Science.gov

Sample records for facility security system

  1. Information security management system planning for CBRN facilities

    SciTech Connect

    Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-12-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  2. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  3. Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities

    PubMed Central

    Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min

    2012-01-01

    Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. Results From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. Conclusions This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another. PMID:22844648

  4. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  5. Using vulnerability assessments to design facility safeguards and security systems

    SciTech Connect

    Snell, M.; Jaeger, C.

    1994-08-01

    The Weapons Complex Reconfiguration (WCR) Program is meant to prepare the Department of Energy (DOE) weapons complex to meet the needs of the next century through construction of now facilities or upgrades-in-place at existing facilities. This paper describes how a vulnerability (VA) was used to identify potential S&S features for the conceptual design for a plutonium storage facility as part of the WCR Program. We distinguish those features of the design that need to be investigated at the conceptual stage from those that can be evaluated later. We also examined what protection features may allow reduced S&S operating costs, with the main focus on protective force costs. While some of these concepts hold the promise for significantly reducing life-cycle protective force costs, their use depends on resolving long-standing tradeoffs between S&S and safety, which are discussed in the study.

  6. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  7. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  8. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  9. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  10. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  11. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) WATERFRONT FACILITIES WATERFRONT FACILITIES HANDLING LIQUEFIED NATURAL GAS AND LIQUEFIED HAZARDOUS GAS Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator...

  12. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) WATERFRONT FACILITIES WATERFRONT FACILITIES HANDLING LIQUEFIED NATURAL GAS AND LIQUEFIED HAZARDOUS GAS Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator...

  13. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) WATERFRONT FACILITIES WATERFRONT FACILITIES HANDLING LIQUEFIED NATURAL GAS AND LIQUEFIED HAZARDOUS GAS Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator...

  14. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) WATERFRONT FACILITIES WATERFRONT FACILITIES HANDLING LIQUEFIED NATURAL GAS AND LIQUEFIED HAZARDOUS GAS Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator...

  15. 78 FR 7334 - Port Authority Access to Facility Vulnerability Assessments and the Integration of Security Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-01

    ... our public dockets in the January 17, 2008, issue of the Federal Register (73 FR 3316). Public meeting..., prevent, mitigate, and respond to Transportation Security Incidents (TSIs) and other disasters. If the... disaster. Each Facility Security Assessment (FSA) must contain provisions for contingency...

  16. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  17. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  18. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  19. Secure Chemical Facilities Act

    THOMAS, 113th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2013-01-23

    01/23/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Secure Chemical Facilities Act

    THOMAS, 112th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2011-03-31

    03/31/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Secure Chemical Facilities Act

    THOMAS, 111th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2010-07-15

    07/15/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Composite Data Products (CDPs) from the Hydrogen Secure Data Center (HSDC) at the Energy Systems Integration Facility (ESIF), NREL

    DOE Data Explorer

    The Hydrogen Secure Data Center (HSDC) at NREL's Energy Systems Integration Facility (ESIF) plays a crucial role in NREL's independent, third-party analysis of hydrogen fuel cell technologies in real-world operation. NREL partners submit operational, maintenance, safety, and cost data to the HSDC on a regular basis. NREL's Technology Validation Team uses an internal network of servers, storage, computers, backup systems, and software to efficiently process raw data, complete quarterly analysis, and digest large amounts of time series data for data visualization. While the raw data are secured by NREL to protect commercially sensitive and proprietary information, individualized data analysis results are provided as detailed data products (DDPs) to the partners who supplied the data. Individual system, fleet, and site analysis results are aggregated into public results called composite data products (CDPs) that show the status and progress of the technology without identifying individual companies or revealing proprietary information. These CDPs are available from this NREL website: 1) Hydrogen Fuel Cell Vehicle and Infrastructure Learning Demonstration; 2) Early Fuel Cell Market Demonstrations; 3) Fuel Cell Technology Status [Edited from http://www.nrel.gov/hydrogen/facilities_secure_data_center.html].

  3. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  4. Waste Receiving and Processing (WRAP) Facility PMS Test Report For Data Management System (DMS) Security Test DMS-Y2K

    SciTech Connect

    PALMER, M.E.

    1999-09-21

    Test Plan HNF-4351 defines testing requirements for installation of a new server in the WRAP Facility. This document shows the results of the test reports on the DMS-Y2K and DMS-F81 (Security) systems.

  5. System Security Authorization Agreement (SSAA) for the WIRE Archive and Research Facility

    NASA Technical Reports Server (NTRS)

    2002-01-01

    The Wide-Field Infrared Explorer (WIRE) Archive and Research Facility (WARF) is operated and maintained by the Department of Physics, USAF Academy. The lab is located in Fairchild Hall, 2354 Fairchild Dr., Suite 2A103, USAF Academy, CO 80840. The WARF will be used for research and education in support of the NASA Wide Field Infrared Explorer (WIRE) satellite, and for related high-precision photometry missions and activities. The WARF will also contain the WIRE preliminary and final archives prior to their delivery to the National Space Science Data Center (NSSDC). The WARF consists of a suite of equipment purchased under several NASA grants in support of WIRE research. The core system consists of a Red Hat Linux workstation with twin 933 MHz PIII processors, 1 GB of RAM, 133 GB of hard disk space, and DAT and DLT tape drives. The WARF is also supported by several additional networked Linux workstations. Only one of these (an older 450 Mhz PIII computer running Red Hat Linux) is currently running, but the addition of several more is expected over the next year. In addition, a printer will soon be added. The WARF will serve as the primary research facility for the analysis and archiving of data from the WIRE satellite, together with limited quantities of other high-precision astronomical photometry data from both ground- and space-based facilities. However, the archive to be created here will not be the final archive; rather, the archive will be duplicated at the NSSDC and public access to the data will generally take place through that site.

  6. 33 CFR 127.701 - Security on existing facilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... (CONTINUED) WATERFRONT FACILITIES WATERFRONT FACILITIES HANDLING LIQUEFIED NATURAL GAS AND LIQUEFIED HAZARDOUS GAS Waterfront Facilities Handling Liquefied Natural Gas Security § 127.701 Security on...

  7. 33 CFR 127.701 - Security on existing facilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... (CONTINUED) WATERFRONT FACILITIES WATERFRONT FACILITIES HANDLING LIQUEFIED NATURAL GAS AND LIQUEFIED HAZARDOUS GAS Waterfront Facilities Handling Liquefied Natural Gas Security § 127.701 Security on...

  8. 33 CFR 127.701 - Security on existing facilities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... (CONTINUED) WATERFRONT FACILITIES WATERFRONT FACILITIES HANDLING LIQUEFIED NATURAL GAS AND LIQUEFIED HAZARDOUS GAS Waterfront Facilities Handling Liquefied Natural Gas Security § 127.701 Security on...

  9. 33 CFR 127.701 - Security on existing facilities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... (CONTINUED) WATERFRONT FACILITIES WATERFRONT FACILITIES HANDLING LIQUEFIED NATURAL GAS AND LIQUEFIED HAZARDOUS GAS Waterfront Facilities Handling Liquefied Natural Gas Security § 127.701 Security on...

  10. 33 CFR 127.701 - Security on existing facilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) WATERFRONT FACILITIES WATERFRONT FACILITIES HANDLING LIQUEFIED NATURAL GAS AND LIQUEFIED HAZARDOUS GAS Waterfront Facilities Handling Liquefied Natural Gas Security § 127.701 Security on...

  11. Perimeter security for Minnesota correctional facilities

    SciTech Connect

    Crist, D.; Spencer, D.D.

    1996-12-31

    For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.

  12. Security systems engineering overview

    SciTech Connect

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  13. Security systems engineering overview

    NASA Astrophysics Data System (ADS)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  14. Physical security technologies for weapons complex reconfiguration facilities

    SciTech Connect

    Jaeger, C.D.

    1994-07-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S&S) team providing assistance to the Department of Energy`s (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S&S life-cycle costs, (2) where feasible automating S&S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S&S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S&S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed.

  15. 33 CFR 127.705 - Security systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator...

  16. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  17. 49 CFR 1544.225 - Security of aircraft and facilities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security of aircraft and facilities. 1544.225... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.225 Security of aircraft and facilities....

  18. 49 CFR 1544.225 - Security of aircraft and facilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security of aircraft and facilities. 1544.225... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.225 Security of aircraft and facilities....

  19. 49 CFR 1544.225 - Security of aircraft and facilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security of aircraft and facilities. 1544.225... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.225 Security of aircraft and facilities....

  20. 49 CFR 1544.225 - Security of aircraft and facilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security of aircraft and facilities. 1544.225... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.225 Security of aircraft and facilities....

  1. Implementation of a secure multi-project laboratory facility

    NASA Astrophysics Data System (ADS)

    Draffin, David M.; Bacha, John S.

    A secure, multiproject facility named the Integrated Technology Development Laboratories (ITDL) has been built. This paper gives some background information on how the ITDL came into existence, along with methods developed to provide for security and laboratory operations. Some details are discussed on the types of resources that are shared between projects, the software design, the hardware design, the power and ground, the communications system, and the configuration management needed to support secure, rapid configuration changes. The facility organization and logistics are also outlined.

  2. 33 CFR 106.220 - Security training for all other OCS facility personnel.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.220 Security training for all...

  3. 33 CFR 106.220 - Security training for all other OCS facility personnel.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.220 Security training for all...

  4. 33 CFR 106.220 - Security training for all other OCS facility personnel.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.220 Security training for all...

  5. 33 CFR 106.220 - Security training for all other OCS facility personnel.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.220 Security training for all...

  6. How to implement security controls for an information security program at CBRN facilities

    SciTech Connect

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  7. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  8. Secure video communications system

    DOEpatents

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  9. Systems security and functional readiness

    SciTech Connect

    Bruckner, D.G.

    1988-01-01

    In Protective Programming Planning, it is important that every facility or installation be configured to support the basic functions and mission of the using organization. This paper addresses the process of identifying the key functional operations of our facilities in Europe and providing the security necessary to keep them operating in natural and man-made threat environments. Functional Readiness is important since many of our existing facilities in Europe were not constructed to meet the demands of today's requirements. There are increased requirements for real-time systems with classified terminals and stringent access control, tempest and other electronic protection devices. One must prioritize the operations of these systems so that essential functions are provided even when the facilities are affected by overt or covert hostile activities.

  10. Network systems security analysis

    NASA Astrophysics Data System (ADS)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  11. Secure videoconferencing equipment switching system and method

    DOEpatents

    Hansen, Michael E.

    2009-01-13

    A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.

