framework climate hazard, exposure and vulnerability components. Overall damage is expected to rise up to 38 billion €/yr, ten time-folds the current climate damage, with drastic variations in risk scenarios. Exemplificative are drought and heat-related damages that could represent 70% of the overall climate damage in 2080s versus the current 12%. Many regions, prominently Southern Europe, will likely suffer multiple stresses and systematic infrastructure failures due to climate extremes if no suitable adaptation measures will be taken.

  9. 78 FR 66038 - Critical Infrastructure Partnership Advisory Council (CIPAC); Correction.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-04

    ... DEPARTMENT OF HOMELAND SECURITY Critical Infrastructure Partnership Advisory Council (CIPAC... Critical Infrastructure Partnership Advisory Council (CIPAC) Plenary Meeting on November 5, 2013. The... Murphy, Critical Infrastructure Partnership Advisory Council Alternate Designated Federal Officer...

  10. 77 FR 32656 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-01

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0008] Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Federal Officer, Critical Infrastructure Partnership Advisory Council, Sector Outreach and Programs...

  11. 77 FR 32655 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-01

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0009] Critical Infrastructure Partnership... the Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal... CONTACT: Larry May, Designated Federal Officer, Critical Infrastructure Partnership Advisory Council...

  12. Aviation security : terrorist acts demonstrate urgent need to improve security at the nation's airports

    DOT National Transportation Integrated Search

    2001-09-20

    A safe and secure civil aviation system is a critical component of the nation's overall security, physical infrastructure, and economic foundation. Billions of dollars and a myriad of programs and policies have been devoted to achieving such a system...

  13. Hierarchical Coloured Petrinet Based Healthcare Infrastructure Interdependency Model

    NASA Astrophysics Data System (ADS)

    Nivedita, N.; Durbha, S.

    2014-11-01

    To ensure a resilient Healthcare Critical Infrastructure, understanding the vulnerabilities and analysing the interdependency on other critical infrastructures is important. To model this critical infrastructure and its dependencies, Hierarchal Coloured petri net modelling approach for simulating the vulnerability of Healthcare Critical infrastructure in a disaster situation is studied.. The model enables to analyse and understand various state changes, which occur when there is a disruption or damage to any of the Critical Infrastructure, and its cascading nature. It also enables to explore optimal paths for evacuation during the disaster. The simulation environment can be used to understand and highlight various vulnerabilities of Healthcare Critical Infrastructure during a flood disaster scenario; minimize consequences; and enable timely, efficient response.

  14. 78 FR 57644 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-19

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2103-0050] Critical Infrastructure Partnership... management; Notice of an open Federal Advisory Committee Meeting. SUMMARY: The Critical Infrastructure... involving critical infrastructure security and resiliency. Off-topic questions or comments will not be...

  15. 75 FR 75611 - Critical Infrastructure Protection Month, 2010

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... Part IV The President Proclamation 8607--Critical Infrastructure Protection Month, 2010..., 2010 Critical Infrastructure Protection Month, 2010 By the President of the United States of America A Proclamation During Critical Infrastructure Protection Month, we highlight the vast network of systems and...

  16. VASA: Interactive Computational Steering of Large Asynchronous Simulation Pipelines for Societal Infrastructure.

    PubMed

    Ko, Sungahn; Zhao, Jieqiong; Xia, Jing; Afzal, Shehzad; Wang, Xiaoyu; Abram, Greg; Elmqvist, Niklas; Kne, Len; Van Riper, David; Gaither, Kelly; Kennedy, Shaun; Tolone, William; Ribarsky, William; Ebert, David S

    2014-12-01

    We present VASA, a visual analytics platform consisting of a desktop application, a component model, and a suite of distributed simulation components for modeling the impact of societal threats such as weather, food contamination, and traffic on critical infrastructure such as supply chains, road networks, and power grids. Each component encapsulates a high-fidelity simulation model that together form an asynchronous simulation pipeline: a system of systems of individual simulations with a common data and parameter exchange format. At the heart of VASA is the Workbench, a visual analytics application providing three distinct features: (1) low-fidelity approximations of the distributed simulation components using local simulation proxies to enable analysts to interactively configure a simulation run; (2) computational steering mechanisms to manage the execution of individual simulation components; and (3) spatiotemporal and interactive methods to explore the combined results of a simulation run. We showcase the utility of the platform using examples involving supply chains during a hurricane as well as food contamination in a fast food restaurant chain.

  17. Security Analysis of Smart Grid Cyber Physical Infrastructures Using Modeling and Game Theoretic Simulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Sheldon, Frederick T.

    Cyber physical computing infrastructures typically consist of a number of sites are interconnected. Its operation critically depends both on cyber components and physical components. Both types of components are subject to attacks of different kinds and frequencies, which must be accounted for the initial provisioning and subsequent operation of the infrastructure via information security analysis. Information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, andmore » information assets. We concentrated our analysis on the electric sector failure scenarios and impact analyses by the NESCOR Working Group Study, From the Section 5 electric sector representative failure scenarios; we extracted the four generic failure scenarios and grouped them into three specific threat categories (confidentiality, integrity, and availability) to the system. These specific failure scenarios serve as a demonstration of our simulation. The analysis using our ABGT simulation demonstrates how to model the electric sector functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the cyber physical infrastructure network with respect to CIA.« less

  18. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2014-01-01 2014-01-01 false Protected Critical Infrastructure Information...

  19. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2011-01-01 2011-01-01 false Protected Critical Infrastructure Information...

  20. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2010-01-01 2010-01-01 false Protected Critical Infrastructure Information...

  1. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2012-01-01 2012-01-01 false Protected Critical Infrastructure Information...

  2. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2013-01-01 2013-01-01 false Protected Critical Infrastructure Information...

  3. Effective implementation of ground penetrating radar (GPR) for condition assessment & monitoring of critical infrastructure components of bridges and highways.

    DOT National Transportation Integrated Search

    2015-01-01

    Recently Maryland State Highway Administration (SHA) started to explore use of Ground Penetrating Radar : (GPR) technology to provide quantitative information for improved decision making and reduced operating : costs. To take full advantage of the G...

  4. WATER SECURITY MONITORING USING SURFACE-ENHANCED RAMAN SPECTROSCOPY - PHASE II

    EPA Science Inventory

    Clean drinking water is a critical component of the United States infrastructure and is therefore a potential target for terrorists. In addition to physical attacks to the water network, like dams, pumping stations and pipelines, there must be vigilance to prevent the water i...

  5. WATER SECURITY MONITORING USING SURFACE-ENHANCED RAMAN SPECTROSCOPY - PHASE I

    EPA Science Inventory

    Clean drinking water is a critical component of the United States infrastructure and is therefore a potential target for terrorists. In addition to physical attacks to the water network including dams, pumping stations and pipelines, there must be vigilance to prevent the wate...

  6. 18 CFR 388.112 - Requests for privileged treatment and Critical Energy Infrastructure Information (CEII) treatment...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... treatment and Critical Energy Infrastructure Information (CEII) treatment for documents submitted to the... treatment and Critical Energy Infrastructure Information (CEII) treatment for documents submitted to the... of exemption from disclosure under FOIA, including critical energy infrastructure information (CEII...

  7. 18 CFR 388.112 - Requests for privileged treatment and Critical Energy Infrastructure Information (CEII) treatment...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... treatment and Critical Energy Infrastructure Information (CEII) treatment for documents submitted to the... treatment and Critical Energy Infrastructure Information (CEII) treatment for documents submitted to the... of exemption from disclosure under FOIA, including critical energy infrastructure information (CEII...

  8. Geographic Hotspots of Critical National Infrastructure.

    PubMed

    Thacker, Scott; Barr, Stuart; Pant, Raghav; Hall, Jim W; Alderson, David

    2017-12-01

    Failure of critical national infrastructures can result in major disruptions to society and the economy. Understanding the criticality of individual assets and the geographic areas in which they are located is essential for targeting investments to reduce risks and enhance system resilience. Within this study we provide new insights into the criticality of real-life critical infrastructure networks by integrating high-resolution data on infrastructure location, connectivity, interdependence, and usage. We propose a metric of infrastructure criticality in terms of the number of users who may be directly or indirectly disrupted by the failure of physically interdependent infrastructures. Kernel density estimation is used to integrate spatially discrete criticality values associated with individual infrastructure assets, producing a continuous surface from which statistically significant infrastructure criticality hotspots are identified. We develop a comprehensive and unique national-scale demonstration for England and Wales that utilizes previously unavailable data from the energy, transport, water, waste, and digital communications sectors. The testing of 200,000 failure scenarios identifies that hotspots are typically located around the periphery of urban areas where there are large facilities upon which many users depend or where several critical infrastructures are concentrated in one location. © 2017 Society for Risk Analysis.

  9. 31 CFR 800.208 - Critical infrastructure.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Critical infrastructure. 800.208..., AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.208 Critical infrastructure. The term critical infrastructure means, in the context of a particular covered transaction, a system or asset, whether physical or...

  10. 18 CFR 375.313 - Delegations to the Critical Energy Infrastructure Information Coordinator.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Critical Energy Infrastructure Information Coordinator. 375.313 Section 375.313 Conservation of Power and... COMMISSION Delegations § 375.313 Delegations to the Critical Energy Infrastructure Information Coordinator... requests for critical energy infrastructure information as defined in § 388.113(c)(1). (b) Make...

  11. 18 CFR 375.313 - Delegations to the Critical Energy Infrastructure Information Coordinator.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Critical Energy Infrastructure Information Coordinator. 375.313 Section 375.313 Conservation of Power and... COMMISSION Delegations § 375.313 Delegations to the Critical Energy Infrastructure Information Coordinator... requests for critical energy infrastructure information as defined in § 388.113(c)(1). (b) Make...

  12. 18 CFR 375.313 - Delegations to the Critical Energy Infrastructure Information Coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Critical Energy Infrastructure Information Coordinator. 375.313 Section 375.313 Conservation of Power and... COMMISSION Delegations § 375.313 Delegations to the Critical Energy Infrastructure Information Coordinator... requests for critical energy infrastructure information as defined in § 388.113(c)(1). (b) Make...

  13. 18 CFR 375.313 - Delegations to the Critical Energy Infrastructure Information Coordinator.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Critical Energy Infrastructure Information Coordinator. 375.313 Section 375.313 Conservation of Power and... COMMISSION Delegations § 375.313 Delegations to the Critical Energy Infrastructure Information Coordinator... requests for critical energy infrastructure information as defined in § 388.113(c)(1). (b) Make...

  14. 31 CFR 800.208 - Critical infrastructure.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Critical infrastructure. 800.208..., AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.208 Critical infrastructure. The term critical infrastructure means, in the context of a particular covered transaction, a system or asset, whether physical or...

  15. 31 CFR 800.208 - Critical infrastructure.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Critical infrastructure. 800.208..., AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.208 Critical infrastructure. The term critical infrastructure means, in the context of a particular covered transaction, a system or asset, whether physical or...

  16. 18 CFR 375.313 - Delegations to the Critical Energy Infrastructure Information Coordinator.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Critical Energy Infrastructure Information Coordinator. 375.313 Section 375.313 Conservation of Power and... COMMISSION Delegations § 375.313 Delegations to the Critical Energy Infrastructure Information Coordinator... requests for critical energy infrastructure information as defined in § 388.113(c)(1). (b) Make...

  17. 31 CFR 800.208 - Critical infrastructure.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Critical infrastructure. 800.208..., AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.208 Critical infrastructure. The term critical infrastructure means, in the context of a particular covered transaction, a system or asset, whether physical or...

  18. Managing critical materials with a technology-specific stocks and flows model.

    PubMed

    Busch, Jonathan; Steinberger, Julia K; Dawson, David A; Purnell, Phil; Roelich, Katy

    2014-01-21

    The transition to low carbon infrastructure systems required to meet climate change mitigation targets will involve an unprecedented roll-out of technologies reliant upon materials not previously widespread in infrastructure. Many of these materials (including lithium and rare earth metals) are at risk of supply disruption. To ensure the future sustainability and resilience of infrastructure, circular economy policies must be crafted to manage these critical materials effectively. These policies can only be effective if supported by an understanding of the material demands of infrastructure transition and what reuse and recycling options are possible given the future availability of end-of-life stocks. This Article presents a novel, enhanced stocks and flows model for the dynamic assessment of material demands resulting from infrastructure transitions. By including a hierarchical, nested description of infrastructure technologies, their components, and the materials they contain, this model can be used to quantify the effectiveness of recovery at both a technology remanufacturing and reuse level and a material recycling level. The model's potential is demonstrated on a case study on the roll-out of electric vehicles in the UK forecast by UK Department of Energy and Climate Change scenarios. The results suggest policy action should be taken to ensure Li-ion battery recycling infrastructure is in place by 2025 and NdFeB motor magnets should be designed for reuse. This could result in a reduction in primary demand for lithium of 40% and neodymium of 70%.

  19. Managing Critical Materials with a Technology-Specific Stocks and Flows Model

    PubMed Central

    2013-01-01

    The transition to low carbon infrastructure systems required to meet climate change mitigation targets will involve an unprecedented roll-out of technologies reliant upon materials not previously widespread in infrastructure. Many of these materials (including lithium and rare earth metals) are at risk of supply disruption. To ensure the future sustainability and resilience of infrastructure, circular economy policies must be crafted to manage these critical materials effectively. These policies can only be effective if supported by an understanding of the material demands of infrastructure transition and what reuse and recycling options are possible given the future availability of end-of-life stocks. This Article presents a novel, enhanced stocks and flows model for the dynamic assessment of material demands resulting from infrastructure transitions. By including a hierarchical, nested description of infrastructure technologies, their components, and the materials they contain, this model can be used to quantify the effectiveness of recovery at both a technology remanufacturing and reuse level and a material recycling level. The model’s potential is demonstrated on a case study on the roll-out of electric vehicles in the UK forecast by UK Department of Energy and Climate Change scenarios. The results suggest policy action should be taken to ensure Li-ion battery recycling infrastructure is in place by 2025 and NdFeB motor magnets should be designed for reuse. This could result in a reduction in primary demand for lithium of 40% and neodymium of 70%. PMID:24328245

  20. 3 CFR 13636 - Executive Order 13636 of February 12, 2013. Improving Critical Infrastructure Cybersecurity

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... hereby ordered as follows: Section 1. Policy. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical infrastructure continues to grow... resilience of the Nation's critical infrastructure and to maintain a cyber environment that encourages...

  1. Effective implementation of ground penetrating radar (GPR) for condition assessment & monitoring of critical infrastructure components of bridges and highways : [research summary].

    DOT National Transportation Integrated Search

    2015-01-01

    Recently Maryland State Highway Administration (SHA) started to explore use of Ground : Penetrating Radar (GPR) technology to provide quantitative information for improved : decision making and reduced operating costs. To take full advantage of the G...

  2. Contaminant transport pathways between urban sewer networks and water supply wells

    USDA-ARS?s Scientific Manuscript database

    Water supply wells and sanitary sewers are critical components of urban infrastructure, but sewer leakage threatens the quality of groundwater in sewered areas. Previous work by our group has documented the presence of human enteric viruses in deep public supply wells. Our current research uses such...

  3. 76 FR 20995 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-14

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0028] Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Infrastructure Protection, National Protection and Programs Directorate, U.S. Department of Homeland Security...

  4. 76 FR 70730 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-15

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0112] The Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Infrastructure Protection, National Protection and Programs Directorate, U.S. Department of Homeland Security...

  5. 76 FR 29775 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-23

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0038] The Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Infrastructure Protection, National Protection and Programs Directorate, U.S. Department of Homeland Security...

  6. 78 FR 16861 - The Critical Infrastructure Partnership Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-19

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0077] The Critical Infrastructure Partnership... Infrastructure Partnership Advisory Council membership update. SUMMARY: The Department of Homeland Security (DHS) announced the establishment of the Critical Infrastructure Partnership Advisory Council (CIPAC) in a Federal...

  7. 75 FR 48983 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-12

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0062] The Critical Infrastructure Partnership... Critical Infrastructure Partnership Advisory Council (CIPAC) by notice published in the Federal Register... Infrastructure Protection, National Protection and Programs Directorate, Department of Homeland Security, 245...

  8. TCIA Secure Cyber Critical Infrastructure Modernization.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keliiaa, Curtis M.

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  9. 77 FR 19300 - National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-30

    ... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... Group regarding the scope of the next phase of the Working Group's critical infrastructure resilience...

  10. Case management information systems: how to put the pieces together now and beyond year 2000.

    PubMed

    Matthews, Pamela

    2002-01-01

    The case management process is a critical management and operational component in the delivery of customer services across the patient care continuum. Case management has transcended time and will continue to be a viable infrastructure process for successful organizations in the future. A key component of the case management infrastructure is information systems and technology support. Case management challenges include effective deployment and use of systems and technology. As more sophisticated, integrated systems are made available, case managers can use these tools to continue to expand effectively beyond the patient's episodic event to provide greater levels of cradle-to-grave management of healthcare. This article explores methods for defining case management system needs and identifying automation options available to the case manager.

  11. 77 FR 59203 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-26

    ... Infrastructure Partnership Advisory Council. [FR Doc. 2012-23666 Filed 9-25-12; 8:45 am] BILLING CODE 9910-9P-P ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0051] Critical Infrastructure Partnership... meeting. SUMMARY: The Critical Infrastructure Partnership Advisory Council (CIPAC) Plenary Meeting will be...

  12. What’s My Lane? Identifying the State Government Role in Critical Infrastructure Protection

    DTIC Science & Technology

    2012-03-01

    lacking. Dr. Bellavita makes an important point that “the initial difference between critical infrastructure and plain vanilla infrastructure seems to...more definitive description of “critical” would help to improve understanding of what infrastructure is critical and help to segregate “ vanilla ” or

  13. The role of minimum supply and social vulnerability assessment for governing critical infrastructure failure: current gaps and future agenda

    NASA Astrophysics Data System (ADS)

    Garschagen, Matthias; Sandholz, Simone

    2018-04-01

    Increased attention has lately been given to the resilience of critical infrastructure in the context of natural hazards and disasters. The major focus therein is on the sensitivity of critical infrastructure technologies and their management contingencies. However, strikingly little attention has been given to assessing and mitigating social vulnerabilities towards the failure of critical infrastructure and to the development, design and implementation of minimum supply standards in situations of major infrastructure failure. Addressing this gap and contributing to a more integrative perspective on critical infrastructure resilience is the objective of this paper. It asks which role social vulnerability assessments and minimum supply considerations can, should and do - or do not - play for the management and governance of critical infrastructure failure. In its first part, the paper provides a structured review on achievements and remaining gaps in the management of critical infrastructure and the understanding of social vulnerabilities towards disaster-related infrastructure failures. Special attention is given to the current state of minimum supply concepts with a regional focus on policies in Germany and the EU. In its second part, the paper then responds to the identified gaps by developing a heuristic model on the linkages of critical infrastructure management, social vulnerability and minimum supply. This framework helps to inform a vision of a future research agenda, which is presented in the paper's third part. Overall, the analysis suggests that the assessment of socially differentiated vulnerabilities towards critical infrastructure failure needs to be undertaken more stringently to inform the scientifically and politically difficult debate about minimum supply standards and the shared responsibilities for securing them.

  14. Onsite and Electric Backup Capabilities at Critical Infrastructure Facilities in the United States

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, Julia A.; Wallace, Kelly E.; Kudo, Terence Y.

    2016-04-01

    The following analysis, conducted by Argonne National Laboratory’s (Argonne’s) Risk and Infrastructure Science Center (RISC), details an analysis of electric power backup of national critical infrastructure as captured through the Department of Homeland Security’s (DHS’s) Enhanced Critical Infrastructure Program (ECIP) Initiative. Between January 1, 2011, and September 2014, 3,174 ECIP facility surveys have been conducted. This study focused first on backup capabilities by infrastructure type and then expanded to infrastructure type by census region.

  15. Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure

    NASA Astrophysics Data System (ADS)

    Arndt, Craig M.; Hall, Nathaniel A.

    2004-08-01

    Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.

  16. Development of a structural health monitoring system for the life assessment of critical transportation infrastructure.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roach, Dennis Patrick; Jauregui, David Villegas; Daumueller, Andrew Nicholas

    2012-02-01

    Recent structural failures such as the I-35W Mississippi River Bridge in Minnesota have underscored the urgent need for improved methods and procedures for evaluating our aging transportation infrastructure. This research seeks to develop a basis for a Structural Health Monitoring (SHM) system to provide quantitative information related to the structural integrity of metallic structures to make appropriate management decisions and ensuring public safety. This research employs advanced structural analysis and nondestructive testing (NDT) methods for an accurate fatigue analysis. Metal railroad bridges in New Mexico will be the focus since many of these structures are over 100 years old andmore » classified as fracture-critical. The term fracture-critical indicates that failure of a single component may result in complete collapse of the structure such as the one experienced by the I-35W Bridge. Failure may originate from sources such as loss of section due to corrosion or cracking caused by fatigue loading. Because standard inspection practice is primarily visual, these types of defects can go undetected due to oversight, lack of access to critical areas, or, in riveted members, hidden defects that are beneath fasteners or connection angles. Another issue is that it is difficult to determine the fatigue damage that a structure has experienced and the rate at which damage is accumulating due to uncertain history and load distribution in supporting members. A SHM system has several advantages that can overcome these limitations. SHM allows critical areas of the structure to be monitored more quantitatively under actual loading. The research needed to apply SHM to metallic structures was performed and a case study was carried out to show the potential of SHM-driven fatigue evaluation to assess the condition of critical transportation infrastructure and to guide inspectors to potential problem areas. This project combines the expertise in transportation infrastructure at New Mexico State University with the expertise at Sandia National Laboratories in the emerging field of SHM.« less

  17. 6 CFR 29.1 - Purpose and scope.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...

  18. 6 CFR 29.1 - Purpose and scope.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...

  19. 6 CFR 29.1 - Purpose and scope.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...

  20. 6 CFR 29.1 - Purpose and scope.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...

  1. Trauma center staffing, infrastructure, and patient characteristics that influence trauma center need.

    PubMed

    Faul, Mark; Sasser, Scott M; Lairet, Julio; Mould-Millman, Nee-Kofi; Sugerman, David

    2015-01-01

    The most effective use of trauma center resources helps reduce morbidity and mortality, while saving costs. Identifying critical infrastructure characteristics, patient characteristics and staffing components of a trauma center associated with the proportion of patients needing major trauma care will help planners create better systems for patient care. We used the 2009 National Trauma Data Bank-Research Dataset to determine the proportion of critically injured patients requiring the resources of a trauma center within each Level I-IV trauma center (n=443). The outcome variable was defined as the portion of treated patients who were critically injured. We defined the need for critical trauma resources and interventions ("trauma center need") as death prior to hospital discharge, admission to the intensive care unit, or admission to the operating room from the emergency department as a result of acute traumatic injury. Generalized Linear Modeling (GLM) was used to determine how hospital infrastructure, staffing Levels, and patient characteristics contributed to trauma center need. Nonprofit Level I and II trauma centers were significantly associated with higher levels of trauma center need. Trauma centers that had a higher percentage of transferred patients or a lower percentage of insured patients were associated with a higher proportion of trauma center need. Hospital infrastructure characteristics, such as bed capacity and intensive care unit capacity, were not associated with trauma center need. A GLM for Level III and IV trauma centers showed that the number of trauma surgeons on staff was associated with trauma center need. Because the proportion of trauma center need is predominantly influenced by hospital type, transfer frequency, and insurance status, it is important for administrators to consider patient population characteristics of the catchment area when planning the construction of new trauma centers or when coordinating care within state or regional trauma systems.

  2. 75 FR 21011 - Critical Infrastructure Partnership Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-22

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0032] Critical Infrastructure Partnership... Infrastructure Partnership Advisory Council (CIPAC) charter renewal. SUMMARY: The Department of Homeland Security... and Outreach Division, Office of Infrastructure Protection, National Protection and Programs...

  3. 75 FR 60771 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-01

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0080] Critical Infrastructure Partnership..., Section Chief Partnership Programs, Partnership and Outreach Division, Office of Infrastructure Protection... Outreach Division, Office of Infrastructure Protection, National Protection and Programs Directorate...

  4. Enhancements of the "eHabitat

    NASA Astrophysics Data System (ADS)

    Santoro, M.; Dubois, G.; Schulz, M.; Skøien, J. O.; Nativi, S.; Peedell, S.; Boldrini, E.

    2012-04-01

    The number of interoperable research infrastructures has increased significantly with the growing awareness of the efforts made by the Global Earth Observation System of Systems (GEOSS). One of the Social Benefit Areas (SBA) that is benefiting most from GEOSS is biodiversity, given the costs of monitoring the environment and managing complex information, from space observations to species records including their genetic characteristics. But GEOSS goes beyond the simple sharing of the data as it encourages the connectivity of models (the GEOSS Model Web), an approach easing the handling of often complex multi-disciplinary questions such as understanding the impact of environmental and climatological factors on ecosystems and habitats. In the context of GEOSS Architecture Implementation Pilot - Phase 3 (AIP-3), the EC-funded EuroGEOSS and GENESIS projects have developed and successfully demonstrated the "eHabitat" use scenario dealing with Climate Change and Biodiversity domains. Based on the EuroGEOSS multidisciplinary brokering infrastructure and on the DOPA (Digital Observatory for Protected Areas, see http://dopa.jrc.ec.europa.eu/), this scenario demonstrated how a GEOSS-based interoperability infrastructure can aid decision makers to assess and possibly forecast the irreplaceability of a given protected area, an essential indicator for assessing the criticality of threats this protected area is exposed to. The "eHabitat" use scenario was advanced in the GEOSS Sprint to Plenary activity; the advanced scenario will include the "EuroGEOSS Data Access Broker" and a new version of the eHabitat model in order to support the use of uncertain data. The multidisciplinary interoperability infrastructure which is used to demonstrate the "eHabitat" use scenario is composed of the following main components: a) A Discovery Broker: this component is able to discover resources from a plethora of different and heterogeneous geospatial services, presenting them on a single and standard discovery service; b) A Discovery Augmentation Component (DAC): this component builds on existing discovery and semantic services in order to provide the infrastructure with semantics enabled queries; c) A Data Access Broker: this component provides a seamless access of heterogeneous remote resources via a unique and standard service; d) Environmental Modeling Components (i.e. OGC WPS): these implement algorithms to predict evolution of protected areas This presentation introduces the advanced infrastructure developed to enhance the "eHabitat" use scenario. The presented infrastructure will be accessible through the GEO Portal and was used for demonstrating the "eHabitat" model at the last GEO Plenary Meeting - Istanbul, November 2011.

  5. The impact of natural hazard on critical infrastructure systems: definition of an ontology

    NASA Astrophysics Data System (ADS)

    Dimauro, Carmelo; Bouchon, Sara; Frattini, Paolo; Giusto, Claudia

    2013-04-01

    According to the Council of the European Union Directive (2008), 'critical infrastructure' means an asset, system or part thereof which is essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact as a result of the failure to maintain those functions. Critical infrastructure networks are exposed to natural events, such as floods, storms, landslides, earthquakes, etc. Recent natural disasters show that socio-economic consequences can be very much aggravated by the impact on these infrastructures. Though, there is still a lack of a recognized approach or methodology to assess the vulnerability of critical infrastructure assets against natural threats. The difficulty to define such an approach is increased by the need to consider a very high number of natural events, which differ in nature, magnitude and probability, as well as the need to assess the vulnerability of a high variety of infrastructure assets (e.g. bridges, roads, tunnels, pipelines, etc.) To meet this challenge, the objective of the THREVI2 EU-CIPS project is to create a database linking the relationships between natural hazards and critical infrastructure assets. The query of the database will allow the end-users (critical infrastructure protection authorities and operators) to identify the relevant scenarios according to the own priorities and criteria. The database builds on an ontology optimized for the assessment of the impact of threats on critical infrastructures. The ontology aims at capturing the existing knowledge on natural hazards, critical infrastructures assets and their related vulnerabilities. Natural phenomena that can threaten critical infrastructures are classified as "events", and organized in a genetic-oriented hierarchy. The main attributes associated to each event are the probability, the magnitude and the "modus". The modus refers to the physical-chemical process by means the event (e.g., a pyroclastic flow) can interact and damage a critical infrastructure asset (e.g., a pipe). Each event can be characterized by several modi (e.g., impact load, heating, burying) that can cause damages to the asset. Hence, the damage is linked to the modus and not directly to the event. The advantage of using the "modus" approach is to allow reducing the number of interactions (natural hazard/Critical infrastructure assets) to be addressed. All different events exert their impact on infrastructures by means of a limited number of different modus. This allows adapting existing vulnerability or fragility laws to events that have not been studied yet, and for which these laws are not available.

  6. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  7. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  8. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  9. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  10. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...

  11. People at risk - nexus critical infrastructure and society

    NASA Astrophysics Data System (ADS)

    Heiser, Micha; Thaler, Thomas; Fuchs, Sven

    2016-04-01

    Strategic infrastructure networks include the highly complex and interconnected systems that are so vital to a city or state that any sudden disruption can result in debilitating impacts on human life, the economy and the society as a whole. Recently, various studies have applied complex network-based models to study the performance and vulnerability of infrastructure systems under various types of attacks and hazards - a major part of them is, particularly after the 9/11 incident, related to terrorism attacks. Here, vulnerability is generally defined as the performance drop of an infrastructure system under a given disruptive event. The performance can be measured by different metrics, which correspond to various levels of resilience. In this paper, we will address vulnerability and exposure of critical infrastructure in the Eastern Alps. The Federal State Tyrol is an international transport route and an essential component of the north-south transport connectivity in Europe. Any interruption of the transport flow leads to incommensurable consequences in terms of indirect losses, since the system does not feature redundant elements at comparable economic efficiency. Natural hazard processes such as floods, debris flows, rock falls and avalanches, endanger this infrastructure line, such as large flood events in 2005 or 2012, rock falls 2014, which had strong impacts to the critical infrastructure, such as disruption of the railway lines (in 2005 and 2012), highways and motorways (in 2014). The aim of this paper is to present how critical infrastructures as well as communities and societies are vulnerable and can be resilient against natural hazard risks and the relative cascading effects to different compartments (industrial, infrastructural, societal, institutional, cultural, etc.), which is the dominant by the type of hazard (avalanches, torrential flooding, debris flow, rock falls). Specific themes will be addressed in various case studies to allow cross-learning and cross-comparison of, for example rural and urban areas, and different scales. Correspondingly, scale-specific resilience indicators and metrics will be developed to tailor methods to specific needs according to the scale of assessment (micro/local and macro/regional) and to the type of infrastructure. The traditional indicators normally used in structural analysis are not sufficient to understand how events happening on the networks can have cascading consequences. Moreover, effects have multidimensional (technical, economic, organizational and human), multiscale (micro and macro) and temporal characteristics (short- to long-term incidence). These considerations will guide to different activities: 1) computation of classic structural analysis indicators on the case studies in order to obtain an identity of the transport infrastructure and; 2) development of a set of new measures of resilience. To mitigate natural hazard risk a large amount of protection measures of different typology have been constructed following inhomogeneous reliability standards. The focus of this case study will be on resilience issues and decision making in the context of a large scale sectorial approach focused on transport infrastructure network.

  12. 76 FR 18743 - Commission Information Collection Activities (FERC-603); Comment Request; Extension

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-05

    ... FERC-603 ``Critical Energy Infrastructure Information'' (OMB No. 1902-0197) is used by the Commission to implement procedures for gaining access to critical energy infrastructure information (CEII) that... information about ``existing or proposed critical infrastructure that (i) relates to the production...

  13. 76 FR 81956 - National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... through the Secretary of Homeland Security with advice on the security of the critical infrastructure... critical infrastructure as directed by the President. At this meeting, the committee will receive work from... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0117] National Infrastructure Advisory...

  14. 76 FR 36137 - National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-21

    ... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0034] National Infrastructure Advisory...

  15. Critical infrastructure protection.

    PubMed

    Deitz, Kim M

    2012-01-01

    Current government policies for protecting the nation's critical infrastructure are described in this article which focuses on hospital disaster planning and incident management and the significant role of Security in infrastructure protection

  16. A Federal Response: The President's Critical Infrastructure Protection Board.

    ERIC Educational Resources Information Center

    Schmidt, Howard

    2002-01-01

    Outlines the U.S. Critical Infrastructure Protection Board's purpose, budget, principles, and priorities. Describes the board's role in coordinating all federal activities related to protection of information systems and networks supporting critical infrastructures. Also discusses its responsibility in creating a policy and road map for government…

  17. A social-ecological database to advance research on infrastructure development impacts in the Brazilian Amazon.

    PubMed

    Tucker Lima, Joanna M; Valle, Denis; Moretto, Evandro Mateus; Pulice, Sergio Mantovani Paiva; Zuca, Nadia Lucia; Roquetti, Daniel Rondinelli; Beduschi, Liviam Elizabeth Cordeiro; Praia, Amanda Salles; Okamoto, Claudia Parucce Franco; da Silva Carvalhaes, Vinicius Leite; Branco, Evandro Albiach; Barbezani, Bruna; Labandera, Emily; Timpe, Kelsie; Kaplan, David

    2016-08-30

    Recognized as one of the world's most vital natural and cultural resources, the Amazon faces a wide variety of threats from natural resource and infrastructure development. Within this context, rigorous scientific study of the region's complex social-ecological system is critical to inform and direct decision-making toward more sustainable environmental and social outcomes. Given the Amazon's tightly linked social and ecological components and the scope of potential development impacts, effective study of this system requires an easily accessible resource that provides a broad and reliable data baseline. This paper brings together multiple datasets from diverse disciplines (including human health, socio-economics, environment, hydrology, and energy) to provide investigators with a variety of baseline data to explore the multiple long-term effects of infrastructure development in the Brazilian Amazon.

  18. A social-ecological database to advance research on infrastructure development impacts in the Brazilian Amazon

    PubMed Central

    Tucker Lima, Joanna M.; Valle, Denis; Moretto, Evandro Mateus; Pulice, Sergio Mantovani Paiva; Zuca, Nadia Lucia; Roquetti, Daniel Rondinelli; Beduschi, Liviam Elizabeth Cordeiro; Praia, Amanda Salles; Okamoto, Claudia Parucce Franco; da Silva Carvalhaes, Vinicius Leite; Branco, Evandro Albiach; Barbezani, Bruna; Labandera, Emily; Timpe, Kelsie; Kaplan, David

    2016-01-01

    Recognized as one of the world’s most vital natural and cultural resources, the Amazon faces a wide variety of threats from natural resource and infrastructure development. Within this context, rigorous scientific study of the region’s complex social-ecological system is critical to inform and direct decision-making toward more sustainable environmental and social outcomes. Given the Amazon’s tightly linked social and ecological components and the scope of potential development impacts, effective study of this system requires an easily accessible resource that provides a broad and reliable data baseline. This paper brings together multiple datasets from diverse disciplines (including human health, socio-economics, environment, hydrology, and energy) to provide investigators with a variety of baseline data to explore the multiple long-term effects of infrastructure development in the Brazilian Amazon. PMID:27575915

  19. Development of a Free-Flight Simulation Infrastructure

    NASA Technical Reports Server (NTRS)

    Miles, Eric S.; Wing, David J.; Davis, Paul C.

    1999-01-01

    In anticipation of a projected rise in demand for air transportation, NASA and the FAA are researching new air-traffic-management (ATM) concepts that fall under the paradigm known broadly as ":free flight". This paper documents the software development and engineering efforts in progress by Seagull Technology, to develop a free-flight simulation (FFSIM) that is intended to help NASA researchers test mature-state concepts for free flight, otherwise referred to in this paper as distributed air / ground traffic management (DAG TM). Under development is a distributed, human-in-the-loop simulation tool that is comprehensive in its consideration of current and envisioned communication, navigation and surveillance (CNS) components, and will allow evaluation of critical air and ground traffic management technologies from an overall systems perspective. The FFSIM infrastructure is designed to incorporate all three major components of the ATM triad: aircraft flight decks, air traffic control (ATC), and (eventually) airline operational control (AOC) centers.

  20. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-31

    ... Cyber Security Trade Mission to Saudi Arabia and Kuwait, September 28-October 1, 2013 AGENCY... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry...

  1. The Influence of State Policies on Critical Infrastructure Resilience: An Approach for Analyzing Transportation and Capital Investment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wall, Thomas; Trail, Jessica; Gevondyan, Erna

    During times of crisis, communities and regions rely heavily on critical infrastructure systems to support their emergency management response and recovery activities. Therefore, the resilience of critical infrastructure systems to crises is a pivotal factor to a community’s overall resilience. Critical infrastructure resilience can be influenced by many factors, including State policies – which are not always uniform in their structure or application across the United States – were identified by the U.S. Department of Homeland Security as an area of particular interest with respect to their the influence on the resilience of critical infrastructure systems. This study focuses onmore » developing an analytical methodology to assess links between policy and resilience, and applies that methodology to critical infrastructure in the Transportation Systems Sector. Specifically, this study seeks to identify potentially influential linkages between State transportation capital funding policies and the resilience of bridges located on roadways that are under the management of public agencies. This study yielded notable methodological outcomes, including the general capability of the analytical methodology to yield – in the case of some States – significant results connecting State policies with critical infrastructure resilience, with the suggestion that further refinement of the methodology may be beneficial.« less

  2. 75 FR 81284 - National Protection and Programs Directorate; National Infrastructure Advisory Council Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-27

    ... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... Directorate; National Infrastructure Advisory Council Meeting AGENCY: National Protection and Programs...

  3. 77 FR 64818 - The Critical Infrastructure Partnership Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0033] The Critical Infrastructure Partnership... Infrastructure Partnership Advisory Council membership update. SUMMARY: The Department of Homeland Security (DHS) announced the [[Page 64819

  4. 3 CFR 8607 - Proclamation 8607 of November 30, 2010. Critical Infrastructure Protection Month, 2010

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., which will make our physical and cyber infrastructure more resilient. Working together, we can raise... Infrastructure Protection Month, 2010 8607 Proclamation 8607 Presidential Documents Proclamations Proclamation 8607 of November 30, 2010 Proc. 8607 Critical Infrastructure Protection Month, 2010By the President of...

  5. The Impact of Process Capability on Service Reliability for Critical Infrastructure Providers

    ERIC Educational Resources Information Center

    Houston, Clemith J., Jr.

    2013-01-01

    This study investigated the relationship between organizational processes that have been identified as promoting resiliency and their impact on service reliability within the scope of critical infrastructure providers. The importance of critical infrastructure to the nation is evident from the body of research and is supported by instances where…

  6. Challenges in Special Steel Making

    NASA Astrophysics Data System (ADS)

    Balachandran, G.

    2018-02-01

    Special bar quality [SBQ] is a long steel product where an assured quality is delivered by the steel mill to its customer. The bars have enhanced tolerance to higher stress application and it is demanded for specialised component making. The SBQ bars are sought for component making processing units such as closed die hot forging, hot extrusion, cold forging, machining, heat treatment, welding operations. The final component quality of the secondary processing units depends on the quality maintained at the steel maker end along with quality maintained at the fabricator end. Thus, quality control is ensured at every unit process stages. The various market segments catered to by SBQ steel segment is ever growing and is reviewed. Steel mills need adequate infrastructure and technological capability to make these higher quality steels. Some of the critical stages of processing SBQ and the critical quality maintenance parameters at the steel mill in the manufacture has been brought out.

  7. Network information attacks on the control systems of power facilities belonging to the critical infrastructure

    NASA Astrophysics Data System (ADS)

    Loginov, E. L.; Raikov, A. N.

    2015-04-01

    The most large-scale accidents occurred as a consequence of network information attacks on the control systems of power facilities belonging to the United States' critical infrastructure are analyzed in the context of possibilities available in modern decision support systems. Trends in the development of technologies for inflicting damage to smart grids are formulated. A volume matrix of parameters characterizing attacks on facilities is constructed. A model describing the performance of a critical infrastructure's control system after an attack is developed. The recently adopted measures and legislation acts aimed at achieving more efficient protection of critical infrastructure are considered. Approaches to cognitive modeling and networked expertise of intricate situations for supporting the decision-making process, and to setting up a system of indicators for anticipatory monitoring of critical infrastructure are proposed.

  8. Attacker-defender game from a network science perspective

    NASA Astrophysics Data System (ADS)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  9. Medication safety infrastructure in critical-access hospitals in Florida.

    PubMed

    Winterstein, Almut G; Hartzema, Abraham G; Johns, Thomas E; De Leon, Jessica M; McDonald, Kathie; Henshaw, Zak; Pannell, Robert

    2006-03-01

    The medication safety infrastructure of critical-access hospitals (CAHs) in Florida was evaluated. Qualitative assessments, including a self-administered survey and site visits, were conducted in seven of nine CAHs between January and June 2003. The survey consisted of the Institute for Safe Medication Practices Medication Safety Self-assessment, the 2003 Joint Commission on Accreditation of Healthcare Organizations patient safety goals, health information technology (HIT) questions, and medication-use-process flow charts. On-site visits included interviews of CAH personnel who had safety responsibility and inspections of pharmacy facilities. The findings were compiled into a matrix reflecting structural and procedural components of the CAH medication safety infrastructure. The nine characteristics that emerged as targets for quality improvement (QI) were medication accessibility and storage, sterile product compounding, access to drug information, access to and utilization of patient information in medication order review, advanced safety technology, drug formularies and standardized medication protocols, safety culture, and medication reconciliation. Based on weighted importance and feasibility, QI efforts in CAHs should focus on enhancing medication order review systems, standardizing procedures for handling high-risk medications, promoting an appropriate safety culture, involvement in seamless care, and investment in HIT.

  10. Critical infrastructure protection : significant challenges in developing national capabilities

    DOT National Transportation Integrated Search

    2001-04-01

    To address the concerns about protecting the nation's critical computer-dependent infrastructure, this General Accounting Office (GOA) report describes the progress of the National Infrastructure Protection Center (NIPC) in (1) developing national ca...

  11. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  12. How are America's private forests changing? An integrated assessment of forest management, housing pressure, and urban development in alternate emissions scenarios

    Treesearch

    Pinki Mondal; Brett J. Butler; David B. Kittredge; Warren K. Moser

    2013-01-01

    Private forests are a vital component of the natural ecosystem infrastructure of the United States, and provide critical ecosystem services including clean air and water, energy, wildlife habitat, recreational services, and wood fiber. These forests have been subject to conversion to developed uses due to increasing population pressures. This study examines the...

  13. 18 CFR 141.300 - FERC Form No. 715, Annual Transmission Planning and Evaluation Report.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... form. (d) Critical Energy Infrastructure Information. (1) If the instructions in Form No. 715 require a utility to reveal Critical Energy Infrastructure Information (CEII), as defined in § 388.113(c) of this... Critical Energy Infrastructure Information (CEII) may be found at 18 CFR 388.113. Requests for access to...

  14. 18 CFR 141.300 - FERC Form No. 715, Annual Transmission Planning and Evaluation Report.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... form. (d) Critical Energy Infrastructure Information. (1) If the instructions in Form No. 715 require a utility to reveal Critical Energy Infrastructure Information (CEII), as defined in § 388.113(c) of this... Critical Energy Infrastructure Information (CEII) may be found at 18 CFR 388.113. Requests for access to...

  15. 18 CFR 141.300 - FERC Form No. 715, Annual Transmission Planning and Evaluation Report.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... form. (d) Critical Energy Infrastructure Information. (1) If the instructions in Form No. 715 require a utility to reveal Critical Energy Infrastructure Information (CEII), as defined in § 388.113(c) of this... Critical Energy Infrastructure Information (CEII) may be found at 18 CFR 388.113. Requests for access to...

  16. 18 CFR 141.300 - FERC Form No. 715, Annual Transmission Planning and Evaluation Report.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... form. (d) Critical Energy Infrastructure Information. (1) If the instructions in Form No. 715 require a utility to reveal Critical Energy Infrastructure Information (CEII), as defined in § 388.113(c) of this... Critical Energy Infrastructure Information (CEII) may be found at 18 CFR 388.113. Requests for access to...

  17. Systematic risk assessment methodology for critical infrastructure elements - Oil and Gas subsectors

    NASA Astrophysics Data System (ADS)

    Gheorghiu, A.-D.; Ozunu, A.

    2012-04-01

    The concern for the protection of critical infrastructure has been rapidly growing in the last few years in Europe. The level of knowledge and preparedness in this field is beginning to develop in a lawfully organized manner, for the identification and designation of critical infrastructure elements of national and European interest. Oil and gas production, refining, treatment, storage and transmission by pipelines facilities, are considered European critical infrastructure sectors, as per Annex I of the Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Besides identifying European and national critical infrastructure elements, member states also need to perform a risk analysis for these infrastructure items, as stated in Annex II of the above mentioned Directive. In the field of risk assessment, there are a series of acknowledged and successfully used methods in the world, but not all hazard identification and assessment methods and techniques are suitable for a given site, situation, or type of hazard. As Theoharidou, M. et al. noted (Theoharidou, M., P. Kotzanikolaou, and D. Gritzalis 2009. Risk-Based Criticality Analysis. In Critical Infrastructure Protection III. Proceedings. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Hanover, New Hampshire, USA, March 23-25, 2009: revised selected papers, edited by C. Palmer and S. Shenoi, 35-49. Berlin: Springer.), despite the wealth of knowledge already created, there is a need for simple, feasible, and standardized criticality analyses. The proposed systematic risk assessment methodology includes three basic steps: the first step (preliminary analysis) includes the identification of hazards (including possible natural hazards) for each installation/section within a given site, followed by a criterial analysis and then a detailed analysis step. The criterial evaluation is used as a ranking system in order to establish the priorities for the detailed risk assessment. This criterial analysis stage is necessary because the total number of installations and sections on a site can be quite large. As not all installations and sections on a site contribute significantly to the risk of a major accident occurring, it is not efficient to include all installations and sections in the detailed risk assessment, which can be time and resource consuming. The selected installations are then taken into consideration in the detailed risk assessment, which is the third step of the systematic risk assessment methodology. Following this step, conclusions can be drawn related to the overall risk characteristics of the site. The proposed methodology can as such be successfully applied to the assessment of risk related to critical infrastructure elements falling under the energy sector of Critical Infrastructure, mainly the sub-sectors oil and gas. Key words: Systematic risk assessment, criterial analysis, energy sector critical infrastructure elements

  18. IP Infrastructure Geolocation

    DTIC Science & Technology

    2015-03-01

    unlimited 13. ABSTRACT (maximum 200 words) Physical network maps are important to critical infrastructure defense and planning. Current state-of...the-art network infrastructure geolocation relies on Domain Name System (DNS) inferences. However, not only is using the DNS relatively inaccurate for...INTENTIONALLY LEFT BLANK iv ABSTRACT Physical network maps are important to critical infrastructure defense and planning. Cur- rent state-of-the-art

  19. Critical Infrastructure Interdependencies Assessment

    DOE PAGES

    Petit, Frederic; Verner, Duane

    2016-11-01

    Throughout the world there is strong recognition that critical infrastructure security and resilience needs to be improved. In the United States, the National Infrastructure Protection Plan (NIPP) provides the strategic vision to guide the national effort to manage risk to the Nation’s critical infrastructure.”1 The achievement of this vision is challenged by the complexity of critical infrastructure systems and their inherent interdependencies. The update to the NIPP presents an opportunity to advance the nation’s efforts to further understand and analyze interdependencies. Such an important undertaking requires the involvement of public and private sector stakeholders and the reinforcement of existing partnershipsmore » and collaborations within the U.S. Department of Homeland Security (DHS) and other Federal agencies, including national laboratories; State, local, tribal, and territorial governments; and nongovernmental organizations.« less

  20. Supervisory Control and Data Acquisition (SCADA) Systems and Cyber-Security: Best Practices to Secure Critical Infrastructure

    ERIC Educational Resources Information Center

    Morsey, Christopher

    2017-01-01

    In the critical infrastructure world, many critical infrastructure sectors use a Supervisory Control and Data Acquisition (SCADA) system. The sectors that use SCADA systems are the electric power, nuclear power and water. These systems are used to control, monitor and extract data from the systems that give us all the ability to light our homes…

  1. US-CERT Control System Center Input/Output (I/O) Conceputal Design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2005-02-01

    This document was prepared for the US-CERT Control Systems Center of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs the federal departments to identify and prioritize critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the NCSD to address the control system security component addressed in the National Strategy to Secure Cyberspace andmore » the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems; the I/O upgrade described in this document supports these goals. The vulnerability assessment Test Bed, located in the Information Operations Research Center (IORC) facility at Idaho National Laboratory (INL), consists of a cyber test facility integrated with multiple test beds that simulate the nation's critical infrastructure. The fundamental mission of the Test Bed is to provide industry owner/operators, system vendors, and multi-agency partners of the INL National Security Division a platform for vulnerability assessments of control systems. The Input/Output (I/O) upgrade to the Test Bed (see Work Package 3.1 of the FY-05 Annual Work Plan) will provide for the expansion of assessment capabilities within the IORC facility. It will also provide capabilities to connect test beds within the Test Range and other Laboratory resources. This will allow real time I/O data input and communication channels for full replications of control systems (Process Control Systems [PCS], Supervisory Control and Data Acquisition Systems [SCADA], and components). This will be accomplished through the design and implementation of a modular infrastructure of control system, communications, networking, computing and associated equipment, and measurement/control devices. The architecture upgrade will provide a flexible patching system providing a quick ''plug and play''configuration through various communication paths to gain access to live I/O running over specific protocols. This will allow for in-depth assessments of control systems in a true-to-life environment. The full I/O upgrade will be completed through a two-phased approach. Phase I, funded by DHS, expands the capabilities of the Test Bed by developing an operational control system in two functional areas, the Science & Technology Applications Research (STAR) Facility and the expansion of various portions of the Test Bed. Phase II (see Appendix A), funded by other programs, will complete the full I/O upgrade to the facility.« less

  2. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access to...

  3. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access to...

  4. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access to...

  5. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access to...

  6. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access to...

  7. High-reliability computing for the smarter planet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Quinn, Heather M; Graham, Paul; Manuzzato, Andrea

    2010-01-01

    The geometric rate of improvement of transistor size and integrated circuit performance, known as Moore's Law, has been an engine of growth for our economy, enabling new products and services, creating new value and wealth, increasing safety, and removing menial tasks from our daily lives. Affordable, highly integrated components have enabled both life-saving technologies and rich entertainment applications. Anti-lock brakes, insulin monitors, and GPS-enabled emergency response systems save lives. Cell phones, internet appliances, virtual worlds, realistic video games, and mp3 players enrich our lives and connect us together. Over the past 40 years of silicon scaling, the increasing capabilities ofmore » inexpensive computation have transformed our society through automation and ubiquitous communications. In this paper, we will present the concept of the smarter planet, how reliability failures affect current systems, and methods that can be used to increase the reliable adoption of new automation in the future. We will illustrate these issues using a number of different electronic devices in a couple of different scenarios. Recently IBM has been presenting the idea of a 'smarter planet.' In smarter planet documents, IBM discusses increased computer automation of roadways, banking, healthcare, and infrastructure, as automation could create more efficient systems. A necessary component of the smarter planet concept is to ensure that these new systems have very high reliability. Even extremely rare reliability problems can easily escalate to problematic scenarios when implemented at very large scales. For life-critical systems, such as automobiles, infrastructure, medical implantables, and avionic systems, unmitigated failures could be dangerous. As more automation moves into these types of critical systems, reliability failures will need to be managed. As computer automation continues to increase in our society, the need for greater radiation reliability is necessary. Already critical infrastructure is failing too frequently. In this paper, we will introduce the Cross-Layer Reliability concept for designing more reliable computer systems.« less

  8. Resilience: Theory and Application.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carlson, J.L.; Haffenden, R.A.; Bassett, G.W.

    2012-02-03

    There is strong agreement among policymakers, practitioners, and academic researchers that the concept of resilience must play a major role in assessing the extent to which various entities - critical infrastructure owners and operators, communities, regions, and the Nation - are prepared to respond to and recover from the full range of threats they face. Despite this agreement, consensus regarding important issues, such as how resilience should be defined, assessed, and measured, is lacking. The analysis presented here is part of a broader research effort to develop and implement assessments of resilience at the asset/facility and community/regional levels. The literaturemore » contains various definitions of resilience. Some studies have defined resilience as the ability of an entity to recover, or 'bounce back,' from the adverse effects of a natural or manmade threat. Such a definition assumes that actions taken prior to the occurrence of an adverse event - actions typically associated with resistance and anticipation - are not properly included as determinants of resilience. Other analyses, in contrast, include one or more of these actions in their definitions. To accommodate these different definitions, we recognize a subset of resistance- and anticipation-related actions that are taken based on the assumption that an adverse event is going to occur. Such actions are in the domain of resilience because they reduce both the immediate and longer-term adverse consequences that result from an adverse event. Recognizing resistance- and anticipation-related actions that take the adverse event as a given accommodates the set of resilience-related actions in a clear-cut manner. With these considerations in mind, resilience can be defined as: 'the ability of an entity - e.g., asset, organization, community, region - to anticipate, resist, absorb, respond to, adapt to, and recover from a disturbance.' Because critical infrastructure resilience is important both in its own right and because of its implications for community/regional resilience, it is especially important to develop a sound methodology for assessing resilience at the asset/facility level. This objective will be accomplished by collecting data on four broadly defined groups of resilience-enhancing measures: preparedness, mitigation measures, response capabilities, and recovery mechanisms. Table ES-1 illustrates how the six components that define resilience are connected to the actions that enhance the capacity of an entity to be resilient. The relationships illustrated in Table ES-1 provide the framework for developing a survey instrument that will be used to elicit the information required to assess resilience at the asset/facility level. The resilience of a community/region is a function of the resilience of its subsystems, including its critical infrastructures, economy, civil society, governance (including emergency services), and supply chains/dependencies. The number and complexity of these subsystems will make the measurement of resilience more challenging as we move from individual assets/facilities to the community/regional level (where critical infrastructure resilience is only one component). Specific challenges include uncertainty about relationships (e.g., the composition of specific supply chains), data gaps, and time and budget constraints that prevent collection of all of the information needed to construct a comprehensive assessment of the resilience of a specific community or region. These challenges can be addressed, at least partially, by adopting a 'systems approach' to the assessment of resilience. In a systems approach, the extent to which the analysis addresses the resilience of the individual subsystems can vary. Specifically, high-level systems analysis can be used to identify the most important lower-level systems. In turn, within the most important lower-level systems, site assessment data should be collected only on the most critical asset-level components about which the least is known. Implementation of the strategies outlined here to assess resilience will facilitate the following four objectives: (1) Develop a methodology and supporting products to assess resilience at the asset/facility level, (2) Develop a methodology and supporting products to assess resilience at the critical infrastructure sector level, (3) Provide resilience-related information to critical infrastructure owners/operators to facilitate risk-based resource decision making, and (4) Provide resilience-related information to State and local mission partners to support their risk-based resource decision making.« less

  9. Complex Networks and Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Setola, Roberto; de Porcellinis, Stefano

    The term “Critical Infrastructures” indicates all those technological infrastructures such as: electric grids, telecommunication networks, railways, healthcare systems, financial circuits, etc. that are more and more relevant for the welfare of our countries. Each one of these infrastructures is a complex, highly non-linear, geographically dispersed cluster of systems, that interact with their human owners, operators, users and with the other infrastructures. Their augmented relevance and the actual political and technological scenarios, which have increased their exposition to accidental failure and deliberate attacks, demand for different and innovative protection strategies (generally indicate as CIP - Critical Infrastructure Protection). To this end it is mandatory to understand the mechanisms that regulate the dynamic of these infrastructures. In this framework, an interesting approach is those provided by the complex networks. In this paper we illustrate some results achieved considering structural and functional properties of the corresponding topological networks both when each infrastructure is assumed as an autonomous system and when we take into account also the dependencies existing among the different infrastructures.

  10. The Component Model of Infrastructure: A Practical Approach to Understanding Public Health Program Infrastructure

    PubMed Central

    Snyder, Kimberly; Rieker, Patricia P.

    2014-01-01

    Functioning program infrastructure is necessary for achieving public health outcomes. It is what supports program capacity, implementation, and sustainability. The public health program infrastructure model presented in this article is grounded in data from a broader evaluation of 18 state tobacco control programs and previous work. The newly developed Component Model of Infrastructure (CMI) addresses the limitations of a previous model and contains 5 core components (multilevel leadership, managed resources, engaged data, responsive plans and planning, networked partnerships) and 3 supporting components (strategic understanding, operations, contextual influences). The CMI is a practical, implementation-focused model applicable across public health programs, enabling linkages to capacity, sustainability, and outcome measurement. PMID:24922125

  11. X-33/RLV System Health Management/ Vehicle Health Management

    NASA Technical Reports Server (NTRS)

    Garbos, Raymond J.; Mouyos, William

    1998-01-01

    To reduce operations cost, the RLV must include the following elements: highly reliable, robust subsystems designed for simple repair access with a simplified servicing infrastructure and incorporating expedited decision making about faults and anomalies. A key component for the Single Stage to Orbit (SSTO) RLV System used to meet these objectives is System Health Management (SHM). SHM deals with the vehicle component- Vehicle Health Management (VHM), the ground processing associated with the fleet (GVHM) and the Ground Infrastructure Health Management (GIHM). The objective is to provide an automated collection and paperless health decision, maintenance and logistics system. Many critical technologies are necessary to make the SHM (and more specifically VHM) practical, reliable and cost effective. Sanders is leading the design, development and integration of the SHM system for RLV and X-33 SHM (a sub-scale, sub-orbit Advanced Technology Demonstrator). This paper will present the X-33 SHM design which forms the baseline for RLV SHM. This paper will also discuss other applications of these technologies.

  12. Impact of configuration management system of computer center on support of scientific projects throughout their lifecycle

    NASA Astrophysics Data System (ADS)

    Bogdanov, A. V.; Iuzhanin, N. V.; Zolotarev, V. I.; Ezhakova, T. R.

    2017-12-01

    In this article the problem of scientific projects support throughout their lifecycle in the computer center is considered in every aspect of support. Configuration Management system plays a connecting role in processes related to the provision and support of services of a computer center. In view of strong integration of IT infrastructure components with the use of virtualization, control of infrastructure becomes even more critical to the support of research projects, which means higher requirements for the Configuration Management system. For every aspect of research projects support, the influence of the Configuration Management system is being reviewed and development of the corresponding elements of the system is being described in the present paper.

  13. 6 CFR 29.5 - Requirements for protection.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... protected use regarding the security of critical infrastructure or protected systems, analysis, warning... expectation of protection from disclosure as provided by the provisions of the Critical Infrastructure... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL...

  14. 6 CFR 29.5 - Requirements for protection.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... protected use regarding the security of critical infrastructure or protected systems, analysis, warning... expectation of protection from disclosure as provided by the provisions of the Critical Infrastructure... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL...

  15. 78 FR 11737 - Improving Critical Infrastructure Cybersecurity

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-19

    ... of America, it is hereby ordered as follows: Section 1. Policy. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical... cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety...

  16. Complex Dynamics of the Power Transmission Grid (and other Critical Infrastructures)

    NASA Astrophysics Data System (ADS)

    Newman, David

    2015-03-01

    Our modern societies depend crucially on a web of complex critical infrastructures such as power transmission networks, communication systems, transportation networks and many others. These infrastructure systems display a great number of the characteristic properties of complex systems. Important among these characteristics, they exhibit infrequent large cascading failures that often obey a power law distribution in their probability versus size. This power law behavior suggests that conventional risk analysis does not apply to these systems. It is thought that much of this behavior comes from the dynamical evolution of the system as it ages, is repaired, upgraded, and as the operational rules evolve with human decision making playing an important role in the dynamics. In this talk, infrastructure systems as complex dynamical systems will be introduced and some of their properties explored. The majority of the talk will then be focused on the electric power transmission grid though many of the results can be easily applied to other infrastructures. General properties of the grid will be discussed and results from a dynamical complex systems power transmission model will be compared with real world data. Then we will look at a variety of uses of this type of model. As examples, we will discuss the impact of size and network homogeneity on the grid robustness, the change in risk of failure as generation mix (more distributed vs centralized for example) changes, as well as the effect of operational changes such as the changing the operational risk aversion or grid upgrade strategies. One of the important outcomes from this work is the realization that ``improvements'' in the system components and operational efficiency do not always improve the system robustness, and can in fact greatly increase the risk, when measured as a risk of large failure.

  17. Engaging the Nation’s Critical Infrastructure Sector to Deter Cyber Threats

    DTIC Science & Technology

    2013-03-01

    is the component of CyberOps that extends cyber power beyond the defensive boundaries of the GIG to detect, deter, deny, and defeat adversaries... economy .16 DDOS attacks are based on multiple, malware infected personal computers, organized into networks called botnets, and are directed by...not condemn the actions of those involved. Of the two attacks on Estonia and Georgia, it was Estonia that had the greatest damage to its economy

  18. Infrastructure, Components and System Level Testing and Analysis of Electric Vehicles: Cooperative Research and Development Final Report, CRADA Number CRD-09-353

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neubauer, J.

    2013-05-01

    Battery technology is critical for the development of innovative electric vehicle networks, which can enhance transportation sustainability and reduce dependence on petroleum. This cooperative research proposed by Better Place and NREL will focus on predicting the life-cycle economics of batteries, characterizing battery technologies under various operating and usage conditions, and designing optimal usage profiles for battery recharging and use.

  19. 10 CFR 217.3 - Program eligibility.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... programs for military and energy production or construction, military or critical infrastructure assistance... Act (42 U.S.C. 5195 et seq.) and critical infrastructure protection and restoration. ...

  20. 10 CFR 217.3 - Program eligibility.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... programs for military and energy production or construction, military or critical infrastructure assistance... Act (42 U.S.C. 5195 et seq.) and critical infrastructure protection and restoration. ...

  1. 10 CFR 217.3 - Program eligibility.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... programs for military and energy production or construction, military or critical infrastructure assistance... Act (42 U.S.C. 5195 et seq.) and critical infrastructure protection and restoration. ...

  2. Roadmap for Developing of Brokering as a Component of EarthCube

    NASA Astrophysics Data System (ADS)

    Pearlman, J.; Khalsa, S. S.; Browdy, S.; Duerr, R. E.; Nativi, S.; Parsons, M. A.; Pearlman, F.; Robinson, E. M.

    2012-12-01

    The goal of NSF's EarthCube is to create a sustainable infrastructure that enables the sharing of all geosciences data, information, and knowledge in an open, transparent and inclusive manner. Key to achieving the EarthCube vision is establishing a process that will guide the evolution of the infrastructure through community engagement and appropriate investment so that the infrastructure is embraced and utilized by the entire geosciences community. In this presentation we describe a roadmap, developed through the EarthCube Brokering Concept Award, for an evolutionary process of infrastructure and interoperability development. All geoscience communities already have, to a greater or lesser degree, elements of an information infrastructure in place. These elements include resources such as data archives, catalogs, and portals as well as vocabularies, data models, protocols, best practices and other community conventions. What is necessary now is a process for consolidating these diverse infrastructure elements into an overall infrastructure that provides easy discovery, access and utilization of resources across disciplinary boundaries. This process of consolidation will be achieved by creating "interfaces," what we call "brokers," between systems. Brokers connect disparate systems without imposing new burdens upon those systems, and enable the infrastructure to adjust to new technical developments and scientific requirements as they emerge. Robust cyberinfrastructure will arise only when social, organizational, and cultural issues are resolved in tandem with the creation of technology-based services. This is best done through use-case-driven requirements and agile, iterative development methods. It is important to start by solving real (not hypothetical) information access and use problems via small pilot projects that develop capabilities targeted to specific communities. These pilots can then grow into larger prototypes addressing intercommunity problems working towards a full-scale socio-technical infrastructure vision. Brokering, as a critical capability for connecting systems, evolves over time through more connections and increased functionality. This adaptive process allows for continual evaluation as to how well science-driven use cases are being met. Several NSF infrastructure projects are underway and beginning to shape the next generation of information sharing. There is a near term, and possibly unique, opportunity to increase the impact and interconnectivity of these projects, and further improve science research collaboration through brokering. Brokering has been demonstrated to be an essential part of a robust, adaptive infrastructure, but critical questions of governance and detailed implementation remain. Our roadmap proposes the expansion of brokering pilots into fully operational prototypes that work with the broader science and informatics communities to answer these questions, connect existing and emerging systems, and evolve the EarthCube infrastructure.

  3. Collaborative Access Control For Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  4. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ackerman, G; Abhayaratne, P; Bale, J

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CImore » facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made possible the identification of several target selection factors that were both important in the development of the analytical framework and subsequently validated by the case studies. Similarly, statistical analysis of the CrITIC data yielded measurable evidence that supported hypotheses derived from the framework, the case studies, and the writings of various experts. Besides providing an important mechanism of self-reinforcement and validation, the project's multifaceted nature made it possible to discern aspects of CI attack motivations that would likely have been missed if any single approach had been adopted.« less

  5. 48 CFR 3002.101 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... information: (1) Protected Critical Infrastructure Information (PCII) as set out in the Critical Infrastructure Information Act of 2002 (Title II, Subtitle B, of the Homeland Security Act, Pub. L. 107-296, 196...

  6. 49 CFR 15.15 - SSI disclosed by DOT.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Information Act. (h) Disclosure of Critical Infrastructure Information. Disclosure of information that is both SSI and has been designated as critical infrastructure information under section 214 of the Homeland...

  7. 49 CFR 15.15 - SSI disclosed by DOT.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Information Act. (h) Disclosure of Critical Infrastructure Information. Disclosure of information that is both SSI and has been designated as critical infrastructure information under section 214 of the Homeland...

  8. 49 CFR 15.15 - SSI disclosed by DOT.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Information Act. (h) Disclosure of Critical Infrastructure Information. Disclosure of information that is both SSI and has been designated as critical infrastructure information under section 214 of the Homeland...

  9. Resilient Military Systems and the Advanced Cyber Threat

    DTIC Science & Technology

    2013-01-01

    systems; intelligence, surveillance, and reconnaissance systems; logistics and human resource systems; and mobile as well as fixed- infrastructure ...significant portions of military and critical infrastructure : power generation, communications, fuel and transportation, emergency services, financial...vulnerabilities in the domestic power grid and critical infrastructure systems.4,5 DoD, and the United States, is extremely reliant on the

  10. Critical Infrastructure Protection- Los Alamos National Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bofman, Ryan K.

    Los Alamos National Laboratory (LANL) has been a key facet of Critical National Infrastructure since the nuclear bombing of Hiroshima exposed the nature of the Laboratory’s work in 1945. Common knowledge of the nature of sensitive information contained here presents a necessity to protect this critical infrastructure as a matter of national security. This protection occurs in multiple forms beginning with physical security, followed by cybersecurity, safeguarding of classified information, and concluded by the missions of the National Nuclear Security Administration.

  11. Optimal Resource Allocation in Electrical Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yao, Y; Edmunds, T; Papageorgiou, D

    2004-01-15

    Infrastructure networks supplying electricity, natural gas, water, and other commodities are at risk of disruption due to well-engineered and coordinated terrorist attacks. Countermeasures such as hardening targets, acquisition of spare critical components, and surveillance can be undertaken to detect and deter these attacks. Allocation of available countermeasures resources to sites or activities in a manner that maximizes their effectiveness is a challenging problem. This allocation must take into account the adversary's response after the countermeasure assets are in place and consequence mitigation measures the infrastructure operation can undertake after the attack. The adversary may simply switch strategies to avoid countermeasuresmore » when executing the attack. Stockpiling spares of critical energy infrastructure components has been identified as a key element of a grid infrastructure defense strategy in a recent National Academy of Sciences report [1]. Consider a scenario where an attacker attempts to interrupt the service of an electrical network by disabling some of its facilities while a defender wants to prevent or minimize the effectiveness of any attack. The interaction between the attacker and the defender can be described in three stages: (1) The defender deploys countermeasures, (2) The attacker disrupts the network, and (3) The defender responds to the attack by rerouting power to maintain service while trying to repair damage. In the first stage, the defender considers all possible attack scenarios and deploys countermeasures to defend against the worst scenarios. Countermeasures can include hardening targets, acquiring spare critical components, and installing surveillance devices. In the second stage, the attacker, with full knowledge of the deployed countermeasures, attempts to disable some nodes or links in the network to inflict the greatest loss on the defender. In the third stage, the defender re-dispatches power and restores disabled nodes or links to minimize the loss. The loss can be measured in costs, including the costs of using more expensive generators and the economic losses that can be attributed to loss of load. The defender's goal is to minimize the loss while the attacker wants to maximize it. Assuming some level of budget constraint, each side can only defend or attack a limited number of network elements. When an element is attacked, it is assumed that it will be totally disabled. It is assumed that when an element is defended it cannot be disabled, which may mean that it will be restored in a very short time after being attacked. The rest of the paper is organized as follows. Section 2 will briefly review literature related to multilevel programming and network defense. Section 3 presents a mathematical formulation of the electrical network defense problem. Section 4 describes the solution algorithms. Section 5 discusses computational results. Finally, Sec. 6 explores future research directions.« less

  12. ISTIMES Integrated System for Transport Infrastructures Surveillance and Monitoring by Electromagnetic Sensing

    NASA Astrophysics Data System (ADS)

    Argenti, M.; Giannini, V.; Averty, R.; Bigagli, L.; Dumoulin, J.

    2012-04-01

    The EC FP7 ISTIMES project has the goal of realizing an ICT-based system exploiting distributed and local sensors for non destructive electromagnetic monitoring in order to make critical transport infrastructures more reliable and safe. Higher situation awareness thanks to real time and detailed information and images of the controlled infrastructure status allows improving decision capabilities for emergency management stakeholders. Web-enabled sensors and a service-oriented approach are used as core of the architecture providing a sys-tem that adopts open standards (e.g. OGC SWE, OGC CSW etc.) and makes efforts to achieve full interoperability with other GMES and European Spatial Data Infrastructure initiatives as well as compliance with INSPIRE. The system exploits an open easily scalable network architecture to accommodate a wide range of sensors integrated with a set of tools for handling, analyzing and processing large data volumes from different organizations with different data models. Situation Awareness tools are also integrated in the system. Definition of sensor observations and services follows a metadata model based on the ISO 19115 Core set of metadata elements and the O&M model of OGC SWE. The ISTIMES infrastructure is based on an e-Infrastructure for geospatial data sharing, with a Data Cata-log that implements the discovery services for sensor data retrieval, acting as a broker through static connections based on standard SOS and WNS interfaces; a Decision Support component which helps decision makers providing support for data fusion and inference and generation of situation indexes; a Presentation component which implements system-users interaction services for information publication and rendering, by means of a WEB Portal using SOA design principles; A security framework using Shibboleth open source middleware based on the Security Assertion Markup Language supporting Single Sign On (SSO). ACKNOWLEDGEMENT - The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under Grant Agreement n° 225663

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ackerman, G; Bale, J; Moran, K

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attackmore » chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4) the refinement of the DECIDe--the Determinants Effecting Critical Infrastructure Decisions--analytical framework to make the factors and dynamics identified by the study more ''usable'' in future efforts to assess terrorist intentions to target chemical-related infrastructure.« less

  14. 49 CFR 1520.15 - SSI disclosed by TSA or the Coast Guard.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... under the Freedom of Information Act. (h) Disclosure of Critical Infrastructure Information. Disclosure of information that is both SSI and has been designated as critical infrastructure information under...

  15. 49 CFR 1520.15 - SSI disclosed by TSA or the Coast Guard.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... under the Freedom of Information Act. (h) Disclosure of Critical Infrastructure Information. Disclosure of information that is both SSI and has been designated as critical infrastructure information under...

  16. 49 CFR 1520.15 - SSI disclosed by TSA or the Coast Guard.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... under the Freedom of Information Act. (h) Disclosure of Critical Infrastructure Information. Disclosure of information that is both SSI and has been designated as critical infrastructure information under...

  17. 49 CFR 1520.15 - SSI disclosed by TSA or the Coast Guard.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... under the Freedom of Information Act. (h) Disclosure of Critical Infrastructure Information. Disclosure of information that is both SSI and has been designated as critical infrastructure information under...

  18. A Systematic Review of Quantitative Resilience Measures for Water Infrastructure Systems

    DOE PAGES

    Shin, Sangmin; Lee, Seungyub; Judi, David; ...

    2018-02-07

    Over the past few decades, the concept of resilience has emerged as an important consideration in the planning and management of water infrastructure systems. Accordingly, various resilience measures have been developed for the quantitative evaluation and decision-making of systems. There are, however, numerous considerations and no clear choice of which measure, if any, provides the most appropriate representation of resilience for a given application. This study provides a critical review of quantitative approaches to measure the resilience of water infrastructure systems, with a focus on water resources and distribution systems. A compilation of 11 criteria evaluating 21 selected resilience measuresmore » addressing major features of resilience is developed using the Axiomatic Design process. Existing gaps of resilience measures are identified based on the review criteria. The results show that resilience measures have generally paid less attention to cascading damage to interrelated systems, rapid identification of failure, physical damage of system components, and time variation of resilience. Concluding the paper, improvements to resilience measures are recommended. The findings contribute to our understanding of gaps and provide information to help further improve resilience measures of water infrastructure systems.« less

  19. A Systematic Review of Quantitative Resilience Measures for Water Infrastructure Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shin, Sangmin; Lee, Seungyub; Judi, David

    Over the past few decades, the concept of resilience has emerged as an important consideration in the planning and management of water infrastructure systems. Accordingly, various resilience measures have been developed for the quantitative evaluation and decision-making of systems. There are, however, numerous considerations and no clear choice of which measure, if any, provides the most appropriate representation of resilience for a given application. This study provides a critical review of quantitative approaches to measure the resilience of water infrastructure systems, with a focus on water resources and distribution systems. A compilation of 11 criteria evaluating 21 selected resilience measuresmore » addressing major features of resilience is developed using the Axiomatic Design process. Existing gaps of resilience measures are identified based on the review criteria. The results show that resilience measures have generally paid less attention to cascading damage to interrelated systems, rapid identification of failure, physical damage of system components, and time variation of resilience. Concluding the paper, improvements to resilience measures are recommended. The findings contribute to our understanding of gaps and provide information to help further improve resilience measures of water infrastructure systems.« less

  20. System Dynamics Approach for Critical Infrastructure and Decision Support. A Model for a Potable Water System.

    NASA Astrophysics Data System (ADS)

    Pasqualini, D.; Witkowski, M.

    2005-12-01

    The Critical Infrastructure Protection / Decision Support System (CIP/DSS) project, supported by the Science and Technology Office, has been developing a risk-informed Decision Support System that provides insights for making critical infrastructure protection decisions. The system considers seventeen different Department of Homeland Security defined Critical Infrastructures (potable water system, telecommunications, public health, economics, etc.) and their primary interdependencies. These infrastructures have been modeling in one model called CIP/DSS Metropolitan Model. The modeling approach used is a system dynamics modeling approach. System dynamics modeling combines control theory and the nonlinear dynamics theory, which is defined by a set of coupled differential equations, which seeks to explain how the structure of a given system determines its behavior. In this poster we present a system dynamics model for one of the seventeen critical infrastructures, a generic metropolitan potable water system (MPWS). Three are the goals: 1) to gain a better understanding of the MPWS infrastructure; 2) to identify improvements that would help protect MPWS; and 3) to understand the consequences, interdependencies, and impacts, when perturbations occur to the system. The model represents raw water sources, the metropolitan water treatment process, storage of treated water, damage and repair to the MPWS, distribution of water, and end user demand, but does not explicitly represent the detailed network topology of an actual MPWS. The MPWS model is dependent upon inputs from the metropolitan population, energy, telecommunication, public health, and transportation models as well as the national water and transportation models. We present modeling results and sensitivity analysis indicating critical choke points, negative and positive feedback loops in the system. A general scenario is also analyzed where the potable water system responds to a generic disruption.

  1. The Department of Energy Nuclear Criticality Safety Program

    NASA Astrophysics Data System (ADS)

    Felty, James R.

    2005-05-01

    This paper broadly covers key events and activities from which the Department of Energy Nuclear Criticality Safety Program (NCSP) evolved. The NCSP maintains fundamental infrastructure that supports operational criticality safety programs. This infrastructure includes continued development and maintenance of key calculational tools, differential and integral data measurements, benchmark compilation, development of training resources, hands-on training, and web-based systems to enhance information preservation and dissemination. The NCSP was initiated in response to Defense Nuclear Facilities Safety Board Recommendation 97-2, Criticality Safety, and evolved from a predecessor program, the Nuclear Criticality Predictability Program, that was initiated in response to Defense Nuclear Facilities Safety Board Recommendation 93-2, The Need for Critical Experiment Capability. This paper also discusses the role Dr. Sol Pearlstein played in helping the Department of Energy lay the foundation for a robust and enduring criticality safety infrastructure.