  12. 77 FR 61771 - Facility Security Officer Training Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-11

    ... public dockets in the January 17, 2008, issue of the Federal Register (73 FR 3316). Information on... SECURITY Coast Guard Facility Security Officer Training Requirements AGENCY: Coast Guard, DHS. ACTION... receive comments on the development of a Facility Security Officer training program, with the...

  13. Security basics for long-term care facilities.

    PubMed

    Green, Martin

    2015-01-01

    The need for Long-Term Care (LTC) facilities is growing, the author reports, and along with it the need for programs to address the major security concerns of such facilities. In this article he explains how to apply the IAHSS Healthcare Security Industry Guidelines and the Design Guidelines to achieve a safer LTC facility. PMID:26647503

  14. Security basics for long-term care facilities.

    PubMed

    Green, Martin

    2015-01-01

    The need for Long-Term Care (LTC) facilities is growing, the author reports, and along with it the need for programs to address the major security concerns of such facilities. In this article he explains how to apply the IAHSS Healthcare Security Industry Guidelines and the Design Guidelines to achieve a safer LTC facility.

  15. Secure video communications systems

    SciTech Connect

    Smith, R.L.

    1991-10-08

    This patent describes a secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  16. Argonne's performance assessment of major facility systems to support semiconductor manufacturing by the National Security Agency/R Group, Ft. Meade, Maryland

    SciTech Connect

    Harrison, W.; Miller, G.M.

    1990-12-01

    The National Security Agency (NSA) was authorized in 1983 to construct a semiconductor and circuit-board manufacturing plant at its Ft. Meade, Maryland, facility. This facility was to become known as the Special Process Laboratories (SPL) building. Phase I construction was managed by the US Army Corps of Engineers, Baltimore District (USACE/BD) and commenced in January 1986. Phase I construction provided the basic building and support systems, such as the heating, ventilating, and air-conditioning system, the deionized-water and wastewater-treatment systems, and the high-purity-gas piping system. Phase II construction involved fitting the semiconductor manufacturing side of the building with manufacturing tools and enhancing various aspects of the Phase I construction. Phase II construction was managed by NSA and commenced in April 1989. Argonne National Laboratory (ANL) was contracted by USACE/BD midway through the Phase I construction period to provide quality-assured performance reviews of major facility systems in the SPL. Following completion of the Phase I construction, ANL continued its performance reviews under NSA sponsorship, focusing its attention on the enhancements to the various manufacturing support systems of interest. The purpose of this document is to provide a guide to the files that were generated by ANL during its term of technical assistance to USACE/BD and NSA and to explain the quality assurance program that was implemented when ANL conducted its performance reviews of the SPL building's systems. One set of the ANL project files is located at NSA, Ft. Meade, and two sets are at Argonne, Illinois. The ANL sets will be maintained until the year 2000, or for the 10-year estimated life of the project. 1 fig.

  17. Cyber Security and Resilient Systems

    SciTech Connect

    Robert S. Anderson

    2009-07-01

    next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  18. Variable contour securing system

    NASA Technical Reports Server (NTRS)

    Zebus, P. P.; Packer, P. N.; Haynie, C. C. (Inventor)

    1978-01-01

    A variable contour securing system has a retaining structure for a member whose surface contains a variable contour. The retaining mechanism includes a spaced array of adjustable spindles mounted on a housing. Each spindle has a base member support cup at one end. A vacuum source is applied to the cups for seating the member adjacent to the cups. A locking mechanism sets the spindles in a predetermined position once the member has been secured to the spindle support cups.

  19. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Security requirements for access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Within Industry 3004.470 Security requirements for access to unclassified facilities,...

  20. Subsurface Facility System Description Document

    SciTech Connect

    Eric Loros

    2001-07-31

    The Subsurface Facility System encompasses the location, arrangement, size, and spacing of the underground openings. This subsurface system includes accesses, alcoves, and drifts. This system provides access to the underground, provides for the emplacement of waste packages, provides openings to allow safe and secure work conditions, and interfaces with the natural barrier. This system includes what is now the Exploratory Studies Facility. The Subsurface Facility System physical location and general arrangement help support the long-term waste isolation objectives of the repository. The Subsurface Facility System locates the repository openings away from main traces of major faults, away from exposure to erosion, above the probable maximum flood elevation, and above the water table. The general arrangement, size, and spacing of the emplacement drifts support disposal of the entire inventory of waste packages based on the emplacement strategy. The Subsurface Facility System provides access ramps to safely facilitate development and emplacement operations. The Subsurface Facility System supports the development and emplacement operations by providing subsurface space for such systems as ventilation, utilities, safety, monitoring, and transportation.

  1. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... (FSO). 106.210 Section 106.210 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a) General. (1) The FSO may perform other duties within the owner's or operator's organization, provided he...

  2. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) Location of escape and evacuation routes and assembly stations; and (viii) Existing security and safety... conflicting policies between safety and security measures and procedures; (viii) Any conflicting OCS facility...) Use of a vessel interfacing with the OCS facility as a weapon or as a means to cause damage...

  3. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) Location of escape and evacuation routes and assembly stations; and (viii) Existing security and safety... conflicting policies between safety and security measures and procedures; (viii) Any conflicting OCS facility...) Use of a vessel interfacing with the OCS facility as a weapon or as a means to cause damage...

  4. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) Location of escape and evacuation routes and assembly stations; and (viii) Existing security and safety... conflicting policies between safety and security measures and procedures; (viii) Any conflicting OCS facility...) Use of a vessel interfacing with the OCS facility as a weapon or as a means to cause damage...

  5. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... evacuation routes and assembly stations; and (viii) Existing security and safety equipment for protection of...-side security services; (ix) Any conflicting policies between safety and security measures and... and their equipment; (vii) Use of a vessel moored at the facility as a weapon or as a means to...

  6. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... evacuation routes and assembly stations; and (viii) Existing security and safety equipment for protection of...-side security services; (ix) Any conflicting policies between safety and security measures and... and their equipment; (vii) Use of a vessel moored at the facility as a weapon or as a means to...

  7. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... evacuation routes and assembly stations; and (viii) Existing security and safety equipment for protection of...-side security services; (ix) Any conflicting policies between safety and security measures and... and their equipment; (vii) Use of a vessel moored at the facility as a weapon or as a means to...

  8. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... must maintain a TWIC. (b) Qualifications. The FSO must have general knowledge, through training or... modifications to the FSP to the Company Security Officer (CSO); (5) Ensure that any problems identified during... security awareness and vigilance on board the OCS facility; (7) Ensure adequate security training for...

  9. Seven layers of security to help protect biomedical research facilities.

    PubMed

    Mortell, Norman

    2010-04-01

    In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.

  10. Building a Secure Library System.

    ERIC Educational Resources Information Center

    Benson, Allen C.

    1998-01-01

    Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…

  11. Computer security in DOE distributed computing systems

    SciTech Connect

    Hunteman, W.J.

    1990-01-01

    The modernization of DOE facilities amid limited funding is creating pressure on DOE facilities to find innovative approaches to their daily activities. Distributed computing systems are becoming cost-effective solutions to improved productivity. This paper defines and describes typical distributed computing systems in the DOE. The special computer security problems present in distributed computing systems are identified and compared with traditional computer systems. The existing DOE computer security policy supports only basic networks and traditional computer systems and does not address distributed computing systems. A review of the existing policy requirements is followed by an analysis of the policy as it applies to distributed computing systems. Suggested changes in the DOE computer security policy are identified and discussed. The long lead time in updating DOE policy will require guidelines for applying the existing policy to distributed systems. Some possible interim approaches are identified and discussed. 2 refs.

  12. Factors affecting distributed system security

    SciTech Connect

    Nessett, D.M.

    1985-11-13

    Recent work examining distributed system security requirements is critiqued. A notion of trust based on distributed system topology and distributed system node evaluation levels proposed in that work is shown to be deficient. The notion fails to make allowances for the distributed system physical security environment, security factors related to the management of distributed systems by more than one jurisdictive authority and interactions that can occur between nodes supporting different mandatory and discretionary security mechanisms.

  13. Physical security and vulnerability modeling for infrasturcture facilities.

    SciTech Connect

    Nozick, Linda Karen; Jones, Dean A.; Davis, Chad Edward; Turnquist, Mark Alan

    2006-07-01

    A model of malicious intrusions in infrastructure facilities is developed, using a network representation of the system structure together with Markov models of intruder progress and strategy. This structure provides an explicit mechanism to estimate the probability of successful breaches of physical security, and to evaluate potential improvements. Simulation is used to analyze varying levels of imperfect information on the part of the intruders in planning their attacks. An example of an intruder attempting to place an explosive device on an airplane at an airport gate illustrates the structure and potential application of the model.

  14. Cyberspace security system

    DOEpatents

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  15. Secure Repayable Storage System

    NASA Astrophysics Data System (ADS)

    Alkharobi, T. M.

    This paper proposes a method to create a system that allows data to be stored in several locations in secure and reliable manner. The system should create several shares from the data such that only pre-specified subsets of these shares can be used to retrieve the original data. The shares then will be distributed to shareholders over a local and/or wide area network. The system should allow requesting some/all shares from shareholders and using them to rebuild the data.

  16. 33 CFR 106.405 - Format and content of the Facility Security Plan (FSP).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Plan (FSP) § 106.405 Format and content of the...

  17. 33 CFR 106.405 - Format and content of the Facility Security Plan (FSP).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Plan (FSP) § 106.405 Format and content of the...

  18. 33 CFR 106.405 - Format and content of the Facility Security Plan (FSP).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Plan (FSP) § 106.405 Format and content of the...

  19. 33 CFR 106.405 - Format and content of the Facility Security Plan (FSP).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Plan (FSP) § 106.405 Format and content of the...

  20. 33 CFR 106.405 - Format and content of the Facility Security Plan (FSP).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Plan (FSP) § 106.405 Format and content of the...

  1. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  2. Healthcare security staffing for smaller facilities: where science meets art.

    PubMed

    Warren, Bryan

    2013-01-01

    Obtaining effective security resourcing and staffing for smaller healthcare facilities presents many difficulties, according to the author In this article, he provides guidance to security practitioners on taking existing data and translating it into a language that administration will understand and appreciate.

  3. Insider threat to secure facilities: data analysis

    SciTech Connect

    Not Available

    1980-05-09

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

  4. Chemical Facility Security Improvement Act of 2013

    THOMAS, 113th Congress

    Rep. Jackson Lee, Sheila [D-TX-18

    2013-01-03

    02/12/2013 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Security system signal supervision

    SciTech Connect

    Chritton, M.R. ); Matter, J.C. )

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  6. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Information regarding security risk for a chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200...

  7. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Information regarding security risk for a... SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information regarding security risk for a chemical facility. (a) Information to determine security risk. In order...

  8. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Information regarding security risk for a... SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information regarding security risk for a chemical facility. (a) Information to determine security risk. In order...

  9. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Information regarding security risk for a... SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information regarding security risk for a chemical facility. (a) Information to determine security risk. In order...

  10. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Information regarding security risk for a... SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information regarding security risk for a chemical facility. (a) Information to determine security risk. In order...

  11. Computer/information security design approaches for Complex 21/Reconfiguration facilities

    SciTech Connect

    Hunteman, W.J.; Zack, N.R.; Jaeger, C.D.

    1993-08-01

    Los Alamos National Laboratory and Sandia National Laboratories have been designated the technical lead laboratories to develop the design of the computer/information security, safeguards, and physical security systems for all of the DOE Complex 21/Reconfiguration facilities. All of the automated information processing systems and networks in these facilities will be required to implement the new DOE orders on computer and information security. The planned approach for a highly integrated information processing capability in each of the facilities will require careful consideration of the requirements in DOE Orders 5639.6 and 1360.2A. The various information protection requirements and user clearances within the facilities will also have a significant effect on the design of the systems and networks. Fulfilling the requirements for proper protection of the information and compliance with DOE orders will be possible because the computer and information security concerns are being incorporated in the early design activities. This paper will discuss the computer and information security addressed in the integrated design effort, uranium/lithium, plutonium, plutonium high explosive/assembly facilities.

  12. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Vulnerability and Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability...

  13. 33 CFR 106.215 - Company or OCS facility personnel with security duties.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Company or OCS facility personnel with security duties. 106.215 Section 106.215 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility...

  14. 33 CFR 105.205 - Facility Security Officer (FSO).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Facility Security Officer (FSO... Officer (FSO). (a) General. (1) The FSO may perform other duties within the owner's or operator's organization, provided he or she is able to perform the duties and responsibilities required of the FSO....

  15. 33 CFR 105.205 - Facility Security Officer (FSO).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Facility Security Officer (FSO... Officer (FSO). (a) General. (1) The FSO may perform other duties within the owner's or operator's organization, provided he or she is able to perform the duties and responsibilities required of the FSO....

  16. 33 CFR 106.215 - Company or OCS facility personnel with security duties.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Company or OCS facility personnel... Outer Continental Shelf (OCS) Facility Security Requirements § 106.215 Company or OCS facility personnel with security duties. Company and OCS facility personnel responsible for security duties must...

  17. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  18. Information Security and Integrity Systems

    NASA Technical Reports Server (NTRS)

    1990-01-01

    Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.

  19. Power Systems Development Facility

    SciTech Connect

    Southern Company Services

    2009-01-31

    In support of technology development to utilize coal for efficient, affordable, and environmentally clean power generation, the Power Systems Development Facility (PSDF), located in Wilsonville, Alabama, has routinely demonstrated gasification technologies using various types of coals. The PSDF is an engineering scale demonstration of key features of advanced coal-fired power systems, including a Transport Gasifier, a hot gas particulate control device, advanced syngas cleanup systems, and high-pressure solids handling systems. This final report summarizes the results of the technology development work conducted at the PSDF through January 31, 2009. Twenty-one major gasification test campaigns were completed, for a total of more than 11,000 hours of gasification operation. This operational experience has led to significant advancements in gasification technologies.

  20. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    DOEpatents

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  1. Power systems facility

    NASA Technical Reports Server (NTRS)

    1989-01-01

    In 1984, the President directed NASA to undertake the development of Space Station Freedom, the next step in a broad-based U.S. civil space program to develop space-flight capabilities and to exploit space for scientific, technological, and commercial purposes. Under that direction, NASA awarded contracts in 1985 for concept definition and preliminary design studies. Those studies have been completed and the Space Station Freedom Program is now in the final design and development phase, leading to a permanently manned space station that will be operational in the mid-1990's. Here at the Lewis Research Center, with Rocketdyne, we are developing and building the S.S. Freedom electric power system (EPS) hardware and software. A major portion of the EPS will be tested at Lewis. The Power Systems Facility was specifically designed for testing the EPS and uses the latest in testing equipment.

  2. Evaluating security systems using SNAP-PC

    SciTech Connect

    Tobin, C.D.; Gregg, M.L.; Erdbruegger, M.R.

    1986-08-01

    SNAP-PC (Safeguards Network Analysis Procedure for the Personal Computer) is a user-friendly version of SNAP designed for IBM XT or AT compatible microcomputers. SNAP is a simulation-based analysis technique supporting the evaluation of fixed-site security systems to prevent theft or sabotage of a specified target. Through SNAP the user is able to define the facility, the sensor system, the guard operating policies and response tactics, and the adversary's attack plan. SNAP uses the system definition to analyze its effectiveness in defending against specific threats. The system performance statistics measured by SNAP include: Adversary mission success probability, guard and adversary casualties, duration of engagements, outcome of engagements, duration of scenario by outcome (adversary success/fail), and adversary duration by facility location. The SNAP-PC package provides a compact analysis tool that can be used to analyze a wide variety of security systems. It places SNAP, a proven evaluation technique, in the hands of on-site personnel, not just computer analysts. The support programs eliminate the labor intensive tedious task of organizing and sorting through reams of output reports and greatly reduce the time previously required to analyze a security system.

  3. Towards an Experimental Testbed Facility for Cyber-Physical Security Research

    SciTech Connect

    Edgar, Thomas W.; Manz, David O.; Carroll, Thomas E.

    2012-01-07

    Cyber-Physical Systems (CPSs) are under great scrutiny due to large Smart Grid investments and recent high profile security vulnerabilities and attacks. Research into improved security technologies, communication models, and emergent behavior is necessary to protect these systems from sophisticated adversaries and new risks posed by the convergence of CPSs with IT equipment. However, cyber-physical security research is limited by the lack of access to universal cyber-physical testbed facilities that permit flexible, high-fidelity experiments. This paper presents a remotely-configurable and community-accessible testbed design that integrates elements from the virtual, simulated, and physical environments. Fusing data between the three environments enables the creation of realistic and scalable environments where new functionality and ideas can be exercised. This novel design will enable the research community to analyze and evaluate the security of current environments and design future, secure, cyber-physical technologies.

  4. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  5. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  6. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  7. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  8. 10 CFR 76.119 - Security facility approval and safeguarding of National Security Information and Restricted Data.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security...

  9. 6 CFR 37.43 - Physical security of DMV production facilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities § 37.43 Physical security of DMV production facilities. (a) States must ensure the physical security of facilities where driver's licenses and identification cards are...

  10. 10 CFR 95.21 - Withdrawal of requests for facility security clearance.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Withdrawal of requests for facility security clearance. 95.21 Section 95.21 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.21 Withdrawal...

  11. Knowledge-based system for computer security

    SciTech Connect

    Hunteman, W.J.

    1988-01-01

    The rapid expansion of computer security information and technology has provided little support for the security officer to identify and implement the safeguards needed to secure a computing system. The Department of Energy Center for Computer Security is developing a knowledge-based computer security system to provide expert knowledge to the security officer. The system is policy-based and incorporates a comprehensive list of system attack scenarios and safeguards that implement the required policy while defending against the attacks. 10 figs.

  12. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... protection systems; (iv) Procedural policies; (v) Radio and telecommunication systems, including computer systems and networks; and (vi) Essential services. (3) The FSA report must list the persons,...

  13. 33 CFR 106.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... protection systems; (iv) Procedural policies; (v) Radio and telecommunication systems, including computer systems and networks; and (vi) Essential services. (3) The FSA report must list the persons,...

  14. Power Systems Development Facility

    SciTech Connect

    2003-07-01

    This report discusses Test Campaign TC12 of the Kellogg Brown & Root, Inc. (KBR) Transport Gasifier train with a Siemens Westinghouse Power Corporation (SW) particle filter system at the Power Systems Development Facility (PSDF) located in Wilsonville, Alabama. The Transport Gasifier is an advanced circulating fluidized-bed reactor designed to operate as either a combustor or a gasifier using a particulate control device (PCD). While operating as a gasifier, either air or oxygen can be used as the oxidant. Test run TC12 began on May 16, 2003, with the startup of the main air compressor and the lighting of the gasifier start-up burner. The Transport Gasifier operated until May 24, 2003, when a scheduled outage occurred to allow maintenance crews to install the fuel cell test unit and modify the gas clean-up system. On June 18, 2003, the test run resumed when operations relit the start-up burner, and testing continued until the scheduled end of the run on July 14, 2003. TC12 had a total of 733 hours using Powder River Basin (PRB) subbituminous coal. Over the course of the entire test run, gasifier temperatures varied between 1,675 and 1,850 F at pressures from 130 to 210 psig.

  15. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  16. Power Systems Development Facility

    SciTech Connect

    Southern Company Services

    2004-04-30

    This report discusses Test Campaign TC15 of the Kellogg Brown & Root, Inc. (KBR) Transport Gasifier train with a Siemens Power Generation, Inc. (SPG) particle filter system at the Power Systems Development Facility (PSDF) located in Wilsonville, Alabama. The Transport Gasifier is an advanced circulating fluidized-bed reactor designed to operate as either a combustor or gasifier using a particulate control device (PCD). While operating as a gasifier, either air or oxygen can be used as the oxidant. Test run TC15 began on April 19, 2004, with the startup of the main air compressor and the lighting of the gasifier startup burner. The Transport Gasifier was shutdown on April 29, 2004, accumulating 200 hours of operation using Powder River Basin (PRB) subbituminous coal. About 91 hours of the test run occurred during oxygen-blown operations. Another 6 hours of the test run was in enriched-air mode. The remainder of the test run, approximately 103 hours, took place during air-blown operations. The highest operating temperature in the gasifier mixing zone mostly varied from 1,800 to 1,850 F. The gasifier exit pressure ran between 200 and 230 psig during air-blown operations and between 110 and 150 psig in oxygen-enhanced air operations.