  2. An Introduction to Flight Software Development: FSW Today, FSW 2010

    NASA Technical Reports Server (NTRS)

    Gouvela, John

    2004-01-01

    Experience and knowledge gained from ongoing maintenance of Space Shuttle Flight Software and new development projects including Cockpit Avionics Upgrade are applied to projected needs of the National Space Exploration Vision through Spiral 2. Lessons learned from these current activities are applied to create a sustainable, reliable model for development of critical software to support Project Constellation. This presentation introduces the technologies, methodologies, and infrastructure needed to produce and sustain high quality software. It will propose what is needed to support a Vision for Space Exploration that places demands on the innovation and productivity needed to support future space exploration. The technologies in use today within FSW development include tools that provide requirements tracking, integrated change management, modeling and simulation software. Specific challenges that have been met include the introduction and integration of Commercial Off the Shelf (COTS) Real Time Operating System for critical functions. Though technology prediction has proved to be imprecise, Project Constellation requirements will need continued integration of new technology with evolving methodologies and changing project infrastructure. Targets for continued technology investment are integrated health monitoring and management, self healing software, standard payload interfaces, autonomous operation, and improvements in training. Emulation of the target hardware will also allow significant streamlining of development and testing. The methodologies in use today for FSW development are object oriented UML design, iterative development using independent components, as well as rapid prototyping . In addition, Lean Six Sigma and CMMI play a critical role in the quality and efficiency of the workforce processes. Over the next six years, we expect these methodologies to merge with other improvements into a consolidated office culture with all processes being guided by automated office assistants. The infrastructure in use today includes strict software development and configuration management procedures, including strong control of resource management and critical skills coverage. This will evolve to a fully integrated staff organization with efficient and effective communication throughout all levels guided by a Mission-Systems Architecture framework with focus on risk management and attention toward inevitable product obsolescence. This infrastructure of computing equipment, software and processes will itself be subject to technological change and need for management of change and improvement,

  3. Consequence-driven cyber-informed engineering (CCE)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Freeman, Sarah G.; St Michel, Curtis; Smith, Robert

    The Idaho National Lab (INL) is leading a high-impact, national security-level initiative to reprioritize the way the nation looks at high-consequence risk within the industrial control systems (ICS) environment of the country’s most critical infrastructure and other national assets. The Consequence-driven Cyber-informed Engineering (CCE) effort provides both private and public organizations with the steps required to examine their own environments for high-impact events/risks; identify implementation of key devices and components that facilitate that risk; illuminate specific, plausible cyber attack paths to manipulate these devices; and develop concrete mitigations, protections, and tripwires to address the high-consequence risk. The ultimate goal ofmore » the CCE effort is to help organizations take the steps necessary to thwart cyber attacks from even top-tier, highly resourced adversaries that would result in a catastrophic physical effect. CCE participants are encouraged to work collaboratively with each other and with key U.S. Government (USG) contributors to establish a coalition, maximizing the positive effect of lessons-learned and further contributing to the protection of critical infrastructure and other national assets.« less

  4. Tracking the deployment of the integrated metropolitan ITS infrastructure in the USA : FY99 results

    DOT National Transportation Integrated Search

    2000-05-01

    This report describes the results of a major data gathering effort aimed at tracking deployment of nine infrastructure components of the metropolitan ITS infrastructure in 78 of the largest metropolitan areas in the nation. The nine components are: F...

  5. Assessment of Change in Green Infrastructure Components Using Morphological Spatial Pattern Analysis for the Conterminous United States

    EPA Science Inventory

    Green infrastructure is a widely used framework for conservation planning in the United States and elsewhere. The main components of green infrastructure are hubs and corridors. Hubs are large areas of natural vegetation, and corridors are linear features that connect hubs. W...

  6. Cybersecurity Information Sharing Between Public Private Sector Agencies

    DTIC Science & Technology

    2015-03-01

    Recognizing the lack of scholarly literature on PPPs and protecting CI from all hazards , including cyber-related threats, Nathan Busch and Austen...referred to as SLTT), and the owners and operators in charge of critical infrastructure, to manage risks and increase resiliency against all hazards .74 PPD...and hazards to critical infrastructure security and resilience, and called for an updated National Infrastructure Protection Plan (NIPP).76 Despite

  7. An Analysis of IT Governance Practices in the Federal Government: Protecting U.S. Critical Infrastructure from Cyber Terrorist Attacks

    ERIC Educational Resources Information Center

    Johnson, R. LeWayne

    2012-01-01

    Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country's IT infrastructure. Critics contend that the DHS has failed to address planning and…

  8. Multisensor system for the protection of critical infrastructure of a seaport

    NASA Astrophysics Data System (ADS)

    Kastek, Mariusz; Dulski, Rafał; Zyczkowski, Marek; Szustakowski, Mieczysław; Trzaskawka, Piotr; Ciurapinski, Wiesław; Grelowska, Grazyna; Gloza, Ignacy; Milewski, Stanislaw; Listewnik, Karol

    2012-06-01

    There are many separated infrastructural objects within a harbor area that may be considered "critical", such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons and explosives) as well as underwater ones (manned or unmanned submarines, scuba divers). The paper will present the concept of multisensor security system for a harbor protection, capable of complex monitoring of selected critical objects within the protected area. The proposed system consists of a command centre and several different sensors deployed in key areas, providing effective protection from land and sea, with special attention focused on the monitoring of underwater zone. The initial project of such systems will be presented, its configuration and initial tests of the selected components. The protection of surface area is based on medium-range radar and LLTV and infrared cameras. Underwater zone will be monitored by a sonar and acoustic and magnetic barriers, connected into an integrated monitoring system. Theoretical analyses concerning the detection of fast, small surface objects (such as RIB boats) by a camera system and real test results in various weather conditions will also be presented.

  9. Predictive battlespace awareness and effects-based operations from a Homeland Security perspective: a wargaming opportunity

    NASA Astrophysics Data System (ADS)

    Williams, James K.; Hubbard, Zachary P.

    2003-09-01

    Effects Based Operations (EBO) and Predictive Battlespace Awareness (PBA) are intimately linked. Intelligence Preparation of the Battlespace (IPB), the predictive component of PBA, provides a structured analytical process for defining the battlespace environment, describing the battlespace effects that influence all sides, modeling the adversary, and determining likely enemy courses of action (COA). IPB documents some of the necessary elements of EBO, such as centers of gravity, counter-COAs, and indicators. The IPB process has been adapted to Information Operations (IO) through Intelligence Preparation of the Information Battlespace (IPIB), a prototype system for cyber-defense. IPIB ranks Enemy cyber-COAs and lists mission-critical network assets that must be defended. It is clear that IPIB can be inverted for developing COAs that implement EBO, and the prototype is being modified for offensive IO. Full-spectrum EBO would combine kinetic, cyber, and cognitive COAs to affect an adversary's behavior. This paper uses a Critical Infrastructure Protection (CIP) scenario to: 1) Provide an example of EBO-based PBA for CIP. 2) Illustrate the interaction between EBO and PBA. 3) Demonstrate the need for a national Critical Infrastructure vulnerability assessment. 4) Identify why simulation and wargaming are the most viable means of performing such an assessment.

  10. A Study to Compare the Failure Rates of Current Space Shuttle Ground Support Equipment with the New Pathfinder Equipment and Investigate the Effect that the Proposed GSE Infrastructure Upgrade Might Have to Reduce GSE Infrastructure Failures

    NASA Technical Reports Server (NTRS)

    Kennedy, Barbara J.

    2004-01-01

    The purposes of this study are to compare the current Space Shuttle Ground Support Equipment (GSE) infrastructure with the proposed GSE infrastructure upgrade modification. The methodology will include analyzing the first prototype installation equipment at Launch PAD B called the "Pathfinder". This study will begin by comparing the failure rate of the current components associated with the "Hardware interface module (HIM)" at the Kennedy Space Center to the failure rate of the neW Pathfinder components. Quantitative data will be gathered specifically on HIM components and the PAD B Hypergolic Fuel facility and Hypergolic Oxidizer facility areas which has the upgraded pathfinder equipment installed. The proposed upgrades include utilizing industrial controlled modules, software, and a fiber optic network. The results of this study provide evidence that there is a significant difference in the failure rates of the two studied infrastructure equipment components. There is also evidence that the support staff for each infrastructure system is not equal. A recommendation to continue with future upgrades is based on a significant reduction of failures in the new' installed ground system components.

  11. Cyber Security Assessment Report: Adventium Labs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2007-12-31

    Major control system components often have life spans of 15-20 years. Many systems in our Nation's critical infrastructure were installed before the Internet became a reality and security was a concern. Consequently, control systems are generally insecure. Security is now being included in the development of new control system devices; however, legacy control systems remain vulnerable. Most efforts to secure control systems are aimed at protecting network borers, but if an intruder gets inside the network these systems are vulnerable to a cyber attack.

  12. Using Physical Models for Anomaly Detection in Control Systems

    NASA Astrophysics Data System (ADS)

    Svendsen, Nils; Wolthusen, Stephen

    Supervisory control and data acquisition (SCADA) systems are increasingly used to operate critical infrastructure assets. However, the inclusion of advanced information technology and communications components and elaborate control strategies in SCADA systems increase the threat surface for external and subversion-type attacks. The problems are exacerbated by site-specific properties of SCADA environments that make subversion detection impractical; and by sensor noise and feedback characteristics that degrade conventional anomaly detection systems. Moreover, potential attack mechanisms are ill-defined and may include both physical and logical aspects.

  13. Identity Verification Systems as a Critical Infrastructure

    DTIC Science & Technology

    2012-03-01

    COVERED Master’s Thesis 4 . TITLE AND SUBTITLE Identity Verification Systems as a Critical Infrastructure 5. FUNDING NUMBERS 6. AUTHOR(S...43 3. Cybercrime .........................................................................................45 4 ...24 Figure 3. Uses of Fictitious or Stolen Identity ................................................................30 Figure 4

  14. Crossing the chasm: information technology to biomedical informatics.

    PubMed

    Fahy, Brenda G; Balke, C William; Umberger, Gloria H; Talbert, Jeffery; Canales, Denise Niles; Steltenkamp, Carol L; Conigliaro, Joseph

    2011-06-01

    Accelerating the translation of new scientific discoveries to improve human health and disease management is the overall goal of a series of initiatives integrated in the National Institutes of Health (NIH) "Roadmap for Medical Research." The Clinical and Translational Science Award (CTSA) program is, arguably, the most visible component of the NIH Roadmap providing resources to institutions to transform their clinical and translational research enterprises along the goals of the Roadmap. The CTSA program emphasizes biomedical informatics as a critical component for the accomplishment of the NIH's translational objectives. To be optimally effective, emerging biomedical informatics programs must link with the information technology platforms of the enterprise clinical operations within academic health centers.This report details one academic health center's transdisciplinary initiative to create an integrated academic discipline of biomedical informatics through the development of its infrastructure for clinical and translational science infrastructure and response to the CTSA mechanism. This approach required a detailed informatics strategy to accomplish these goals. This transdisciplinary initiative was the impetus for creation of a specialized biomedical informatics core, the Center for Biomedical Informatics (CBI). Development of the CBI codified the need to incorporate medical informatics including quality and safety informatics and enterprise clinical information systems within the CBI. This article describes the steps taken to develop the biomedical informatics infrastructure, its integration with clinical systems at one academic health center, successes achieved, and barriers encountered during these efforts.

  15. 18 CFR 5.29 - Other provisions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... member of the public. (c) Requests for privileged or Critical Energy Infrastructure Information treatment of pre-filing submission. If a potential Applicant requests privileged or critical energy infrastructure information treatment of any information submitted to the Commission during pre-filing...

  16. 18 CFR 5.29 - Other provisions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... member of the public. (c) Requests for privileged or Critical Energy Infrastructure Information treatment of pre-filing submission. If a potential Applicant requests privileged or critical energy infrastructure information treatment of any information submitted to the Commission during pre-filing...

  17. Low carbon technology performance vs infrastructure vulnerability: analysis through the local and global properties space.

    PubMed

    Dawson, David A; Purnell, Phil; Roelich, Katy; Busch, Jonathan; Steinberger, Julia K

    2014-11-04

    Renewable energy technologies, necessary for low-carbon infrastructure networks, are being adopted to help reduce fossil fuel dependence and meet carbon mitigation targets. The evolution of these technologies has progressed based on the enhancement of technology-specific performance criteria, without explicitly considering the wider system (global) impacts. This paper presents a methodology for simultaneously assessing local (technology) and global (infrastructure) performance, allowing key technological interventions to be evaluated with respect to their effect on the vulnerability of wider infrastructure systems. We use exposure of low carbon infrastructure to critical material supply disruption (criticality) to demonstrate the methodology. A series of local performance changes are analyzed; and by extension of this approach, a method for assessing the combined criticality of multiple materials for one specific technology is proposed. Via a case study of wind turbines at both the material (magnets) and technology (turbine generators) levels, we demonstrate that analysis of a given intervention at different levels can lead to differing conclusions regarding the effect on vulnerability. Infrastructure design decisions should take a systemic approach; without these multilevel considerations, strategic goals aimed to help meet low-carbon targets, that is, through long-term infrastructure transitions, could be significantly jeopardized.

  18. Critical Infrastructure: The National Asset Database

    DTIC Science & Technology

    2007-07-16

    Infrastructure: The National Asset Database 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e...upon which federal resources, including infrastructure protection grants , are allocated. According to DHS, both of those assumptions are wrong. DHS...assets that it has determined are critical to the nation. Also, while the National Asset Database has been used to support federal grant -making

  19. A Tool for Rating the Resilience of Critical Infrastructures in Extreme Fires

    DTIC Science & Technology

    2014-05-01

    provide a tool for NRC to help the Canadian industry to develop extreme fire protection materials and technologies for critical infrastructures. Future...supported by the Canadian Safety and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre for Security Science, in...in oil refinery and chemical industry facilities. The only available standard in North America that addresses the transportation infrastructure is

  20. Method or Madness: Federal Oversight Structures for Critical Infrastructure Protection

    DTIC Science & Technology

    2007-12-01

    to dramatically reduce their operating costs and completely revamp their business models. In fact, many companies no longer have the capacity or...increasing reliance on private sector companies in many critical infrastructure segments, government agencies have been reluctant to try innovative...as it is applied to infrastructure services, is effectively limited to “economic growth and the free flow of commerce.”15 The collection of essays

  1. Present and Future Energy Scenario in India

    NASA Astrophysics Data System (ADS)

    Kumar, S.; Bhattacharyya, B.; Gupta, V. K.

    2014-09-01

    India's energy sector is one of the most critical components of an infrastructure that affects India's economic growth and therefore is also one of the largest industries in India. India has the 5th largest electricity generating capacity and is the 6th largest energy consumer amounting for around 3.4 % of global energy consumption. India's energy demand has grown at 3.6 % pa over the past 30 years. The consumption of the energy is directly proportional to the progress of manpower with ever growing population, improvement in the living standard of the humanity and industrialization of the developing countries. Very recently smart grid technology can attribute important role in energy scenario. Smart grid refers to electric power system that enhances grid reliability and efficiency by automatically responding to system disturbances. This paper discusses the new communication infrastructure and scheme designed to integrate data.

  2. Continuity of operations/continuity of government for state-level transportation organizations : brief.

    DOT National Transportation Integrated Search

    2011-09-01

    As a result of a federal requirement, all non-federal entities that own or operate critical : infrastructure are required to develop Continuity of Operations/Continuity of Government : (COOP/COG) Plans. Transportation is a critical infrastructure com...

  3. 6 CFR 29.3 - Effect of provisions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...

  4. 6 CFR 29.3 - Effect of provisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...

  5. 6 CFR 29.3 - Effect of provisions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...

  6. 6 CFR 29.3 - Effect of provisions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...

  7. 6 CFR 29.3 - Effect of provisions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE... utilize the PCII only for purposes appropriate under the CII Act, including securing critical infrastructure or protected systems. Such PCII may not be utilized for any other collateral regulatory purposes...

  8. 78 FR 16699 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Executive Order \\1\\ to strengthen the cybersecurity of critical infrastructure by increasing information sharing and by jointly developing and implementing a framework of cybersecurity practices with our...-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity . (2...

  9. The European cooperative approach to securing critical information infrastructure.

    PubMed

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.

  10. Geospatial decision support framework for critical infrastructure interdependency assessment

    NASA Astrophysics Data System (ADS)

    Shih, Chung Yan

    Critical infrastructures, such as telecommunications, energy, banking and finance, transportation, water systems and emergency services are the foundations of modern society. There is a heavy dependence on critical infrastructures at multiple levels within the supply chain of any good or service. Any disruptions in the supply chain may cause profound cascading effect to other critical infrastructures. A 1997 report by the President's Commission on Critical Infrastructure Protection states that a serious interruption in freight rail service would bring the coal mining industry to a halt within approximately two weeks and the availability of electric power could be reduced in a matter of one to two months. Therefore, this research aimed at representing and assessing the interdependencies between coal supply, transportation and energy production. A proposed geospatial decision support framework was established and applied to analyze interdependency related disruption impact. By utilizing the data warehousing approach, geospatial and non-geospatial data were retrieved, integrated and analyzed based on the transportation model and geospatial disruption analysis developed in the research. The results showed that by utilizing this framework, disruption impacts can be estimated at various levels (e.g., power plant, county, state, etc.) for preventative or emergency response efforts. The information derived from the framework can be used for data mining analysis (e.g., assessing transportation mode usages; finding alternative coal suppliers, etc.).

  11. Critical Infrastructure Rebuild Prioritization using Simulation Optimization

    DTIC Science & Technology

    2007-03-01

    23 Figure 2.9 Production by temperature and production made from a crude oil (EIA.com)24 Figure 2.10 Natural gas industry... Oil infrastructure physical layer ...................................................................... 45 Figure 3.6 Natural gas infrastructure...information layer.......................................................... 55 Figure 3.11 Oil infrastructure information layer

  12. LANL: Weapons Infrastructure Briefing to Naval Reactors, July 18, 2017

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chadwick, Frances

    Presentation slides address: The Laboratory infrastructure supports hundreds of high hazard, complex operations daily; LANL’s unique science and engineering infrastructure is critical to delivering on our mission; LANL FY17 Budget & Workforce; Direct-Funded Infrastructure Accounts; LANL Org Chart; Weapons Infrastructure Program Office; The Laboratory’s infrastructure relies on both Direct and Indirect funding; NA-50’s Operating, Maintenance & Recapitalization funding is critical to the execution of the mission; Los Alamos is currently executing several concurrent Line Item projects; Maintenance @ LANL; NA-50 is helping us to address D&D needs; We are executing a CHAMP Pilot Project at LANL; G2 = Main Toolmore » for Program Management; MDI: Future Investments are centered on facilities with a high Mission Dependency Index; Los Alamos hosted first “Deep Dive” in November 2016; Safety, Infrastructure & Operations is one of the most important programs at LANL, and is foundational for our mission success.« less

  13. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE PAGES

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.; ...

    2015-04-06

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  14. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  15. Impact of organizational infrastructure on beta-blocker and aspirin therapy for acute myocardial infarction.

    PubMed

    Ellerbeck, Edward F; Bhimaraj, Arvind; Hall, Sandra

    2006-09-01

    Although organizational change has been advocated as a critical component of quality improvement, there is little data available on the variation and effectiveness of organizational elements in the care of acute myocardial infarction (AMI). This study was designed to examine the impact of organizational infrastructure on the use of aspirin and beta-blockers during and after AMI. We assessed organizational infrastructure for AMI care in 44 hospitals in Kansas and linked these data to patient-specific process of care data collected in Kansas as part of the Cooperative Cardiovascular Project. While controlling for clustering within hospitals, we examined the relationships between hospital infrastructure and use of aspirin and beta-blocker both at admission and discharge. Hospitals varied widely in their inclusion of aspirin and beta-blockers in AMI pathways, protocols, and standardized order sets. Hospitals also varied in the involvement of their physicians in AMI quality improvement and in their ability to identify a physician champion for AMI care. Patients were more likely to receive aspirin on admission in hospitals that included aspirin in their emergency department order sets (odds ratio [OR] 1.57, 95% confidence interval [CI] 1.01-2.48) and were more likely to receive beta-blockers on admission and at discharge if beta-blockers were included in an emergency department protocol or pathway (OR 2.14, 95% CI 1.25-3.77 and OR 3.5, 95% CI 1.14-14.38, respectively). Use of beta-blockers at discharge was also associated with commitment of administration to AMI care and the presence of a physician champion. Quality improvement efforts should include a close examination of the organization of AMI care to assure that critical elements in the care of AMI patients are not inadvertently omitted.

  16. Public key infrastructure for DOE security research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  17. Exploiting IoT Technologies and Open Source Components for Smart Seismic Network Instrumentation

    NASA Astrophysics Data System (ADS)

    Germenis, N. G.; Koulamas, C. A.; Foundas, P. N.

    2017-12-01

    The data collection infrastructure of any seismic network poses a number of requirements and trade-offs related to accuracy, reliability, power autonomy and installation & operational costs. Having the right hardware design at the edge of this infrastructure, embedded software running inside the instruments is the heart of pre-processing and communication services implementation and their integration with the central storage and processing facilities of the seismic network. This work demonstrates the feasibility and benefits of exploiting software components from heterogeneous sources in order to realize a smart seismic data logger, achieving higher reliability, faster integration and less development and testing costs of critical functionality that is in turn responsible for the cost and power efficient operation of the device. The instrument's software builds on top of widely used open source components around the Linux kernel with real-time extensions, the core Debian Linux distribution, the earthworm and seiscomp tooling frameworks, as well as components from the Internet of Things (IoT) world, such as the CoAP and MQTT protocols for the signaling planes, besides the widely used de-facto standards of the application domain at the data plane, such as the SeedLink protocol. By using an innovative integration of features based on lower level GPL components of the seiscomp suite with higher level processing earthworm components, coupled with IoT protocol extensions to the latter, the instrument can implement smart functionality such as network controlled, event triggered data transmission in parallel with edge archiving and on demand, short term historical data retrieval.

  18. The development and pilot testing of a rapid assessment tool to improve local public health system capacity in Australia.

    PubMed

    Bagley, Prue; Lin, Vivian

    2009-11-15

    To operate effectively the public health system requires infrastructure and the capacity to act. Public health's ability to attract funding for infrastructure and capacity development would be enhanced if it was able to demonstrate what level of capacity was required to ensure a high performing system. Australia's public health activities are undertaken within a complex organizational framework that involves three levels of government and a diverse range of other organizations. The question of appropriate levels of infrastructure and capacity is critical at each level. Comparatively little is known about infrastructure and capacity at the local level. In-depth interviews were conducted with senior managers in two Australian states with different frameworks for health administration. They were asked to reflect on the critical components of infrastructure and capacity required at the local level. The interviews were analyzed to identify the major themes. Workshops with public health experts explored this data further. The information generated was used to develop a tool, designed to be used by groups of organizations within discrete geographical locations to assess local public health capacity. Local actors in these two different systems pointed to similar areas for inclusion for the development of an instrument to map public health capacity at the local level. The tool asks respondents to consider resources, programs and the cultural environment within their organization. It also asks about the policy environment - recognizing that the broader environment within which organizations operate impacts on their capacity to act. Pilot testing of the tool pointed to some of the challenges involved in such an exercise, particularly if the tool were to be adopted as policy. This research indicates that it is possible to develop a tool for the systematic assessment of public health capacity at the local level. Piloting the tool revealed some concerns amongst participants, particularly about how the tool would be used. However there was also recognition that the areas covered by the tool were those considered relevant.

  19. Sea Level Rise Impacts On Infrastructure Vulnerability

    NASA Astrophysics Data System (ADS)

    Pasqualini, D.; Mccown, A. W.; Backhaus, S.; Urban, N. M.

    2015-12-01

    Increase of global sea level is one of the potential consequences of climate change and represents a threat for the U.S.A coastal regions, which are highly populated and home of critical infrastructures. The potential danger caused by sea level rise may escalate if sea level rise is coupled with an increase in frequency and intensity of storms that may strike these regions. These coupled threats present a clear risk to population and critical infrastructure and are concerns for Federal, State, and particularly local response and recovery planners. Understanding the effect of sea level rise on the risk to critical infrastructure is crucial for long planning and for mitigating potential damages. In this work we quantify how infrastructure vulnerability to a range of storms changes due to an increase of sea level. Our study focuses on the Norfolk area of the U.S.A. We assess the direct damage of drinking water and wastewater facilities and the power sector caused by a distribution of synthetic hurricanes. In addition, our analysis estimates indirect consequences of these damages on population and economic activities accounting also for interdependencies across infrastructures. While projections unanimously indicate an increase in the rate of sea level rise, the scientific community does not agree on the size of this rate. Our risk assessment accounts for this uncertainty simulating a distribution of sea level rise for a specific climate scenario. Using our impact assessment results and assuming an increase of future hurricanes frequencies and intensities, we also estimate the expected benefits for critical infrastructure.

  20. 76 FR 50487 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-15

    ... Information (PCII) Stakeholder Survey AGENCY: National Protection and Programs Directorate, DHS. ACTION: 30... Collection Request, Protected Critical Infrastructure Information (PCII) Stakeholder Survey. DHS previously... homeland security duties. This survey is designed to gather information from PCII Officers that can be used...

  1. 47 CFR 90.615 - Individual channels available in the General Category in 806-824/851-869 MHz band.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Critical Infrastructure Industry Categories from three to five years after the release of a public notice... applicants in the Public Safety or Critical Infrastructure Industry Categories from three to five years after...

  2. 47 CFR 90.615 - Individual channels available in the General Category in 806-824/851-869 MHz band.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Critical Infrastructure Industry Categories from three to five years after the release of a public notice... applicants in the Public Safety or Critical Infrastructure Industry Categories from three to five years after...

  3. 47 CFR 90.615 - Individual channels available in the General Category in 806-824/851-869 MHz band.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Critical Infrastructure Industry Categories from three to five years after the release of a public notice... applicants in the Public Safety or Critical Infrastructure Industry Categories from three to five years after...

  4. 47 CFR 90.615 - Individual channels available in the General Category in 806-824/851-869 MHz band.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Critical Infrastructure Industry Categories from three to five years after the release of a public notice... applicants in the Public Safety or Critical Infrastructure Industry Categories from three to five years after...

  5. The national strategy for the physical protection of critical infrastructures and key assets

    DOT National Transportation Integrated Search

    2003-02-01

    This document defines the road ahead for a core mission area identified in the President's National Strategy for Homeland Security-reducing the Nation's vulnerability to acts of terrorism by protecting our critical infrastructures and key assets from...

  6. 31 CFR 800.208 - Critical infrastructure.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Critical infrastructure. 800.208 Section 800.208 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF INVESTMENT SECURITY, DEPARTMENT OF THE TREASURY REGULATIONS PERTAINING TO MERGERS, ACQUISITIONS...

  7. 78 FR 54454 - Open Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-04

    ... include the following items: --Cybersecurity Executive Order 13636, Improving Critical Infrastructure Cybersecurity (78 FR 11737, February 19, 2013); Development of New Cybersecurity Framework; Request for Information (RFI)--Developing a Framework to Improve Critical Infrastructure Cybersecurity (78 FR 13024...

  8. 78 FR 19277 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-29

    ... Obama signed an Executive Order to strengthen the cybersecurity of critical infrastructure by increasing information sharing and by jointly developing and implementing a framework of cybersecurity practices with our...-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity . (2...

  9. CALS Infrastructure Analysis. Draft. Volume 21

    DOT National Transportation Integrated Search

    1990-03-01

    This executive overview to the DoD CALS Infrastructure Analysis Report summarizes the Components' current effort to modernize the DoD technical data infrastructure. This infrastructure includes all existing and planned capabilities to acquire, manage...

  10. Transportation of Large Wind Components: A Review of Existing Geospatial Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mooney, Meghan; Maclaurin, Galen

    2016-09-01

    This report features the geospatial data component of a larger project evaluating logistical and infrastructure requirements for transporting oversized and overweight (OSOW) wind components. The goal of the larger project was to assess the status and opportunities for improving the infrastructure and regulatory practices necessary to transport wind turbine towers, blades, and nacelles from current and potential manufacturing facilities to end-use markets. The purpose of this report is to summarize existing geospatial data on wind component transportation infrastructure and to provide a data gap analysis, identifying areas for further analysis and data collection.

  11. Restoration of services in disrupted infrastructure systems: A network science approach

    PubMed Central

    Ergun, Ozlem

    2018-01-01

    Due to the ubiquitous nature of disruptive extreme events, functionality of the critical infrastructure systems (CIS) is constantly at risk. In case of a disruption, in order to minimize the negative impact to the society, service networks operating on the CIS should be restored as quickly as possible. In this paper, we introduce a novel network science inspired measure to quantify the criticality of components within a disrupted service network and develop a restoration heuristic (Cent-Restore) that prioritizes restoration efforts based on this measure. As an illustrative case study, we consider a road network blocked by debris in the aftermath of a natural disaster. The debris obstructs the flow of relief aid and search-and-rescue teams between critical facilities and disaster sites, debilitating the emergency service network. In this context, the problem is defined as finding a schedule to clear the roads with the limited resources. First, we develop a mixed-integer programming model for the problem. Then we validate the efficiency and accuracy of the Cent-Restore heuristic on randomly generated instances by comparing it to the model. Furthermore, we use Cent-Restore to recommend real-time restoration plans for disrupted road networks of Boston and Manhattan and analyze the performance of the plans over time through resilience curves. We compare Cent-Restore to the current restoration guidelines proposed by FEMA and other strategies that prioritize the restoration efforts based on different measures. As a result we confirm the importance of including specific post-disruption attributes of the networks to create effective restoration strategies. Moreover, we explore the relationship between a service network’s resilience and its topological and operational characteristics under different disruption scenarios. The methods and insights provided in this work can be extended to other disrupted large-scale critical infrastructure systems in which the ultimate goal is to enable the functions of the overlaying service networks. PMID:29444191

  12. Restoration of services in disrupted infrastructure systems: A network science approach.

    PubMed

    Ulusan, Aybike; Ergun, Ozlem

    2018-01-01

    Due to the ubiquitous nature of disruptive extreme events, functionality of the critical infrastructure systems (CIS) is constantly at risk. In case of a disruption, in order to minimize the negative impact to the society, service networks operating on the CIS should be restored as quickly as possible. In this paper, we introduce a novel network science inspired measure to quantify the criticality of components within a disrupted service network and develop a restoration heuristic (Cent-Restore) that prioritizes restoration efforts based on this measure. As an illustrative case study, we consider a road network blocked by debris in the aftermath of a natural disaster. The debris obstructs the flow of relief aid and search-and-rescue teams between critical facilities and disaster sites, debilitating the emergency service network. In this context, the problem is defined as finding a schedule to clear the roads with the limited resources. First, we develop a mixed-integer programming model for the problem. Then we validate the efficiency and accuracy of the Cent-Restore heuristic on randomly generated instances by comparing it to the model. Furthermore, we use Cent-Restore to recommend real-time restoration plans for disrupted road networks of Boston and Manhattan and analyze the performance of the plans over time through resilience curves. We compare Cent-Restore to the current restoration guidelines proposed by FEMA and other strategies that prioritize the restoration efforts based on different measures. As a result we confirm the importance of including specific post-disruption attributes of the networks to create effective restoration strategies. Moreover, we explore the relationship between a service network's resilience and its topological and operational characteristics under different disruption scenarios. The methods and insights provided in this work can be extended to other disrupted large-scale critical infrastructure systems in which the ultimate goal is to enable the functions of the overlaying service networks.

  13. Critical Infrastructure Protection: EMP Impacts on the U.S. Electric Grid

    NASA Astrophysics Data System (ADS)

    Boston, Edwin J., Jr.

    The purpose of this research is to identify the United States electric grid infrastructure systems vulnerabilities to electromagnetic pulse attacks and the cyber-based impacts of those vulnerabilities to the electric grid. Additionally, the research identifies multiple defensive strategies designed to harden the electric grid against electromagnetic pulse attack that include prevention, mitigation and recovery postures. Research results confirm the importance of the electric grid to the United States critical infrastructures system and that an electromagnetic pulse attack against the electric grid could result in electric grid degradation, critical infrastructure(s) damage and the potential for societal collapse. The conclusions of this research indicate that while an electromagnetic pulse attack against the United States electric grid could have catastrophic impacts on American society, there are currently many defensive strategies under consideration designed to prevent, mitigate and or recover from an electromagnetic pulse attack. However, additional research is essential to further identify future target hardening opportunities, efficient implementation strategies and funding resources.

  14. 75 FR 61160 - National Protection and Programs Directorate; National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-04

    ... systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as.... Deliberation: Optimization of Resources for Mitigating Infrastructure Disruptions VII. Discussion of Potential...

  15. 78 FR 39712 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-02

    ... DEPARTMENT OF COMMERCE International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait Clarification and Amendment AGENCY... cyber-security firms and trade organizations which have not already submitted an application are...

  16. 78 FR 25254 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-30

    ... include the following items: --Cybersecurity Executive Order 13636, Improving Critical Infrastructure Cybersecurity (78 FR 11737, February 19, 2013); Development of New Cybersecurity Framework; Request for Information (RFI)--Developing a Framework to Improve Critical Infrastructure Cybersecurity (78 FR 13024...

  17. Cyber Vulnerabilities Within Critical Infrastructure: The Flaws of Industrial Control Systems in the Oil and Gas Industry

    NASA Astrophysics Data System (ADS)

    Alpi, Danielle Marie

    The 16 sectors of critical infrastructure in the US are susceptible to cyber-attacks. Potential attacks come from internal and external threats. These attacks target the industrial control systems (ICS) of companies within critical infrastructure. Weakness in the energy sector's ICS, specifically the oil and gas industry, can result in economic and ecological disaster. The purpose of this study was to establish means for oil companies to identify and stop cyber-attacks specifically APT threats. This research reviewed current cyber vulnerabilities and ways in which a cyber-attack may be deterred. This research found that there are insecure devices within ICS that are not regularly updated. Therefore, security issues have amassed. Safety procedures and training thereof are often neglected. Jurisdiction is unclear in regard to critical infrastructure. The recommendations this research offers are further examination of information sharing methods, development of analytic platforms, and better methods for the implementation of defense-in-depth security measures.

  18. Quality of service provision assessment in the healthcare information and telecommunications infrastructures.

    PubMed

    Babulak, Eduard

    2006-01-01

    The continuous increase in the complexity and the heterogeneity of corporate and healthcare telecommunications infrastructures will require new assessment methods of quality of service (QoS) provision that are capable of addressing all engineering and social issues with much faster speeds. Speed and accessibility to any information at any time from anywhere will create global communications infrastructures with great performance bottlenecks that may put in danger human lives, power supplies, national economy and security. Regardless of the technology supporting the information flows, the final verdict on the QoS is made by the end user. The users' perception of telecommunications' network infrastructure QoS provision is critical to the successful business management operation of any organization. As a result, it is essential to assess the QoS Provision in the light of user's perception. This article presents a cost effective methodology to assess the user's perception of quality of service provision utilizing the existing Staffordshire University Network (SUN) by adding a component of measurement to the existing model presented by Walker. This paper presents the real examples of CISCO Networking Solutions for Health Care givers and offers a cost effective approach to assess the QoS provision within the campus network, which could be easily adapted to any health care organization or campus network in the world.

  19. Fuzzy architecture assessment for critical infrastructure resilience

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Muller, George

    2012-12-01

    This paper presents an approach for the selection of alternative architectures in a connected infrastructure system to increase resilience of the overall infrastructure system. The paper begins with a description of resilience and critical infrastructure, then summarizes existing approaches to resilience, and presents a fuzzy-rule based method of selecting among alternative infrastructure architectures. This methodology includes considerations which are most important when deciding on an approach to resilience. The paper concludes with a proposed approach which builds on existing resilience architecting methods by integrating key system aspects using fuzzy memberships and fuzzy rule sets. This novel approach aids the systemsmore » architect in considering resilience for the evaluation of architectures for adoption into the final system architecture.« less

  20. Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection

    NASA Astrophysics Data System (ADS)

    Düssel, Patrick; Gehl, Christian; Laskov, Pavel; Bußer, Jens-Uwe; Störmann, Christof; Kästner, Jan

    With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may give rise to severe damage for life and assets without the implementation of proper safeguards. Thus, we propose a method that is capable to reliably detect unknown, exploit-based attacks on cyber-critical infrastructures carried out over the network. We illustrate the effectiveness of the proposed method by conducting experiments on network traffic that can be found in modern industrial control systems. Moreover, we provide results of a throughput measuring which demonstrate the real-time capabilities of our system.

  1. 75 FR 67989 - Agency Information Collection Activities: Office of Infrastructure Protection; Infrastructure...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-04

    ..., National Protection and Programs Directorate, Office of Infrastructure Protection (IP), will submit the... manner.'' DHS designated IP to lead these efforts. Given that the vast majority of the Nation's critical infrastructure and key resources in most sectors are privately owned or controlled, IP's success in achieving the...

  2. A probabilistic and adaptive approach to modeling performance of pavement infrastructure

    DOT National Transportation Integrated Search

    2007-08-01

    Accurate prediction of pavement performance is critical to pavement management agencies. Reliable and accurate predictions of pavement infrastructure performance can save significant amounts of money for pavement infrastructure management agencies th...

  3. 75 FR 39266 - National Protection and Programs Directorate; National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... infrastructure sectors and their information systems. Pursuant to 41 CFR 102-3.150(b), this notice was published... Critical Infrastructure Resilience Goals VI. Working Group Status: Optimization of Resources for Mitigating...

  4. Cybersecurity: The Nation’s Greatest Threat to Critical Infrastructure

    DTIC Science & Technology

    2013-03-01

    protection has become a matter of national security, public safety, and economic stability . It is imperative the U.S. Government (USG) examine current...recommendations for federal responsibilities and legislation to direct nation critical infrastructure efforts to ensure national security, public safety and economic stability .

  5. GPS disruptions : efforts to assess risks to critical infrastructure and coordinate agency actions should be enhanced.

    DOT National Transportation Integrated Search

    2013-11-01

    To assess the risks and potential effects from disruptions in the Global : Positioning System (GPS) on critical infrastructure, the Department of Homeland : Security (DHS) published the GPS National Risk Estimate (NRE) in 2012. In : doing so, DHS con...

  6. 75 FR 54915 - Notice Pursuant to the National Cooperative Research and Production Act of 1993-Sensory System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-09

    ... DEPARTMENT OF JUSTICE Antitrust Division Notice Pursuant to the National Cooperative Research and Production Act of 1993--Sensory System for Critical Infrastructure Defect Recognition, Visualization and... Critical Infrastructure Defect Recognition, Visualization and Failure Prediction ('Sensory System'') has...

  7. 6 CFR 29.1 - Purpose and scope.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION § 29.1 Purpose and scope. (a) Purpose of this Part. This Part implements sections 211 through 215... receipt, care, and storage of Critical Infrastructure Information (CII) voluntarily submitted to the... herein as the Critical Infrastructure Information Act of 2002 (CII Act). Consistent with the statutory...

  8. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 18 Conservation of Power and Water Resources 1 2011-04-01 2011-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE APPLICATION...

  9. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE APPLICATION...

  10. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE APPLICATION...

  11. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE APPLICATION...

  12. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE APPLICATION...

  13. GEMSS: grid-infrastructure for medical service provision.

    PubMed

    Benkner, S; Berti, G; Engelbrecht, G; Fingberg, J; Kohring, G; Middleton, S E; Schmidt, R

    2005-01-01

    The European GEMSS Project is concerned with the creation of medical Grid service prototypes and their evaluation in a secure service-oriented infrastructure for distributed on demand/supercomputing. Key aspects of the GEMSS Grid middleware include negotiable QoS support for time-critical service provision, flexible support for business models, and security at all levels in order to ensure privacy of patient data as well as compliance to EU law. The GEMSS Grid infrastructure is based on a service-oriented architecture and is being built on top of existing standard Grid and Web technologies. The GEMSS infrastructure offers a generic Grid service provision framework that hides the complexity of transforming existing applications into Grid services. For the development of client-side applications or portals, a pluggable component framework has been developed, providing developers with full control over business processes, service discovery, QoS negotiation, and workflow, while keeping their underlying implementation hidden from view. A first version of the GEMSS Grid infrastructure is operational and has been used for the set-up of a Grid test-bed deploying six medical Grid service prototypes including maxillo-facial surgery simulation, neuro-surgery support, radio-surgery planning, inhaled drug-delivery simulation, cardiovascular simulation and advanced image reconstruction. The GEMSS Grid infrastructure is based on standard Web Services technology with an anticipated future transition path towards the OGSA standard proposed by the Global Grid Forum. GEMSS demonstrates that the Grid can be used to provide medical practitioners and researchers with access to advanced simulation and image processing services for improved preoperative planning and near real-time surgical support.