  17. POWER SYSTEMS DEVELOPMENT FACILITY

    SciTech Connect

    Unknown

    2002-11-01

    This report discusses test campaign GCT4 of the Kellogg Brown & Root, Inc. (KBR) transport reactor train with a Siemens Westinghouse Power Corporation (Siemens Westinghouse) particle filter system at the Power Systems Development Facility (PSDF) located in Wilsonville, Alabama. The transport reactor is an advanced circulating fluidized-bed reactor designed to operate as either a combustor or a gasifier using one of two possible particulate control devices (PCDs). The transport reactor was operated as a pressurized gasifier during GCT4. GCT4 was planned as a 250-hour test run to continue characterization of the transport reactor using a blend of several Powder River Basin (PRB) coals and Bucyrus limestone from Ohio. The primary test objectives were: Operational Stability--Characterize reactor loop and PCD operations with short-term tests by varying coal-feed rate, air/coal ratio, riser velocity, solids-circulation rate, system pressure, and air distribution. Secondary objectives included the following: Reactor Operations--Study the devolatilization and tar cracking effects from transient conditions during transition from start-up burner to coal. Evaluate the effect of process operations on heat release, heat transfer, and accelerated fuel particle heat-up rates. Study the effect of changes in reactor conditions on transient temperature profiles, pressure balance, and product gas composition. Effects of Reactor Conditions on Synthesis Gas Composition--Evaluate the effect of air distribution, steam/coal ratio, solids-circulation rate, and reactor temperature on CO/CO{sub 2} ratio, synthesis gas Lower Heating Value (LHV), carbon conversion, and cold and hot gas efficiencies. Research Triangle Institute (RTI) Direct Sulfur Recovery Process (DSRP) Testing--Provide syngas in support of the DSRP commissioning. Loop Seal Operations--Optimize loop seal operations and investigate increases to previously achieved maximum solids-circulation rate.

  18. 6 CFR 37.43 - Physical security of DMV production facilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Physical security of DMV production facilities. 37.43 Section 37.43 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License...

  19. Security: Detection, Emergency System, Guard Services

    ERIC Educational Resources Information Center

    Nation's Schools and Colleges, 1974

    1974-01-01

    Three short articles describe (respectively) a student security advisory council at one high school that involves students in security work, emergency telephone systems on two university campuses, and tips for hiring security guards for colleges. (Author/DN)

  20. System and method for secure group transactions

    DOEpatents

    Goldsmith, Steven Y.

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  1. It Security and EO Systems

    NASA Astrophysics Data System (ADS)

    Burnett, M.

    2010-12-01

    One topic that is beginning to influence the systems that support these goals is that of Information Technology (IT) Security. Unsecure systems are vulnerable to increasing attacks and other negative consequences; sponsoring agencies are correspondingly responding with more refined policies and more stringent security requirements. These affect how EO systems can meet the goals of data and service interoperability and harmonization through open access, transformation and visualization services. Contemporary systems, including the vision of a system-of-systems (such as GEOSS, the Global Earth Observation System of Systems), utilize technologies that support a distributed, global, net-centric environment. These types of systems have a high reliance on the open systems, web services, shared infrastructure and data standards. The broader IT industry has developed and used these technologies in their business and mission critical systems for many years. Unfortunately, the IT industry, and their customers have learned the importance of protecting their assets and resources (computing and information) as they have been forced to respond to an ever increasing number and more complex illegitimate “attackers”. This presentation will offer an overview of work done by the CEOS WGISS organization in summarizing security threats, the challenges to responding to them and capturing the current state of the practice within the EO community.

  2. Mobile security surveillance system

    NASA Astrophysics Data System (ADS)

    Sokolnikov, Andre

    2006-05-01

    The necessity to control certain areas from outside intrusion or, vice versa, preventing subjects/objects (e.g. prisoners) from leaving a controlled area has brought to life numerous designs of surveillance systems for the above-mentioned tasks. Fibers, laser beams, microwaves, etc have been used for decades to provide an alarm signal, should anyone or anything cross a light, radio beam or break a fiber. However, it is difficult to distinguish a stray animal from a human being, or even a snow ball from the first two using the conventional surveillance designs. False alarms render practically useless the above means, especially for field applications. It is possible, nonetheless, to set up an automatic system that discriminates objects/subjects crossing the control line/perimeter - a statistical approach which includes time series analysis is proposed as a solution for the problem.

  3. Multimedia Security System for Security and Medical Applications

    ERIC Educational Resources Information Center

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  4. Energy Systems Integration Facility Overview

    SciTech Connect

    Arvizu, Dan; Chistensen, Dana; Hannegan, Bryan; Garret, Bobi; Kroposki, Ben; Symko-Davies, Martha; Post, David; Hammond, Steve; Kutscher, Chuck; Wipke, Keith

    2014-02-28

    The U.S. Department of Energy's Energy Systems Integration Facility (ESIF) is located at the National Renewable Energy Laboratory is the right tool, at the right time... a first-of-its-kind facility that addresses the challenges of large-scale integration of clean energy technologies into the energy systems that power the nation.

  5. Energy Systems Integration Facility Overview

    ScienceCinema

    Arvizu, Dan; Chistensen, Dana; Hannegan, Bryan; Garret, Bobi; Kroposki, Ben; Symko-Davies, Martha; Post, David; Hammond, Steve; Kutscher, Chuck; Wipke, Keith

    2016-07-12

    The U.S. Department of Energy's Energy Systems Integration Facility (ESIF) is located at the National Renewable Energy Laboratory is the right tool, at the right time... a first-of-its-kind facility that addresses the challenges of large-scale integration of clean energy technologies into the energy systems that power the nation.

  6. Telephone wire is backbone of security system

    SciTech Connect

    Brede, K.; Rackson, L.T.

    1995-09-01

    Video provides a variety of low-cost, high-quality solutions in today`s security environment. Cost-conscious managers of power generation stations, casinos, prison facilities, military bases and office buildings are considering using regular telephone wire (unshielded twisted pair-UTP) within their existing systems as the backbone of a video to the PC, personal and video-conferencing and training are other areas where phone wire in a building can save money and provide an alternative to coax or fiber for video. More and more, businesses and government agencies are meeting their needs efficiently by using telephone wires for more than just telephones.

  7. 36 CFR Appendix A to Part 1234 - Minimum Security Standards for Level III Federal Facilities

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Minimum Security Standards for.... 1234, App. A Appendix A to Part 1234—Minimum Security Standards for Level III Federal Facilities Recommended Standards Chart Level III Perimeter Security Parking: Control of facility parking...

  8. POWER SYSTEMS DEVELOPMENT FACILITY

    SciTech Connect

    Unknown

    2002-05-01

    This report discusses test campaign GCT3 of the Halliburton KBR transport reactor train with a Siemens Westinghouse Power Corporation (Siemens Westinghouse) particle filter system at the Power Systems Development Facility (PSDF) located in Wilsonville, Alabama. The transport reactor is an advanced circulating fluidized-bed reactor designed to operate as either a combustor or a gasifier using one of two possible particulate control devices (PCDs). The transport reactor was operated as a pressurized gasifier during GCT3. GCT3 was planned as a 250-hour test run to commission the loop seal and continue the characterization of the limits of operational parameter variations using a blend of several Powder River Basin coals and Bucyrus limestone from Ohio. The primary test objectives were: (1) Loop Seal Commissioning--Evaluate the operational stability of the loop seal with sand and limestone as a bed material at different solids circulation rates and establish a maximum solids circulation rate through the loop seal with the inert bed. (2) Loop Seal Operations--Evaluate the loop seal operational stability during coal feed operations and establish maximum solids circulation rate. Secondary objectives included the continuation of reactor characterization, including: (1) Operational Stability--Characterize the reactor loop and PCD operations with short-term tests by varying coal feed, air/coal ratio, riser velocity, solids circulation rate, system pressure, and air distribution. (2) Reactor Operations--Study the devolatilization and tar cracking effects from transient conditions during transition from start-up burner to coal. Evaluate the effect of process operations on heat release, heat transfer, and accelerated fuel particle heat-up rates. Study the effect of changes in reactor conditions on transient temperature profiles, pressure balance, and product gas composition. (3) Effects of Reactor Conditions on Syngas Composition--Evaluate the effect of air distribution, steam

  9. 10 CFR 95.49 - Security of automatic data processing (ADP) systems.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security...

  10. Information technology security system engineering methodology

    NASA Technical Reports Server (NTRS)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  11. Securing the Global Airspace System Via Identity-Based Security

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  12. Internetting tactical security sensor systems

    NASA Astrophysics Data System (ADS)

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control

  13. Managing secure computer systems and networks.

    PubMed

    Von Solms, B

    1996-10-01

    No computer system or computer network can today be operated without the necessary security measures to secure and protect the electronic assets stored, processed and transmitted using such systems and networks. Very often the effort in managing such security and protection measures are totally underestimated. This paper provides an overview of the security management needed to secure and protect a typical IT system and network. Special reference is made to this management effort in healthcare systems, and the role of the information security officer is also highlighted.

  14. Food security practice in Kansas schools and health care facilities.

    PubMed

    Yoon, Eunju; Shanklin, Carol W

    2007-02-01

    This pilot study investigated perceived importance and frequency of specific preventive measures, and food and nutrition professionals' and foodservice directors' willingness to develop a food defense management plan. A mail questionnaire was developed based on the US Department of Agriculture document, Biosecurity Checklist for School Foodservice Programs--Developing a Biosecurity Management Plan. The survey was sent to food and nutrition professionals and foodservice operators in 151 acute care hospitals, 181 long-term-care facilities, and 450 school foodservice operations. Chemical use and storage was perceived as the most important practice to protect an operation and was the practice implemented most frequently. Results of the study indicate training programs on food security are needed to increase food and nutrition professionals' motivation to implement preventive measures.

  15. Security Encryption Scheme for Communication of Web Based Control Systems

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  16. Threats to financial system security

    SciTech Connect

    McGovern, D.E.

    1997-06-01

    The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.

  17. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect

    Steele, B.J.; Papier, I.I.

    1996-06-20

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  18. Improving Security in Schools. Managing School Facilities, Guide 4.

    ERIC Educational Resources Information Center

    Department for Education and Employment, London (England).

    This booklet offers guidance on how to improve school security, including advice on the management of security and the roles of local education authorities, school governors, and headteachers. The guide describes how schools can carry out their own security surveys, assess themselves in terms of risk, and then consider security measures…

  19. The Livermore Security Console system

    SciTech Connect

    Smart, J.A.

    1987-04-14

    The Console system contains multiple, redundant workstations that enable operator to monitor alarms, assess incidents, and dispatch field personnel. Each workstation is heavily computerized and incorporates automatic video switching and recording, integrated radio and telephone communications, and an advanced high-resolution map and incident-display system. Operation of the workstation is closely integrated with the map display system, allowing an operators to readily pan and zoom. Objects of security interest are overlaid on the map using color. Access to alarm sensor information, entry-control device status, and the closed-circuit television system is obtained by zooming into an area and selecting the appropriate icons or symbols on the maps. Control menus are overlaid on the map. Several large databases have been closely integrated with the map display system, providing access to information such as telephone numbers and building or room occupants. An expert system is currently being integrated with the map display system. Object state changes are interpreted by a rule-based inference engine. Incidents are overlaid on the map.

  20. Cyberspace Security Econometrics System (CSES)

    2012-07-27

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing complance pressures require careful consideration and adaption. The CSES provides a measure (i.e. a quantitative indication) of reliability, performance, and/or safety of a system that accounts for themore » criticality of each requirement as a function of one or more stakeholders' interests in that requirement. For a given stakeholder, CSES accounts for the variance that may exist among the stakes one attaches to meeting each requirement.« less

  1. Cyberspace Security Econometrics System (CSES)

    SciTech Connect

    2012-07-27

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing complance pressures require careful consideration and adaption. The CSES provides a measure (i.e. a quantitative indication) of reliability, performance, and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders' interests in that requirement. For a given stakeholder, CSES accounts for the variance that may exist among the stakes one attaches to meeting each requirement.

  2. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  3. Secure resource management: Specifying and testing secure operating systems

    SciTech Connect

    Archer, M.; Frincke, D.A.; Levitt, K. . Div. of Computer Science)

    1990-04-10

    Much work has been devoted to methods for reasoning about the specifications of operating system specifications, the goal being to develop specifications for an operating system that are verified to be secure. Before the verification should be attempted, the specifications should be tested. This paper presents tools that can assist in the security testing of specifications. The first tool is based on the final Algebra Specification and Execution (FASE) system, and would be used to test specifications with real input values. FASE is an executable specification language which is operational in style, in which entities are represented in terms of their observable behavior. To facilitate the testing of an operating system (and its specification), use FASE we have specified a Secure Resource Manager (SRM), a generic template of an operating system. The SRM specification can be specialized to a specification of a particular operating system; the SRM is quite general and handles most features of modern nondistributed operating systems. The second tool, called the PLANNER, is used to derive a sequence of operations that exhibits a security flaw, most often a covert channel for information flow. The PLANNER is based on classical methods of AI planning, specialized to achieve goals concerned with information flow. The tools are demonstrated with respect to a simple operating system specification develop by Millen.

  4. Radio frequency security system, method for a building facility or the like, and apparatus and methods for remotely monitoring the status of fire extinguishers

    DOEpatents

    Runyon, Larry; Gunter, Wayne M.; Gilbert, Ronald W.

    2006-07-25

    A system for remotely monitoring the status of one or more fire extinguishers includes means for sensing at least one parameter of each of the fire extinguishers; means for selectively transmitting the sensed parameters along with information identifying the fire extinguishers from which the parameters were sensed; and means for receiving the sensed parameters and identifying information for the fire extinguisher or extinguishers at a common location. Other systems and methods for remotely monitoring the status of multiple fire extinguishers are also provided.

  5. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  6. 33 CFR 105.210 - Facility personnel with security duties.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous... control techniques; (f) Security related communications; (g) Knowledge of emergency procedures...

  7. 33 CFR 105.210 - Facility personnel with security duties.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management...

  8. Application of Framework for Integrating Safety, Security and Safeguards (3Ss) into the Design Of Used Nuclear Fuel Storage Facility

    SciTech Connect

    Badwan, Faris M.; Demuth, Scott F

    2015-01-06

    Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is a fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design of the

  9. A security vulnerabilities assessment tool for interim storage facilities of low-level radioactive wastes.

    PubMed

    Bible, J; Emery, R J; Williams, T; Wang, S

    2006-11-01

    Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to

  10. A security vulnerabilities assessment tool for interim storage facilities of low-level radioactive wastes.

    PubMed

    Bible, J; Emery, R J; Williams, T; Wang, S

    2006-11-01

    Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to

  11. Safeguards and security considerations for automated and robotic systems

    SciTech Connect

    Jordan, S.E.; Jaeger, C.D.

    1994-09-01

    Within the reconfigured Nuclear Weapons Complex there will be a large number of automated and robotic (A&R) systems because of the many benefits derived from their use. To meet the overall security requirements of a facility, consideration must be given to those systems that handle and process nuclear material. Since automation and robotics is a relatively new technology, not widely applied to the Nuclear Weapons Complex, safeguards and security (S&S) issues related to these systems have not been extensively explored, and no guidance presently exists. The goal of this effort is to help integrate S&S into the design of future A&R systems. Towards this, the authors first examined existing A and R systems from a security perspective to identify areas of concern and possible solutions of these problems. They then were able to develop generalized S&S guidance and design considerations for automation and robotics.

  12. Secure Internet video conferencing for assessing acute medical problems in a nursing facility.

    PubMed Central

    Weiner, M.; Schadow, G.; Lindbergh, D.; Warvel, J.; Abernathy, G.; Dexter, P.; McDonald, C. J.

    2001-01-01

    Although video-based teleconferencing is becoming more widespread in the medical profession, especially for scheduled consultations, applications for rapid assessment of acute medical problems are rare. Use of such a video system in a nursing facility may be especially beneficial, because physicians are often not immediately available to evaluate patients. We have assembled and tested a portable, wireless conferencing system to prepare for a randomized trial of the system s influence on resource utilization and satisfaction. The system includes a rolling cart with video conferencing hardware and software, a remotely controllable digital camera, light, wireless network, and battery. A semi-automated paging system informs physicians of patient s study status and indications for conferencing. Data transmission occurs wirelessly in the nursing home and then through Internet cables to the physician s home. This provides sufficient bandwidth to support quality motion images. IPsec secures communications. Despite human and technical challenges, this system is affordable and functional. Images Figure 1 PMID:11825286

  13. [Security Management in Clinical Laboratory Departments and Facilities: Current Status and Issues].

    PubMed

    Ishida, Haku; Nakamura, Junji; Yoshida, Hiroshi; Koike, Masaru; Inoue, Yuji

    2014-11-01

    We conducted a questionnaire survey regarding the current activities for protecting patients' privacy and the security of information systems (IS) related to the clinical laboratory departments of university hospitals, certified training facilities for clinical laboratories, and general hospitals in Yamaguchi Prefecture. The response rate was 47% from 215 medical institutions, including three commercial clinical laboratory centers. The results showed that there were some differences in management activities among facilities with respect to continuing education, the documentation or regulation of operational management for paper records, electronic information, remaining samples, genetic testing, and laboratory information for secondary use. They were suggested to be caused by differences in functions between university and general hospitals, differences in the scale of hospitals, or whether or not hospitals have received accreditation or ISO 15189. Regarding the IS, although the majority of facilities had sufficiently employed the access control to IS, there was some room for improvement in the management of special cases such as VIPs and patients with HIV infection. Furthermore, there were issues regarding the login method for computers shared by multiple staff, the showing of the names of personnel in charge of reports, and the risks associated with direct connections to systems and the Internet and the use of portable media such as USB memory sticks. These results indicated that further efforts are necessary for each facility to continue self-assessment and make improvements. PMID:27509732

  14. [Security Management in Clinical Laboratory Departments and Facilities: Current Status and Issues].

    PubMed

    Ishida, Haku; Nakamura, Junji; Yoshida, Hiroshi; Koike, Masaru; Inoue, Yuji

    2014-11-01

    We conducted a questionnaire survey regarding the current activities for protecting patients' privacy and the security of information systems (IS) related to the clinical laboratory departments of university hospitals, certified training facilities for clinical laboratories, and general hospitals in Yamaguchi Prefecture. The response rate was 47% from 215 medical institutions, including three commercial clinical laboratory centers. The results showed that there were some differences in management activities among facilities with respect to continuing education, the documentation or regulation of operational management for paper records, electronic information, remaining samples, genetic testing, and laboratory information for secondary use. They were suggested to be caused by differences in functions between university and general hospitals, differences in the scale of hospitals, or whether or not hospitals have received accreditation or ISO 15189. Regarding the IS, although the majority of facilities had sufficiently employed the access control to IS, there was some room for improvement in the management of special cases such as VIPs and patients with HIV infection. Furthermore, there were issues regarding the login method for computers shared by multiple staff, the showing of the names of personnel in charge of reports, and the risks associated with direct connections to systems and the Internet and the use of portable media such as USB memory sticks. These results indicated that further efforts are necessary for each facility to continue self-assessment and make improvements.

  15. Post 9-11 Security Issues for Non-Power Reactor Facilities

    SciTech Connect

    Zaffuts, P. J.

    2003-02-25

    This paper addresses the legal and practical issues arising out of the design and implementation of a security-enhancement program for non power reactor nuclear facilities. The security enhancements discussed are derived from the commercial nuclear power industry's approach to security. The nuclear power industry's long and successful experience with protecting highly sensitive assets provides a wealth of information and lessons that should be examined by other industries contemplating security improvements, including, but not limited to facilities using or disposing of nuclear materials. This paper describes the nuclear industry's approach to security, the advantages and disadvantages of its constituent elements, and the legal issues that facilities will need to address when adopting some or all of these elements in the absence of statutory or regulatory requirements to do so.

  16. Adapting Positive Behavioral Interventions and Supports for Secure Juvenile Justice Settings: Improving Facility-Wide Behavior

    ERIC Educational Resources Information Center

    Jolivette, Kristine; Nelson, C. Michael

    2010-01-01

    The popularity and success of positive behavioral interventions and supports (PBIS) in public schools across the United States has led professionals to advocate for its implementation in secure juvenile settings. Statewide implementation efforts have been mounted in several jurisdictions, and a number of secure facilities are applying it with…

  17. 21 CFR 1301.77 - Security controls for freight forwarding facilities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Security controls for freight forwarding facilities. 1301.77 Section 1301.77 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION OF MANUFACTURERS, DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Security...

  18. 21 CFR 1301.77 - Security controls for freight forwarding facilities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Security controls for freight forwarding facilities. 1301.77 Section 1301.77 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION OF MANUFACTURERS, DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Security...

  19. 21 CFR 1301.77 - Security controls for freight forwarding facilities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Security controls for freight forwarding facilities. 1301.77 Section 1301.77 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION OF MANUFACTURERS, DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Security...

  20. 21 CFR 1301.77 - Security controls for freight forwarding facilities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Security controls for freight forwarding facilities. 1301.77 Section 1301.77 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION OF MANUFACTURERS, DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Security...

  1. 21 CFR 1301.77 - Security controls for freight forwarding facilities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Security controls for freight forwarding facilities. 1301.77 Section 1301.77 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION OF MANUFACTURERS, DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Security...

  2. National Ignition Facility system design requirements conventional facilities SDR001

    SciTech Connect

    Hands, J.

    1996-04-09

    This System Design Requirements (SDR) document specifies the functions to be performed and the minimum design requirements for the National Ignition Facility (NIF) site infrastructure and conventional facilities. These consist of the physical site and buildings necessary to house the laser, target chamber, target preparation areas, optics support and ancillary functions.