  14. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less

  15. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ackerman, G; Blair, C; Bale, J

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a projectmore » sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely, that transnational jihadist organizations are amongst the extremist groups that are most likely to carry out successful attacks against targets that U.S. officials would categorize as elements of this country's critical infrastructure. These networks clearly have the operational capabilities to conduct these types of attacks, even on a large scale, and they display a number of ideological proclivities that may incline them to attack such targets. Although this seems self-evident, this study has also yielded more detailed insights into the behavior and orientation of al-Qaida and its affiliated networks.« less

  16. Precision chemical heating for diagnostic devices.

    PubMed

    Buser, J R; Diesburg, S; Singleton, J; Guelig, D; Bishop, J D; Zentner, C; Burton, R; LaBarre, P; Yager, P; Weigl, B H

    2015-12-07

    Decoupling nucleic acid amplification assays from infrastructure requirements such as grid electricity is critical for providing effective diagnosis and treatment at the point of care in low-resource settings. Here, we outline a complete strategy for the design of electricity-free precision heaters compatible with medical diagnostic applications requiring isothermal conditions, including nucleic acid amplification and lysis. Low-cost, highly energy dense components with better end-of-life disposal options than conventional batteries are proposed as an alternative to conventional heating methods to satisfy the unique needs of point of care use.

  17. Building cancer nursing skills in a resource-constrained government hospital.

    PubMed

    Strother, R M; Fitch, Margaret; Kamau, Peter; Beattie, Kathy; Boudreau, Angela; Busakhalla, N; Loehrer, P J

    2012-09-01

    Cancer is a rising cause of morbidity and mortality in resource-constrained settings. Few places in the developing world have cancer care experts and infrastructure for caring for cancer patients; therefore, it is imperative to develop this infrastructure and expertise. A critical component of cancer care, rarely addressed in the published literature, is cancer nursing. This report describes an effort to develop cancer nursing subspecialty knowledge and skills in support of a growing resource-constrained comprehensive cancer care program in Western Kenya. This report highlights the context of cancer care delivery in a resource-constrained setting, and describes one targeted intervention to further develop the skill set and knowledge of cancer care providers, as part of collaboration between developed world academic institutions and a medical school and governmental hospital in Western Kenya. Based on observations of current practice, practice setting, and resource limitations, a pragmatic curriculum for cancer care nursing was developed and implemented.

  18. 3 CFR 8460 - Proclamation 8460 of December 2, 2009. Critical Infrastructure Protection Month, 2009

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the United States of America A Proclamation Critical infrastructure protection is an essential element... have a debilitating effect on security, national economic security, public health or safety. From water... country's essential resources are safe and capable of recovering from disruptive incidents. The Department...

  19. Superstorm Sandy: Implications For Designing A PostCyber Attack Power Restoration System

    DTIC Science & Technology

    2016-03-31

    for such progress. Phillip Allison, “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems: Building Security into Your Industrial...TechSvcs/Multi-stateFleetResponseWorkshopReport-02-21-13.pdf. Allison, Phillip. “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

  20. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  1. Information Security: A Difficult Balance

    ERIC Educational Resources Information Center

    Rose, Linwood H.

    2004-01-01

    Protecting the critical infrastructure of this country is essential to the preservation of lives as they are now lived. The time has come for leaders in higher education to recognize and creatively respond to the opportunity and realities of protecting the national critical infrastructure. To do this effectively, the academy must embrace and…

  2. Report: EPA Needs to Better Implement Plan for Protecting Critical Infrastructure and Key Resources Used to Respond to Terrorist Attacks and Disasters

    EPA Pesticide Factsheets

    Report #2006-P-00022, April 26, 2006. Assignment of formal authority and more accountability is required to ensure the initiatives in the Critical Infrastructure and Key Resources Protection Plan are accomplished in a timely manner.

  3. 78 FR 13024 - Developing a Framework To Improve Critical Infrastructure Cybersecurity

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-26

    ... review to develop a framework to reduce cyber risks to critical infrastructure \\1\\ (the ``Cybersecurity... processes that align policy, business, and technological approaches to address cyber risks. \\1\\ For the... cyber activity. Such activity is increasing and its consequences can range from theft through disruption...

  4. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    PubMed

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  5. Crossing the Chasm: Information Technology to Biomedical Informatics

    PubMed Central

    Fahy, Brenda G.; Balke, C. William; Umberger, Gloria H.; Talbert, Jeffery; Canales, Denise Niles; Steltenkamp, Carol L.; Conigliaro, Joseph

    2011-01-01

    Accelerating the translation of new scientific discoveries to improve human health and disease management is the overall goal of a series of initiatives integrated in the National Institutes of Health (NIH) “Roadmap for Medical Research.” The Clinical and Translational Research Award (CTSA) program is, arguably, the most visible component of the NIH Roadmap providing resources to institutions to transform their clinical and translational research enterprises along the goals of the Roadmap. The CTSA program emphasizes biomedical informatics as a critical component for the accomplishment of the NIH’s translational objectives. To be optimally effective, emerging biomedical informatics programs must link with the information technology (IT) platforms of the enterprise clinical operations within academic health centers. This report details one academic health center’s transdisciplinary initiative to create an integrated academic discipline of biomedical informatics through the development of its infrastructure for clinical and translational science infrastructure and response to the CTSA mechanism. This approach required a detailed informatics strategy to accomplish these goals. This transdisciplinary initiative was the impetus for creation of a specialized biomedical informatics core, the Center for Biomedical Informatics (CBI). Development of the CBI codified the need to incorporate medical informatics including quality and safety informatics and enterprise clinical information systems within the CBI. This paper describes the steps taken to develop the biomedical informatics infrastructure, its integration with clinical systems at one academic health center, successes achieved, and barriers encountered during these efforts. PMID:21383632

  6. Tree Species Suitability to Bioswales and Impact on the Urban Water Budget.

    PubMed

    Scharenbroch, Bryant C; Morgenroth, Justin; Maule, Brian

    2016-01-01

    Water movement between soil and the atmosphere is restricted by hardscapes in the urban environment. Some green infrastructure is intended to increase infiltration and storage of water, thus decreasing runoff and discharge of urban stormwater. Bioswales are a critical component of a water-sensitive urban design (or a low-impact urban design), and incorporation of trees into these green infrastructural components is believed to be a novel way to return stored water to the atmosphere via transpiration. This research was conducted in The Morton Arboretum's main parking lot, which is one of the first and largest green infrastructure installations in the midwestern United States. The parking lot is constructed of permeable pavers and tree bioswales. Trees in bioswales were evaluated for growth and condition and for their effects on water cycling via transpiration. Our data indicate that trees in bioswales accounted for 46 to 72% of total water outputs via transpiration, thereby reducing runoff and discharge from the parking lot. By evaluating the stomatal conductance, diameter growth, and condition of a variety of tree species in these bioswales, we found that not all species are equally suited for bioswales and that not all are equivalent in their transpiration and growth rates, thereby contributing differentially to the functional capacity of bioswales. We conclude that species with high stomatal conductance and large mature form are likely to contribute best to bioswale function. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.

  7. Laser damage testing of optical components under cryogenic conditions

    NASA Astrophysics Data System (ADS)

    Oulehla, Jindrich; Pokorný, Pavel; Lazar, Josef

    2012-11-01

    In this contribution we present a technology for deposition and testing of interference coatings for optical components designed to operate in power pulsed lasers. The aim of the technology is to prepare components for high power laser facilities such as ELI (Extreme Light Infrastructure) or HiLASE. ELI is a part of the European plan to build a new generation of large research facilities selected by the European Strategy Forum for Research Infrastructures (ESFRI). These facilities rely on the use of diode pumped solid state lasers (DPSSL). The choice of the material for the lasers' optical components is critical. Some of the most important properties include the ability to be antireflection and high reflection coated to reduce the energy losses and increase the overall efficiency. As large amounts of heat need to be dissipated during laser operation, cryogenic cooling is necessary. The conducted experiments served as preliminary tests of laser damage threshold measurement methodology that we plan to use in the future. We designed a special apparatus consisting of a vacuum chamber and a cooling system. The samples were placed into the vacuum chamber which was evacuated and then the samples were cooled down to approximately 120K and illuminated by a pulsed laser. Pulse duration was in the nanosecond region. Multiple test sites on the sample's surface were used for different laser pulse energies. We used optical and electron microscopy and spectrophotometer measurements for coating investigation after the conducted experiments.

  8. Laser damage testing of optical components under cryogenic conditions

    NASA Astrophysics Data System (ADS)

    Oulehla, Jindřich; Pokorný, Pavel; Lazar, Josef

    2012-01-01

    In this contribution we present a technology for deposition and testing of interference coatings for optical components designed to operate in power pulsed lasers. The aim of the technology is to prepare components for high power laser facilities such as ELI (Extreme Light Infrastructure) or HiLASE. ELI is a part of the Eropean plan to build a new generation of large research facilities selected by the the Eropean Strategy Forum for Research Infrastructures (ESFRI). These facilities rely on the use of diode pumped solid state lasers (DPSSL). The choice of the material or the lasers' optical components is critical. Some of the most important properties include the ability to be antireflection and high reflection coated to reduce the energy losses and increase the overall efficiency. As large amounts of hear need to be dissipated during laser operation, cryogenic cooling is necessary. The conducted experiments served as preliminary tests of laser damage threshold measurement methodology that we plan to use in the future. We designed a special apparatus consistion of a vacuum chamber an a cooling system. The samples were placed into the vacuum chamber which was evacuated and them the samples were cooled down to approximately 120K and illuminated by a pulsed laser. Pulse duration was in the nanosecond region. Multiple test sites on the sample's surface were used for different laser pulse energies. We used optical and electron microscopy and spectrophotometer measurements for coating investigation after the conducted experiments.

  9. 2010 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP) Risk Reduction and Mitigation in the Defense Industrial Base

    DTIC Science & Technology

    2010-04-28

    Base Critical Infrastructure Protection Conference (DIBCIP) “Risk Reduction & Mitigation in the Defense Industrial Base ” April 26-28, 2010...Philadelphia, PA Agenda Tuesday, April 27, 2010 Keynote Address: The Economic Crisis and Its Impact on the DIB: Defense Industrial Base Forecasts 2010...Ms. Nancy Pomerleau, Exercise Director, Partnership Outreach Division, DHS-IP DIB 2010 DIB CIP DEFENSE INDUSTRIAL BASE CRITICAL

  10. An open, component-based information infrastructure for integrated health information networks.

    PubMed

    Tsiknakis, Manolis; Katehakis, Dimitrios G; Orphanoudakis, Stelios C

    2002-12-18

    A fundamental requirement for achieving continuity of care is the seamless sharing of multimedia clinical information. Different technological approaches can be adopted for enabling the communication and sharing of health record segments. In the context of the emerging global information society, the creation of and access to the integrated electronic health record (I-EHR) of a citizen has been assigned high priority in many countries. This requirement is complementary to an overall requirement for the creation of a health information infrastructure (HII) to support the provision of a variety of health telematics and e-health services. In developing a regional or national HII, the components or building blocks that make up the overall information system ought to be defined and an appropriate component architecture specified. This paper discusses current international priorities and trends in developing the HII. It presents technological challenges and alternative approaches towards the creation of an I-EHR, being the aggregation of health data created during all interactions of an individual with the healthcare system. It also presents results from an ongoing Research and Development (R&D) effort towards the implementation of the HII in HYGEIAnet, the regional health information network of Crete, Greece, using a component-based software engineering approach. Critical design decisions and related trade-offs, involved in the process of component specification and development, are also discussed and the current state of development of an I-EHR service is presented. Finally, Human Computer Interaction (HCI) and security issues, which are important for the deployment and use of any I-EHR service, are considered.

  11. Infrastructure management : Project A : developing a framework for prioritizing infrastructure improvements on critical freight corridors; Project B : developing a market based framework for freight infrastructure management.

    DOT National Transportation Integrated Search

    2012-12-01

    Fully operational highways are necessary for efficient freight movements by the trucking industry. Yet, the combination of limited funding and aging infrastructure creates a grim scenario for states, which are dependent upon the economic benefits of ...

  12. Urban underground infrastructure mapping and assessment

    NASA Astrophysics Data System (ADS)

    Huston, Dryver; Xia, Tian; Zhang, Yu; Fan, Taian; Orfeo, Dan; Razinger, Jonathan

    2017-04-01

    This paper outlines and discusses a few associated details of a smart cities approach to the mapping and condition assessment of urban underground infrastructure. Underground utilities are critical infrastructure for all modern cities. They carry drinking water, storm water, sewage, natural gas, electric power, telecommunications, steam, etc. In most cities, the underground infrastructure reflects the growth and history of the city. Many components are aging, in unknown locations with congested configurations, and in unknown condition. The technique uses sensing and information technology to determine the state of infrastructure and provide it in an appropriate, timely and secure format for managers, planners and users. The sensors include ground penetrating radar and buried sensors for persistent sensing of localized conditions. Signal processing and pattern recognition techniques convert the data in information-laden databases for use in analytics, graphical presentations, metering and planning. The presented data are from construction of the St. Paul St. CCTA Bus Station Project in Burlington, VT; utility replacement sites in Winooski, VT; and laboratory tests of smart phone position registration and magnetic signaling. The soil conditions encountered are favorable for GPR sensing and make it possible to locate buried pipes and soil layers. The present state of the art is that the data collection and processing procedures are manual and somewhat tedious, but that solutions for automating these procedures appear to be viable. Magnetic signaling with moving permanent magnets has the potential for sending lowfrequency telemetry signals through soils that are largely impenetrable by other electromagnetic waves.

  13. Green Infrastructure Checklists and Renderings

    EPA Pesticide Factsheets

    Materials and checklists for Denver, CO to review development project plans for green infrastructure components, best practices for inspecting and maintaining installed green infrastructure. Also includes renderings of streetscape projects.

  14. Assessing the vulnerability of infrastructure to climate change on the Islands of Samoa

    NASA Astrophysics Data System (ADS)

    Fakhruddin, S. H. M.

    2015-03-01

    Pacific Islanders have been exposed to risks associated with climate change. Samoa as one of the Pacific Islands are prone to climatic hazards that will likely increase in coming decades, affecting coastal communities and infrastructure around the islands. Climate models do not predict a reduction of such disaster events in the future in Samoa; indeed, most predict an increase in such events. This paper identifies key infrastructure and their functions and status in order to provide an overall picture of relative vulnerability to climate-related stresses of such infrastructure on the island. By reviewing existing reports as well as holding a series of consultation meetings, a list of critical infrastructures were developed and shared with stakeholders for their consideration. An indicator-based vulnerability model (SIVM) was developed in collaboration with stakeholders to assess the vulnerability of selected infrastructure systems on the Samoan Islands. Damage costs were extracted from the Evan cyclone recovery needs document. On the other hand, criticality and capacity to repair data were collected from stakeholders. Having stakeholder perspectives on these two issues was important because (a) criticality of a given infrastructure could be viewed differently among different stakeholders, and (b) stakeholders were the best available source (in this study) to estimate the capacity to repair non-physical damage to such infrastructure. Analysis of the results suggested rankings from most vulnerable to least vulnerable sectors are the transportation sector, the power sector, the water supply sector and the sewerage system.

  15. Assessing the vulnerability of infrastructure to climate change on the Islands of Samoa

    NASA Astrophysics Data System (ADS)

    Fakhruddin, S. H. M.; Babel, M. S.; Kawasaki, A.

    2015-06-01

    Pacific Islanders have been exposed to risks associated with climate change. Samoa, as one of the Pacific Islands, is prone to climatic hazards that will likely increase in the coming decades, affecting coastal communities and infrastructure around the islands. Climate models do not predict a reduction of such disaster events in the future in Samoa; indeed, most predict an increase. This paper identifies key infrastructure and their functions and status in order to provide an overall picture of relative vulnerability to climate-related stresses of such infrastructure on the island. By reviewing existing reports as well as holding a series of consultation meetings, a list of critical infrastructure was developed and shared with stakeholders for their consideration. An indicator-based vulnerability model (SIVM) was developed in collaboration with stakeholders to assess the vulnerability of selected infrastructure systems on the Samoan Islands. Damage costs were extracted from the Cyclone Evan recovery needs document. Additionally, data on criticality and capacity to repair damage were collected from stakeholders. Having stakeholder perspectives on these two issues was important because (a) criticality of a given infrastructure could be viewed differently among different stakeholders, and (b) stakeholders were the best available source (in this study) to estimate the capacity to repair non-physical damage to such infrastructure. Analysis of the results suggested a ranking of sectors from the most vulnerable to least vulnerable are: the transportation sector, the power sector, the water supply sector and the sewerage system.

  16. NGNP Infrastructure Readiness Assessment: Consolidation Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brian K Castle

    2011-02-01

    The Next Generation Nuclear Plant (NGNP) project supports the development, demonstration, and deployment of high temperature gas-cooled reactors (HTGRs). The NGNP project is being reviewed by the Nuclear Energy Advisory Council (NEAC) to provide input to the DOE, who will make a recommendation to the Secretary of Energy, whether or not to continue with Phase 2 of the NGNP project. The NEAC review will be based on, in part, the infrastructure readiness assessment, which is an assessment of industry's current ability to provide specified components for the FOAK NGNP, meet quality assurance requirements, transport components, have the necessary workforce inmore » place, and have the necessary construction capabilities. AREVA and Westinghouse were contracted to perform independent assessments of industry's capabilities because of their experience with nuclear supply chains, which is a result of their experiences with the EPR and AP-1000 reactors. Both vendors produced infrastructure readiness assessment reports that identified key components and categorized these components into three groups based on their ability to be deployed in the FOAK plant. The NGNP project has several programs that are developing key components and capabilities. For these components, the NGNP project have provided input to properly assess the infrastructure readiness for these components.« less

  17. A novel critical infrastructure resilience assessment approach using dynamic Bayesian networks

    NASA Astrophysics Data System (ADS)

    Cai, Baoping; Xie, Min; Liu, Yonghong; Liu, Yiliu; Ji, Renjie; Feng, Qiang

    2017-10-01

    The word resilience originally originates from the Latin word "resiliere", which means to "bounce back". The concept has been used in various fields, such as ecology, economics, psychology, and society, with different definitions. In the field of critical infrastructure, although some resilience metrics are proposed, they are totally different from each other, which are determined by the performances of the objects of evaluation. Here we bridge the gap by developing a universal critical infrastructure resilience metric from the perspective of reliability engineering. A dynamic Bayesian networks-based assessment approach is proposed to calculate the resilience value. A series, parallel and voting system is used to demonstrate the application of the developed resilience metric and assessment approach.

  18. EuroGEOSS/GENESIS ``e-Habitat'' AIP-3 Use Scenario

    NASA Astrophysics Data System (ADS)

    Mazzetti, P.; Dubois, G.; Santoro, M.; Peedell, S.; de Longueville, B.; Nativi, S.; Craglia, M.

    2010-12-01

    Natural ecosystems are in rapid decline. Major habitats are disappearing at a speed never observed before. The current rate of species extinction is several orders of magnitude higher than the background rate from the fossil record. Protected Areas (PAs) and Protected Area Systems are designed to conserve natural and cultural resources, to maintain biodiversity (ecosystems, species, genes) and ecosystem services. The scientific challenge of understanding how environmental and climatological factors impact on ecosystems and habitats requires the use of information from different scientific domains. Thus, multidisciplinary interoperability is a crucial requirement for a framework aiming to support scientists. The Group on Earth Observations (or GEO) is coordinating international efforts to build a Global Earth Observation System of Systems (GEOSS). This emerging public infrastructure is interconnecting a diverse and growing array of instruments and systems for monitoring and forecasting changes in the global environment. This “system of systems” supports multidisciplinary and cross-disciplinary scientific researches. The presented GEOSS-based interoperability framework facilitates the discovery and exploitation of datasets and models from heterogeneous scientific domains and Information Technology services (data sources). The GEO Architecture and Data Committee (ADC) launched the Architecture Implementation Pilot (AIP) Initiative to develop and deploy new processes and infrastructure components for the GEOSS Common Infrastructure (GCI) and the broader GEOSS architecture. The current AIP Phase 3 (AIP-3) aims to increase GEOSS capacity to support several strategic Societal Benefit Areas (SBAs) including: Disaster Management, Health/Air Quality, Biodiversity, Energy, Health/Disease and Water. As to Biodiversity, the EC-funded EuroGEOSS (http://www.eurogeoss.eu) and GENESIS (http://www.genesis-fp7.eu) projects have developed a use scenario called “e-Habitat”. This scenario demonstrates how a GEOSS-based interoperability infrastructure can aid decision makers to assess and possibly forecast the irreplaceability of a given protected area, an essential indicator for assessing the criticality of threats this protected area is exposed to. Based on the previous AIP-Phase2 experience, the EuroGEOSS and GENESIS projects enhanced the successfully experimented interoperability infrastructure with: a) a discovery broker service which underpins semantics enabled queries: the EuroGEOSS/GENESIS Discovery Augmentation Component (DAC); b) environmental modeling components (i.e. OGC WPS instances) implementing algorithms to predict evolution of PAs ecosystems; c) a workflow engine to: i) browse semantic repositories; ii) retrieve concepts of interest; iii) search for resources (i.e. datasets and models) related to such concepts; iv) execute WPS instances. This presentation introduces the enhanced infrastructure developed by the EuroGEOSS/GENESIS AIP-3 Pilot to implement the “e-Habitat” use scenario. The presented infrastructure is accessible through the GEO Portal and is going to be used for demonstrating the “e-Habitat” model at the GEO Ministerial Meeting - Beijing, November 2010.

  19. EPA Research Highlights: EPA Studies Aging Water Infrastructure

    EPA Science Inventory

    The nation's extensive water infrastructure has the capacity to treat, store, and transport trillions of gallons of water and wastewater per day through millions of miles of pipelines. However, some infrastructure components are more than 100 years old, and as the infrastructure ...

  20. Evaluation of long carbon fiber reinforced concrete to mitigate earthquake damage of infrastructure components.

    DOT National Transportation Integrated Search

    2013-06-01

    The proposed study involves investigating long carbon fiber reinforced concrete as a method of mitigating earthquake damage to : bridges and other infrastructure components. Long carbon fiber reinforced concrete has demonstrated significant resistanc...

  1. Attenuation of Storm Surge Flooding By Wetlands in the Chesapeake Bay: An Integrated Geospatial Framework Evaluating Impacts to Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    Khalid, A.; Haddad, J.; Lawler, S.; Ferreira, C.

    2014-12-01

    Areas along the Chesapeake Bay and its tributaries are extremely vulnerable to hurricane flooding, as evidenced by the costly effects and severe impacts of recent storms along the Virginia coast, such as Hurricane Isabel in 2003 and Hurricane Sandy in 2012. Coastal wetlands, in addition to their ecological importance, are expected to mitigate the impact of storm surge by acting as a natural protection against hurricane flooding. Quantifying such interactions helps to provide a sound scientific basis to support planning and decision making. Using storm surge flooding from various historical hurricanes, simulated using a coupled hydrodynamic wave model (ADCIRC-SWAN), we propose an integrated framework yielding a geospatial identification of the capacity of Chesapeake Bay wetlands to protect critical infrastructure. Spatial identification of Chesapeake Bay wetlands is derived from the National Wetlands Inventory (NWI), National Land Cover Database (NLCD), and the Coastal Change Analysis Program (C-CAP). Inventories of population and critical infrastructure are extracted from US Census block data and FEMA's HAZUS-Multi Hazard geodatabase. Geospatial and statistical analyses are carried out to develop a relationship between wetland land cover, hurricane flooding, population and infrastructure vulnerability. These analyses result in the identification and quantification of populations and infrastructure in flooded areas that lie within a reasonable buffer surrounding the identified wetlands. Our analysis thus produces a spatial perspective on the potential for wetlands to attenuate hurricane flood impacts in critical areas. Statistical analysis will support hypothesis testing to evaluate the benefits of wetlands from a flooding and storm-surge attenuation perspective. Results from geospatial analysis are used to identify where interactions with critical infrastructure are relevant in the Chesapeake Bay.

  2. Risk Assessment Methodology for Water utilities (RAM-W) : the foundation for emergency response planning.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Danneels, Jeffrey John

    2005-03-01

    Concerns about acts of terrorism against critical infrastructures have been on the rise for several years. Critical infrastructures are those physical structures and information systems (including cyber) essential to the minimum operations of the economy and government. The President's Commission on Critical Infrastructure Protection (PCCIP) probed the security of the nation's critical infrastructures. The PCCIP determined the water infrastructure is highly vulnerable to a range of potential attacks. In October 1997, the PCCIP proposed a public/private partnership between the federal government and private industry to improve the protection of the nation's critical infrastructures. In early 2000, the EPA partnered withmore » the Awwa Research Foundation (AwwaRF) and Sandia National Laboratories to create the Risk Assessment Methodology for Water Utilities (RAM-W{trademark}). Soon thereafter, they initiated an effort to create a template and minimum requirements for water utility Emergency Response Plans (ERP). All public water utilities in the US serving populations greater than 3,300 are required to undertaken both a vulnerability assessment and the development of an emergency response plan. This paper explains the initial steps of RAM-W{trademark} and then demonstrates how the security risk assessment is fundamental to the ERP. During the development of RAM-W{trademark}, Sandia performed several security risk assessments at large metropolitan water utilities. As part of the scope of that effort, ERPs at each utility were reviewed to determine how well they addressed significant vulnerabilities uncovered during the risk assessment. The ERP will contain responses to other events as well (e.g. natural disasters) but should address all major findings in the security risk assessment.« less

  3. PROTECTING THE NATION'S CRITICAL INFRASTRUCTURE: THE VULNERABILITY OF U.S. WATER SUPPLY SYSTEMS

    EPA Science Inventory

    Terrorism in the United States was not considered a serious threat until the second half of the 1990s. However, recent attacks both at home and abroad have forced government planners to consider the possibility that critical elements of the U.S. infrastructure might in fact be vu...

  4. How Critical Is Critical Infrastructure?

    DTIC Science & Technology

    2015-09-01

    electrical power, telecommunications, transportation, petroleum liquid , or natural gas as shown in Figure 34 from the National Infrastructure Protection...Natural Gas Segment  Food and Agriculture Sector  Government facilities Sector  Healthcare and Public Health Sector  Information Technology...514 religious meeting places, 127 gas 69 “Current United States GDP,” 2015, http

  5. Eco-logical : an ecosystem approach to developing transportation infrastructure projects in a changing environment

    DOT National Transportation Integrated Search

    2009-09-13

    The development of infrastructure facilities can negatively impact critical habitat and essential ecosystems. There are a variety of techniques available to avoid, minimize, and mitigate negative impacts of existing infrastructure as well as future i...

  6. 77 FR 72673 - Critical Infrastructure Protection and Resilience Month, 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-05

    .... Cyber incidents can have devastating consequences on both physical and virtual infrastructure, which is... work within existing authorities to fortify our country against cyber risks, comprehensive legislation remains essential to improving infrastructure security, enhancing cyber information sharing between...

  7. The Integrated Safety-Critical Advanced Avionics Communication and Control (ISAACC) System Concept: Infrastructure for ISHM

    NASA Technical Reports Server (NTRS)

    Gwaltney, David A.; Briscoe, Jeri M.

    2005-01-01

    Integrated System Health Management (ISHM) architectures for spacecraft will include hard real-time, critical subsystems and soft real-time monitoring subsystems. Interaction between these subsystems will be necessary and an architecture supporting multiple criticality levels will be required. Demonstration hardware for the Integrated Safety-Critical Advanced Avionics Communication & Control (ISAACC) system has been developed at NASA Marshall Space Flight Center. It is a modular system using a commercially available time-triggered protocol, ?Tp/C, that supports hard real-time distributed control systems independent of the data transmission medium. The protocol is implemented in hardware and provides guaranteed low-latency messaging with inherent fault-tolerance and fault-containment. Interoperability between modules and systems of modules using the TTP/C is guaranteed through definition of messages and the precise message schedule implemented by the master-less Time Division Multiple Access (TDMA) communications protocol. "Plug-and-play" capability for sensors and actuators provides automatically configurable modules supporting sensor recalibration and control algorithm re-tuning without software modification. Modular components of controlled physical system(s) critical to control algorithm tuning, such as pumps or valve components in an engine, can be replaced or upgraded as "plug and play" components without modification to the ISAACC module hardware or software. ISAACC modules can communicate with other vehicle subsystems through time-triggered protocols or other communications protocols implemented over Ethernet, MIL-STD- 1553 and RS-485/422. Other communication bus physical layers and protocols can be included as required. In this way, the ISAACC modules can be part of a system-of-systems in a vehicle with multi-tier subsystems of varying criticality. The goal of the ISAACC architecture development is control and monitoring of safety critical systems of a manned spacecraft. These systems include spacecraft navigation and attitude control, propulsion, automated docking, vehicle health management and life support. ISAACC can integrate local critical subsystem health management with subsystems performing long term health monitoring. The ISAACC system and its relationship to ISHM will be presented.

  8. Technologies for Protection and Resistance Enhancement of Critical Infrastructures againstExtreme Fire

    DTIC Science & Technology

    2014-05-01

    in Right of Canada, as represented by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ...extreme fire protection of critical infrastructures. Résumé …..... Le présent rapport fournit de l’information qui pourrait aider à élaborer des...démarches nationales pour une atténuation du risque émergeant des conditions d’incendie extrêmes pour les infrastructures essentielles (IE). Les résultats

  9. Quantifying the benefits of urban forest systems as a component of the green infrastructure stormwater treatment network

    Treesearch

    Eric Kuehler; Jon Hathaway; Andrew Tirpak

    2017-01-01

    The use of green infrastructure for reducing stormwater runoff is increasingly common. One under‐studied component of the green infrastructure network is the urban forest system. Trees can play an important role as the “first line of defense” for restoring more natural hydrologic regimes in urban watersheds by intercepting rainfall, delaying runoff, infiltrating, and...

  10. Highway Funding: It's Time to Think Seriously About Operations. A Policy Framework

    DOT National Transportation Integrated Search

    1998-09-01

    This report describes the results of a major data gathering effort aimed at tracking deployment of nine infrastructure components of the metropolitan ITS infrastructure in 78 of the largest metropolitan areas in the nation. The nine components are: F...

  11. Challenges and opportunities in the design and construction of a GIS-based emission inventory infrastructure for the Niger Delta region of Nigeria.

    PubMed

    Fagbeja, Mofoluso A; Hill, Jennifer L; Chatterton, Tim J; Longhurst, James W S; Akpokodje, Joseph E; Agbaje, Ganiy I; Halilu, Shaba A

    2017-03-01

    Environmental monitoring in middle- and low-income countries is hampered by many factors which include enactment and enforcement of legislations; deficiencies in environmental data reporting and documentation; inconsistent, incomplete and unverifiable data; a lack of access to data; and technical expertise. This paper describes the processes undertaken and the major challenges encountered in the construction of the first Niger Delta Emission Inventory (NDEI) for criteria air pollutants and CO 2 released from the anthropogenic activities in the region. This study focused on using publicly available government and research data. The NDEI has been designed to provide a Geographic Information System-based component of an air quality and carbon management framework. The NDEI infrastructure was designed and constructed at 1-, 10- and 20-km grid resolutions for point, line and area sources using industry standard processes and emission factors derived from activities similar to those in the Niger Delta. Due to inadequate, incomplete, potentially inaccurate and unavailable data, the infrastructure was populated with data based on a series of best possible assumptions for key emission sources. This produces outputs with variable levels of certainty, which also highlights the critical challenges in the estimation of emissions from a developing country. However, the infrastructure is functional and has the ability to produce spatially resolved emission estimates.

  12. Integrating Cost Engineering and Project Management in a Junior Engineering Economics Course and a Senior Capstone Project Design Course

    ERIC Educational Resources Information Center

    Tickles, Virginia C.; Li, Yadong; Walters, Wilbur L.

    2013-01-01

    Much criticism exists concerning a lack of focus on real-world problem-solving in the science, technology, engineering and mathematics (STEM) infrastructures. Many of these critics say that current educational infrastructures are incapable in preparing future scientists and engineers to solve the complex and multidisciplinary problems this society…

  13. Aging Water Infrastructure Research Program Innovation & Research for the 21st Century

    EPA Science Inventory

    The U.S. infrastructure is critical for providing essential services: protect public health and the environment and support and sustain our economy. Significant investment in water infrastructure: over 16,000 WWTPs serving 190 million people; about 54,000 community water syste...

  14. 78 FR 29375 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ...), Office of Infrastructure Protection (IP), Infrastructure Information Collection Division (IICD... Forrest DHS/NPPD/IP/PCII, [email protected] . SUPPLEMENTARY INFORMATION: The PCII Program was... administered by DHS/ NPPD/IP/IICD. The PCII Program is responsible for ensuring compliance with the Regulation...

  15. 76 FR 17935 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ... Infrastructure Protection (IP) will submit the following Information Collection Request to the Office of... questions about this Information Collection Request should be forwarded to DHS/NPPD/IP, Attn: Emily R... PCII Program is administered by IP's Infrastructure Information Collection Division (IICD). The PCII...

  16. The ISTIMES project: a new integrated system for monitoring critical transport infrastructures interested by natural hazards

    NASA Astrophysics Data System (ADS)

    Proto, Monica; Massimo, Bavusi; Francesco, Soldovieri

    2010-05-01

    The research project "Integrated System for Transport Infrastructure surveillance and Monitoring by Electromagnetic Sensing" (ISTIMES), was approved in the 7th Framework Programme, in the Joint Call ICT and Security and started on 1st July 2009. The purpose of ISTIMES project is to design, assess and promote an ICT-based system, exploiting distributed and local sensors, for non-destructive electromagnetic monitoring in order to achieve the critical transport infrastructures more reliable and safe. The transportation sector's components are susceptible to the consequences of natural disasters and can also be attractive as terrorist targets. The sector's size, its physically dispersed and decentralized nature, the many public and private entities involved in its operations, the critical importance of cost considerations, and the inherent requirement of convenient accessibility to its services by all users - make the transportation particularly vulnerable to security and safety threats. As well known, the surface transportation system consists of interconnected infrastructures including highways, transit systems, railroads, airports, waterways, pipelines and ports, and the vehicles, aircraft, and vessels that operate along these networks. Thus, interdependencies exist between transportation and nearly every other sector of the economy and the effective operation of this system is essential to the European economic productivity; therefore, transportation sector protection is of paramount importance since threats to it may impact other industries that rely on it. The system exploits an open network architecture that can accommodate a wide range of sensors, static and mobile, and can be easily scaled up to allow the integration of additional sensors and interfacing with other networks. It relies on heterogeneous state-of-the-art electromagnetic sensors, enabling a self-organizing, self-healing, ad-hoc networking of terrestrial sensors, supported by specific satellite measurements. The integration of electromagnetic technologies with new ICT information and telecommunications systems enables remotely controlled monitoring and surveillance and real time data imaging of the critical transport infrastructures. Thus, the proposal will concern also with the development of tools for handling, analysing and processing large data volume (Information Fusion) and then providing information and performing behaviour prediction in a quick, easy and intuitive way (Situation Awareness). The proposal is based on several independent non-invasive imaging technologies based on electromagnetic sensing. Sensor cross validation, synergy and new data fusion and correlation schemes will permit a multi-method, multi-resolution and multi-scale electromagnetic detection and monitoring of surface and subsurface changes of the infrastructure. According to GMES and European Spatial Data Infrastructure (ESDI) initiatives, the system will adopt open architectures and will make efforts to achieve full interoperability. The system will be tested on two very challenging test beds such as: a highway-bridge and a railway tunnel. The system will be based on clear end-user requirements, coming from representative end-users and technological choices will be based on a long term cost-benefit analysis. Then, a dissemination plan was included into the project to encourage a wide range of public institutions and private companies to evaluate and adopt our approach for real-time control and distributed monitoring also in the more general framework of critical and civil infrastructure management and protection. Finally, an exploitation plan will develop for the commercialization of any derived technology, software, or monitoring concepts. ISTIMES project is carried out by an international partnership formed by nine partners coming from seven countries: Tecnologie per le Osservazioni della Terra (TeRN), Elsag Datamat (ED) and Dipartimento della Protezione Civile (DPC) from Italy, Eidgenoessische Materialpruefungs-und Forschungsanstalt (EMPA) from Switzerland, Laboratoire Central des Ponts et Chaussées (LCPC) from France, Lund University (ULUND) from Sweden, Tel Aviv University (TAU) from Israel, Territorial Data Elaboration (TDE) from Romania and Norsk Elektro Optikk (NEO) from Norway.

  17. Time-Varying, Multi-Scale Adaptive System Reliability Analysis of Lifeline Infrastructure Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gearhart, Jared Lee; Kurtz, Nolan Scot

    2014-09-01

    The majority of current societal and economic needs world-wide are met by the existing networked, civil infrastructure. Because the cost of managing such infrastructure is high and increases with time, risk-informed decision making is essential for those with management responsibilities for these systems. To address such concerns, a methodology that accounts for new information, deterioration, component models, component importance, group importance, network reliability, hierarchical structure organization, and efficiency concerns has been developed. This methodology analyzes the use of new information through the lens of adaptive Importance Sampling for structural reliability problems. Deterioration, multi-scale bridge models, and time-variant component importance aremore » investigated for a specific network. Furthermore, both bridge and pipeline networks are studied for group and component importance, as well as for hierarchical structures in the context of specific networks. Efficiency is the primary driver throughout this study. With this risk-informed approach, those responsible for management can address deteriorating infrastructure networks in an organized manner.« less

  18. 49 CFR 1520.5 - Sensitive security information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...

  19. 49 CFR 1520.5 - Sensitive security information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...

  20. 49 CFR 1520.5 - Sensitive security information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...

  1. 49 CFR 1520.5 - Sensitive security information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., including threats against cyber infrastructure. (8) Security measures. Specific details of aviation...) Critical aviation, maritime, or rail infrastructure asset information. Any list identifying systems or...

  2. An inter-professional approach to personalized medicine education: one institution's experience.

    PubMed

    Formea, Christine M; Nicholson, Wayne T; Vitek, Carolyn Rohrer

    2015-03-01

    Personalized medicine offers the promise of better diagnoses, targeted therapies and individualized treatment plans. Pharmacogenomics is an integral component of personalized medicine; it aids in the prediction of an individual's response to medications. Despite growing public acceptance and emerging clinical evidence, this rapidly expanding field of medicine is slow to be adopted and utilized by healthcare providers, although many believe that they should be knowledgeable and able to apply pharmacogenomics in clinical practice. Institutional infrastructure must be built to support pharmacogenomic implementation. Multidisciplinary education for healthcare providers is a critical component for pharmacogenomics to achieve its full potential to optimize patient care. We describe our recent experience at the Mayo Clinic implementing pharmacogenomics education in a large, academic healthcare system facilitated by the Mayo Clinic Center for Individualized Medicine.

  3. Transforming Our Cities: High-Performance Green Infrastructure (WERF Report INFR1R11)

    EPA Science Inventory

    The objective of this project is to demonstrate that the highly distributed real-time control (DRTC) technologies for green infrastructure being developed by the research team can play a critical role in transforming our nation’s urban infrastructure. These technologies include a...

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eltoweissy, Mohamed Y.; Du, David H.C.; Gerla, Mario

    Mission-Critical Networking (MCN) refers to networking for application domains where life or livelihood may be at risk. Typical application domains for MCN include critical infrastructure protection and operation, emergency and crisis intervention, healthcare services, and military operations. Such networking is essential for safety, security and economic vitality in our complex world characterized by uncertainty, heterogeneity, emergent behaviors, and the need for reliable and timely response. MCN comprise networking technology, infrastructures and services that may alleviate the risk and directly enable and enhance connectivity for mission-critical information exchange among diverse, widely dispersed, mobile users.

  5. MISSION: Mission and Safety Critical Support Environment. Executive overview

    NASA Technical Reports Server (NTRS)

    Mckay, Charles; Atkinson, Colin

    1992-01-01

    For mission and safety critical systems it is necessary to: improve definition, evolution and sustenance techniques; lower development and maintenance costs; support safe, timely and affordable system modifications; and support fault tolerance and survivability. The goal of the MISSION project is to lay the foundation for a new generation of integrated systems software providing a unified infrastructure for mission and safety critical applications and systems. This will involve the definition of a common, modular target architecture and a supporting infrastructure.

  6. Fully integrated automated security surveillance system: managing a changing world through managed technology and product applications

    NASA Astrophysics Data System (ADS)

    Francisco, Glen; Brown, Todd

    2012-06-01

    Integrated security systems are essential to pre-empting criminal assaults. Nearly 500,000 sites have been identified (source: US DHS) as critical infrastructure sites that would suffer severe damage if a security breach should occur. One major breach in any of 123 U.S. facilities, identified as "most critical", threatens more than 1,000,000 people. The vulnerabilities of critical infrastructure are expected to continue and even heighten over the coming years.

  7. Modeling the resilience of critical infrastructure: the role of network dependencies.

    PubMed

    Guidotti, Roberto; Chmielewski, Hana; Unnikrishnan, Vipin; Gardoni, Paolo; McAllister, Therese; van de Lindt, John

    2016-01-01

    Water and wastewater network, electric power network, transportation network, communication network, and information technology network are among the critical infrastructure in our communities; their disruption during and after hazard events greatly affects communities' well-being, economic security, social welfare, and public health. In addition, a disruption in one network may cause disruption to other networks and lead to their reduced functionality. This paper presents a unified theoretical methodology for the modeling of dependent/interdependent infrastructure networks and incorporates it in a six-step probabilistic procedure to assess their resilience. Both the methodology and the procedure are general, can be applied to any infrastructure network and hazard, and can model different types of dependencies between networks. As an illustration, the paper models the direct effects of seismic events on the functionality of a potable water distribution network and the cascading effects of the damage of the electric power network (EPN) on the potable water distribution network (WN). The results quantify the loss of functionality and delay in the recovery process due to dependency of the WN on the EPN. The results show the importance of capturing the dependency between networks in modeling the resilience of critical infrastructure.

  8. Modeling the resilience of critical infrastructure: the role of network dependencies

    PubMed Central

    Guidotti, Roberto; Chmielewski, Hana; Unnikrishnan, Vipin; Gardoni, Paolo; McAllister, Therese; van de Lindt, John

    2017-01-01

    Water and wastewater network, electric power network, transportation network, communication network, and information technology network are among the critical infrastructure in our communities; their disruption during and after hazard events greatly affects communities’ well-being, economic security, social welfare, and public health. In addition, a disruption in one network may cause disruption to other networks and lead to their reduced functionality. This paper presents a unified theoretical methodology for the modeling of dependent/interdependent infrastructure networks and incorporates it in a six-step probabilistic procedure to assess their resilience. Both the methodology and the procedure are general, can be applied to any infrastructure network and hazard, and can model different types of dependencies between networks. As an illustration, the paper models the direct effects of seismic events on the functionality of a potable water distribution network and the cascading effects of the damage of the electric power network (EPN) on the potable water distribution network (WN). The results quantify the loss of functionality and delay in the recovery process due to dependency of the WN on the EPN. The results show the importance of capturing the dependency between networks in modeling the resilience of critical infrastructure. PMID:28825037

  9. Experiences integrating autonomous components and legacy systems into tsunami early warning systems

    NASA Astrophysics Data System (ADS)

    Reißland, S.; Herrnkind, S.; Guenther, M.; Babeyko, A.; Comoglu, M.; Hammitzsch, M.

    2012-04-01

    Fostered by and embedded in the general development of Information and Communication Technology (ICT) the evolution of Tsunami Early Warning Systems (TEWS) shows a significant development from seismic-centred to multi-sensor system architectures using additional sensors, e.g. sea level stations for the detection of tsunami waves and GPS stations for the detection of ground displacements. Furthermore, the design and implementation of a robust and scalable service infrastructure supporting the integration and utilisation of existing resources serving near real-time data not only includes sensors but also other components and systems offering services such as the delivery of feasible simulations used for forecasting in an imminent tsunami threat. In the context of the development of the German Indonesian Tsunami Early Warning System (GITEWS) and the project Distant Early Warning System (DEWS) a service platform for both sensor integration and warning dissemination has been newly developed and demonstrated. In particular, standards of the Open Geospatial Consortium (OGC) and the Organization for the Advancement of Structured Information Standards (OASIS) have been successfully incorporated. In the project Collaborative, Complex, and Critical Decision-Support in Evolving Crises (TRIDEC) new developments are used to extend the existing platform to realise a component-based technology framework for building distributed TEWS. This talk will describe experiences made in GITEWS, DEWS and TRIDEC while integrating legacy stand-alone systems and newly developed special-purpose software components into TEWS using different software adapters and communication strategies to make the systems work together in a corporate infrastructure. The talk will also cover task management and data conversion between the different systems. Practical approaches and software solutions for the integration of sensors, e.g. providing seismic and sea level data, and utilisation of special-purpose components, such as simulation systems, in TEWS will be presented.

  10. Productivity-based approach to valuation of transportation infrastructure.

    DOT National Transportation Integrated Search

    2014-10-01

    Transportation infrastructure, a vital component to sustain economic prosperity, represents the largest public-owned : infrastructure asset in the U.S. With over a trillion invested dollars invested into long-lived physical assets such as : roads and...

  11. Informatics for patient safety: a nursing research perspective.

    PubMed

    Bakken, Suzanne

    2006-01-01

    In Crossing the Quality Chasm, the Institute of Medicine (IOM) Committee on Quality of Health Care in America identified the critical role of information technology in designing a health system that produces care that is "safe, effective, patient-centered, timely, efficient, and equitable" (Committee on Quality of Health Care in America, 2001, p. 164). A subsequent IOM report contends that improved information systems are essential to a new health care delivery system that "both prevents errors and learns from them when they occur" (Committee on Data Standards for Patient Safety, 2004, p. 1). This review specifically highlights the role of informatics processes and information technology in promoting patient safety and summarizes relevant nursing research. First, the components of an informatics infrastructure for patient safety are described within the context of the national framework for delivering consumer-centric and information-rich health care and using the National Health Information Infrastructure (NHII) (Thompson & Brailer, 2004). Second, relevant nursing research is summarized; this includes research studies that contributed to the development of selected infrastructure components as well as studies specifically focused on patient safety. Third, knowledge gaps and opportunities for nursing research are identified for each main topic. The health information technologies deployed as part of the national framework must support nursing practice in a manner that enables prevention of medical errors and promotion of patient safety and contributes to the development of practice-based nursing knowledge as well as best practices for patient safety. The seminal work that has been completed to date is necessary, but not sufficient, to achieve this objective.

  12. Employing Replay Connectors for SIEM Operator Education

    DTIC Science & Technology

    2013-09-01

    BLANK xiii LIST OF ACRONYMS AND ABBREVIATIONS CORR Correlation Optimized Retention and Retrieval CII Critical Information Infrastructure GLBA...vast distances is now quicker and easier with the advancement in mobile computing devices and more ubiquitous connectivity and bandwidth. As a result...breakdown of the Critical Information Infrastructure (CII) is one of the core risks facing the international economy. The World Economic Forum

  13. Neural Network Based Intrusion Detection System for Critical Infrastructures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less

  14. 77 FR 68795 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-16

    ...), Office of Infrastructure Protection (IP), Infrastructure Information Collection Division (IICD... forwarded to DHS/NPPD/IP/IICD, 245 Murray Lane, SW., Mail Stop 0602, Arlington,VA 20598-0602. Emailed.../IP PCII Program to assess state and local programs, their compliance with PCII rules and requirements...

  15. Performance measurement and modeling of component applications in a high performance computing environment : a case study.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Armstrong, Robert C.; Ray, Jaideep; Malony, A.

    2003-11-01

    We present a case study of performance measurement and modeling of a CCA (Common Component Architecture) component-based application in a high performance computing environment. We explore issues peculiar to component-based HPC applications and propose a performance measurement infrastructure for HPC based loosely on recent work done for Grid environments. A prototypical implementation of the infrastructure is used to collect data for a three components in a scientific application and construct performance models for two of them. Both computational and message-passing performance are addressed.

  16. Connecting Learners: The South Carolina Educational Technology Plan.

    ERIC Educational Resources Information Center

    South Carolina State Dept. of Education, Columbia.

    This educational technology plan for South Carolina contains the following sections: (1) statewide progress related to the telecommunications infrastructure, professional development, video infrastructure, administrative infrastructure, and funding; (2) introduction to educational technology concepts, including major components and factors…

  17. 44 CFR 201.7 - Tribal Mitigation Plans.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... of existing and future buildings, infrastructure, and critical facilities located in the identified... effects of each hazard, with particular emphasis on new and existing buildings and infrastructure. (iii...

  18. A cyber infrastructure for the SKA Telescope Manager

    NASA Astrophysics Data System (ADS)

    Barbosa, Domingos; Barraca, João. P.; Carvalho, Bruno; Maia, Dalmiro; Gupta, Yashwant; Natarajan, Swaminathan; Le Roux, Gerhard; Swart, Paul

    2016-07-01

    The Square Kilometre Array Telescope Manager (SKA TM) will be responsible for assisting the SKA Operations and Observation Management, carrying out System diagnosis and collecting Monitoring and Control data from the SKA subsystems and components. To provide adequate compute resources, scalability, operation continuity and high availability, as well as strict Quality of Service, the TM cyber-infrastructure (embodied in the Local Infrastructure - LINFRA) consists of COTS hardware and infrastructural software (for example: server monitoring software, host operating system, virtualization software, device firmware), providing a specially tailored Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) solution. The TM infrastructure provides services in the form of computational power, software defined networking, power, storage abstractions, and high level, state of the art IaaS and PaaS management interfaces. This cyber platform will be tailored to each of the two SKA Phase 1 telescopes (SKA_MID in South Africa and SKA_LOW in Australia) instances, each presenting different computational and storage infrastructures and conditioned by location. This cyber platform will provide a compute model enabling TM to manage the deployment and execution of its multiple components (observation scheduler, proposal submission tools, MandC components, Forensic tools and several Databases, etc). In this sense, the TM LINFRA is primarily focused towards the provision of isolated instances, mostly resorting to virtualization technologies, while defaulting to bare hardware if specifically required due to performance, security, availability, or other requirement.

  19. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2006-04-18

    initially approved. The current review process for such purchases, implemented under authority of the Exon- Florio provision of the Defense Production Act (50...legislative proposals “broaden” coverage of Exon- Florio to include the purchase of assets associated with critical infrastructure. As currently written...Exon- Florio covers persons engaged in interstate commerce. While this covers a broad range of “persons,” extending beyond those that might be part

  20. Resilience and legislation: Will IT security legislation boost critical infrastructure resilience in Germany?

    PubMed

    Kaschner, Holger; Jordan, Tim

    The German government is seeking to enhance the resilience of critical national infrastructures via its new IT Security Law. This paper analyses the content of the law, as well as the limitations and constraints arising from the conflicting interests of affected stakeholders. The paper also offers solutions to help the IT Security Law fulfil its potential despite the constraints.

  1. A reference model for model-based design of critical infrastructure protection systems

    NASA Astrophysics Data System (ADS)

    Shin, Young Don; Park, Cheol Young; Lee, Jae-Chon

    2015-05-01

    Today's war field environment is getting versatile as the activities of unconventional wars such as terrorist attacks and cyber-attacks have noticeably increased lately. The damage caused by such unconventional wars has also turned out to be serious particularly if targets are critical infrastructures that are constructed in support of banking and finance, transportation, power, information and communication, government, and so on. The critical infrastructures are usually interconnected to each other and thus are very vulnerable to attack. As such, to ensure the security of critical infrastructures is very important and thus the concept of critical infrastructure protection (CIP) has come. The program to realize the CIP at national level becomes the form of statute in each country. On the other hand, it is also needed to protect each individual critical infrastructure. The objective of this paper is to study on an effort to do so, which can be called the CIP system (CIPS). There could be a variety of ways to design CIPS's. Instead of considering the design of each individual CIPS, a reference model-based approach is taken in this paper. The reference model represents the design of all the CIPS's that have many design elements in common. In addition, the development of the reference model is also carried out using a variety of model diagrams. The modeling language used therein is the systems modeling language (SysML), which was developed and is managed by Object Management Group (OMG) and a de facto standard. Using SysML, the structure and operational concept of the reference model are designed to fulfil the goal of CIPS's, resulting in the block definition and activity diagrams. As a case study, the operational scenario of the nuclear power plant while being attacked by terrorists is studied using the reference model. The effectiveness of the results is also analyzed using multiple analysis models. It is thus expected that the approach taken here has some merits over the traditional design methodology of repeating requirements analysis and system design.

  2. 44 CFR 201.7 - Tribal Mitigation Plans.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... buildings, infrastructure, and critical facilities located in the identified hazard areas; (B) An estimate... particular emphasis on new and existing buildings and infrastructure. (iii) An action plan describing how the...

  3. Saving America's School Infrastructure. Research in Education Fiscal Policy and Practice.

    ERIC Educational Resources Information Center

    Crampton, Faith E., Ed.; Thompson, David C., Ed.

    This book addresses funding for school facilities. Contents of section 1, "Overview and Scope of the Problem," are: (1) "Unmet School Infrastructure Funding Need as a Critical Educational Capacity Issue: Setting the Context" (Faith E. Crampton); (2) "Financing School Infrastructure Needs: An Overview across the 50 States" (Catherine C. Sielke);…

  4. National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency

    ERIC Educational Resources Information Center

    US Department of Homeland Security, 2009

    2009-01-01

    The overarching goal of the National Infrastructure Protection Plan (NIPP) is to build a safer, more secure, and more resilient America by preventing, deterring, neutralizing, or mitigating the effects of deliberate efforts by terrorists to destroy, incapacitate, or exploit elements of our Nation's critical infrastructure and key resources (CIKR)…

  5. Deploying and operating integrated intelligent transportation systems : twenty questions and answers : guidance from the evaluation of the Metropolitan Model Deployment Initiative sites

    DOT National Transportation Integrated Search

    2000-01-01

    This report describes the results of a major data gathering effort aimed at tracking deployment of nine infrastructure components of the metropolitan ITS infrastructure in 78 of the largest metropolitan areas in the nation. The nine components are: F...

  6. VERA 3.6 Release Notes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Williamson, Richard L.; Kochunas, Brendan; Adams, Brian M.

    The Virtual Environment for Reactor Applications components included in this distribution include selected computational tools and supporting infrastructure that solve neutronics, thermal-hydraulics, fuel performance, and coupled neutronics-thermal hydraulics problems. The infrastructure components provide a simplified common user input capability and provide for the physics integration with data transfer and coupled-physics iterative solution algorithms.

  7. Beyond bouncing back : a roundtable on critical transportation resilience

    DOT National Transportation Integrated Search

    2013-06-01

    Global transportation infrastructure today is confronted with significant vulnerabilities an aging : infrastructure; a growing concentration of populations at high-density coastal urban areas; increasing : interdependencies among the nation's phy...

  8. 44 CFR 201.6 - Local Mitigation Plans.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., infrastructure, and critical facilities located in the identified hazard areas; (B) An estimate of the potential... effects of each hazard, with particular emphasis on new and existing buildings and infrastructure. All...

  9. 44 CFR 201.6 - Local Mitigation Plans.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., infrastructure, and critical facilities located in the identified hazard areas; (B) An estimate of the potential... effects of each hazard, with particular emphasis on new and existing buildings and infrastructure. All...

  10. 44 CFR 201.6 - Local Mitigation Plans.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., infrastructure, and critical facilities located in the identified hazard areas; (B) An estimate of the potential... effects of each hazard, with particular emphasis on new and existing buildings and infrastructure. All...

  11. Organizational Strategies for Critical Transportation Infrastructure: Characteristics of Urban Resilience. The Case of Montreal.

    NASA Astrophysics Data System (ADS)

    Beauregard, Stéphane; Therrien, Marie-Christine; Normandin, Julie-Maude

    2010-05-01

    Organizational Strategies for Critical Transportation Infrastructure: Characteristics of Urban Resilience. The Case of Montreal. Stéphane Beauregard M.Sc. Candidate École nationale d'administration publique Julie-Maude Normandin Ph.D. Candidate École nationale d'administration publique Marie-Christine Therrien Professor École nationale d'administration publique The proposed paper presents preliminary results on the resilience of organizations managing critical infrastructure in the Metropolitan Montreal area (Canada). A resilient city is characterized by a network of infrastructures and individuals capable of maintaining their activities in spite of a disturbance (Godschalk, 2002). Critical infrastructures provide essential services for the functioning of society. In a crisis situation, the interruption or a decrease in performance of critical infrastructures could have important impacts on the population. They are also vulnerable to accidents and cascading effects because on their complexity and tight interdependence (Perrow, 1984). For these reasons, protection and security of the essential assets and networks are one of the objectives of organizations and governments. But prevention and recovery are two endpoints of a continuum which include also intermediate concerns: ensuring organizational robustness or failing with elegance rather than catastrophically. This continuum also includes organizational resilience (or system), or the ability to recover quickly after an interruption has occurred. Wildavsky (1988) proposes that anticipation strategies work better against known problems while resilience strategies focus on unknown problems. Anticipation policies can unnecessarily immobilize investments against risks, while resilience strategies include the potential for a certain sacrifice in the interests of a more long-term survival and adaptation to changing threats. In addition, a too large confidence in anticipation strategies can bring loss of capacity of an organization to adapt to conditions. Each strategy must adapt to specific conditions. Where uncertainties important, resilience is probably the most appropriate. Where conditions are stable, and where future projections are generally fair, anticipating works better, although it should be used judiciously (Fiksel, 2003). Anticipation strategies immobilize specific or tangible resources and, can eventually be costly in the long-term. On the other hand, resilient systems and organizations are those that quickly acquire information about their environments, quickly change their behaviour and their structures, even if the circumstances are chaotic. They communicate easily and openly, and largely mobilize networks of expertise and support (Perrow, 1999). We conducted qualitative research to assess different variables that positively affect the organizational resilience in the management of critical infrastructure. We preferred a methodology allowing us to retain the complexity of the phenomenon, not affecting the nature of the system studied. Our methodology allows us to create pragmatic theoretical concepts (grounded theory) (Glaser and Strauss, 1967). Our main concern is not to separate the phenomenon studied in its context. This methodology allows us to better understand the coordination between the organizations network infrastructure essential by a process of "sweeping-in" (Dewey, 1938). After conducting a literature review of various concepts of our research (Comfort, L. K., 2002; Lagadec and Michel-Kerjan, 2004; Perrow, 1999; Weick and Sutcliffe, 2001; and more) we have conducted numerous interviews and distributed a questionnaire to highlight significant indicators. For the first part of this research, we targeted the transportation critical infrastructure of Montreal area because it is crucial and also this infrastructure includes public, parapublic and private organisations. The first results of this research demonstrate the contribution of different structural and functional factors that influence the intraorganizational resilience and interorganizational resilience for the transportation sector of Montreal.

  12. Fabrication Infrastructure to Enable Efficient Exploration and Utilization of Space

    NASA Technical Reports Server (NTRS)

    Howell, Joe T.; Fikes, John C.; McLemore, Carole A.; Manning, Curtis W.; Good, Jim

    2007-01-01

    Unlike past one-at-a-time mission approaches, system-of-systems infrastructures will be needed to enable ambitious scenarios for sustainable future space exploration and utilization. Fabrication infrastructure will be needed to support habitat structure development, tools and mechanical part fabrication, as well as repair and replacement of ground support and space mission hardware such as life support items, vehicle components and crew systems. The fabrication infrastructure will need the In Situ Fabrication and Repair (ISFR) element, which is working in conjunction with the In Situ Resources Utilization (ISRU) element, to live off the land. The ISFR Element supports the entire life cycle of Exploration by: reducing downtime due to failed components; decreasing risk to crew by recovering quickly from degraded operation of equipment; improving system functionality with advanced geometry capabilities; and enhancing mission safety by reducing assembly part counts of original designs where possible. This paper addresses the fabrication infrastructures that support efficient, affordable, reliable infrastructures for both space exploration systems and logistics; these infrastructures allow sustained, affordable and highly effective operations on the Moon, Mars and beyond.

  13. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    NASA Astrophysics Data System (ADS)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  14. Measuring infrastructure: A key step in program evaluation and planning

    PubMed Central

    Schmitt, Carol L.; Glasgow, LaShawn; Lavinghouze, S. Rene; Rieker, Patricia P.; Fulmer, Erika; McAleer, Kelly; Rogers, Todd

    2016-01-01

    State tobacco prevention and control programs (TCPs) require a fully functioning infrastructure to respond effectively to the Surgeon General’s call for accelerating the national reduction in tobacco use. The literature describes common elements of infrastructure; however, a lack of valid and reliable measures has made it difficult for program planners to monitor relevant infrastructure indicators and address observed deficiencies, or for evaluators to determine the association among infrastructure, program efforts, and program outcomes. The Component Model of Infrastructure (CMI) is a comprehensive, evidence-based framework that facilitates TCP program planning efforts to develop and maintain their infrastructure. Measures of CMI components were needed to evaluate the model’s utility and predictive capability for assessing infrastructure. This paper describes the development of CMI measures and results of a pilot test with nine state TCP managers. Pilot test findings indicate that the tool has good face validity and is clear and easy to follow. The CMI tool yields data that can enhance public health efforts in a funding-constrained environment and provides insight into program sustainability. Ultimately, the CMI measurement tool could facilitate better evaluation and program planning across public health programs. PMID:27037655

  15. Measuring infrastructure: A key step in program evaluation and planning.

    PubMed

    Schmitt, Carol L; Glasgow, LaShawn; Lavinghouze, S Rene; Rieker, Patricia P; Fulmer, Erika; McAleer, Kelly; Rogers, Todd

    2016-06-01

    State tobacco prevention and control programs (TCPs) require a fully functioning infrastructure to respond effectively to the Surgeon General's call for accelerating the national reduction in tobacco use. The literature describes common elements of infrastructure; however, a lack of valid and reliable measures has made it difficult for program planners to monitor relevant infrastructure indicators and address observed deficiencies, or for evaluators to determine the association among infrastructure, program efforts, and program outcomes. The Component Model of Infrastructure (CMI) is a comprehensive, evidence-based framework that facilitates TCP program planning efforts to develop and maintain their infrastructure. Measures of CMI components were needed to evaluate the model's utility and predictive capability for assessing infrastructure. This paper describes the development of CMI measures and results of a pilot test with nine state TCP managers. Pilot test findings indicate that the tool has good face validity and is clear and easy to follow. The CMI tool yields data that can enhance public health efforts in a funding-constrained environment and provides insight into program sustainability. Ultimately, the CMI measurement tool could facilitate better evaluation and program planning across public health programs. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Investigating end-to-end security in the fifth generation wireless capabilities and IoT extensions

    NASA Astrophysics Data System (ADS)

    Uher, J.; Harper, J.; Mennecke, R. G.; Patton, P.; Farroha, B.

    2016-05-01

    The emerging 5th generation wireless network will be architected and specified to meet the vision of allowing the billions of devices and millions of human users to share spectrum to communicate and deliver services. The expansion of wireless networks from its current role to serve these diverse communities of interest introduces new paradigms that require multi-tiered approaches. The introduction of inherently low security components, like IoT devices, necessitates that critical data be better secured to protect the networks and users. Moreover high-speed communications that are meant to enable the autonomous vehicles require ultra reliable and low latency paths. This research explores security within the proposed new architectures and the cross interconnection of the highly protected assets with low cost/low security components forming the overarching 5th generation wireless infrastructure.

  17. OOI CyberInfrastructure - Next Generation Oceanographic Research

    NASA Astrophysics Data System (ADS)

    Farcas, C.; Fox, P.; Arrott, M.; Farcas, E.; Klacansky, I.; Krueger, I.; Meisinger, M.; Orcutt, J.

    2008-12-01

    Software has become a key enabling technology for scientific discovery, observation, modeling, and exploitation of natural phenomena. New value emerges from the integration of individual subsystems into networked federations of capabilities exposed to the scientific community. Such data-intensive interoperability networks are crucial for future scientific collaborative research, as they open up new ways of fusing data from different sources and across various domains, and analysis on wide geographic areas. The recently established NSF OOI program, through its CyberInfrastructure component addresses this challenge by providing broad access from sensor networks for data acquisition up to computational grids for massive computations and binding infrastructure facilitating policy management and governance of the emerging system-of-scientific-systems. We provide insight into the integration core of this effort, namely, a hierarchic service-oriented architecture for a robust, performant, and maintainable implementation. We first discuss the relationship between data management and CI crosscutting concerns such as identity management, policy and governance, which define the organizational contexts for data access and usage. Next, we detail critical services including data ingestion, transformation, preservation, inventory, and presentation. To address interoperability issues between data represented in various formats we employ a semantic framework derived from the Earth System Grid technology, a canonical representation for scientific data based on DAP/OPeNDAP, and related data publishers such as ERDDAP. Finally, we briefly present the underlying transport based on a messaging infrastructure over the AMQP protocol, and the preservation based on a distributed file system through SDSC iRODS.

  18. 77 FR 24594 - Version 4 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-25

    ... framework for the identification and protection of ``Critical Cyber Assets'' to support the reliable... documentation of Critical Cyber Assets associated with ``Critical Assets'' that support the reliable operation... ``Critical Cyber Assets'' that are associated with ``Critical Assets'' to support the reliable operation of...

  19. Operations Research Support for Critical Infrastructure Resilience in the Province of British Columbia

    DTIC Science & Technology

    2012-10-01

    support for various aspects of CI resilience in BC since 2008, initially for the Vancouver 2010 Olympic and Paralympic Winter Games and, subsequently... Paralympic Winter Games (V2010). Under this project, DRDC provided critical infrastructure (CI) support to two groups: the Integrated Security Unit (ISU...BC since 2008, initially for the Vancouver 2010 Olympic and Paralympic Winter Games and, subsequently, for the development of Emergency Management

  20. Impact of Underwater Explosions on Concrete Bridge Foundations

    DTIC Science & Technology

    2016-06-01

    www.theconstructioncivil.org/ [16] M. Aggour, A. Hachichi and M. Mayer, “Nondestructive evaluation of timber bridge piles,” in Proceedings of a Session a Structure Congress...detonation must be executed a safe distance from any critical infrastructure to ensure the survivability of the structure . This thesis implements...be executed a safe distance from any critical infrastructure to ensure the survivability of the structure . This thesis implements the Dynamic System

  1. A Roadmap for Recovery/Decontamination Plan for Critical Infrastructure after CBRN Event Involving Drinking Water Utilities: Scoping Study

    DTIC Science & Technology

    2014-05-01

    A Roadmap for Recovery/Decontamination Plan for Critical Infrastructure after CBRN Event Involving Drinking Water Utilities: Scoping Study... Drinking Water Utilities was supported by the Canadian Safety and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre...after CBRN Event Involving Drinking Water Utilities Scoping Study Prepared by: Vladimir Blinov Konstantin Volchek Emergencies Science and

  2. Information Technology: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    DTIC Science & Technology

    2007-05-01

    services by implementing a disaster recovery plan to restore an organization’s critical business functions. (DRII 2004). ISO 27001 An information...the International Organization for Standardization ( ISO )), the IT SSP bases the terms and definitions on those in the NIPP because the SSP is an annex...International Organization for Standardization/International Electrotechnical Commission ( ISO /IEC) 27000 Series, Information technology—Security

  3. Critical Infrastructure Protection: How to Assess and Provide Remedy to Vulnerabilities in Telecom Hotels

    DTIC Science & Technology

    2006-09-01

    Telecommunications and Information Administration Telecom Telecommunications Telco Telecommunications Company VBIED Vehicle Borne Improvised Explosive... effect the damage to one system or sector would have on another. These concentrations of the sector’s key assets are becoming attractive targets even...critical U.S. infrastructures, such as the nation’s telephone system . Companies make it easier to control their networks from remote locations to save

  4. Identifying Cybersecurity Risks to Critical Infrastructure Act of 2012

    THOMAS, 112th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2012-07-26

    House - 08/15/2012 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Managing Critical Infrastructures C.I.M. Suite

    ScienceCinema

    Dudenhoeffer, Donald

    2018-05-23

    See how a new software package developed by INL researchers could help protect infrastructure during natural disasters, terrorist attacks and electrical outages. For more information about INL research, visit http://www.facebook.com/idahonationallaboratory.

  6. Simulating economic effects of disruptions in the telecommunications infrastructure.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cox, Roger Gary; Barton, Dianne Catherine; Reinert, Rhonda K.

    2004-01-01

    CommAspen is a new agent-based model for simulating the interdependent effects of market decisions and disruptions in the telecommunications infrastructure on other critical infrastructures in the U.S. economy such as banking and finance, and electric power. CommAspen extends and modifies the capabilities of Aspen-EE, an agent-based model previously developed by Sandia National Laboratories to analyze the interdependencies between the electric power system and other critical infrastructures. CommAspen has been tested on a series of scenarios in which the communications network has been disrupted, due to congestion and outages. Analysis of the scenario results indicates that communications networks simulated by themore » model behave as their counterparts do in the real world. Results also show that the model could be used to analyze the economic impact of communications congestion and outages.« less

  7. Geovisualization applications to examine and explore high-density and hierarchical critical infrastructure data

    NASA Astrophysics Data System (ADS)

    Edsall, Robert; Hembree, Harvey

    2018-05-01

    The geospatial research and development team in the National and Homeland Security Division at Idaho National Laboratory was tasked with providing tools to derive insight from the substantial amount of data currently available - and continuously being produced - associated with the critical infrastructure of the US. This effort is in support of the Department of Homeland Security, whose mission includes the protection of this infrastructure and the enhancement of its resilience to hazards, both natural and human. We present geovisual-analytics-based approaches for analysis of vulnerabilities and resilience of critical infrastructure, designed so that decision makers, analysts, and infrastructure owners and managers can manage risk, prepare for hazards, and direct resources before and after an incident that might result in an interruption in service. Our designs are based on iterative discussions with DHS leadership and analysts, who in turn will use these tools to explore and communicate data in partnership with utility providers, law enforcement, and emergency response and recovery organizations, among others. In most cases these partners desire summaries of large amounts of data, but increasingly, our users seek the additional capability of focusing on, for example, a specific infrastructure sector, a particular geographic region, or time period, or of examining data in a variety of generalization or aggregation levels. These needs align well with tenets of in-formation-visualization design; in this paper, selected applications among those that we have designed are described and positioned within geovisualization, geovisual analytical, and information visualization frameworks.

  8. The Pedagogy of Complex Work Support Systems: Infrastructuring Practices and the Production of Critical Awareness in Risk Auditing

    ERIC Educational Resources Information Center

    Mathisen, Arve; Nerland, Monika

    2012-01-01

    This paper employs a socio-technical perspective to explore the role of complex work support systems in organising knowledge and providing opportunities for learning in professional work. Drawing on concepts from infrastructure studies, such systems are seen as work infrastructures which connect information, knowledge, standards and work…

  9. Science of Security Lablet - Scalability and Usability

    DTIC Science & Technology

    2014-12-16

    mobile computing [19]. However, the high-level infrastructure design and our own implementation (both described throughout this paper) can easily...critical and infrastructural systems demands high levels of sophistication in the technical aspects of cybersecurity, software and hardware design...Forget, S. Komanduri, Alessandro Acquisti, Nicolas Christin, Lorrie Cranor, Rahul Telang. "Security Behavior Observatory: Infrastructure for Long-term

  10. 76 FR 58730 - Version 4 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-22

    ... provide a cybersecurity framework for the identification and protection of ``Critical Cyber Assets'' to... the identification and documentation of Critical Cyber Assets associated with Critical Assets that... Standards provide a cybersecurity framework for the identification and protection of ``Critical Cyber Assets...

  11. Building Stronger State Partnerships with the US Department of Energy (Energy Assurance)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mike Keogh

    2011-09-30

    From 2007 until 2011, the National Association of Regulatory Utility Commissioners (NARUC) engaged in a partnership with the National Energy Technology Lab (NETL) to improve State-Federal coordination on electricity policy and energy assurance issues. This project allowed State Public Utility Commissioners and their staffs to engage on the most cutting-edge level in the arenas of energy assurance and electricity policy. Four tasks were outlined in the Statement of Performance Objectives: Task 1 - Training for Commissions on Critical Infrastructure Topics; Task 2 - Analyze and Implement Recommendations on Energy Assurance Issues; Task 3 - Ongoing liaison activities & outreach tomore » build stronger networks between federal agencies and state regulators; and Task 4 - Additional Activities. Although four tasks were prescribed, in practice these tasks were carried out under two major activity areas: the critical infrastructure and energy assurance partnership with the US Department of Energy's Infrastructure Security and Emergency Response office, and the National Council on Electricity Policy, a collaborative which since 1994 has brought together State and Federal policymakers to address the most pressing issues facing the grid from restructuring to smart grid implementation. On Critical Infrastructure protection, this cooperative agreement helped State officials yield several important advances. The lead role on NARUC's side was played by our Committee on Critical Infrastructure Protection. Key lessons learned in this arena include the following: (1) Tabletops and exercises work - They improve the capacity of policymakers and their industry counterparts to face the most challenging energy emergencies, and thereby equip these actors with the capacity to face everything up to that point as well. (2) Information sharing is critical - Connecting people who need information with people who have information is a key success factor. However, exposure of critical infrastructure information to bad actors also creates new vulnerabilities. (3) Tensions exist between the transparency-driven basis of regulatory activity and the information-protection requirements of asset protection. (4) Coordination between states is a key success factor - Because comparatively little federal authority exists over electricity and other energy infrastructure, the interstate nature of these energy grids defy centralized command and control governance. Patchwork responses are a risk when addressed at a state-by-state level. Coordination is the key to ensuring consistent response to shared threats. In Electricity Policy, the National Council on Electricity Policy continued to make important strides forward. Coordinated electricity policy among States remains the best surrogate for an absent national electricity policy. In every area from energy efficiency to clean coal, State policies are driving the country's electricity policy, and regional responses to climate change, infrastructure planning, market operation, and new technology deployment depend on a forum for bringing the States together.« less

  12. Application of Ontologies for Big Earth Data

    NASA Astrophysics Data System (ADS)

    Huang, T.; Chang, G.; Armstrong, E. M.; Boening, C.

    2014-12-01

    Connected data is smarter data! Earth Science research infrastructure must do more than just being able to support temporal, geospatial discovery of satellite data. As the Earth Science data archives continue to expand across NASA data centers, the research communities are demanding smarter data services. A successful research infrastructure must be able to present researchers the complete picture, that is, datasets with linked citations, related interdisciplinary data, imageries, current events, social media discussions, and scientific data tools that are relevant to the particular dataset. The popular Semantic Web for Earth and Environmental Terminology (SWEET) ontologies is a collection of ontologies and concepts designed to improve discovery and application of Earth Science data. The SWEET ontologies collection was initially developed to capture the relationships between keywords in the NASA Global Change Master Directory (GCMD). Over the years this popular ontologies collection has expanded to cover over 200 ontologies and 6000 concepts to enable scalable classification of Earth system science concepts and Space science. This presentation discusses the semantic web technologies as the enabling technology for data-intensive science. We will discuss the application of the SWEET ontologies as a critical component in knowledge-driven research infrastructure for some of the recent projects, which include the DARPA Ontological System for Context Artifact and Resources (OSCAR), 2013 NASA ACCESS Virtual Quality Screening Service (VQSS), and the 2013 NASA Sea Level Change Portal (SLCP) projects. The presentation will also discuss the benefits in using semantic web technologies in developing research infrastructure for Big Earth Science Data in an attempt to "accommodate all domains and provide the necessary glue for information to be cross-linked, correlated, and discovered in a semantically rich manner." [1] [1] Savas Parastatidis: A platform for all that we know: creating a knowledge-driven research infrastructure. The Fourth Paradigm 2009: 165-172

  13. Development of a public health nursing data infrastructure.

    PubMed

    Monsen, Karen A; Bekemeier, Betty; P Newhouse, Robin; Scutchfield, F Douglas

    2012-01-01

    An invited group of national public health nursing (PHN) scholars, practitioners, policymakers, and other stakeholders met in October 2010 identifying a critical need for a national PHN data infrastructure to support PHN research. This article summarizes the strengths, limitations, and gaps specific to PHN data and proposes a research agenda for development of a PHN data infrastructure. Future implications are suggested, such as issues related to the development of the proposed PHN data infrastructure and future research possibilities enabled by the infrastructure. Such a data infrastructure has potential to improve accountability and measurement, to demonstrate the value of PHN services, and to improve population health. © 2012 Wiley Periodicals, Inc.

  14. 77 FR 21989 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ... Advisors email the form to the individual who then emails back the completed form, minus their date and... official who nominated the applicant and by the Assistant Secretary for Infrastructure Protection. Upon...

  15. A risk assessment methodology for critical transportation infrastructure.

    DOT National Transportation Integrated Search

    2002-01-01

    Infrastructure protection typifies a problem of risk assessment and management in a large-scale system. This study offers a methodological framework to identify, prioritize, assess, and manage risks. It includes the following major considerations: (1...

  16. 75 FR 29336 - North American Electric Reliability Corporation; Notice of Filing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-25

    ... (VSL) assignments for Version 1 of the Critical Infrastructure Protection (CIP) Reliability Standards... Infrastructure Protection Reliability Standards, 130 FERC ] 61,211 at PP 23, 28, 31-33 (2010) (March 18 CIP VSL...