  3. Robotic systems for homeland security

    NASA Astrophysics Data System (ADS)

    Esser, Brian; Miller, Jon; Huston, Dryver R.; Bourn, Phil

    2004-07-01

    This paper will present the concept of utilizing various mobile robotic platforms for homeland security. Highly specialized mobile robots equipped with the proper sensors and data processing capabilities have the ability to provide security and surveillance for a wide variety of applications. Large infrastructure components, such as bridges, pipelines, dams, and electrical power grids pose severe challenges for monitoring, surveillance, and protection against man-made and natural hazards. The structures are enormous, often with awkward and dangerous configurations that make it difficult, if not impossible, for continuous human surveillance. Properly outfitted robots have the potential to provide long-term surveillance without requiring continuous human supervision. Furthermore, these robotic platforms can have disaster mitigation capabilities such as evaluation of infrastructure integrity at the disaster site. The results presented will include proof-of-concept robotic platforms equipped with various sensor arrays, as well as discussion of design criteria for numerous homeland security applications.

  4. High Assurance Models for Secure Systems

    ERIC Educational Resources Information Center

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  5. 78 FR 48037 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... required security education training for employees of NRC licensees possessing security clearances so that... National Security Information, which was published in the Federal Register on January 5, 2010 (75 FR 707... implementation of the Executive Order, issued a final rule (75 FR 37254; June 28, 2010) amending 32 CFR...

  6. 33 CFR 105.210 - Facility personnel with security duties.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous... effects, baggage, cargo, and vessel stores; and (m) The meaning and the consequential requirements of...

  7. Security Against Vandalism. It Takes Facts, Feelings and Facilities

    ERIC Educational Resources Information Center

    Weeks, Susan; And Others

    1976-01-01

    Measures to decrease vandalism include participation in planning by students, community members, and school personnel; principals with strong leadership capabilities; unobtrusive security measures; architectural solutions; and prompt preventive maintenance. (MLF)

  8. Recommended Practice for Securing Control System Modems

    SciTech Connect

    James R. Davidson; Jason L. Wright

    2008-01-01

    This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

  9. Situated Usability Testing for Security Systems

    SciTech Connect

    Greitzer, Frank L.

    2011-03-02

    While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused on matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.

  10. CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL

    SciTech Connect

    Kathleen A. Lee

    2008-01-01

    The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

  11. Secure videoconferencing equipment switching system and method

    DOEpatents

    Dirks, David H; Gomes, Diane; Stewart, Corbin J; Fischer, Robert A

    2013-04-30

    Examples of systems described herein include videoconferencing systems having audio/visual components coupled to a codec. The codec may be configured by a control system. Communication networks having different security levels may be alternately coupled to the codec following appropriate configuration by the control system. The control system may also be coupled to the communication networks.

  12. Control Systems Cyber Security Standards Support Activities

    SciTech Connect

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  13. Secure and Efficient Routable Control Systems

    SciTech Connect

    Edgar, Thomas W.; Hadley, Mark D.; Manz, David O.; Winn, Jennifer D.

    2010-05-01

    This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision.

  14. Security for safety critical space borne systems

    NASA Technical Reports Server (NTRS)

    Legrand, Sue

    1987-01-01

    The Space Station contains safety critical computer software components in systems that can affect life and vital property. These components require a multilevel secure system that provides dynamic access control of the data and processes involved. A study is under way to define requirements for a security model providing access control through level B3 of the Orange Book. The model will be prototyped at NASA-Johnson Space Center.

  15. Securing iris recognition systems against masquerade attacks

    NASA Astrophysics Data System (ADS)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  16. Birds of a Feather: Supporting Secure Systems

    SciTech Connect

    Braswell III, H V

    2006-04-24

    Over the past few years Lawrence Livermore National Laboratory has begun the process of moving to a diskless environment in the Secure Computer Support realm. This movement has included many moving targets and increasing support complexity. We would like to set up a forum for Security and Support professionals to get together from across the Complex and discuss current deployments, lessons learned, and next steps. This would include what hardware, software, and hard copy based solutions are being used to manage Secure Computing. The topics to be discussed include but are not limited to: Diskless computing, port locking and management, PC, Mac, and Linux/UNIX support and setup, system imaging, security setup documentation and templates, security documentation and management, customer tracking, ticket tracking, software download and management, log management, backup/disaster recovery, and mixed media environments.

  17. Continuing Chemical Facilities Antiterrorism Security Act of 2011

    THOMAS, 112th Congress

    Sen. Collins, Susan M. [R-ME

    2011-03-03

    10/20/2011 By Senator Lieberman from Committee on Homeland Security and Governmental Affairs filed written report. Report No. 112-90. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. Low-Cost Security Measures for School Facilities

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    This paper discusses a variety of school safety and security measures that may be implemented at little or no cost and without the use of complex technology. Measures are presented according to these categories: (1) General; (2) Outside the Building; and (3) Inside the Building.

  19. 6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... a high level of security risk.â 27.205 Section 27.205 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.205 Determination that a chemical facility “presents a high level of security risk.”...

  20. 6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... a high level of security risk.â 27.205 Section 27.205 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.205 Determination that a chemical facility “presents a high level of security risk.”...

  1. 6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... a high level of security risk.â 27.205 Section 27.205 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.205 Determination that a chemical facility “presents a high level of security risk.”...

  2. 6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... a high level of security risk.â 27.205 Section 27.205 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.205 Determination that a chemical facility “presents a high level of security risk.”...

  3. CORBA security services for health information systems.

    PubMed

    Blobel, B; Holena, M

    1998-01-01

    The structure of healthcare systems in developed countries is changing to 'shared care', enforced by economic constraints and caused by a change in the basic conditions of care. That development results in co-operative health information systems across the boundaries of organisational, technological, and policy domains. Increasingly, these distributed and, as far as their domains are concerned, heterogeneous systems are based on middleware approaches, such as CORBA. Regarding the sensitivity of personal and medical data, such open, distributed, and heterogeneous health information systems require a high level of data protection and data security, both with respect to patient information and with respect to users. This paper, relying on experience gained through our activities in CORBAmed, describes the possibilities the CORBA middleware provides to achieve application and communication security. On the background of the overall CORBA architecture, it outlines the different security services previewed in the adopted CORBA specifications which are discussed in the context of the security requirements of healthcare information systems. Security services required in the healthcare domain but not available at the moment are mentioned. A solution is proposed, which on the one hand allows to make use of the available CORBA security services and additional ones, on the other hand remains open to other middleware approaches, such as DHE or HL7. PMID:9848400

  4. CORBA security services for health information systems.

    PubMed

    Blobel, B; Holena, M

    1998-01-01

    The structure of healthcare systems in developed countries is changing to 'shared care', enforced by economic constraints and caused by a change in the basic conditions of care. That development results in co-operative health information systems across the boundaries of organisational, technological, and policy domains. Increasingly, these distributed and, as far as their domains are concerned, heterogeneous systems are based on middleware approaches, such as CORBA. Regarding the sensitivity of personal and medical data, such open, distributed, and heterogeneous health information systems require a high level of data protection and data security, both with respect to patient information and with respect to users. This paper, relying on experience gained through our activities in CORBAmed, describes the possibilities the CORBA middleware provides to achieve application and communication security. On the background of the overall CORBA architecture, it outlines the different security services previewed in the adopted CORBA specifications which are discussed in the context of the security requirements of healthcare information systems. Security services required in the healthcare domain but not available at the moment are mentioned. A solution is proposed, which on the one hand allows to make use of the available CORBA security services and additional ones, on the other hand remains open to other middleware approaches, such as DHE or HL7.

  5. Security model for picture archiving and communication systems.

    PubMed

    Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K

    2000-05-01

    The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model. PMID:10847401

  6. Security Profile Inspector for UNIX Systems

    SciTech Connect

    Bartoletti, Tony

    1995-04-01

    SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX system security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.

  7. Secure Video Surveillance System (SVSS) for unannounced safeguards inspections.

    SciTech Connect

    Galdoz, Erwin G. , Rio de Janeiro, Brazil); Pinkalla, Mark

    2010-09-01

    The Secure Video Surveillance System (SVSS) is a collaborative effort between the U.S. Department of Energy (DOE), Sandia National Laboratories (SNL), and the Brazilian-Argentine Agency for Accounting and Control of Nuclear Materials (ABACC). The joint project addresses specific requirements of redundant surveillance systems installed in two South American nuclear facilities as a tool to support unannounced inspections conducted by ABACC and the International Atomic Energy Agency (IAEA). The surveillance covers the critical time (as much as a few hours) between the notification of an inspection and the access of inspectors to the location in facility where surveillance equipment is installed. ABACC and the IAEA currently use the EURATOM Multiple Optical Surveillance System (EMOSS). This outdated system is no longer available or supported by the manufacturer. The current EMOSS system has met the project objective; however, the lack of available replacement parts and system support has made this system unsustainable and has increased the risk of an inoperable system. A new system that utilizes current technology and is maintainable is required to replace the aging EMOSS system. ABACC intends to replace one of the existing ABACC EMOSS systems by the Secure Video Surveillance System. SVSS utilizes commercial off-the shelf (COTS) technologies for all individual components. Sandia National Laboratories supported the system design for SVSS to meet Safeguards requirements, i.e. tamper indication, data authentication, etc. The SVSS consists of two video surveillance cameras linked securely to a data collection unit. The collection unit is capable of retaining historical surveillance data for at least three hours with picture intervals as short as 1sec. Images in .jpg format are available to inspectors using various software review tools. SNL has delivered two SVSS systems for test and evaluation at the ABACC Safeguards Laboratory. An additional 'proto-type' system remains

  8. 6 CFR 5.31 - Security of systems of records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security of systems of records. 5.31 Section 5.31 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY DISCLOSURE OF RECORDS AND INFORMATION Privacy Act § 5.31 Security of systems of records. (a) In general. Each...

  9. 75 FR 28042 - Privacy Act of 1974: System of Records; Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... SECURITY Office of the Secretary Privacy Act of 1974: System of Records; Department of Homeland Security...: In accordance with the Privacy Act of 1974 the Department of Homeland Security proposes to update and reissue an existing Department of Homeland Security system of records notice titled,...

  10. Design tools for complex dynamic security systems.

    SciTech Connect

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III; Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  11. Selecting RMF Controls for National Security Systems

    SciTech Connect

    Witzke, Edward L.

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  12. Primer Control System Cyber Security Framework and Technical Metrics

    SciTech Connect

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  13. Simulation of the effectiveness evaluation process of security systems

    NASA Astrophysics Data System (ADS)

    Godovykh, A. V.; Stepanov, B. P.; Sheveleva, A. A.; Sharafieva, K. R.