  17. 32 CFR 240.4 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... enterprise information infrastructure requirements. (c) The academic disciplines, with concentrations in IA..., computer systems analysis, cyber operations, cybersecurity, database administration, data management... infrastructure development and academic research to support the DoD IA/IT critical areas of interest. ...

  18. 32 CFR 240.4 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... enterprise information infrastructure requirements. (c) The academic disciplines, with concentrations in IA..., computer systems analysis, cyber operations, cybersecurity, database administration, data management... infrastructure development and academic research to support the DoD IA/IT critical areas of interest. ...

  19. 32 CFR 240.4 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... enterprise information infrastructure requirements. (c) The academic disciplines, with concentrations in IA..., computer systems analysis, cyber operations, cybersecurity, database administration, data management... infrastructure development and academic research to support the DoD IA/IT critical areas of interest. ...

  20. Operable Data Management for Ocean Observing Systems

    NASA Astrophysics Data System (ADS)

    Chavez, F. P.; Graybeal, J. B.; Godin, M. A.

    2004-12-01

    As oceanographic observing systems become more numerous and complex, data management solutions must follow. Most existing oceanographic data management systems fall into one of three categories: they have been developed as dedicated solutions, with limited application to other observing systems; they expect that data will be pre-processed into well-defined formats, such as netCDF; or they are conceived as robust, generic data management solutions, with complexity (high) and maturity and adoption rates (low) to match. Each approach has strengths and weaknesses; no approach yet fully addresses, nor takes advantage of, the sophistication of ocean observing systems as they are now conceived. In this presentation we describe critical data management requirements for advanced ocean observing systems, of the type envisioned by ORION and IOOS. By defining common requirements -- functional, qualitative, and programmatic -- for all such ocean observing systems, the performance and nature of the general data management solution can be characterized. Issues such as scalability, maintaining metadata relationships, data access security, visualization, and operational flexibility suggest baseline architectural characteristics, which may in turn lead to reusable components and approaches. Interoperability with other data management systems, with standards-based solutions in metadata specification and data transport protocols, and with the data management infrastructure envisioned by IOOS and ORION, can also be used to define necessary capabilities. Finally, some requirements for the software infrastructure of ocean observing systems can be inferred. Early operational results and lessons learned, from development and operations of MBARI ocean observing systems, are used to illustrate key requirements, choices, and challenges. Reference systems include the Monterey Ocean Observing System (MOOS), its component software systems (Software Infrastructure and Applications for MOOS, and the Shore Side Data System), and the Autonomous Ocean Sampling Network (AOSN).

  1. Modeling anthropogenic and natural fire ignitions in an inner-alpine valley

    NASA Astrophysics Data System (ADS)

    Vacchiano, Giorgio; Foderi, Cristiano; Berretti, Roberta; Marchi, Enrico; Motta, Renzo

    2018-03-01

    Modeling and assessing the factors that drive forest fire ignitions is critical for fire prevention and sustainable ecosystem management. In southern Europe, the anthropogenic component of wildland fire ignitions is especially relevant. In the Alps, however, the role of fire as a component of disturbance regimes in forest and grassland ecosystems is poorly known. The aim of this work is to model the probability of fire ignition for an Alpine region in Italy using a regional wildfire archive (1995-2009) and MaxEnt modeling. We analyzed separately (i) winter forest fires, (ii) winter fires on grasslands and fallow land, and (iii) summer fires. Predictors were related to morphology, climate, and land use; distance from infrastructures, number of farms, and number of grazing animals were used as proxies for the anthropogenic component. Collinearity among predictors was reduced by a principal component analysis. Regarding ignitions, 30 % occurred in agricultural areas and 24 % in forests. Ignitions peaked in the late winter-early spring. Negligence from agrosilvicultural activities was the main cause of ignition (64 %); lightning accounted for 9 % of causes across the study time frame, but increased from 6 to 10 % between the first and second period of analysis. Models for all groups of fire had a high goodness of fit (AUC 0.90-0.95). Temperature was proportional to the probability of ignition, and precipitation was inversely proportional. Proximity from infrastructures had an effect only on winter fires, while the density of grazing animals had a remarkably different effect on summer (positive correlation) and winter (negative) fires. Implications are discussed regarding climate change, fire regime changes, and silvicultural prevention. Such a spatially explicit approach allows us to carry out spatially targeted fire management strategies and may assist in developing better fire management plans.

  2. Remote Sensing of Arctic Environmental Conditions and Critical Infrastructure using Infra-Red (IR) Cameras and Unmanned Air Vehicles (UAVs)

    NASA Astrophysics Data System (ADS)

    Hatfield, M. C.; Webley, P.; Saiet, E., II

    2014-12-01

    Remote Sensing of Arctic Environmental Conditions and Critical Infrastructure using Infra-Red (IR) Cameras and Unmanned Air Vehicles (UAVs) Numerous scientific and logistical applications exist in Alaska and other arctic regions requiring analysis of expansive, remote areas in the near infrared (NIR) and thermal infrared (TIR) bands. These include characterization of wild land fire plumes and volcanic ejecta, detailed mapping of lava flows, and inspection of lengthy segments of critical infrastructure, such as the Alaska pipeline and railroad system. Obtaining timely, repeatable, calibrated measurements of these extensive features and infrastructure networks requires localized, taskable assets such as UAVs. The Alaska Center for Unmanned Aircraft Systems Integration (ACUASI) provides practical solutions to these problem sets by pairing various IR sensors with a combination of fixed-wing and multi-rotor air vehicles. Fixed-wing assets, such as the Insitu ScanEagle, offer long reach and extended duration capabilities to quickly access remote locations and provide enduring surveillance of the target of interest. Rotary-wing assets, such as the Aeryon Scout or the ACUASI-built Ptarmigan hexcopter, provide a precision capability for detailed horizontal mapping or vertical stratification of atmospheric phenomena. When included with other ground capabilities, we will show how they can assist in decision support and hazard assessment as well as giving those in emergency management a new ability to increase knowledge of the event at hand while reducing the risk to all involved. Here, in this presentation, we illustrate how UAV's can provide the ideal tool to map and analyze the hazardous events and critical infrastructure under extreme environmental conditions.

  3. Towards the cyber security paradigm of ehealth: Resilience and design aspects

    NASA Astrophysics Data System (ADS)

    Rajamäki, Jyri; Pirinen, Rauno

    2017-06-01

    Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.

  4. Modelling a critical infrastructure-driven spatial database for proactive disaster management: A developing country context

    PubMed Central

    Baloye, David O.

    2016-01-01

    The understanding and institutionalisation of the seamless link between urban critical infrastructure and disaster management has greatly helped the developed world to establish effective disaster management processes. However, this link is conspicuously missing in developing countries, where disaster management has been more reactive than proactive. The consequence of this is typified in poor response time and uncoordinated ways in which disasters and emergency situations are handled. As is the case with many Nigerian cities, the challenges of urban development in the city of Abeokuta have limited the effectiveness of disaster and emergency first responders and managers. Using geospatial techniques, the study attempted to design and deploy a spatial database running a web-based information system to track the characteristics and distribution of critical infrastructure for effective use during disaster and emergencies, with the purpose of proactively improving disaster and emergency management processes in Abeokuta.

  5. Forewarning of Failure in Complex Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Hively, Lee M; Prowell, Stacy J

    2011-01-01

    As the critical infrastructures of the United States have become more and more dependent on public and private networks, the potential for widespread national impact resulting from disruption or failure of these networks has also increased. Securing the nation s critical infrastructures requires protecting not only their physical systems but, just as important, the cyber portions of the systems on which they rely. A failure is inclusive of random events, design flaws, and instabilities caused by cyber (and/or physical) attack. One such domain is failure in critical equipment. A second is aging bridges. We discuss the workings of such amore » system in the context of the necessary sensors, command and control and data collection as well as the cyber security efforts that would support this system. Their application and the implications of this computing architecture are also discussed, with respect to our nation s aging infrastructure.« less

  6. Cyberwarfare on the Electricity Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Murarka, N.; Ramesh, V.C.

    2000-03-20

    The report analyzes the possibility of cyberwarfare on the electricity infrastructure. The ongoing deregulation of the electricity industry makes the power grid all the more vulnerable to cyber attacks. The report models the power system information system components, models potential threats and protective measures. It therefore offers a framework for infrastructure protection.

  7. A Virtual Environment for Resilient Infrastructure Modeling and Design

    DTIC Science & Technology

    2015-09-01

    Security CI Critical Infrastructure CID Center for Infrastructure Defense CSV Comma Separated Value DAD Defender-Attacker-Defender DHS Department...responses to disruptive events (e.g., cascading failure behavior) in a context- rich , controlled environment for exercises, education, and training...The general attacker-defender (AD) and defender-attacker-defender ( DAD ) models for CI are defined in Brown et al. (2006). These models help

  8. DoD Cybersecurity Discipline Implementation Plan

    DTIC Science & Technology

    2016-02-01

    provided email services are disabled for commercial mobile devices. N/A Commanders and Supervisors must ensure all servers and network infrastructure ... infrastructure physically and logically. All of these protections come from security measures that are already required. This line of effort supports...networks and critical infrastructure . These threats and risks have been recognized by DoD for several years, and the Department has responded with

  9. Cyber Compendium, Professional Continuing Education Course Papers. Volume 2, Issue 1, Spring 2015

    DTIC Science & Technology

    2015-01-01

    250,000 mobile devices.23 Cutting just 20% of this infrastructure would translate to a potential savings of over $7 Billion per year. Air...BYOD device extends beyond the device itself. There is the supporting infrastructure such as the Mobile Application Store (MAS), which provides access...96 Prioritizing Cyber Capabilities: to Protect U.S. Critical Infrastructure

  10. An autonomous structural health monitoring system for Waiau interchange.

    DOT National Transportation Integrated Search

    2013-03-01

    Bridge infrastructure is a critical element of the transportation system which makes maintaining its safety and : performance vital to a healthy society. However, the civil infrastructure systems in the United States are decaying : at an accelerated ...

  11. Safety impacts of bicycle infrastructure: A critical review.

    PubMed

    DiGioia, Jonathan; Watkins, Kari Edison; Xu, Yanzhi; Rodgers, Michael; Guensler, Randall

    2017-06-01

    This paper takes a critical look at the present state of bicycle infrastructure treatment safety research, highlighting data needs. Safety literature relating to 22 bicycle treatments is examined, including findings, study methodologies, and data sources used in the studies. Some preliminary conclusions related to research efficacy are drawn from the available data and findings in the research. While the current body of bicycle safety literature points toward some defensible conclusions regarding the safety and effectiveness of certain bicycle treatments, such as bike lanes and removal of on-street parking, the vast majority treatments are still in need of rigorous research. Fundamental questions arise regarding appropriate exposure measures, crash measures, and crash data sources. This research will aid transportation departments with regard to decisions about bicycle infrastructure and guide future research efforts toward understanding safety impacts of bicycle infrastructure. Copyright © 2017 Elsevier Ltd and National Safety Council. All rights reserved.

  12. Utilizing Semantic Big Data for realizing a National-scale Infrastructure Vulnerability Analysis System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chinthavali, Supriya; Shankar, Mallikarjun

    Critical Infrastructure systems(CIs) such as energy, water, transportation and communication are highly interconnected and mutually dependent in complex ways. Robust modeling of CIs interconnections is crucial to identify vulnerabilities in the CIs. We present here a national-scale Infrastructure Vulnerability Analysis System (IVAS) vision leveraging Se- mantic Big Data (SBD) tools, Big Data, and Geographical Information Systems (GIS) tools. We survey existing ap- proaches on vulnerability analysis of critical infrastructures and discuss relevant systems and tools aligned with our vi- sion. Next, we present a generic system architecture and discuss challenges including: (1) Constructing and manag- ing a CI network-of-networks graph,more » (2) Performing analytic operations at scale, and (3) Interactive visualization of ana- lytic output to generate meaningful insights. We argue that this architecture acts as a baseline to realize a national-scale network based vulnerability analysis system.« less

  13. Investing in soils as an infrastructure to maintain and enhance food water and carbon services

    NASA Astrophysics Data System (ADS)

    Davies, Jessica

    2017-04-01

    Soils are a life support system for global society and our planet. In addition to providing the vast majority of our food; soils regulate water quality and quantity reducing the risk of floods, droughts and pollution; and as the largest store of carbon in the earth system they are critical to climate change. By providing these multiple essential services, soils act a natural form of infrastructure that is critical to supporting both rural and urban communities and economies. Can natural infrastructure and natural capital concepts be used to motivate and enable investment and regulation of soils for purposes such as soil carbon sequestration? What scientific knowledge and tools would we need to support soil infrastructure decision making - in policy arenas and elsewhere? This poster will present progress from a new research project supported by the UK research council (EP/N030532/1) that addresses these questions.

  14. Pressure sensitivity analysis of fiber Bragg grating sensors

    NASA Astrophysics Data System (ADS)

    Mrad, Nezih; Sridharan, Vasant; Kazemi, Alex

    2014-09-01

    Recent development in fiber optic sensing technology has mainly focused on discrete sensing, particularly, sensing systems with potential multiplexing and multi-parameter capabilities. Bragg grating fiber optic sensors have emerged as the non-disputed champion for multiplexing and simultaneous multi-parameter sensing for emerging high value structural components, advanced processing and manufacturing capabilities and increased critical infrastructure resilience applications. Although the number of potential applications for this sensing technology is large and spans the domains of medicine, manufacturing, aerospace, and public safety; critical issues such as fatigue life, sensitivity, accuracy, embeddability, material/sensor interface integrity, and universal demodulation systems still need to be addressed. The purpose of this paper is to primarily evaluate Commercial-Of-The-Shelf (COTS) Fiber Bragg Grating (FBG) sensors' sensitivity to pressure, often neglected in several applications. The COTS fiber sensitivity to pressure is further evaluated for two types of coatings (Polyimide and Acrylate), and different arrangements (arrayed and single).

  15. FOSS Tools for Research Infrastructures - A Success Story?

    NASA Astrophysics Data System (ADS)

    Stender, V.; Schroeder, M.; Wächter, J.

    2015-12-01

    Established initiatives and mandated organizations, e.g. the Initiative for Scientific Cyberinfrastructures (NSF, 2007) or the European Strategy Forum on Research Infrastructures (ESFRI, 2008), promote and foster the development of sustainable research infrastructures. The basic idea behind these infrastructures is the provision of services supporting scientists to search, visualize and access data, to collaborate and exchange information, as well as to publish data and other results. Especially the management of research data is gaining more and more importance. In geosciences these developments have to be merged with the enhanced data management approaches of Spatial Data Infrastructures (SDI). The Centre for GeoInformationTechnology (CeGIT) at the GFZ German Research Centre for Geosciences has the objective to establish concepts and standards of SDIs as an integral part of research infrastructure architectures. In different projects, solutions to manage research data for land- and water management or environmental monitoring have been developed based on a framework consisting of Free and Open Source Software (FOSS) components. The framework provides basic components supporting the import and storage of data, discovery and visualization as well as data documentation (metadata). In our contribution, we present our data management solutions developed in three projects, Central Asian Water (CAWa), Sustainable Management of River Oases (SuMaRiO) and Terrestrial Environmental Observatories (TERENO) where FOSS components build the backbone of the data management platform. The multiple use and validation of tools helped to establish a standardized architectural blueprint serving as a contribution to Research Infrastructures. We examine the question of whether FOSS tools are really a sustainable choice and whether the increased efforts of maintenance are justified. Finally it should help to answering the question if the use of FOSS for Research Infrastructures is a success story.

  16. Private Sector Investment in Pakistani Agriculture: The Role of Infrastructural Investment

    DTIC Science & Technology

    1999-01-01

    private sector will be expected to play the major role in providing capital to the agricultural sector, with the government’s remaining involvement being largely one of furnishing basic infrastructure. The critical question of course is how willing is the private sector to commit capital to agricultural activities in this new policy environment? Has the private sector responded in the past to the increases in profitability provided by an expansion in infrastructure? If so, what types of infrastructure are most conducive in

  17. A new vision of the post-NIST civil infrastructure program: the challenges of next-generation construction materials and processes

    NASA Astrophysics Data System (ADS)

    Wu, H. Felix; Wan, Yan

    2014-03-01

    Our nation's infrastructural systems are crumbling. The deteriorating process grows over time. The physical aging of these vital facilities and the remediation of their current critical state pose a key societal challenge to the United States. Current sensing technologies, while well developed in controlled laboratory environments, have not yet yielded tools for producing real-time, in-situ data that are adequately comprehensible for infrastructure decision-makers. The need for advanced sensing technologies is national because every municipality and state in the nation faces infrastructure management challenges. The need is critical because portions of infrastructure are reaching the end of their life-spans and there are few cost-effective means to monitor infrastructure integrity and to prioritize the renovation and replacement of infrastructure elements. New advanced sensing technologies that produce cost-effective inspection and real-time monitoring data, and that can also help or aid in meaningful interpretation of the acquired data, therefore will enhance the safety in regard to the public on structural integrity by issuing timely and accurate alert data for effective maintenance to avoid disasters happening. New advanced sensing technologies also allow more informed management of infrastructural investments by avoiding premature replacement of infrastructure and identifying those structures in need of immediate action to prevent from catastrophic failure. Infrastructure management requires that once a structural defect is detected, an economical and efficient repair be made. Advancing the technologies of repairing infrastructure elements in contact with water, road salt, and subjected to thermal changes requires innovative research to significantly extend the service life of repairs, lower the costs of repairs, and provide repair technologies that are suitable for a wide range of conditions. All these new technologies will provide increased lifetimes, security, and safety of elements of critical infrastructure for the Nation's already deteriorating civil infrastructure. It is envisioned that the Nation should look far beyond: not only should we efficiently and effectively address current problems of the aging infrastructure, but we must also further develop next-generation construction materials and processes for new construction. To accomplish this ambitious goal, we must include process efficiency that will help select the most reliable and cost-effective materials in construction processes; performance and cost will be the prime consideration for selections construction materials based on life-cycle cost and materials performance; energy efficiency will drive reduced energy consumption from current levels by 50 % per unit of output; and environmental responsiveness will achieve net-zero waste from construction materials and its constituents. Should it be successfully implemented, we will transform the current 21st century infrastructure systems to enable the vital functioning of society and improve competitiveness of the economy to ensure that our quality of life remains high.

  18. Rapid assessment of infrastructure of primary health care facilities - a relevant instrument for health care systems management.

    PubMed

    Scholz, Stefan; Ngoli, Baltazar; Flessa, Steffen

    2015-05-01

    Health care infrastructure constitutes a major component of the structural quality of a health system. Infrastructural deficiencies of health services are reported in literature and research. A number of instruments exist for the assessment of infrastructure. However, no easy-to-use instruments to assess health facility infrastructure in developing countries are available. Present tools are not applicable for a rapid assessment by health facility staff. Therefore, health information systems lack data on facility infrastructure. A rapid assessment tool for the infrastructure of primary health care facilities was developed by the authors and pilot-tested in Tanzania. The tool measures the quality of all infrastructural components comprehensively and with high standardization. Ratings use a 2-1-0 scheme which is frequently used in Tanzanian health care services. Infrastructural indicators and indices are obtained from the assessment and serve for reporting and tracing of interventions. The tool was pilot-tested in Tanga Region (Tanzania). The pilot test covered seven primary care facilities in the range between dispensary and district hospital. The assessment encompassed the facilities as entities as well as 42 facility buildings and 80 pieces of technical medical equipment. A full assessment of facility infrastructure was undertaken by health care professionals while the rapid assessment was performed by facility staff. Serious infrastructural deficiencies were revealed. The rapid assessment tool proved a reliable instrument of routine data collection by health facility staff. The authors recommend integrating the rapid assessment tool in the health information systems of developing countries. Health authorities in a decentralized health system are thus enabled to detect infrastructural deficiencies and trace the effects of interventions. The tool can lay the data foundation for district facility infrastructure management.

  19. A GIS Inventory of Critical Coastal Infrastructure Land Use in Caribbean Island Small Island Developing States: Classification and Criteria Methodology

    NASA Astrophysics Data System (ADS)

    D'aversa, N.; Becker, A.; Bove, G.

    2017-12-01

    Caribbean Small Island Developing States (SIDS) face significant natural hazard risks, as demonstrated by recent Hurricanes Jose, Irma, and Maria. Scientists project storms to become more intense and sea level rise to increase over the next century. As a result, the Inter-American Development Bank projections suggest that Caribbean nations could face climate-related losses in excess of $22 billion annually by 2050. Critical infrastructure that supports island economies, such as airports, seaports, cruise ports, and energy facilities, are typically located in the coastal zone with high exposure to natural hazards. Despite the increasing danger from climate driven natural hazards in coastal zones in the region, there is very little data available to identify how much land and associated infrastructure is at risk. This work focuses on the criteria and data standards developed for this new region-wide GIS database, which will then be used to formulate a risk assessment. Results will be integrated into a single, comprehensive source for data of lands identified as critical coastal infrastructure and used to address such questions as: How much of the Caribbean SIDS infrastructure lands are at risk from sea level rise? How might demand for such lands change in the future, based on historical trends? Answers to these questions will help decision makers understand how to prioritize resilience investment decisions in the coming decades.

  20. Nevada Infrastructure for Climate Change Science, Education, and Outreach

    NASA Astrophysics Data System (ADS)

    Dana, G. L.; Piechota, T. C.; Lancaster, N.; Mensing, S. A.

    2009-12-01

    The Nevada system of Higher Education, including the University of Nevada, Las Vegas, the University of Nevada, Reno, the Desert Research Institute, and Nevada State College have begun a five year research and infrastructure building program, funded by the National Science Foundation Experimental Program to Stimulate Competitive Research (NSF EPSCoR) with the vision “to create a statewide interdisciplinary program and virtual climate change center that will stimulate transformative research, education, and outreach on the effects of regional climate change on ecosystem resources (especially water) and support use of this knowledge by policy makers and stakeholders.” Six major strategies are proposed: 1) Develop a capability to model climate change and its effects at a regional and sub-regional scales to evaluate different future scenarios and strategies (Climate Modeling Component) 2) Develop data collection, modeling, and visualization infrastructure to determine and analyze effects on ecosystems and disturbance regimes (Ecological Change Component) 3) Develop data collection, modeling, and visualization infrastructure to better quantify and model changes in water balance and resources under climate change (Water Resources Component) 4) Develop data collection and modeling infrastructure to assess effects on human systems, responses to institutional and societal aspects, and enhance policy making and outreach to communities and stakeholders (Policy, Decision-Making, and Outreach Component) 5) Develop a data portal and software to support interdisciplinary research via integration of data from observational networks and modeling (Cyberinfrastructure Component) and 6) Develop educational infrastructure to train students at all levels and provide public outreach in climate change issues (Education Component). As part of the new infrastructure, two observational transects will be established across Great Basin Ranges, one in southern Nevada in the Spring Mountains, and the second to be located in the Snake Range of eastern Nevada which will reach bristlecone pine stands. Climatic, hydrologic and ecological data from these transects will be downloaded into high capacity data storage units and made available to researchers through creation of the Nevada climate change portal. Our research will aim to answer two interdisciplinary science questions: 1) How will climate change affect water resources and linked ecosystem resources and human systems? And 2) How will climate change affect disturbance regimes (e.g., wildland fires, invasive species, insect outbreaks, droughts) and linked systems?

  1. Geriatric infrastructure, BRAC, and ecosystem service markets? End-of-life decisions for dams, roads, and offshore platforms (Invited)

    NASA Astrophysics Data System (ADS)

    Doyle, M. W.

    2010-12-01

    US infrastructure expanded dramatically in the mid-20th century, and now includes more than 79,000 dams, 15,000 miles of levees, 3.7 million miles of roads, 600,000 miles of sewer pipe, 500,000 onshore oil wells, and over 4,000 offshore oil platforms. Many structures have been in place for 50 years or more, and an increasing portion of national infrastructure is approaching or exceeding its originally intended design life. Bringing national infrastructure to acceptable levels would cost nearly 10% of the US annual GDP. Decommissioning infrastructure can decrease public spending and increase public safety while facilitating economic expansion and ecological restoration. While most infrastructure remains critical to the national economy, a substantial amount is obsolete or declining in importance. Over 11,000 dams are abandoned, and of nearly 400,000 miles of road on its lands, the U.S. Forest Service considers one-fourth non-essential and often non-functional. Removing obsolete infrastructure allows greater focus and funding on maintaining or improving infrastructure most critical to society. Moreover, a concerted program of infrastructure decommissioning promises significant long-term cost savings, and is a necessary step before more substantial, systematic changes are possible, like those needed to address the new energy sources and shifting climate. One key challenge for infrastructure reform is how to prioritize and implement such a widespread and politically-charged series of decisions. Two approaches are proposed for different scales. For small, private infrastructure, emerging state and federal ecosystem service markets can provide an economic impetus to push infrastructure removal. Ecosystem market mechanisms may also be most effective at identifying those projects with the greatest ecological bang for the buck. Examples where this approach has proved successful include dam removal for stream mitigation under the Clean Water Act, and levee decommissioning on the Missouri and Iowa Rivers for wildlife conservation areas. Programs that link offshore oil platform decommissioning to marine conservation areas are also notable examples of creative linkages between infrastructure and conservation efforts. For federal infrastructure, the forthcoming Water Resources Development Act (WRDA) should include a BRAC-like program. Faced with a number of aging military bases, the Department of Defense (DOD) began identifying installations it would rather close than maintain or modernize. Overcoming political hurdles was accomplished via the Base Realignment and Closure Commission (BRAC), a bi-partisan commission that buffered politicians by creating a slate of closures for Congress and the President to approve or scuttle in toto. From 1988-2005, BRACs closed > 125 military installations, saving > $50 billion. DOD advocated BRAC because it increased efficiency by focusing funding on those bases central to DODs mission, and removed base funding decisions from political influence. Regardless of the approach, society must develop approaches from which to base difficult end-of-life decisions for infrastructure. In most cases, removing obsolete infrastructure can allow focus on infrastructure that remains critical to society.

  2. Assessing urban strategies for reducing the impacts of extreme weather on infrastructure networks.

    PubMed

    Pregnolato, Maria; Ford, Alistair; Robson, Craig; Glenis, Vassilis; Barr, Stuart; Dawson, Richard

    2016-05-01

    Critical infrastructure networks, including transport, are crucial to the social and economic function of urban areas but are at increasing risk from natural hazards. Minimizing disruption to these networks should form part of a strategy to increase urban resilience. A framework for assessing the disruption from flood events to transport systems is presented that couples a high-resolution urban flood model with transport modelling and network analytics to assess the impacts of extreme rainfall events, and to quantify the resilience value of different adaptation options. A case study in Newcastle upon Tyne in the UK shows that both green roof infrastructure and traditional engineering interventions such as culverts or flood walls can reduce transport disruption from flooding. The magnitude of these benefits depends on the flood event and adaptation strategy, but for the scenarios considered here 3-22% improvements in city-wide travel times are achieved. The network metric of betweenness centrality, weighted by travel time, is shown to provide a rapid approach to identify and prioritize the most critical locations for flood risk management intervention. Protecting just the top ranked critical location from flooding provides an 11% reduction in person delays. A city-wide deployment of green roofs achieves a 26% reduction, and although key routes still flood, the benefits of this strategy are more evenly distributed across the transport network as flood depths are reduced across the model domain. Both options should form part of an urban flood risk management strategy, but this method can be used to optimize investment and target limited resources at critical locations, enabling green infrastructure strategies to be gradually implemented over the longer term to provide city-wide benefits. This framework provides a means of prioritizing limited financial resources to improve resilience. This is particularly important as flood management investments must typically exceed a far higher benefit-cost threshold than transport infrastructure investments. By capturing the value to the transport network from flood management interventions, it is possible to create new business models that provide benefits to, and enhance the resilience of, both transport and flood risk management infrastructures. Further work will develop the framework to consider other hazards and infrastructure networks.

  3. Assessing urban strategies for reducing the impacts of extreme weather on infrastructure networks

    PubMed Central

    Pregnolato, Maria; Ford, Alistair; Robson, Craig; Glenis, Vassilis; Barr, Stuart; Dawson, Richard

    2016-01-01

    Critical infrastructure networks, including transport, are crucial to the social and economic function of urban areas but are at increasing risk from natural hazards. Minimizing disruption to these networks should form part of a strategy to increase urban resilience. A framework for assessing the disruption from flood events to transport systems is presented that couples a high-resolution urban flood model with transport modelling and network analytics to assess the impacts of extreme rainfall events, and to quantify the resilience value of different adaptation options. A case study in Newcastle upon Tyne in the UK shows that both green roof infrastructure and traditional engineering interventions such as culverts or flood walls can reduce transport disruption from flooding. The magnitude of these benefits depends on the flood event and adaptation strategy, but for the scenarios considered here 3–22% improvements in city-wide travel times are achieved. The network metric of betweenness centrality, weighted by travel time, is shown to provide a rapid approach to identify and prioritize the most critical locations for flood risk management intervention. Protecting just the top ranked critical location from flooding provides an 11% reduction in person delays. A city-wide deployment of green roofs achieves a 26% reduction, and although key routes still flood, the benefits of this strategy are more evenly distributed across the transport network as flood depths are reduced across the model domain. Both options should form part of an urban flood risk management strategy, but this method can be used to optimize investment and target limited resources at critical locations, enabling green infrastructure strategies to be gradually implemented over the longer term to provide city-wide benefits. This framework provides a means of prioritizing limited financial resources to improve resilience. This is particularly important as flood management investments must typically exceed a far higher benefit–cost threshold than transport infrastructure investments. By capturing the value to the transport network from flood management interventions, it is possible to create new business models that provide benefits to, and enhance the resilience of, both transport and flood risk management infrastructures. Further work will develop the framework to consider other hazards and infrastructure networks. PMID:27293781

  4. Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences

    DTIC Science & Technology

    2004-09-02

    Consequences 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7...OSLGCP now administers the grants programs. 30According to the guidance, threat assessment determines the relative likelihood of a known potential...information on critical infrastructure assets. The Office of State and Local Government Coordination and Preparedness (OSLGCP) administers two grant

  5. Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences

    DTIC Science & Technology

    2005-02-04

    Consequences 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7...OSLGCP). The OSLGCP now administers the grants programs. 37 According to the guidance, threat assessment determines the relative likelihood of a...Preparedness (OSLGCP) administers two grant programs that give states the opportunity to identify critical infrastructure assets: the State Homeland Security

  6. The National Plan for Research and Development In Support of Critical Infrastructure Protection

    DTIC Science & Technology

    2004-01-01

    vulnerabilities and highlight areas for improvement. As part of this effort, CIP &CP has cre- ated a research and development agenda aimed at improving...Infrastructure Protection Research and Development Plan 13 LONG-TERM DIRECTION PROVIDED BY THE CIP R&D PLAN The creation of a national critical...Research and Development Plan 20 Mapping to Other National R&D Plans The many R&D plans outside the direct context of CIP underway within DHS, other

  7. Impacts of climate change and variability on transportation systems and infrastructure : Gulf Coast study, phase I

    DOT National Transportation Integrated Search

    2008-03-01

    Climate affects the design, construction, safety, operations, and maintenance of transportation : infrastructure and systems. The prospect of a changing climate raises critical questions : regarding how alterations in temperature, precipitation, stor...

  8. Intercity passenger rail : Congress faces critical decisions in developing a national policy

    DOT National Transportation Integrated Search

    2002-04-11

    This document is the statement of JayEtta Z. Hecker, Director, Physical Infrastructure. Testimony before the Subcommittee on Railroads, Committee on Transportation and Infrastructure, House of Representatives on the future of intercity passenger rail...

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ehlen, Mark Andrew; Vugrin, Eric D.; Warren, Drake E.

    In recent years, the nation has recognized that critical infrastructure protection should consider not only the prevention of disruptive events, but also the processes that infrastructure systems undergo to maintain functionality following disruptions. This more comprehensive approach has been termed critical infrastructure resilience (CIR). Given the occurrence of a particular disruptive event, the resilience of a system to that event is the system's ability to efficiently reduce both the magnitude and duration of the deviation from targeted system performance levels. Sandia National Laboratories (Sandia) has developed a comprehensive resilience assessment framework for evaluating the resilience of infrastructure and economic systems.more » The framework includes a quantitative methodology that measures resilience costs that result from a disruption to infrastructure function. The framework also includes a qualitative analysis methodology that assesses system characteristics that affect resilience in order to provide insight and direction for potential improvements to resilience. This paper describes the resilience assessment framework. This paper further demonstrates the utility of the assessment framework through application to a hypothetical scenario involving the disruption of a petrochemical supply chain by a hurricane.« less

  10. Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Franusich, Michael D.

    SpiralGen, Inc. built a proof-of-concept toolkit for enhancing the cyber security of nuclear power plants and other critical infrastructure with high-assurance instrumentation and control code. The toolkit is based on technology from the DARPA High-Assurance Cyber Military Systems (HACMS) program, which has focused on applying the science of formal methods to the formidable set of problems involved in securing cyber physical systems. The primary challenges beyond HACMS in developing this toolkit were to make the new technology usable by control system engineers and compatible with the regulatory and commercial constraints of the nuclear power industry. The toolkit, packaged as amore » Simulink add-on, allows a system designer to assemble a high-assurance component from formally specified and proven blocks and generate provably correct control and monitor code for that subsystem.« less

  11. An Encryption Scheme for Communication Internet SCADA Components

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Supervisory Control and Data Acquisition Systems (SCADA) through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  12. Infrastructure for Big Data in the Intensive Care Unit.

    PubMed

    Zelechower, Javier; Astudillo, José; Traversaro, Francisco; Redelico, Francisco; Luna, Daniel; Quiros, Fernan; San Roman, Eduardo; Risk, Marcelo

    2017-01-01

    The Big Data paradigm can be applied in intensive care unit, in order to improve the treatment of the patients, with the aim of customized decisions. This poster is about the infrastructure necessary to built a Big Data system for the ICU. Together with the infrastructure, the conformation of a multidisciplinary team is essential to develop Big Data to use in critical care medicine.

  13. Stochastic Hybrid Systems Modeling and Middleware-enabled DDDAS for Next-generation US Air Force Systems

    DTIC Science & Technology

    2017-03-30

    experimental evaluations for hosting DDDAS-like applications in public cloud infrastructures . Finally, we report on ongoing work towards using the DDDAS...developed and their experimental evaluations for hosting DDDAS-like applications in public cloud infrastructures . Finally, we report on ongoing work towards...Dynamic resource management, model learning, simulation-based optimizations, cloud infrastructures for DDDAS applications. I. INTRODUCTION Critical cyber

  14. Innovative Decentralized Decision-Making Enabling Capability on Mobile Edge Devices

    DTIC Science & Technology

    2015-09-01

    feasibility of adapting mobile device infrastructure into a future tactical cloud ecosystem. F. SCOPE The scope of this research is focused on the...critical to mobility : wireless infrastructure , the mobile device itself, and mobile applications” (Office of the Department of Defense Chief Information... Infrastructure to a Cost Effective and Platform Agnostic Environment; 3) Collaborate with DOD and Industry Partners to Develop a Classified Mobile Device

  15. Scalable collaborative risk management technology for complex critical systems

    NASA Technical Reports Server (NTRS)

    Campbell, Scott; Torgerson, Leigh; Burleigh, Scott; Feather, Martin S.; Kiper, James D.

    2004-01-01

    We describe here our project and plans to develop methods, software tools, and infrastructure tools to address challenges relating to geographically distributed software development. Specifically, this work is creating an infrastructure that supports applications working over distributed geographical and organizational domains and is using this infrastructure to develop a tool that supports project development using risk management and analysis techniques where the participants are not collocated.

  16. Sustainable infrastructure system modeling under uncertainties and dynamics

    NASA Astrophysics Data System (ADS)

    Huang, Yongxi

    Infrastructure systems support human activities in transportation, communication, water use, and energy supply. The dissertation research focuses on critical transportation infrastructure and renewable energy infrastructure systems. The goal of the research efforts is to improve the sustainability of the infrastructure systems, with an emphasis on economic viability, system reliability and robustness, and environmental impacts. The research efforts in critical transportation infrastructure concern the development of strategic robust resource allocation strategies in an uncertain decision-making environment, considering both uncertain service availability and accessibility. The study explores the performances of different modeling approaches (i.e., deterministic, stochastic programming, and robust optimization) to reflect various risk preferences. The models are evaluated in a case study of Singapore and results demonstrate that stochastic modeling methods in general offers more robust allocation strategies compared to deterministic approaches in achieving high coverage to critical infrastructures under risks. This general modeling framework can be applied to other emergency service applications, such as, locating medical emergency services. The development of renewable energy infrastructure system development aims to answer the following key research questions: (1) is the renewable energy an economically viable solution? (2) what are the energy distribution and infrastructure system requirements to support such energy supply systems in hedging against potential risks? (3) how does the energy system adapt the dynamics from evolving technology and societal needs in the transition into a renewable energy based society? The study of Renewable Energy System Planning with Risk Management incorporates risk management into its strategic planning of the supply chains. The physical design and operational management are integrated as a whole in seeking mitigations against the potential risks caused by feedstock seasonality and demand uncertainty. Facility spatiality, time variation of feedstock yields, and demand uncertainty are integrated into a two-stage stochastic programming (SP) framework. In the study of Transitional Energy System Modeling under Uncertainty, a multistage stochastic dynamic programming is established to optimize the process of building and operating fuel production facilities during the transition. Dynamics due to the evolving technologies and societal changes and uncertainty due to demand fluctuations are the major issues to be addressed.

  17. LEGOS: Object-based software components for mission-critical systems. Final report, June 1, 1995--December 31, 1997

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1998-08-01

    An estimated 85% of the installed base of software is a custom application with a production quantity of one. In practice, almost 100% of military software systems are custom software. Paradoxically, the marginal costs of producing additional units are near zero. So why hasn`t the software market, a market with high design costs and low productions costs evolved like other similar custom widget industries, such as automobiles and hardware chips? The military software industry seems immune to market pressures that have motivated a multilevel supply chain structure in other widget industries: design cost recovery, improve quality through specialization, and enablemore » rapid assembly from purchased components. The primary goal of the ComponentWare Consortium (CWC) technology plan was to overcome barriers to building and deploying mission-critical information systems by using verified, reusable software components (Component Ware). The adoption of the ComponentWare infrastructure is predicated upon a critical mass of the leading platform vendors` inevitable adoption of adopting emerging, object-based, distributed computing frameworks--initially CORBA and COM/OLE. The long-range goal of this work is to build and deploy military systems from verified reusable architectures. The promise of component-based applications is to enable developers to snap together new applications by mixing and matching prefabricated software components. A key result of this effort is the concept of reusable software architectures. A second important contribution is the notion that a software architecture is something that can be captured in a formal language and reused across multiple applications. The formalization and reuse of software architectures provide major cost and schedule improvements. The Unified Modeling Language (UML) is fast becoming the industry standard for object-oriented analysis and design notation for object-based systems. However, the lack of a standard real-time distributed object operating system, lack of a standard Computer-Aided Software Environment (CASE) tool notation and lack of a standard CASE tool repository has limited the realization of component software. The approach to fulfilling this need is the software component factory innovation. The factory approach takes advantage of emerging standards such as UML, CORBA, Java and the Internet. The key technical innovation of the software component factory is the ability to assemble and test new system configurations as well as assemble new tools on demand from existing tools and architecture design repositories.« less

  18. Multiphysics Application Coupling Toolkit

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Campbell, Michael T.

    2013-12-02

    This particular consortium implementation of the software integration infrastructure will, in large part, refactor portions of the Rocstar multiphysics infrastructure. Development of this infrastructure originated at the University of Illinois DOE ASCI Center for Simulation of Advanced Rockets (CSAR) to support the center's massively parallel multiphysics simulation application, Rocstar, and has continued at IllinoisRocstar, a small company formed near the end of the University-based program. IllinoisRocstar is now licensing these new developments as free, open source, in hopes to help improve their own and others' access to infrastructure which can be readily utilized in developing coupled or composite software systems;more » with particular attention to more rapid production and utilization of multiphysics applications in the HPC environment. There are two major pieces to the consortium implementation, the Application Component Toolkit (ACT), and the Multiphysics Application Coupling Toolkit (MPACT). The current development focus is the ACT, which is (will be) the substrate for MPACT. The ACT itself is built up from the components described in the technical approach. In particular, the ACT has the following major components: 1.The Component Object Manager (COM): The COM package provides encapsulation of user applications, and their data. COM also provides the inter-component function call mechanism. 2.The System Integration Manager (SIM): The SIM package provides constructs and mechanisms for orchestrating composite systems of multiply integrated pieces.« less

  19. GOMMA: a component-based infrastructure for managing and analyzing life science ontologies and their evolution

    PubMed Central

    2011-01-01

    Background Ontologies are increasingly used to structure and semantically describe entities of domains, such as genes and proteins in life sciences. Their increasing size and the high frequency of updates resulting in a large set of ontology versions necessitates efficient management and analysis of this data. Results We present GOMMA, a generic infrastructure for managing and analyzing life science ontologies and their evolution. GOMMA utilizes a generic repository to uniformly and efficiently manage ontology versions and different kinds of mappings. Furthermore, it provides components for ontology matching, and determining evolutionary ontology changes. These components are used by analysis tools, such as the Ontology Evolution Explorer (OnEX) and the detection of unstable ontology regions. We introduce the component-based infrastructure and show analysis results for selected components and life science applications. GOMMA is available at http://dbs.uni-leipzig.de/GOMMA. Conclusions GOMMA provides a comprehensive and scalable infrastructure to manage large life science ontologies and analyze their evolution. Key functions include a generic storage of ontology versions and mappings, support for ontology matching and determining ontology changes. The supported features for analyzing ontology changes are helpful to assess their impact on ontology-dependent applications such as for term enrichment. GOMMA complements OnEX by providing functionalities to manage various versions of mappings between two ontologies and allows combining different match approaches. PMID:21914205

  20. Nitrogen dioxide sequestration using demolished concrete and its potential application in transportation infrastructure development : final report.

    DOT National Transportation Integrated Search

    2016-04-01

    Achieving environmental sustainability of the US transportation infrastructure via more environmentally sound construction is not a trivial task. Our : proposal, which addresses this critical area, is aiming at transforming concrete, the material of ...

  1. IEEE TRANSACTIONS ON CYBERNETICS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig R. RIeger; David H. Scheidt; William D. Smart

    2014-11-01

    MODERN societies depend on complex and critical infrastructures for energy, transportation, sustenance, medical care, emergency response, communications security. As computers, automation, and information technology (IT) have advanced, these technologies have been exploited to enhance the efficiency of operating the processes that make up these infrastructures

  2. Integration of Mobil Satellite and Cellular Systems

    NASA Technical Reports Server (NTRS)

    Drucker, E. H.; Estabrook, P.; Pinck, D.; Ekroot, L.

    1993-01-01

    By integrating the ground based infrastructure component of a mobile satellite system with the infrastructure systems of terrestrial 800 MHz cellular service providers, a seamless network of universal coverage can be established.

  3. Strategies for 96-hour critical infrastructure compliance.

    PubMed

    Storbakken, Steven H; Kendall, Shannon; Lackey, Connie

    2009-01-01

    Organizations that stand the best chance at survival following a disaster do so because they can depend on the sharing of resources and mutual ideologies, the authors claim, pointing out that when it comes to strategizing for 96-hour critical infrastructure compliance, it is important to keep at the forefront not only the idea of collaborative planning from within the organization--involving security and safety, clinical, facilities and administrative staffs--but also includes collaborative planning with the local and regional businesses surrounding the organization.

  4. Green Infrastructure Opportunities that Arise During Municipal Operations

    EPA Pesticide Factsheets

    This document provides approaches that local government officials and municipal program managers in small to midsize communities can use to incorporate green infrastructure components into work they are doing in public spaces.

  5. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    NASA Astrophysics Data System (ADS)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  6. A secure and efficiently searchable health information architecture.

    PubMed

    Yasnoff, William A

    2016-06-01

    Patient-centric repositories of health records are an important component of health information infrastructure. However, patient information in a single repository is potentially vulnerable to loss of the entire dataset from a single unauthorized intrusion. A new health record storage architecture, the personal grid, eliminates this risk by separately storing and encrypting each person's record. The tradeoff for this improved security is that a personal grid repository must be sequentially searched since each record must be individually accessed and decrypted. To allow reasonable search times for large numbers of records, parallel processing with hundreds (or even thousands) of on-demand virtual servers (now available in cloud computing environments) is used. Estimated search times for a 10 million record personal grid using 500 servers vary from 7 to 33min depending on the complexity of the query. Since extremely rapid searching is not a critical requirement of health information infrastructure, the personal grid may provide a practical and useful alternative architecture that eliminates the large-scale security vulnerabilities of traditional databases by sacrificing unnecessary searching speed. Copyright © 2016 Elsevier Inc. All rights reserved.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Onyeji, Ijeoma; Bazilian, Morgan; Bronk, Chris

    Both the number and security implications of sophisticated cyber attacks on companies providing critical energy infrastructures are increasing. As power networks and, to a certain extent, oil and gas infrastructure both upstream and downstream, are becoming increasingly integrated with information communication technology systems, they are growing more susceptible to cyber attacks.

  8. Spatial correlation of auroral zone geomagnetic variations

    NASA Astrophysics Data System (ADS)

    Jackel, B. J.; Davalos, A.

    2016-12-01

    Magnetic field perturbations in the auroral zone are produced by a combination of distant ionospheric and local ground induced currents. Spatial and temporal structure of these currents is scientifically interesting and can also have a significant influence on critical infrastructure.Ground-based magnetometer networks are an essential tool for studying these phenomena, with the existing complement of instruments in Canada providing extended local time coverage. In this study we examine the spatial correlation between magnetic field observations over a range of scale lengths. Principal component and canonical correlation analysis are used to quantify relationships between multiple sites. Results could be used to optimize network configurations, validate computational models, and improve methods for empirical interpolation.

  9. Information Assurance in Wireless Networks

    NASA Astrophysics Data System (ADS)

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  10. Designing for resilience

    NASA Astrophysics Data System (ADS)

    Dwivedi, Anurag

    2014-06-01

    The motivation for this work comes from a desire to improve resilience of mission critical cyber enabled systems including those used in critical infrastructure domains such as cyber, power, water, fuel, financial, healthcare, agriculture, and manufacturing. Resilience can be defined as the ability of a system to persistently meet its performance requirements despite the occurrence of adverse events. Characterizing the resilience of a system requires a clear definition of the performance requirements of the system of interest and an ability to quantify the impact on performance by the adverse events of concern. A quantitative characterization of system resilience allows the resilience requirements to be included in the system design criteria. Resilience requirements of a system are derived from the service level agreements (SLAs), measures of effectiveness (MOEs), and measures of performance (MOPs) of the services or missions supported by the system. This paper describes a methodology for designing resilient systems. The components of the methodology include resilience characterization for threat models associated with various exposure modes, requirements mapping, subsystem ranking based on criticality, and selective implementation of mitigations to improve system resilience to a desired level.

  11. Estimating maquiladora hazardous waste generation on the U.S./Mexico border

    NASA Astrophysics Data System (ADS)

    Bowen, Mace M.; Kontuly, Thomas; Hepner, George F.

    1995-03-01

    Maquiladoras, manufacturing plants that primarily assemble foreign components for reexport, are located in concentrations along the northern frontier of the US/Mexico border. These plants process a wide variety of materials using modern industrial technologies within the context of developing world institutions and infrastructure. Hazardous waste generation by maquiladoras represents a critical environmental management issue because of the spatial concentration of these plants in border municipalities where the infrastructure for waste management is nonexistent or poor. These border municipalities contain rapidly increasing populations, which further stress their waste handling infrastructure capacities while exposing their populations to greater contaminant risks. Limited empirical knowledge exists concerning hazardous waste types and generation rates from maquiladorsas. There is no standard reporting method for waste generation or methodology for estimating generation rates at this time. This paper presents a method that can be used for the rapid assessment of hazardous waste generation. A first approximation of hazardous waste generation is produced for maquiladoras in the three municipalities of Nogales, Sonora, Mexicali, Baja California, and Cd. Juarez, Chihuahua, using the INVENT model developed by the World Bank. In addition, our intent is to evaluate the potential of the INVENT model for adaptation to the US/Mexico border industrial situation. The press of border industrial development, especially with the recent adoption of the NAFTA, make such assessments necessary as a basis for the environmental policy formulation and management needed in the immediate future.

  12. Ultrasonic imaging for concrete infrastructure condition assessment and quality assurance.

    DOT National Transportation Integrated Search

    2017-04-01

    This report describes work on laboratory and field performance reviews of an ultrasonic shear wave imaging device called MIRA : for application to plain and reinforced concrete infrastructure components. Potential applications investigated included b...

  13. Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations

    NASA Astrophysics Data System (ADS)

    Görbil, Gökçe; Gelenbe, Erol

    The simulation of critical infrastructures (CI) can involve the use of diverse domain specific simulators that run on geographically distant sites. These diverse simulators must then be coordinated to run concurrently in order to evaluate the performance of critical infrastructures which influence each other, especially in emergency or resource-critical situations. We therefore describe the design of an adaptive communication middleware that provides reliable and real-time one-to-one and group communications for federations of CI simulators over a wide-area network (WAN). The proposed middleware is composed of mobile agent-based peer-to-peer (P2P) overlays, called virtual networks (VNets), to enable resilient, adaptive and real-time communications over unreliable and dynamic physical networks (PNets). The autonomous software agents comprising the communication middleware monitor their performance and the underlying PNet, and dynamically adapt the P2P overlay and migrate over the PNet in order to optimize communications according to the requirements of the federation and the current conditions of the PNet. Reliable communications is provided via redundancy within the communication middleware and intelligent migration of agents over the PNet. The proposed middleware integrates security methods in order to protect the communication infrastructure against attacks and provide privacy and anonymity to the participants of the federation. Experiments with an initial version of the communication middleware over a real-life networking testbed show that promising improvements can be obtained for unicast and group communications via the agent migration capability of our middleware.

  14. 77 FR 62521 - National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-15

    ... oral comments after the presentation of the report from the Regional Resilience Working Group. We... a presentation from the NIAC Regional Resilience Working Group documenting their work to date on the Regional Resilience Study, which includes the role and impact of critical infrastructure on regional...

  15. 44 CFR 201.4 - Standard State Mitigation Plans.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... State owned or operated buildings, infrastructure, and critical facilities located in the identified... vulnerable to damage and loss associated with hazard events. State owned or operated critical facilities...

  16. 44 CFR 201.4 - Standard State Mitigation Plans.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... State owned or operated buildings, infrastructure, and critical facilities located in the identified... vulnerable to damage and loss associated with hazard events. State owned or operated critical facilities...

  17. Accounting for Poverty in Infrastructure Reform: Learning from Latin America's Experience. WBI Development Studies.

    ERIC Educational Resources Information Center

    Estache, Antonio; Foster, Vivien; Wodon, Quentin

    This book explores the connections between infrastructure reform and poverty alleviation in Latin America based on a detailed analysis of the effects of a decade of reforms. The book demonstrates that because the access to, and affordability of, basic services is still a major problem, infrastructure investment will be a core component of poverty…

  18. The TENCompetence Infrastructure: A Learning Network Implementation

    NASA Astrophysics Data System (ADS)

    Vogten, Hubert; Martens, Harrie; Lemmers, Ruud

    The TENCompetence project developed a first release of a Learning Network infrastructure to support individuals, groups and organisations in professional competence development. This infrastructure Learning Network infrastructure was released as open source to the community thereby allowing users and organisations to use and contribute to this development as they see fit. The infrastructure consists of client applications providing the user experience and server components that provide the services to these clients. These services implement the domain model (Koper 2006) by provisioning the entities of the domain model (see also Sect. 18.4) and henceforth will be referenced as domain entity services.

  19. The Role of GIS and Data Librarians in Cyber-infrastructure Support and Governance

    NASA Astrophysics Data System (ADS)

    Branch, B. D.

    2012-12-01

    A governance road-map for cyber-infrastructure in the geosciences will include an intentional librarian core capable of technical skills that include GIS and open source support for data curation that involves all aspects of data life cycle management. Per Executive Order 12906 and other policy; spatial data, literacy, and curation are critical cyber-infrastructure needs in the near future. A formal earth science and space informatics librarian may be an outcome of such development. From e-science to e-research, STEM pipelines need librarians as critical data intermediaries in technical assistance and collaboration efforts with scientists' data and outreach needs. Future training concerns should advocate trans-disciplinary data science and policy skills that will be necessary for data management support and procurement.

  20. Cafe: A Generic Configurable Customizable Composite Cloud Application Framework

    NASA Astrophysics Data System (ADS)

    Mietzner, Ralph; Unger, Tobias; Leymann, Frank

    In this paper we present Cafe (Composite Application Framework) an approach to describe configurable composite service-oriented applications and to automatically provision them across different providers. Cafe enables independent software vendors to describe their composite service-oriented applications and the components that are used to assemble them. Components can be internal to the application or external and can be deployed in any of the delivery models present in the cloud. The components are annotated with requirements for the infrastructure they later need to be run on. Providers on the other hand advertise their infrastructure services by describing them as infrastructure capabilities. The separation of software vendors and providers enables end users and providers to follow a best-of-breed strategy by combining arbitrary applications with arbitrary providers. We show how such applications can be automatically provisioned and present an architecture and a prototype that implements the concepts.

  1. Challenges for the Protection of Critical ICT-Based Financial Infrastructures

    NASA Astrophysics Data System (ADS)

    Hämmerli, Bernhard M.; Arendt, Henning H.

    A workshop was held in Frankfurt during September 24-25, 2007, in order to initiate a dialogue between financial industry (FI) stakeholders and Europe’s top-level research community. The workshop focused on identifying research and development challenges for the protection of critical ICT-based financial infrastructures for the next 5 years: “Protection of Massively Distributed Critical Financial Services” and “Trust in New Value Added Business Chains”. The outcome of the workshop contributed to the development of the research agenda from the perspectives of three working groups. A number of project ideas were spawned based on the workshop, including a coordination actions project entitled PARSIFAL, which this paper will focus on.

  2. "Dancing on the edge of research" - What is needed to build and sustain research capacity within the massage therapy profession? A formative evaluation.

    PubMed

    Kania-Richmond, Ania; Menard, Martha B; Barberree, Beth; Mohring, Marvin

    2017-04-01

    Conducting research on massage therapy (MT) continues to be a significant challenge. To explore and identify the structures, processes, and resources required to enable viable, sustainable and high quality MT research activities in the Canadian context. Academically-based researchers and MT professionals involved in research. Formative evaluation and a descriptive qualitative approach were applied. Five main themes regarding the requirements of a productive and sustainable MT research infrastructure in Canada were identified: 1) core components, 2) variable components, 3) varying perspectives of stakeholder groups, 4) barriers to creating research infrastructure, and 5) negative metaphors. In addition, participants offered a number of recommendations on how to develop such an infrastructure. While barriers exist that require attention, participants' insights suggest there are various pathways through which a productive and sustainable MT research infrastructure can be achieved. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. A General Purpose High Performance Linux Installation Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wachsmann, Alf

    2002-06-17

    With more and more and larger and larger Linux clusters, the question arises how to install them. This paper addresses this question by proposing a solution using only standard software components. This installation infrastructure scales well for a large number of nodes. It is also usable for installing desktop machines or diskless Linux clients, thus, is not designed for cluster installations in particular but is, nevertheless, highly performant. The infrastructure proposed uses PXE as the network boot component on the nodes. It uses DHCP and TFTP servers to get IP addresses and a bootloader to all nodes. It then usesmore » kickstart to install Red Hat Linux over NFS. We have implemented this installation infrastructure at SLAC with our given server hardware and installed a 256 node cluster in 30 minutes. This paper presents the measurements from this installation and discusses the bottlenecks in our installation.« less

  4. The ATLAS Simulation Infrastructure

    DOE PAGES

    Aad, G.; Abbott, B.; Abdallah, J.; ...

    2010-09-25

    The simulation software for the ATLAS Experiment at the Large Hadron Collider is being used for large-scale production of events on the LHC Computing Grid. This simulation requires many components, from the generators that simulate particle collisions, through packages simulating the response of the various detectors and triggers. All of these components come together under the ATLAS simulation infrastructure. In this paper, that infrastructure is discussed, including that supporting the detector description, interfacing the event generation, and combining the GEANT4 simulation of the response of the individual detectors. Also described are the tools allowing the software validation, performance testing, andmore » the validation of the simulated output against known physics processes.« less

  5. Building green infrastructure via citizen participation - a six-year study in the Shepherd Creek

    EPA Science Inventory

    Green infrastructure at the parcel scale provides critical ecosystem goods and services when these services (such as flood mitigation) must be provided locally. Here we report on an approach that encourages suburban landowners to mitigate impervious surfaces on their properties t...

  6. U.S. National Cyberstrategy and Critical Infrastructure: The Protection Mandate and Its Execution

    DTIC Science & Technology

    2013-09-01

    revising this thesis, and balancing the coordination needed for: (1) Piano; (2) Soccer /Baseball; (3) Cubmaster Cub Scout Pack-135; (4) Hospitality...disease and pest response; and provides nutritional assistance. Provides the financial infrastructure of the nation. This sector consists of commercial

  7. Lifelong Learning: Workforce Development and Economic Success.

    ERIC Educational Resources Information Center

    Lee, Alice

    Lifelong learning through a strong, policy-supported information technology (IT) infrastructure is critical to the success of Asia Pacific Economic Cooperation (APEC) member economies. There is a great need to upgrade the quality of skills within the workforce, and there have been unprecedented investments in infrastructure and advanced…

  8. Development of a remote sensing network for time-sensitive detection of fine scale damage to transportation infrastructure : [final report].

    DOT National Transportation Integrated Search

    2015-09-23

    This research project aimed to develop a remote sensing system capable of rapidly identifying fine-scale damage to critical transportation infrastructure following hazard events. Such a system must be pre-planned for rapid deployment, automate proces...

  9. 3 CFR 8910 - Proclamation 8910 of November 30, 2012. Critical Infrastructure Protection and Resilience Month...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... also its vulnerabilities to emerging threats. Cyber incidents can have devastating consequences on both... against cyber risks, comprehensive legislation remains essential to improving infrastructure security, enhancing cyber information sharing between government and the private sector, and protecting the privacy...

  10. Tracking housing recovery in Sea Bright, NJ and the relationship to infrastructure renewal.

    DOT National Transportation Integrated Search

    2017-03-01

    Understanding how a community is recovering from a disaster is critical to being able to make investments in transportation infrastructure. This project is a follow up study to a 2014 study that looked at the recovery process in Sea Bright, New Jerse...

  11. New concept of critical infrastructure strengthening

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gazizov, Talgat R.; Orlov, Pavel E.; Zabolotsky, Alexander M.

    2016-06-08

    Strengthening of critical infrastructure is considered. Modal reservation of electronics is proposed as a new concept of the strengthening. The concept combines a widely used cold backup and a recently proposed modal filtration. It makes electronics reliable as well as protected against electromagnetic interference, especially the ultra-wide band pulses. New printed circuit board structure is suggested for implementation of the proposed concept. Results of simulation in time and frequency domains are presented for the suggested structures. Considerable attenuation of dangerous excitations shows that the new concept and structure are promising.

  12. Testbeds for Assessing Critical Scenarios in Power Control Systems

    NASA Astrophysics Data System (ADS)

    Dondossola, Giovanna; Deconinck, Geert; Garrone, Fabrizio; Beitollahi, Hakem

    The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility InfrastructurAL Resilience. The selected scenarios refer to power control systems encompassing information and communication security of SCADA systems for grid teleoperation, impact of attacks on inter-operator communications in power emergency conditions, impact of intentional faults on the secondary and tertiary control in power grids with distributed generators. Two testbeds have been developed for assessing the effect of the attacks and prototyping resilient architectures.

  13. Top Cyber: Developing the Top One Percent to Defeat the Advanced Persistent Threat

    DTIC Science & Technology

    2014-02-13

    Critical Infrastructure.” V3-CO-UK, 7 May 2013. http://www.v3.co.uk/v3-uk/news/2266397/us- government-chinese- hackers -have-the-skills-to-take-down...it is a source of great risk; and, for hackers , it is the super-highway to a target-rich environment. For the U.S. Government (USG), cyberspace is...worldwide. Ultimately, for all its benefits, the Internet presents an “Achilles’ Heel” in the defense of the nation’s Critical Infrastructure and Key

  14. Critical Foundations: Protecting America’s Infrastructures. The Report of the President’s Commission on Critical Infrastructure Protection.

    DTIC Science & Technology

    1997-10-13

    in Tokyo and bombings of the subway system in Paris, mass transit remains open and vulnerable to terrorist acts. Millions of miles of pipelines carry...Outside of "" C Risk Management Plan . Creates a Competitive Advantage , Not Considered Industry’s "• Protects Brand/ Franchise Responsibility- I ssue of...the out- set, the Commission considered expanding the scope of this sector to include food , health care and the nation’s work force as additional

  15. New Geodetic Infrastructure for Australia: The NCRIS / AuScope Geospatial Component

    NASA Astrophysics Data System (ADS)

    Tregoning, P.; Watson, C. S.; Coleman, R.; Johnston, G.; Lovell, J.; Dickey, J.; Featherstone, W. E.; Rizos, C.; Higgins, M.; Priebbenow, R.

    2009-12-01

    In November 2006, the Australian Federal Government announced AUS15.8M in funding for geospatial research infrastructure through the National Collaborative Research Infrastructure Strategy (NCRIS). Funded within a broader capability area titled ‘Structure and Evolution of the Australian Continent’, NCRIS has provided a significant investment across Earth imaging, geochemistry, numerical simulation and modelling, the development of a virtual core library, and geospatial infrastructure. Known collectively as AuScope (www.auscope.org.au), this capability area has brought together Australian’s leading Earth scientists to decide upon the most pressing scientific issues and infrastructure needs for studying Earth systems and their impact on the Australian continent. Importantly and at the same time, the investment in geospatial infrastructure offers the opportunity to raise Australian geodetic science capability to the highest international level into the future. The geospatial component of AuScope builds onto the AUS15.8M of direct funding through the NCRIS process with significant in-kind and co-investment from universities and State/Territory and Federal government departments. The infrastructure to be acquired includes an FG5 absolute gravimeter, three gPhone relative gravimeters, three 12.1 m radio telescopes for geodetic VLBI, a continent-wide network of continuously operating geodetic quality GNSS receivers, a trial of a mobile SLR system and access to updated cluster computing facilities. We present an overview of the AuScope geospatial capability, review the current status of the infrastructure procurement and discuss some examples of the scientific research that will utilise the new geospatial infrastructure.

  16. Application of GIS in exploring spatial dimensions of Efficiency in Competitiveness of Regions

    NASA Astrophysics Data System (ADS)

    Rahmat, Shahid; Sen, Joy

    2017-04-01

    Infrastructure is an important component in building competitiveness of a region. Present global scenario of economic slowdown that is led by slump in demand of goods and services and decreasing capacity of government institutions in investing public infrastructure. Strategy of augmenting competitiveness of a region can be built around improving efficient distribution of public infrastructure in the region. This efficiency in the distribution of infrastructure will reduce the burden of government institution and improve the relative output of the region in relative lesser investment. A rigorous literature study followed by an expert opinion survey (RIDIT scores) reveals that Railway, Road, ICTs and Electricity infrastructure is very crucial for better competitiveness of a region. Discussion with Experts in ICTs, Railways and Electricity sectors were conducted to find the issues, hurdles and possible solution for the development of these sectors. In an underdeveloped country like India, there is a large constrain of financial resources, for investment in infrastructure sector. Judicious planning for allocation of resources for infrastructure provisions becomes very important for efficient and sustainable development. Data Envelopment Analysis (DEA) is the mathematical programming optimization tool that measure technical efficiency of the multiple-input and/or multiple-output case by constructing a relative technical efficiency score. This paper tries to utilize DEA to identify the efficiency at which present level of selected components of Infrastructure (Railway, Road, ICTs and Electricity) is utilized in order to build competitiveness of the region. This paper tries to identify a spatial pattern of efficiency of Infrastructure with the help of spatial auto-correlation and Hot-spot analysis in Arc GIS. This analysis leads to policy implications for efficient allocation of financial resources for the provision of infrastructure in the region and building a prerequisite to boost an efficient Regional Competitiveness.

  17. BioPortal: An Open-Source Community-Based Ontology Repository

    NASA Astrophysics Data System (ADS)

    Noy, N.; NCBO Team

    2011-12-01

    Advances in computing power and new computational techniques have changed the way researchers approach science. In many fields, one of the most fruitful approaches has been to use semantically aware software to break down the barriers among disparate domains, systems, data sources, and technologies. Such software facilitates data aggregation, improves search, and ultimately allows the detection of new associations that were previously not detectable. Achieving these analyses requires software systems that take advantage of the semantics and that can intelligently negotiate domains and knowledge sources, identifying commonality across systems that use different and conflicting vocabularies, while understanding apparent differences that may be concealed by the use of superficially similar terms. An ontology, a semantically rich vocabulary for a domain of interest, is the cornerstone of software for bridging systems, domains, and resources. However, as ontologies become the foundation of all semantic technologies in e-science, we must develop an infrastructure for sharing ontologies, finding and evaluating them, integrating and mapping among them, and using ontologies in applications that help scientists process their data. BioPortal [1] is an open-source on-line community-based ontology repository that has been used as a critical component of semantic infrastructure in several domains, including biomedicine and bio-geochemical data. BioPortal, uses the social approaches in the Web 2.0 style to bring structure and order to the collection of biomedical ontologies. It enables users to provide and discuss a wide array of knowledge components, from submitting the ontologies themselves, to commenting on and discussing classes in the ontologies, to reviewing ontologies in the context of their own ontology-based projects, to creating mappings between overlapping ontologies and discussing and critiquing the mappings. Critically, it provides web-service access to all its content, enabling its integration in semantically enriched applications. [1] Noy, N.F., Shah, N.H., et al., BioPortal: ontologies and integrated data resources at the click of a mouse. Nucleic Acids Res, 2009. 37(Web Server issue): p. W170-3.

  18. Design-build agreements : a case study review of the included handover requirements.

    DOT National Transportation Integrated Search

    2009-04-01

    Road infrastructure is a key component of any regions transportation system. It allows : unprecedented levels of mobility, accessibility, and economic growth. On the other hand, the cost : associated with inadequate road infrastructure can amount ...

  19. Comparison of WinSLAMM Modeled Results with Monitored Biofiltration Data

    EPA Science Inventory

    The US EPA’s Green Infrastructure Demonstration project in Kansas City incorporates both small scale individual biofiltration device monitoring, along with large scale watershed monitoring. The test watershed (100 acres) is saturated with green infrastructure components (includin...

  20. Key Management Infrastructure Increment 2 (KMI Inc 2)

    DTIC Science & Technology

    2016-03-01

    2016 Major Automated Information System Annual Report Key Management Infrastructure Increment 2 (KMI Inc 2) Defense Acquisition Management...PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be Determined TY - Then...Assigned: April 6, 2015 Program Information Program Name Key Management Infrastructure Increment 2 (KMI Inc 2) DoD Component DoD The acquiring DoD

  1. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...

  2. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...

  3. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...

  4. 6 CFR 27.215 - Security vulnerability assessments.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...

  5. INNOVATION AND RESEARCH FOR WATER INFRASTRUCTURE FOR THE 21ST CENTURY RESEARCH PLAN

    EPA Science Inventory

    This plan has been developed to provide the Office of Research and Development (ORD) with a guide for implementing a research program that addresses high priority needs of the Nation relating to its drinking water and wastewater infrastructure. By identifying these critical need...

  6. 77 FR 37060 - Critical Infrastructure and Key Resources (CIKR) Asset Protection Technical Assistance Program...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-20

    ...), National Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP.../IP/IICD, 245 Murray Lane SW., Mailstop 0602, Arlington, VA 20598-0602. Email requests should go to... Technical Assistance Program (CAPTAP) is offered jointly by the NPPD/IP and the Federal Emergency Management...

  7. Intelligent Learning Infrastructure for Knowledge Intensive Organizations: A Semantic Web Perspective

    ERIC Educational Resources Information Center

    Lytras, Miltiadis, Ed.; Naeve, Ambjorn, Ed.

    2005-01-01

    In the context of Knowledge Society, the convergence of knowledge and learning management is a critical milestone. "Intelligent Learning Infrastructure for Knowledge Intensive Organizations: A Semantic Web Perspective" provides state-of-the art knowledge through a balanced theoretical and technological discussion. The semantic web perspective…

  8. Critical Homeland Infrastructure Protection

    DTIC Science & Technology

    2007-01-01

    talent. Examples include: * Detection of surveillance activities; * Stand-off detection of chemical, biological, nuclear, radiation and explosive ...Manager Guardian DARPA Overview Mr. Roger Gibbs DARPA LLNL Technologies in Support of Infrastructure Mr. Don Prosnitz LLNL Protection Sandia National...FP Antiterrorism/Force Protection CBRNE Chemical Biological Radiological Nuclear Explosive CERT Commuter Emergency Response Team CIA Central

  9. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, R. K.; Peters, Scott

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modifiedmore » and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.« less

  10. Cryptographic Key Management and Critical Risk Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and usedmore » as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.« less

  11. Policy and Policy Formulation Considerations for Incorporation of Secure Mobile Devices in USMC Ground Combat Units

    DTIC Science & Technology

    2014-09-01

    power. The wireless infrastructure is an expansion of the current DOD IE which can be leveraged to connect mobile capabilities and technologies. The...DOD must focus on three critical areas central to mobility : the wireless infrastructure , the devices themselves, and the applications the devices use... infrastructure to support mobile devices. – The intent behind this goal is to improve the existing wireless backbone to support secure voice, data, and video

  12. Energy-Water Nexus Knowledge Discovery Framework

    NASA Astrophysics Data System (ADS)

    Bhaduri, B. L.; Foster, I.; Chandola, V.; Chen, B.; Sanyal, J.; Allen, M.; McManamay, R.

    2017-12-01

    As demand for energy grows, the energy sector is experiencing increasing competition for water. With increasing population and changing environmental, socioeconomic scenarios, new technology and investment decisions must be made for optimized and sustainable energy-water resource management. This requires novel scientific insights into the complex interdependencies of energy-water infrastructures across multiple space and time scales. An integrated data driven modeling, analysis, and visualization capability is needed to understand, design, and develop efficient local and regional practices for the energy-water infrastructure components that can be guided with strategic (federal) policy decisions to ensure national energy resilience. To meet this need of the energy-water nexus (EWN) community, an Energy-Water Knowledge Discovery Framework (EWN-KDF) is being proposed to accomplish two objectives: Development of a robust data management and geovisual analytics platform that provides access to disparate and distributed physiographic, critical infrastructure, and socioeconomic data, along with emergent ad-hoc sensor data to provide a powerful toolkit of analysis algorithms and compute resources to empower user-guided data analysis and inquiries; and Demonstration of knowledge generation with selected illustrative use cases for the implications of climate variability for coupled land-water-energy systems through the application of state-of-the art data integration, analysis, and synthesis. Oak Ridge National Laboratory (ORNL), in partnership with Argonne National Laboratory (ANL) and researchers affiliated with the Center for International Earth Science Information Partnership (CIESIN) at Columbia University and State University of New York-Buffalo (SUNY), propose to develop this Energy-Water Knowledge Discovery Framework to generate new, critical insights regarding the complex dynamics of the EWN and its interactions with climate variability and change. An overarching objective of this project is to integrate impacts, adaptation, and vulnerability (IAV) science with emerging data science to meet the data analysis needs of the U.S. Department of Energy and partner federal agencies with respect to the EWN.

  13. Street tree structural differences and associated stormwater benefits in metropolitan Cincinnati, Ohio, USA

    EPA Science Inventory

    Green infrastructure approaches leverage vegetation and soil to improve environmental quality. Municipal street trees are crucial components of urban green infrastructure because they provide stormwater interception benefits and other ecosystem services. Thus, it is important to ...

  14. Developing self-cleaning and air purifying transportation infrastructure components to minimize environmental impact of transportation.

    DOT National Transportation Integrated Search

    2013-10-01

    Creating transportation infrastructure, which can clean up itself and contaminated air surrounding it, can be a : groundbreaking approach in addressing environmental challenges of our time. This project has explored a possibility of : depositing coat...

  15. INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project

    NASA Astrophysics Data System (ADS)

    D'Antonio, Salvatore; Romano, Luigi; Khelil, Abdelmajid; Suri, Neeraj

    The INSPIRE project aims at enhancing the European potential in the field of security by ensuring the protection of critical information infrastructures through (a) the identification of their vulnerabilities and (b) the development of innovative techniques for securing networked process control systems. To increase the resilience of such systems INSPIRE will develop traffic engineering algorithms, diagnostic processes and self-reconfigurable architectures along with recovery techniques. Hence, the core idea of the INSPIRE project is to protect critical information infrastructures by appropriately configuring, managing, and securing the communication network which interconnects the distributed control systems. A working prototype will be implemented as a final demonstrator of selected scenarios. Controls/Communication Experts will support project partners in the validation and demonstration activities. INSPIRE will also contribute to standardization process in order to foster multi-operator interoperability and coordinated strategies for securing lifeline systems.

  16. Escalating impacts of climate extremes on critical infrastructures in Europe.

    PubMed

    Forzieri, Giovanni; Bianchi, Alessandra; Silva, Filipe Batista E; Marin Herrera, Mario A; Leblois, Antoine; Lavalle, Carlo; Aerts, Jeroen C J H; Feyen, Luc

    2018-01-01

    Extreme climatic events are likely to become more frequent owing to global warming. This may put additional stress on critical infrastructures with typically long life spans. However, little is known about the risks of multiple climate extremes on critical infrastructures at regional to continental scales. Here we show how single- and multi-hazard damage to energy, transport, industrial, and social critical infrastructures in Europe are likely to develop until the year 2100 under the influence of climate change. We combine a set of high-resolution climate hazard projections, a detailed representation of physical assets in various sectors and their sensitivity to the hazards, and more than 1100 records of losses from climate extremes in a prognostic modelling framework. We find that damages could triple by the 2020s, multiply six-fold by mid-century, and amount to more than 10 times present damage of €3.4 billion per year by the end of the century due only to climate change. Damage from heatwaves, droughts in southern Europe, and coastal floods shows the most dramatic rise, but the risks of inland flooding, windstorms, and forest fires will also increase in Europe, with varying degrees of change across regions. Economic losses are highest for the industry, transport, and energy sectors. Future losses will not be incurred equally across Europe. Southern and south-eastern European countries will be most affected and, as a result, will probably require higher costs of adaptation. The findings of this study could aid in prioritizing regional investments to address the unequal burden of impacts and differences in adaptation capacities across Europe.

  17. A Vulnerability Index and Analysis for the Road Network of Rural Chile

    NASA Astrophysics Data System (ADS)

    Braun, Andreas; Stötzer, Johanna; Kubisch, Susanne; Dittrich, Andre; Keller, Sina

    2017-04-01

    Natural hazards impose considerable threats to the physical and socio-economic wellbeing of people, a fact, which is well understood and investigated for many regions. However, not only people are vulnerable. During the last decades, a considerable amount of literature has focussed the particular vulnerability of the critical infrastructure: for example road networks. Considering critical infrastructure, far less reliable information exists for many regions worldwide - particularly, regions outside of the so called developed world. Critical infrastructure is destroyed in many disasters, causing cascade and follow up effects, for instance, impediments during evacuation, rescue and during the resilience phase. These circumstances, which are general enough to be applied to most regions, aggravate in regions characterized by high disparities between the urban and the rural sphere. Peripheral rural areas are especially prone to get isolated due to defects of the few roads which connect them to larger urban centres (where, frequently, disaster and emergency actors are situated). The rural area of Central Chile is a appropriate example for these circumstances. It is prone to destruction by several geo-hazards and furthermore, characterized by the aforementioned disparities. Past disasters, e.g. the 1991 Cerro Hudson eruption and the 2010 Maule earthquake have led to follow up effects (e.g. farmers, being unable to evacuate their animals due to road failures in the first case, and difficultires to evacuate people from places such as Caleta Tumbes or Dichato, which are connected by just a single road only in the second). The contribution develops a methodology to investigate into the critical infrastructure of such places. It develops a remoteness index for Chile, which identifies remote, peripheral rural areas, prone to get isolated due to road network failures during disasters. The approach is graph based. It offers particular advantages for regions like rural Chile since 1. it does not require traffic flow data which do not exist, 2. identifies peripheral areas particularly well, 3. identifies both nodes (places) prone to isolation and edges (roads) critical for the connectivity of rural areas, 4. based on a mathematical structure, it implies several possible planning solutions to reduce vulnerability of the critical infrastructure and people dependent on it. The methodology is presented and elaborated theoretically. Afterwards, it is demonstrated on an actual dataset from central Chile. It is demonstrated, how the methodology can be applied to derive planning solutions for peripheral rural areas.

  18. FOSS Tools for Research Data Management

    NASA Astrophysics Data System (ADS)

    Stender, Vivien; Jankowski, Cedric; Hammitzsch, Martin; Wächter, Joachim

    2017-04-01

    Established initiatives and organizations, e.g. the Initiative for Scientific Cyberinfrastructures (NSF, 2007) or the European Strategy Forum on Research Infrastructures (ESFRI, 2008), promote and foster the development of sustainable research infrastructures. These infrastructures aim the provision of services supporting scientists to search, visualize and access data, to collaborate and exchange information, as well as to publish data and other results. In this regard, Research Data Management (RDM) gains importance and thus requires the support by appropriate tools integrated in these infrastructures. Different projects provide arbitrary solutions to manage research data. However, within two projects - SUMARIO for land and water management and TERENO for environmental monitoring - solutions to manage research data have been developed based on Free and Open Source Software (FOSS) components. The resulting framework provides essential components for harvesting, storing and documenting research data, as well as for discovering, visualizing and downloading these data on the basis of standardized services stimulated considerably by enhanced data management approaches of Spatial Data Infrastructures (SDI). In order to fully exploit the potentials of these developments for enhancing data management in Geosciences the publication of software components, e.g. via GitHub, is not sufficient. We will use our experience to move these solutions into the cloud e.g. as PaaS or SaaS offerings. Our contribution will present data management solutions for the Geosciences developed in two projects. A sort of construction kit with FOSS components build the backbone for the assembly and implementation of projects specific platforms. Furthermore, an approach is presented to stimulate the reuse of FOSS RDM solutions with cloud concepts. In further projects specific RDM platforms can be set-up much faster, customized to the individual needs and tools can be added during the run-time.