    2016-06-01

    The paper is devoted to issues of creation of cross-functional analytical complex for simulation of the process of operation of the security system elements. Basic objectives, a design concept and an interrelation of main elements of the complex are described. The proposed conception of the analytical complex provides an opportunity to simulate processes for evaluating the effectiveness of physical protection system of a nuclear facility. The complex uses models, that take into account features of the object, parameters of technical means and tactics of adversaries. Recommendations were made for applying of this conception for training specialists in the field of physical protection of nuclear materials.

  14. Framework for Integrating Safety, Operations, Security, and Safeguards in the Design and Operation of Nuclear Facilities

    SciTech Connect

    Darby, John L.; Horak, Karl Emanuel; LaChance, Jeffrey L.; Tolk, Keith Michael; Whitehead, Donnie Wayne

    2007-10-01

    The US is currently on the brink of a nuclear renaissance that will result in near-term construction of new nuclear power plants. In addition, the Department of Energy’s (DOE) ambitious new Global Nuclear Energy Partnership (GNEP) program includes facilities for reprocessing spent nuclear fuel and reactors for transmuting safeguards material. The use of nuclear power and material has inherent safety, security, and safeguards (SSS) concerns that can impact the operation of the facilities. Recent concern over terrorist attacks and nuclear proliferation led to an increased emphasis on security and safeguard issues as well as the more traditional safety emphasis. To meet both domestic and international requirements, nuclear facilities include specific SSS measures that are identified and evaluated through the use of detailed analysis techniques. In the past, these individual assessments have not been integrated, which led to inefficient and costly design and operational requirements. This report provides a framework for a new paradigm where safety, operations, security, and safeguards (SOSS) are integrated into the design and operation of a new facility to decrease cost and increase effectiveness. Although the focus of this framework is on new nuclear facilities, most of the concepts could be applied to any new, high-risk facility.

  15. 78 FR 48076 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... National Security Information and Restricted Data AGENCY: Nuclear Regulatory Commission. ACTION: Proposed... INFORMATION AND RESTRICTED DATA 0 1. The authority citation for part 95 continues to read as follows... Information (75 FR 707; January 5, 2010), before derivatively classifying information and at least once...

  16. 78 FR 69286 - Facility Security Clearance and Safeguarding of National Security Information and Restricted Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... Information and Restricted Data AGENCY: Nuclear Regulatory Commission. ACTION: Direct final rule; confirmation...; telephone: 301-415-3501; email: Daniel.Lenehan@nrc.gov . SUPPLEMENTARY INFORMATION: On August 7, 2013 (78 FR..., Classified National Security Information. In addition, this direct final rule allowed licensees...

  17. Geothermal heating retrofit at the Utah State Prison Minimum Security Facility. Final report, March 1979-January 1986

    SciTech Connect

    Not Available

    1986-01-01

    This report is a summary of progress and results of the Utah State Prison Geothermal Space Heating Project. Initiated in 1978 by the Utah State Energy Office and developed with assistance from DOE's Division of Geothermal and Hydropower Technologies PON program, final construction was completed in 1984. The completed system provides space and water heating for the State Prison's Minimum Security Facility. It consists of an artesian flowing geothermal well, plate heat exchangers, and underground distribution pipeline that connects to the existing hydronic heating system in the State Prison's Minimum Security Facility. Geothermal water disposal consists of a gravity drain line carrying spent geothermal water to a cooling pond which discharges into the Jordan River, approximately one mile from the well site. The system has been in operation for two years with mixed results. Continuing operation and maintenance problems have reduced the expected seasonal operation from 9 months per year to 3 months. Problems with the Minimum Security heating system have reduced the expected energy contribution by approximately 60%. To date the system has saved the prison approximately $18,060. The total expenditure including resource assessment and development, design, construction, performance verification, and reporting is approximately $827,558.

  18. Secure Control Systems for the Energy Sector

    SciTech Connect

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  19. A voice password system for access security

    SciTech Connect

    Birnbaum, M.; Cohen, L.A.; Welsh, F.X.

    1986-09-01

    A voice password system for access security using speaker verification technology has been designed for use over dial-up telephone lines. The voice password system (VPS) can provide secure access to telephone networks, computers, rooms, and buildings. It also has application in office automation systems, electric funds transfer, and ''smart cards'' (interactive computers embedded in credit-card-sized packages). As increasing attention is focused on access security in the public, private, and government sectors, the voice password system can provide a timely solution to the security dilemma. The VPS uses modes of communication available to almost everyone (the human voice and the telephone). A user calls the VPS, enters his or her identification number (ID) by touch-tone telephone, and then speaks a password. This is usually a phrase or a sentence of about seven syllables. On initial calls, the VPS creates a model of the user's voice, called a reference template, and labels it with the caller's unique user ID. To gain access later, the user calls the system, enters the proper user ID, and speaks the password phrase. The VPS compares the user's stored reference template with the spoken password and produces a distance score.

  20. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... services and utilities; (v) Measures to protect radio and telecommunication equipment, including computer systems and networks; (vi) Adjacent areas that may be exploited during or for an attack; (vii) Areas that... protection systems; (iv) Procedural policies; (v) Radio and telecommunication systems, including...

  1. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... services and utilities; (v) Measures to protect radio and telecommunication equipment, including computer systems and networks; (vi) Adjacent areas that may be exploited during or for an attack; (vii) Areas that... protection systems; (iv) Procedural policies; (v) Radio and telecommunication systems, including...

  2. 6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Determination that a chemical facility âpresents a high level of security risk.â 27.205 Section 27.205 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility...

  3. The Secure, Transportable, Autonomous Reactor System

    SciTech Connect

    Brown, N.W.; Hassberger, J.A.; Smith, C.; Carelli, M.; Greenspan, E.; Peddicord, K.L.; Stroh, K.; Wade, D.C.; Hill, R.N.

    1999-05-27

    The Secure, Transportable, Autonomous Reactor (STAR) system is a development architecture for implementing a small nuclear power system, specifically aimed at meeting the growing energy needs of much of the developing world. It simultaneously provides very high standards for safety, proliferation resistance, ease and economy of installation, operation, and ultimate disposition. The STAR system accomplishes these objectives through a combination of modular design, factory manufacture, long lifetime without refueling, autonomous control, and high reliability.

  4. Race Differences in Mental Health Service Access in a Secure Male Juvenile Justice Facility

    ERIC Educational Resources Information Center

    Dalton, Richard F.; Evans, Lisa J.; Cruise, Keith R.; Feinstein, Ronald A.; Kendrick, Rhonda F.

    2009-01-01

    This study examined whether African American and Caucasian male youths had similar rates of referral to mental health services in a juvenile justice secure facility when controlling for differences obtained in the initial screening and assessment process. Data from the Massachusetts Youth Screening Instrument-2 (MAYSI-2), Initial Health Care…

  5. Acceptance criteria for the evaluation of Category 1 fuel cycle facility physical security plans

    SciTech Connect

    Dwyer, P.A.

    1991-10-01

    This NUREG document presents criteria developed from US Nuclear Regulatory Commission regulations for the evaluation of physical security plans submitted by Category 1 fuel facility licensees. Category 1 refers to those licensees who use or possess a formula quantity of strategic special nuclear material.

  6. Analysis of impact of noncompliance with physical-security requirements at nuclear facilities

    SciTech Connect

    Green, J.N.

    1982-03-01

    Inspectors are required to analyze the impact of instances of noncompliance with physical security requirements at licensed nuclear facilities. A scoring procedure for components and a method for evaluating the effectiveness of the subsystems involved are proposed to reinforce an inspector's judgment about the remaining level of safeguards.

  7. Risk and Resilience: Girls' Experiences Navigating Space and Relationships in a Secure Residential Facility

    ERIC Educational Resources Information Center

    Simonsen, Amy E.

    2010-01-01

    The purpose of this qualitative study was to examine how adolescent girls with diagnosed learning and emotional disabilities described themselves as they negotiated various environments and relationships within a secure residential facility. The goal was to explore how conditions and interactions in these environments promoted both risk and…

  8. Enhancing Multilateral Security in and by Reputation Systems

    NASA Astrophysics Data System (ADS)

    Steinbrecher, Sandra

    With the increasing possibilities for interaction between Internet users exceeding pure communication, in multilateral security the research question arises to rethink and extend classical security requirements. Reputation systems are a possible solution to assist new security requirements. But naturally also reputation systems have to be designed in a multilateral secure way. In this paper we discuss both multilateral security by and in reputation systems. An overview on the possibilities how such systems could be realised is given.

  9. Comparison of Routable Control System Security Approaches

    SciTech Connect

    Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

    2011-06-01

    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

  10. Control Systems Cyber Security:Defense in Depth Strategies

    SciTech Connect

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  11. Biosensor Systems for Homeland Security

    SciTech Connect

    Bruckner-Lea, Cindy J.

    2004-05-30

    The detection of biological agents is important to minimize the effects of pathogens that can harm people, livestock, or plants. In addition to pathogens distributed by man, there is a need to detect natural outbreaks. Recent outbreaks of SARS, mad cow disease, pathogenic E. coli and Salmonella, as well as the discovery of letters filled with anthrax spores have highlighted the need for biosensor systems to aid in prevention, early warning, response, and recovery. Rapid detection can be used to prevent exposure; and detection on a longer timescale can be used to minimize exposure, define treatment, and determine whether contaminated areas are clean enough for reuse. The common types of biological agents of concern include bacteria, spores, and viruses (Figure 1). From a chemist’s point of view, pathogens are essentially complex packages of chemicals that are assembled into organized packages with somewhat predictable physical characteristics such as size and shape. Pathogen detection methods can be divided into three general approaches: selective detection methods for specific identification such as nucleic acid analysis and structural recognition, semi-selective methods for broad-spectrum detection (e.g. physical properties, metabolites, lipids), and function-based methods (e.g. effect of the pathogen on organisms, tissues, or cells). The requirements for biodetection systems depend upon the application. While detect to warn sensors may require rapid detection on the order one minute, detection times of many minutes or hours may be suitable for determining appropriate treatments or for forensic analysis. Of course ideal sensor systems will meet the needs of many applications, and will be sensitive, selective, rapid, and simultaneously detect all agents of concern. They will also be reliable with essentially no false negatives or false positives, small, easy to use, and low cost with minimal consumables.

  12. Alaska SAR Facility mass storage, current system

    NASA Technical Reports Server (NTRS)

    Cuddy, David; Chu, Eugene; Bicknell, Tom

    1993-01-01

    This paper examines the mass storage systems that are currently in place at the Alaska SAR Facility (SAF). The architecture of the facility will be presented including specifications of the mass storage media that are currently used and the performances that we have realized from the various media. The distribution formats and media are also discussed. Because the facility is expected to service future sensors, the new requirements and possible solutions to these requirements are also discussed.

  13. Catheter Securement Systems for Peripherally Inserted and Nontunneled Central Vascular Access Devices

    PubMed Central

    Krenik, Karen M.; Smith, Graham E.