  19. A model for simulating adaptive, dynamic flows on networks: Application to petroleum infrastructure

    DOE PAGES

    Corbet, Thomas F.; Beyeler, Walt; Wilson, Michael L.; ...

    2017-10-03

    Simulation models can greatly improve decisions meant to control the consequences of disruptions to critical infrastructures. We describe a dynamic flow model on networks purposed to inform analyses by those concerned about consequences of disruptions to infrastructures and to help policy makers design robust mitigations. We conceptualize the adaptive responses of infrastructure networks to perturbations as market transactions and business decisions of operators. We approximate commodity flows in these networks by a diffusion equation, with nonlinearities introduced to model capacity limits. To illustrate the behavior and scalability of the model, we show its application first on two simple networks, thenmore » on petroleum infrastructure in the United States, where we analyze the effects of a hypothesized earthquake.« less

  20. A model for simulating adaptive, dynamic flows on networks: Application to petroleum infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Corbet, Thomas F.; Beyeler, Walt; Wilson, Michael L.

    Simulation models can greatly improve decisions meant to control the consequences of disruptions to critical infrastructures. We describe a dynamic flow model on networks purposed to inform analyses by those concerned about consequences of disruptions to infrastructures and to help policy makers design robust mitigations. We conceptualize the adaptive responses of infrastructure networks to perturbations as market transactions and business decisions of operators. We approximate commodity flows in these networks by a diffusion equation, with nonlinearities introduced to model capacity limits. To illustrate the behavior and scalability of the model, we show its application first on two simple networks, thenmore » on petroleum infrastructure in the United States, where we analyze the effects of a hypothesized earthquake.« less

  1. Composites

    NASA Astrophysics Data System (ADS)

    Taylor, John G.

    The Composites market is arguably the most challenging and profitable market for phenolic resins aside from electronics. The variety of products and processes encountered creates the challenges, and the demand for high performance in critical operations brings value. Phenolic composite materials are rendered into a wide range of components to supply a diverse and fragmented commercial base that includes customers in aerospace (Space Shuttle), aircraft (interiors and brakes), mass transit (interiors), defense (blast protection), marine, mine ducting, off-shore (ducts and grating) and infrastructure (architectural) to name a few. For example, phenolic resin is a critical adhesive in the manufacture of honeycomb sandwich panels. Various solvent and water based resins are described along with resin characteristics and the role of metal ions for enhanced thermal stability of the resin used to coat the honeycomb. Featured new developments include pultrusion of phenolic grating, success in RTM/VARTM fabricated parts, new ballistic developments for military vehicles and high char yield carbon-carbon composites along with many others. Additionally, global regional market resin volumes and sales are presented and compared with other thermosetting resin systems.

  2. Avionic architecture requirements for Space Exploration Initiative systems

    NASA Technical Reports Server (NTRS)

    Herbella, C. G.; Brown, D. C.

    1991-01-01

    The authors discuss NASA's Strategic Avionics Technology Working Group (SATWG) and the results of the first study commissioned by the SATWG, the Space Avionics Requirements Study (SARS). The goal of the SARS task was to show that an open avionics architecture, using modular, standardized components, could be applied across the wide range of systems that comprise the Space Exploration Initiative. The study addressed systems ranging from expendable launch vehicles and the space station to surface systems such as Mars or lunar rovers and habitats. Top-level avionics requirements were derived from characterizations of each of the systems considered. Then a set of avionics subsystems were identified, along with estimates of the numbers and types of modules needed to meet the requirements. Applicability of these results across the infrastructure was then illustrated. In addition to these tasks, critical technologies were identified, characterized, and assessed in terms of their criticality and impact on the program. Design, development, test, and evaluation methods were addressed to identify potential areas of improvement.

  3. Simulating Impacts of Disruptions to Liquid Fuels Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilson, Michael; Corbet, Thomas F.; Baker, Arnold B.

    This report presents a methodology for estimating the impacts of events that damage or disrupt liquid fuels infrastructure. The impact of a disruption depends on which components of the infrastructure are damaged, the time required for repairs, and the position of the disrupted components in the fuels supply network. Impacts are estimated for seven stressing events in regions of the United States, which were selected to represent a range of disruption types. For most of these events the analysis is carried out using the National Transportation Fuels Model (NTFM) to simulate the system-level liquid fuels sector response. Results are presentedmore » for each event, and a brief cross comparison of event simulation results is provided.« less

  4. Medical image informatics infrastructure design and applications.

    PubMed

    Huang, H K; Wong, S T; Pietka, E

    1997-01-01

    Picture archiving and communication systems (PACS) is a system integration of multimodality images and health information systems designed for improving the operation of a radiology department. As it evolves, PACS becomes a hospital image document management system with a voluminous image and related data file repository. A medical image informatics infrastructure can be designed to take advantage of existing data, providing PACS with add-on value for health care service, research, and education. A medical image informatics infrastructure (MIII) consists of the following components: medical images and associated data (including PACS database), image processing, data/knowledge base management, visualization, graphic user interface, communication networking, and application oriented software. This paper describes these components and their logical connection, and illustrates some applications based on the concept of the MIII.

  5. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.

    PubMed

    Wang, Maocai; Dai, Guangming; Choo, Kim-Kwang Raymond; Jayaraman, Prem Prakash; Ranjan, Rajiv

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al.

  6. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures

    PubMed Central

    Dai, Guangming

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user’s public key based on the user’s identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al. PMID:27564373

  7. URBAN-NET: A Network-based Infrastructure Monitoring and Analysis System for Emergency Management and Public Safety

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, Sangkeun; Chen, Liangzhe; Duan, Sisi

    Abstract Critical Infrastructures (CIs) such as energy, water, and transportation are complex networks that are crucial for sustaining day-to-day commodity flows vital to national security, economic stability, and public safety. The nature of these CIs is such that failures caused by an extreme weather event or a man-made incident can trigger widespread cascading failures, sending ripple effects at regional or even national scales. To minimize such effects, it is critical for emergency responders to identify existing or potential vulnerabilities within CIs during such stressor events in a systematic and quantifiable manner and take appropriate mitigating actions. We present here amore » novel critical infrastructure monitoring and analysis system named URBAN-NET. The system includes a software stack and tools for monitoring CIs, pre-processing data, interconnecting multiple CI datasets as a heterogeneous network, identifying vulnerabilities through graph-based topological analysis, and predicting consequences based on what-if simulations along with visualization. As a proof-of-concept, we present several case studies to show the capabilities of our system. We also discuss remaining challenges and future work.« less

  8. Surgical and anaesthetic capacity of hospitals in Malawi: key insights

    PubMed Central

    Henry, Jaymie Ang; Frenkel, Erica; Borgstein, Eric; Mkandawire, Nyengo; Goddia, Cyril

    2015-01-01

    Background Surgery is increasingly recognized as an important driver for health systems strengthening, especially in developing countries. To facilitate quality improvement initiatives, baseline knowledge of capacity for surgical, anaesthetic, emergency and obstetric care is critical. In partnership with the Malawi Ministry of Health, we quantified government hospitals’ surgical capacity through workforce, infrastructure and health service delivery components. Methods From November 2012 to January 2013, we surveyed district and mission hospital administrators and clinical staff onsite using a modified version of the Personnel, Infrastructure, Procedures, Equipment and Supplies (PIPES) tool from Surgeons OverSeas. We calculated percentage of facilities demonstrating adequacy of the assessed components, surgical case rates, operating theatre density and surgical workforce density. Results Twenty-seven government hospitals were surveyed (90% of the district hospitals, all central hospitals). Of the surgical workforce surveyed (n = 370), 92.7% were non-surgeons and 77% were clinical officers (COs). Of the 109 anaesthesia providers, 95.4% were non-physician anaesthetists (anaesthesia COs or ACOs). Non-surgeons and ACOs were the only providers of surgical services and anaesthetic services in 85% and 88.9% of hospitals, respectively. No specialists served the district hospitals. All of the hospitals experienced periods without external electricity. Most did not always have a functioning generator (78.3% district, 25% central) or running water (82.6%, 50%). None of the district hospitals had an Intensive Care Unit (ICU). Cricothyroidotomy, bowel resection and cholecystectomy were not done in over two-thirds of hospitals. Every hospital provided general anaesthesia but some did not always have a functioning anaesthesia machine (52.2%, 50%). Surgical rate, operating theatre density and surgical workforce density per 100 000 population was 289.48–747.38 procedures, 0.98 and 5.41 and 3.68 surgical providers, respectively. Conclusion COs form the backbone of Malawi’s surgical and anaesthetic workforce and should be supported with improvements in infrastructure as well as training and mentorship by specialist surgeons and anaesthetists. PMID:25261799

  9. Petroleum Scarcity and Public Health: Considerations for Local Health Departments

    PubMed Central

    Parker, Cindy L.; Caine, Virginia A.; McKee, Mary; Shirley, Lillian M.; Links, Jonathan M.

    2011-01-01

    Recognition of petroleum as a finite global resource has spurred increasing interest in the intersection between petroleum scarcity and public health. Local health departments represent a critical yet highly vulnerable component of the public health infrastructure. These frontline agencies currently face daunting resource constraints and rely heavily on petroleum for vital population-based health services. Against this backdrop, petroleum scarcity may necessitate reconfiguring local public health service approaches. We describe the anticipated impacts of petroleum scarcity on local health departments, recommend the use of the 10 Essential Public Health Services as a framework for examining attendant operational challenges and potential responses to them, and describe approaches that local health departments and their stakeholders could consider as part of timely planning efforts. PMID:21778471

  10. Financing the construction of transport infrastructure as the basis for sustainable development of the regional economy

    NASA Astrophysics Data System (ADS)

    Nidziy, Elena

    2017-10-01

    Dependence of the regional economic development from efficiency of financing of the construction of transport infrastructure is analyzed and proved in this article. Effective mechanism for infrastructure projects financing, public and private partnership, is revealed and its concrete forms are formulated. Here is proposed an optimal scenario for financing for the transport infrastructure, which can lead to positive transformations in the economy. Paper considers the advantages and risks of public and private partnership for subjects of contractual relations. At that, components for the assessment of economic effect of the implementation of infrastructure projects were proposed simultaneously with formulation of conditions for minimization risks. Results of the research could be used for solution of persistent problems in the development of transport infrastructure, issues of financial assurance of construction of infrastructure projects at the regional level.

  11. Measuring the pulse of urban green infrastructure: vegetation dynamics across residential landscapes

    EPA Science Inventory

    Vegetation can be an important component of urban green infrastructure. Its structure is a complex result of the socio-ecological milieu and management decisions, and it can influence numerous ecohydrological processes such as stormwater interception and evapotranspiration. Despi...

  12. Informing Food Protection Education: A Project to Define and Classify Resources for a Cross-Disciplinary Expert Community

    ERIC Educational Resources Information Center

    Schenck-Hamlin, Donna; Pierquet, Jennifer; McClellan, Chuck

    2011-01-01

    In the wake of the September 2001 attacks, the U.S. government founded the Department of Homeland Security (DHS) with responsibility to develop a National Infrastructure Protection Plan for securing critical infrastructures and key resources. DHS established interdisciplinary networks of academic expertise administered through Centers of…

  13. Quality Support Infrastructure in Early Childhood: Still (Mostly) Missing

    ERIC Educational Resources Information Center

    Azzi-Lessing, Lenette

    2009-01-01

    Support for early care and education among policy makers and the public is at an unprecedented high. As investments in early care and education programs in the United States continue to rise, the issue of quality becomes increasingly critical. This article addresses the need for adequate infrastructure to support high-quality early care and…

  14. Reflections on Policy in Gifted Education: James J. Gallagher

    ERIC Educational Resources Information Center

    Brown, Elissa F.; Garland, Rebecca B.

    2015-01-01

    In this article, Brown and Garland, reflect on issues raised by James J. Gallagher, such as educational policies helping to create and support an infrastructure within which the needs of students can be addressed. Gallagher felt that a strong federal policy, such as IDEA, was critical to building and maintaining a solid infrastructure. Gallagher…

  15. The component alignment model: a new approach to health care information technology strategic planning.

    PubMed

    Martin, J B; Wilkins, A S; Stawski, S K

    1998-08-01

    The evolving health care environment demands that health care organizations fully utilize information technologies (ITs). The effective deployment of IT requires the development and implementation of a comprehensive IT strategic plan. A number of approaches to health care IT strategic planning exist, but they are outdated or incomplete. The component alignment model (CAM) introduced here recognizes the complexity of today's health care environment, emphasizing continuous assessment and realignment of seven basic components: external environment, emerging ITs, organizational infrastructure, mission, IT infrastructure, business strategy, and IT strategy. The article provides a framework by which health care organizations can develop an effective IT strategic planning process.

  16. The Resilient Infrastructure Initiative

    DOE PAGES

    Clifford, Megan

    2016-10-01

    Infrastructure is, by design, largely unnoticed until it breaks down and services fail. This includes water supplies, gas pipelines, bridges and dams, phone lines and cell towers, roads and culverts, railways, and the electric grid—all of the complex systems that keep our societies and economies running. Climate change, population growth, increased urbanization, system aging, and outdated design standards stress existing infrastructure and its ability to satisfy the rapidly changing demands from users. Here, the resilience of both physical and cyber infrastructure systems, however, is critical to a community as it prepares for, responds to, and recovers from a disaster, whethermore » natural or man-made.« less

  17. Modeling And Detecting Anomalies In Scada Systems

    NASA Astrophysics Data System (ADS)

    Svendsen, Nils; Wolthusen, Stephen

    The detection of attacks and intrusions based on anomalies is hampered by the limits of specificity underlying the detection techniques. However, in the case of many critical infrastructure systems, domain-specific knowledge and models can impose constraints that potentially reduce error rates. At the same time, attackers can use their knowledge of system behavior to mask their manipulations, causing adverse effects to observed only after a significant period of time. This paper describes elementary statistical techniques that can be applied to detect anomalies in critical infrastructure networks. A SCADA system employed in liquefied natural gas (LNG) production is used as a case study.

  18. Investigating the effect of increased wind generation capacity on investment in transmission infrastructure

    NASA Astrophysics Data System (ADS)

    Braswell, Michael G.

    The transmission network that connects electricity generators with consumers is a critical yet often-overlooked component of the nation's electrical power infrastructure. However, the transmission grid has suffered from chronic underinvestment in recent decades due to various economic and regulatory factors that impede timely and efficient investments in transmission. One factor that might help offset these obstacles to transmission is the growth in wind power generation. The assumption among many in the electrical power industry is that wind power investments necessarily require greater investment in transmission due to the fact that wind power is a geographically-restricted resource and cannot always be situated close to areas of high electricity demand. However, to date there have been few, if any, empirical studies to verify this connection. This paper discusses a state-by-state empirical study exploring the relationship between increased wind generation capacity and the level of investment in transmission infrastructure. This study begins with the hypothesis that increases in installed wind generation capacity, in combination with other policies that promote wind energy more generally, should result in higher levels of transmission investment. Using data from the Federal Energy Regulatory Commission (FERC) and the American Wind Energy Association (AWEA), this paper develops regression models suggesting that wind investment has a small but distinct positive impact on transmission investment. This paper then explores the effects of other state renewable energy promotion policies, and discusses the policy implications of these findings.

  19. Optimization of urban water supply portfolios combining infrastructure capacity expansion and water use decisions

    NASA Astrophysics Data System (ADS)

    Medellin-Azuara, J.; Fraga, C. C. S.; Marques, G.; Mendes, C. A.

    2015-12-01

    The expansion and operation of urban water supply systems under rapidly growing demands, hydrologic uncertainty, and scarce water supplies requires a strategic combination of various supply sources for added reliability, reduced costs and improved operational flexibility. The design and operation of such portfolio of water supply sources merits decisions of what and when to expand, and how much to use of each available sources accounting for interest rates, economies of scale and hydrologic variability. The present research provides a framework and an integrated methodology that optimizes the expansion of various water supply alternatives using dynamic programming and combining both short term and long term optimization of water use and simulation of water allocation. A case study in Bahia Do Rio Dos Sinos in Southern Brazil is presented. The framework couples an optimization model with quadratic programming model in GAMS with WEAP, a rain runoff simulation models that hosts the water supply infrastructure features and hydrologic conditions. Results allow (a) identification of trade offs between cost and reliability of different expansion paths and water use decisions and (b) evaluation of potential gains by reducing water system losses as a portfolio component. The latter is critical in several developing countries where water supply system losses are high and often neglected in favor of more system expansion. Results also highlight the potential of various water supply alternatives including, conservation, groundwater, and infrastructural enhancements over time. The framework proves its usefulness for planning its transferability to similarly urbanized systems.

  20. The Neuronal Infrastructure of Speaking

    ERIC Educational Resources Information Center

    Menenti, Laura; Segaert, Katrien; Hagoort, Peter

    2012-01-01

    Models of speaking distinguish producing meaning, words and syntax as three different linguistic components of speaking. Nevertheless, little is known about the brain's integrated neuronal infrastructure for speech production. We investigated semantic, lexical and syntactic aspects of speaking using fMRI. In a picture description task, we…

  1. Research infrastructure support to address ecosystem dynamics

    NASA Astrophysics Data System (ADS)

    Los, Wouter

    2014-05-01

    Predicting the evolution of ecosystems to climate change or human pressures is a challenge. Even understanding past or current processes is complicated as a result of the many interactions and feedbacks that occur within and between components of the system. This talk will present an example of current research on changes in landscape evolution, hydrology, soil biogeochemical processes, zoological food webs, and plant community succession, and how these affect feedbacks to components of the systems, including the climate system. Multiple observations, experiments, and simulations provide a wealth of data, but not necessarily understanding. Model development on the coupled processes on different spatial and temporal scales is sensitive for variations in data and of parameter change. Fast high performance computing may help to visualize the effect of these changes and the potential stability (and reliability) of the models. This may than allow for iteration between data production and models towards stable models reducing uncertainty and improving the prediction of change. The role of research infrastructures becomes crucial is overcoming barriers for such research. Environmental infrastructures are covering physical site facilities, dedicated instrumentation and e-infrastructure. The LifeWatch infrastructure for biodiversity and ecosystem research will provide services for data integration, analysis and modeling. But it has to cooperate intensively with the other kinds of infrastructures in order to support the iteration between data production and model computation. The cooperation in the ENVRI project (Common operations of environmental research infrastructures) is one of the initiatives to foster such multidisciplinary research.

  2. The Navajo Learning Network and the NASA Life Sciences/AFOSR Infrastructure Development Project

    NASA Technical Reports Server (NTRS)

    1999-01-01

    The NSF-funded Navajo Learning Network project, with help from NASA Life Sciences and AFOSR, enabled Dine College to take a giant leap forward technologically - in a way that could never had been possible had these projects been managed separately. The combination of these and other efforts created a network of over 500 computers located at ten sites across the Navajo reservation. Additionally, the college was able to install a modern telephone system which shares network data, and purchase a new higher education management system. The NASA Life Sciences funds further allowed the college library system to go online and become available to the entire campus community. NSF, NASA and AFOSR are committed to improving minority access to higher education opportunities and promoting faculty development and undergraduate research through infrastructure support and development. This project has begun to address critical inequalities in access to science, mathematics, engineering and technology for Navajo students and educators. As a result, Navajo K-12 education has been bolstered and Dine College will therefore better prepare students to transfer successfully to four-year institutions. Due to the integration of the NSF and NASA/AFOSR components of the project, a unified project report is appropriate.

  3. Blood banking services in India.

    PubMed

    Sardana, V N

    1996-01-01

    India's health care sector has made impressive strides toward providing health for all by the year 2000. That progress, however, has not been supported by a modern transfusion services network which continues to improve itself. In India, blood collection, storage, and delivery occur mainly in blood banks attached to hospitals, most of which are under central and state government controls. A significant portion of blood banking activity is also done by voluntary agencies and private sector blood banks. A study found the blood transfusion services infrastructure to be highly decentralized and lacking of many critical resources; an overall shortage of blood, especially from volunteer donors; limited and erratic testing facilities; an extremely limited blood component production/availability/use; and a shortage of health care professionals in the field of transfusion services. Infrastructural modernization and the technical upgrading of skills in the blood banks would, however, provide India with a dynamic transfusion services network. The safety of blood transfusion, the national blood safety program, HIV testing facilities, modernization of blood banks, the rational use of blood, program management, manpower development, the legal framework, voluntary blood donation, and a 1996 Supreme Court judgement on the need to focus greater attention upon the blood program are discussed.

  4. Beyond basic citation—What to identify, when, and why

    NASA Astrophysics Data System (ADS)

    Parsons, M. A.

    2015-12-01

    Persistent identifiers (and locators) have emerged as a critical component in designing and implementing information systems and networks. This is especially evident in the use of the Digital Object Identifier in association with formal bibliographic citation of literature and increasingly of data sets. Indeed, the principles and methods of data citation have been a hot topic in the informatics community over the last decade or so. To date the focus has typically been on closely linking data sets to associated literature and generally emulating bibliographic-style citation. To design a sustainable, trusted data infrastructure, however, requires us to unambiguously reference many things in many ways, be they data, software, instruments, methods, or people. Design of this infrastructure also requires us to consider the entire data lifecycle and when important elements come into play and need to be identified. This paper will advocate an "ecological" model of data sharing that takes a more holistic perspective than many traditional data publication approaches. It will explore a variety of use cases around what elements of an information ecosystem need to be unambiguously identified and located, at what point in the data production process, and to what explicit purpose.

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Klise, Katherine A.; Hart, David; Moriarty, Dylan Michael

    Drinking water systems face multiple challenges, including aging infrastructure, water quality concerns, uncertainty in supply and demand, natural disasters, environmental emergencies, and cyber and terrorist attacks. All of these have the potential to disrupt a large portion of a water system causing damage to infrastructure and outages to customers. Increasing resilience to these types of hazards is essential to improving water security. As one of the United States (US) sixteen critical infrastructure sectors, drinking water is a national priority. The National Infrastructure Advisory Council defined infrastructure resilience as “the ability to reduce the magnitude and/or duration of disruptive events. Themore » effectiveness of a resilient infrastructure or enterprise depends upon its ability to anticipate, absorb, adapt to, and/or rapidly recover from a potentially disruptive event”. Being able to predict how drinking water systems will perform during disruptive incidents and understanding how to best absorb, recover from, and more successfully adapt to such incidents can help enhance resilience.« less

  6. Complex Failure Forewarning System - DHS Conference Proceedings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Hively, Lee M; Prowell, Stacy J

    2011-01-01

    As the critical infrastructures of the United States have become more and more dependent on public and private networks, the potential for widespread national impact resulting from disruption or failure of these networks has also increased. Securing the nation s critical infrastructures requires protecting not only their physical systems but, just as important, the cyber portions of the systems on which they rely. A failure is inclusive of random events, design flaws, and instabilities caused by cyber (and/or physical) attack. One such domain, aging bridges, is used to explain the Complex Structure Failure Forewarning System. We discuss the workings ofmore » such a system in the context of the necessary sensors, command and control and data collection as well as the cyber security efforts that would support this system. Their application and the implications of this computing architecture are also discussed, with respect to our nation s aging infrastructure.« less

  7. Handling Emergency Management in [an] Object Oriented Modeling Environment

    NASA Technical Reports Server (NTRS)

    Tokgoz, Berna Eren; Cakir, Volkan; Gheorghe, Adrian V.

    2010-01-01

    It has been understood that protection of a nation from extreme disasters is a challenging task. Impacts of extreme disasters on a nation's critical infrastructures, economy and society could be devastating. A protection plan itself would not be sufficient when a disaster strikes. Hence, there is a need for a holistic approach to establish more resilient infrastructures to withstand extreme disasters. A resilient infrastructure can be defined as a system or facility that is able to withstand damage, but if affected, can be readily and cost-effectively restored. The key issue to establish resilient infrastructures is to incorporate existing protection plans with comprehensive preparedness actions to respond, recover and restore as quickly as possible, and to minimize extreme disaster impacts. Although national organizations will respond to a disaster, extreme disasters need to be handled mostly by local emergency management departments. Since emergency management departments have to deal with complex systems, they have to have a manageable plan and efficient organizational structures to coordinate all these systems. A strong organizational structure is the key in responding fast before and during disasters, and recovering quickly after disasters. In this study, the entire emergency management is viewed as an enterprise and modelled through enterprise management approach. Managing an enterprise or a large complex system is a very challenging task. It is critical for an enterprise to respond to challenges in a timely manner with quick decision making. This study addresses the problem of handling emergency management at regional level in an object oriented modelling environment developed by use of TopEase software. Emergency Operation Plan of the City of Hampton, Virginia, has been incorporated into TopEase for analysis. The methodology used in this study has been supported by a case study on critical infrastructure resiliency in Hampton Roads.

  8. Green Infrastructure, Groundwater and the Sustainable City

    NASA Astrophysics Data System (ADS)

    Band, L. E.

    2014-12-01

    The management of water is among the most important attributes of urbanization. Provision of sufficient quantities and quality of freshwater, treatment and disposal of wastewater and flood protection are critical for urban sustainability. Over the last century, two major shifts in water management paradigms have occurred, the first to improve public health with the provision of infrastructure for centralized sanitary effluent collection and treatment, and the rapid drainage and routing of stormwater. A current shift in paradigm is now occurring in response to the unintended consequences of sanitary and stormwater management, which have degraded downstream water bodies and shifted flood hazard downstream. Current infrastructure is being designed and implemented to retain, rather than rapidly drain, stormwater, with a focus on infiltration based methods. In urban areas, this amounts to a shift in hydrologic behavior to depression focused recharge. While stormwater is defined as surface flow resulting from developed areas, an integrated hydrologic systems approach to urban water management requires treatment of the full critical zone. In urban areas this extends from the top of the vegetation and building canopy, to a subsurface depth including natural soils, fill, saprolite and bedrock. In addition to matric and network flow in fracture systems, an urban "karst" includes multiple generations of current and past infrastructure, which has developed extensive subsurface pipe networks for supply and drainage, enhancing surface/groundwater flows and exchange. In this presentation, Band will discuss the need to focus on the urban critical zone, and the development and adaptation of new modeling and analytical approaches to understand and plan green infrastructure based on surface/groundwater/ecosystem interactions, and implications for the restoration and new design of cities.

  9. TRANSVAC research infrastructure - Results and lessons learned from the European network of vaccine research and development.

    PubMed

    Geels, Mark J; Thøgersen, Regitze L; Guzman, Carlos A; Ho, Mei Mei; Verreck, Frank; Collin, Nicolas; Robertson, James S; McConkey, Samuel J; Kaufmann, Stefan H E; Leroy, Odile

    2015-10-05

    TRANSVAC was a collaborative infrastructure project aimed at enhancing European translational vaccine research and training. The objective of this four year project (2009-2013), funded under the European Commission's (EC) seventh framework programme (FP7), was to support European collaboration in the vaccine field, principally through the provision of transnational access (TNA) to critical vaccine research and development (R&D) infrastructures, as well as by improving and harmonising the services provided by these infrastructures through joint research activities (JRA). The project successfully provided all available services to advance 29 projects and, through engaging all vaccine stakeholders, successfully laid down the blueprint for the implementation of a permanent research infrastructure for early vaccine R&D in Europe. Copyright © 2015. Published by Elsevier Ltd.

  10. Robustness and Recovery of Lifeline Infrastructure and Ecosystem Networks

    NASA Astrophysics Data System (ADS)

    Bhatia, U.; Ganguly, A. R.

    2015-12-01

    Disruptive events, both natural and man-made, can have widespread impacts on both natural systems and lifeline infrastructure networks leading to the loss of biodiversity and essential functionality, respectively. Projected sea-level rise and climate change can further increase the frequency and severity of large-scale floods on urban-coastal megacities. Nevertheless, Failure in infrastructure systems can trigger cascading impacts on dependent ecosystems, and vice-versa. An important consideration in the behavior of the isolated networks and inter-connected networks following disruptive events is their resilience, or the ability of the network to "bounce back" to a pre-disaster state. Conventional risk analysis and subsequent risk management frameworks have focused on identifying the components' vulnerability and strengthening of the isolated components to withstand these disruptions. But high interconnectedness of these systems, and evolving nature of hazards, particularly in the context of climate extremes, make the component level analysis unrealistic. In this study, we discuss the complex network-based resilience framework to understand fragility and recovery strategies for infrastructure systems impacted by climate-related hazards. We extend the proposed framework to assess the response of ecological networks to multiple species loss and design the restoration management framework to identify the most efficient restoration sequence of species, which can potentially lead to disproportionate gains in biodiversity.

  11. COMMUNITY-ORIENTED DESIGN AND EVALUATION PROCESS FOR SUSTAINABLE INFRASTRUCTURE

    EPA Science Inventory

    We met our first objective by completing the physical infrastructure of the La Fortuna-Tule water and sanitation project using the CODE-PSI method. This physical component of the project was important in providing a real, relevant, community-scale test case for the methods ...

  12. "Measuring Operational Effectiveness of Information Technology Infrastructure Library (IIL) and the Impact of Critical Facilities Inclusion in the Process."

    ERIC Educational Resources Information Center

    Woodell, Eric A.

    2013-01-01

    Information Technology (IT) professionals use the Information Technology Infrastructure Library (ITIL) process to better manage their business operations, measure performance, improve reliability and lower costs. This study examined the operational results of those data centers using ITIL against those that do not, and whether the results change…

  13. Closing the Gap: Cybersecurity for U.S. Forces and Commands

    DTIC Science & Technology

    2017-03-30

    Dickson, Ph.D. Professor of Military Studies , JAWS Thesis Advisor Kevin Therrien, Col, USAF Committee Member Stephen Rogers, Colonel, USA Director...infrastructures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries.”5...of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and

  14. Multinational Experiment 7. Outcome 3 - Cyber Domain Objective 3.1: Threats and Vulnerability Methodology Version 1.0

    DTIC Science & Technology

    2014-02-09

    often  operators  of command and control  systems  within critical infrastructures, and  can in some ways be considered critical assets themselves. The...application layer makes up the  command and control  system  for the critical infrastructure. That includes  operating   systems  and  applications for users and...Determine how to achieve secure synchronization between primary and secondary  systems .  • Ensure alternatives are  operating , trained for, and practiced

  15. Probabilistic Scenario-based Seismic Risk Analysis for Critical Infrastructures Method and Application for a Nuclear Power Plant

    NASA Astrophysics Data System (ADS)

    Klügel, J.

    2006-12-01

    Deterministic scenario-based seismic hazard analysis has a long tradition in earthquake engineering for developing the design basis of critical infrastructures like dams, transport infrastructures, chemical plants and nuclear power plants. For many applications besides of the design of infrastructures it is of interest to assess the efficiency of the design measures taken. These applications require a method allowing to perform a meaningful quantitative risk analysis. A new method for a probabilistic scenario-based seismic risk analysis has been developed based on a probabilistic extension of proven deterministic methods like the MCE- methodology. The input data required for the method are entirely based on the information which is necessary to perform any meaningful seismic hazard analysis. The method is based on the probabilistic risk analysis approach common for applications in nuclear technology developed originally by Kaplan & Garrick (1981). It is based (1) on a classification of earthquake events into different size classes (by magnitude), (2) the evaluation of the frequency of occurrence of events, assigned to the different classes (frequency of initiating events, (3) the development of bounding critical scenarios assigned to each class based on the solution of an optimization problem and (4) in the evaluation of the conditional probability of exceedance of critical design parameters (vulnerability analysis). The advantage of the method in comparison with traditional PSHA consists in (1) its flexibility, allowing to use different probabilistic models for earthquake occurrence as well as to incorporate advanced physical models into the analysis, (2) in the mathematically consistent treatment of uncertainties, and (3) in the explicit consideration of the lifetime of the critical structure as a criterion to formulate different risk goals. The method was applied for the evaluation of the risk of production interruption losses of a nuclear power plant during its residual lifetime.

  16. Principles of Emergency Department facility design for optimal management of mass-casualty incidents.

    PubMed

    Halpern, Pinchas; Goldberg, Scott A; Keng, Jimmy G; Koenig, Kristi L

    2012-04-01

    The Emergency Department (ED) is the triage, stabilization and disposition unit of the hospital during a mass-casualty incident (MCI). With most EDs already functioning at or over capacity, efficient management of an MCI requires optimization of all ED components. While the operational aspects of MCI management have been well described, the architectural/structural principles have not. Further, there are limited reports of the testing of ED design components in actual MCI events. The objective of this study is to outline the important infrastructural design components for optimization of ED response to an MCI, as developed, implemented, and repeatedly tested in one urban medical center. In the authors' experience, the most important aspects of ED design for MCI have included external infrastructure and promoting rapid lockdown of the facility for security purposes; an ambulance bay permitting efficient vehicle flow and casualty discharge; strategic placement of the triage location; patient tracking techniques; planning adequate surge capacity for both patients and staff; sufficient command, control, communications, computers, and information; well-positioned and functional decontamination facilities; adequate, well-located and easily distributed medical supplies; and appropriately built and functioning essential services. Designing the ED to cope well with a large casualty surge during a disaster is not easy, and it may not be feasible for all EDs to implement all the necessary components. However, many of the components of an appropriate infrastructural design add minimal cost to the normal expenditures of building an ED. This study highlights the role of design and infrastructure in MCI preparedness in order to assist planners in improving their ED capabilities. Structural optimization calls for a paradigm shift in the concept of structural and operational ED design, but may be necessary in order to maximize surge capacity, department resilience, and patient and staff safety.

  17. Effects of a significant New Madrid Seismic Zone event on oil and natural gas pipelines and their cascading effects to critical infrastructures

    NASA Astrophysics Data System (ADS)

    Fields, Damon E.

    Critical Infrastructure Protection (CIP) is a construct that relates preparedness and responsiveness to natural or man-made disasters that involve vulnerable assets deemed essential for the functioning of our economy and society. Infrastructure systems (power grids, bridges, airports, etc.) are vulnerable to disastrous types of events--natural or man-made. Failures of these systems can have devastating effects on communities and entire regions. CIP relates our willingness, ability, and capability to defend, mitigate, and re-constitute those assets that succumb to disasters affecting one or more infrastructure sectors. This qualitative research utilized ethnography and employed interviews with subject matter experts (SMEs) from various fields of study regarding CIP with respect to oil and natural gas pipelines in the New Madrid Seismic Zone. The study focused on the research question: What can be done to mitigate vulnerabilities in the oil and natural gas infrastructures, along with the potential cascading effects to interdependent systems, associated with a New Madrid fault event? The researcher also analyzed National Level Exercises (NLE) and real world events, and associated After Action Reports (AAR) and Lessons Learned (LL) in order to place a holistic lens across all infrastructures and their dependencies and interdependencies. Three main themes related to the research question emerged: (a) preparedness, (b) mitigation, and (c) impacts. These themes comprised several dimensions: (a) redundancy, (b) node hardening, (c) education, (d) infrastructure damage, (e) cascading effects, (f) interdependencies, (g) exercises, and (h) earthquake readiness. As themes and dimensions are analyzed, they are considered against findings in AARs and LL from previous real world events and large scale exercise events for validation or rejection.

  18. Multi-Level Data-Security and Data-Protection in a Distributed Search Infrastructure for Digital Medical Samples.

    PubMed

    Witt, Michael; Krefting, Dagmar

    2016-01-01

    Human sample data is stored in biobanks with software managing digital derived sample data. When these stand-alone components are connected and a search infrastructure is employed users become able to collect required research data from different data sources. Data protection, patient rights, data heterogeneity and access control are major challenges for such an infrastructure. This dissertation will investigate concepts for a multi-level security architecture to comply with these requirements.

  19. Establishing storm thresholds for the Spanish Gulf of Cádiz coast

    NASA Astrophysics Data System (ADS)

    Del Río, Laura; Plomaritis, Theocharis A.; Benavente, Javier; Valladares, María; Ribera, Pedro

    2012-03-01

    In this study critical thresholds are defined for storm impacts along the Spanish coast of the Gulf of Cádiz. The thresholds correspond to the minimum wave and tide conditions necessary to produce significant morphological changes on beaches and dunes and/or damage on coastal infrastructure or human occupation. Threshold definition was performed by computing theoretical sea-level variations during storms and comparing them with the topography of the study area and the location of infrastructure at a local level. Specifically, the elevations of the berm, the dune foot and the entrance of existing washovers were selected as threshold parameters. The total sea-level variation generated by a storm event was estimated as the sum of the tidal level, the wind-induced setup, the barometric setup and the wave-associated sea-level variation (wave setup and runup), assuming a minimum interaction between the different processes. These components were calculated on the basis of parameterisations for significant wave height (Hs) obtained for the oceanographic and environmental conditions of the Gulf of Cadiz. For this purpose real data and reanalysis time-series (HIPOCAS project) were used. Validation of the obtained results was performed for a range of coastal settings over the study area. The obtained thresholds for beach morphological changes in spring tide conditions range between a significant wave height of 1.5 m and 3.7 m depending on beach characteristics, while for dune foot erosion are around 3.3 to 3.7 m and for damage to infrastructure around 7.2 m. In case of neap tide conditions these values are increased on average by 50% over the areas with large tidal range. Furthermore, records of real damage in coastal infrastructure caused by storms were collected at a regional level from newspapers and other bibliographic sources and compared with the hydrodynamic conditions that caused the damage. These were extracted from the hindcast database of the HIPOCAS project, including parameters such as storm duration, mean and maximum wave height and wave direction. Results show that the duration of the storm is not critical in determining the occurrence of coastal damage in the regional study area. This way, the threshold would be defined as a duration ≥30 h, with moderate average wave height (≥3.3 m) and high maximum wave height (≥4.1 m) approaching from the 3rd and 4th quadrants, during mean or spring tide situation. The calculated thresholds constitute snapshots of risk conditions within a certain time framework. Beach and nearshore zones are extremely dynamic, and also the characteristics of occupation on the coast change over time, so critical storm thresholds will change accordingly and therefore will need to be updated.

  20. Modelling and Simulation as a Service: New Concepts and Service-Oriented Architectures (Modelisation et simulation en tant que service: Nouveaux concepts et architectures orientes service)

    DTIC Science & Technology

    2015-05-01

    delivery business model where S&T activities are conducted in a NATO dedicated executive body, having its own personnel, capabilities and infrastructure ...SD-4: Design for Securability 5-4 5.3.2 Recommendations on Simulation Environment Infrastructure 5-5 5.3.2.1 Recommendation IN-1: Harmonize...Critical Data and 5-5 Algorithms 5.3.2.2 Recommendation IN-2: Establish Permanent Simulation 5-5 Infrastructure 5.3.2.3 Recommendation IN-3: Establish

Top