    2016-01-01

    Sutureless catheter securement systems are intended to eliminate risks associated with sutures. The clinical acceptability of a novel system was investigated compared with the current method of securement for peripherally inserted central catheters (19 facilities using StatLock or sutures) or nontunneled central vascular access devices (3 facilities using StatLock or sutures or HubGuard + Sorbaview Shield). More than 94% of respondents rated the novel system as same, better, or much better than their current product. More than 82% of respondents were willing to replace their current system with the new one. PMID:27379679

  14. Animal eyes in homeland security systems

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Kostrzewski, Andrew; Gertsenshteyn, Michael; Grubsky, Victor; Shnitser, Paul; Agurok, Ilya; Bennahmias, Mark; Lee, Kang; Savant, Gajendra

    2007-04-01

    In this paper, biologically-inspired optical imaging systems, including fish eye, bug eye, lobster eye, and RGB color vision, are discussed as new lensing systems for military and homeland security applications. This new area of interest includes UV, VIS, IR, and X-ray part of electromagnetic spectrum. In particular, recent progress at Physical Optics Corporation will be discussed, including such applications as hyperspectral/multi-spectral imagery, video surveillance, and X-ray inspection.

  15. System and method for key generation in security tokens

    DOEpatents

    Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.; Pooser, Raphael C.; Prowell, Stacy J.

    2015-10-27

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  16. Security Profile Inspector for UNIX Systems

    1995-04-01

    SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configurationmore » Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX system security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less

  17. Security threat assessment of an Internet security system using attack tree and vague sets.

    PubMed

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  18. Aquaculture Farm Facility Loss Management System

    NASA Astrophysics Data System (ADS)

    Choi, Hyung-Rim; Park, Byoung-Kwon; Park, Yong-Sung; Lee, Chang-Sup; Choi, Ki-Nam; Park, Chang-Hyun; Jo, Yong-Hyun; Lee, Byung-Ha

    The loss of aquaculture farm facilities occurring from natural disasters of accidents can cause not only property damage but also marine environmental pollution and vessel safety accidents. When aquaculture farm facilities have been lost to sink down to the bottom of the water, those should be picked up through direct searches but it is difficult to find them because they cannot be visually identified and they are in the sea. In this study, a system that can efficiently manage aquaculture farm facility loss using a new technology IP-RFID will be presented. By attaching IP-Tags to aquaculture farm facilities, this technology enables the transmission of facility information and locations to diverse users in real time through the IPs and through this, the efficiency of aquaculture farm facility management and supervision can be improved and marine environmental pollution can be reduced.

  19. Photovoltaic Systems Test Facilities: Existing capabilities compilation

    NASA Technical Reports Server (NTRS)

    Volkmer, K.

    1982-01-01

    A general description of photovoltaic systems test facilities (PV-STFs) operated under the U.S. Department of Energy's photovoltaics program is given. Descriptions of a number of privately operated facilities having test capabilities appropriate to photovoltaic hardware development are given. A summary of specific, representative test capabilities at the system and subsystem level is presented for each listed facility. The range of system and subsystem test capabilities available to serve the needs of both the photovoltaics program and the private sector photovoltaics industry is given.

  20. Ensuring system security through formal software evaluation

    SciTech Connect

    Howell, J A; Fuyat, C; Elvy, M

    1992-01-01

    With the increasing use of computer systems and networks to process safeguards information in nuclear facilities, the issue of system and data integrity is receiving worldwide attention. Among the many considerations are validation that the software performs as intended and that the information is adequately protected. Such validations are often requested of the Safeguards Systems Group of the Los Alamos National Laboratory. This paper describes our methodology for performing these software evaluations.

  1. Hacker tracking Security system for HMI

    NASA Astrophysics Data System (ADS)

    Chauhan, Rajeev Kumar

    2011-12-01

    Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.

  2. Secure Data Network System (SDNS) network, transport, and message security protocols

    NASA Astrophysics Data System (ADS)

    Dinkel, C.

    1990-03-01

    The Secure Data Network System (SDNS) project, implements computer to computer communications security for distributed applications. The internationally accepted Open Systems Interconnection (OSI) computer networking architecture provides the framework for SDNS. SDNS uses the layering principles of OSI to implement secure data transfers between computer nodes of local area and wide area networks. Four security protocol documents developed by the National Security Agency (NSA) as output from the SDNS project are included. SDN.301 provides the framework for security at layer 3 of the OSI Model. Cryptographic techniques to provide data protection for transport connections or for connectionless-mode transmission are described in SDN.401. Specifications for message security service and protocol are contained in SDN.701. Directory System Specifications for Message Security Protocol are covered in SDN.702.

  3. Optical Security System with Fourier Plane encoding.

    PubMed

    Javidi, B; Ahouzi, E

    1998-09-10

    We propose a new technique for security verification of personal documents and other forms of personal identifications such as ID cards, passports, or credit cards. In this technique a primary pattern that might be a phase-encoded image is convolved by a random code. The information is phase encoded on the personal document. Therefore the information cannot be reproduced by an intensity detector such as a CCD camera. An optical processor based on the nonlinear joint transform correlator is used to perform the verification and the validation of documents with this technique. By verification of the biometrics information and the random code simultaneously, the proposed optical system determines whether a card is authentic or is being used by an authorized person. We tested the performance of the optical system for security and validation in the presence of input noise and in the presence of distortion of the information on the card. The performance of the proposed method is evaluated by use of a number of metrics. Statistical analysis of the system is performed to investigate the noise tolerance and the discrimination against false inputs for security verification. PMID:18286124

  4. Ultra Safe And Secure Blasting System

    SciTech Connect

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

  5. A system approach to nuclear facility monitoring

    SciTech Connect

    Argo, P.E.; Doak, J.E.; Howse, J.W.

    1996-09-01

    Sensor technology for use in nuclear facility monitoring has reached and advanced stage of development. Research on where to place these sensors in a facility and how to combine their outputs in a meaningful fashion does not appear to be keeping pace. In this paper, we take a global view of the problem where sensor technology is viewed as only one piece of a large puzzle. Other pieces of this puzzle include the optimal location and type of sensors used in a specific facility, the rate at which sensors record information, and the risk associated with the materials/processes at a facility. If the data are analyzed off-site, how will they be transmitted? Is real-time analysis necessary? Are we monitoring only the facility itself, or might we also monitor the processing that occurs there? How are we going to combine the output from the various sensors to give us an accurate picture of the state of the facility? This paper will not try to answer all these questions, but rather it will attempt to stimulate thought in this area by formulating a systems approach to the problem demonstrated by a prototype system and a systems proposed for an actual facility. Our focus will be on the data analysis aspect of the problem.

  6. NASA Electronic Library System (NELS): The system impact of security

    NASA Technical Reports Server (NTRS)

    Mcgregor, Terry L.

    1993-01-01

    This paper discusses security issues as they relate to the NASA Electronic Library System which is currently in use as the repository system for AdaNET System Version 3 (ASV3) being operated by MountainNET, Inc. NELS was originally designed to provide for public, development, and secure collections and objects. The secure feature for collections and objects was deferred in the initial system for implementation at a later date. The NELS system is now 9 months old and many lessons have been learned about the use and maintenance of library systems. MountainNET has 9 months of experience in operating the system and gathering feedback from the ASV3 user community. The user community has expressed an interest in seeing security features implemented in the current system. The time has come to take another look at the whole issue of security for the NELS system. Two requirements involving security have been put forth by MountainNET for the ASV3 system. The first is to incorporate at the collection level a security scheme to allow restricted access to collections. This should be invisible to end users and be controlled by librarians. The second is to allow inclusion of applications which can be executed only by a controlled group of users; for example, an application which can be executed by librarians only. The requirements provide a broad framework in which to work. These requirements raise more questions than answers. To explore the impact of these requirements a top down approach will be used.

  7. Capacity Utilization Study for Aviation Security Cargo Inspection Queuing System

    SciTech Connect

    Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E; Brumback, Daryl L

    2010-01-01

    In this paper, we conduct performance evaluation study for an aviation security cargo inspection queuing system for material flow and accountability. The queuing model employed in our study is based on discrete-event simulation and processes various types of cargo simultaneously. Onsite measurements are collected in an airport facility to validate the queuing model. The overall performance of the aviation security cargo inspection system is computed, analyzed, and optimized for the different system dynamics. Various performance measures are considered such as system capacity, residual capacity, throughput, capacity utilization, subscribed capacity utilization, resources capacity utilization, subscribed resources capacity utilization, and number of cargo pieces (or pallets) in the different queues. These metrics are performance indicators of the system s ability to service current needs and response capacity to additional requests. We studied and analyzed different scenarios by changing various model parameters such as number of pieces per pallet, number of TSA inspectors and ATS personnel, number of forklifts, number of explosives trace detection (ETD) and explosives detection system (EDS) inspection machines, inspection modality distribution, alarm rate, and cargo closeout time. The increased physical understanding resulting from execution of the queuing model utilizing these vetted performance measures should reduce the overall cost and shipping delays associated with new inspection requirements.

  8. 49 CFR 234.211 - Security of warning system apparatus.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Security of warning system apparatus. 234.211... Maintenance, Inspection, and Testing Maintenance Standards § 234.211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall be secured against unauthorized entry....

  9. 49 CFR 234.211 - Security of warning system apparatus.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Security of warning system apparatus. 234.211... Maintenance, Inspection, and Testing Maintenance Standards § 234.211 Security of warning system apparatus. Highway-rail grade crossing warning system apparatus shall be secured against unauthorized entry....

  10. 6 CFR 5.31 - Security of systems of records.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... AND INFORMATION Privacy Act § 5.31 Security of systems of records. (a) In general. Each component shall establish administrative and physical controls to prevent unauthorized access to its systems of... 6 Domestic Security 1 2012-01-01 2012-01-01 false Security of systems of records. 5.31 Section...

  11. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 7 2014-10-01 2014-10-01 false System security plan: contents. 659.23 Section 659.23 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL TRANSIT... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at...

  12. The F-18 systems research aircraft facility

    NASA Technical Reports Server (NTRS)

    Sitz, Joel R.

    1992-01-01

    To help ensure that new aerospace initiatives rapidly transition to competitive U.S. technologies, NASA Dryden Flight Research Facility has dedicated a systems research aircraft facility. The primary goal is to accelerate the transition of new aerospace technologies to commercial, military, and space vehicles. Key technologies include more-electric aircraft concepts, fly-by-light systems, flush airdata systems, and advanced computer architectures. Future aircraft that will benefit are the high-speed civil transport and the National AeroSpace Plane. This paper describes the systems research aircraft flight research vehicle and outlines near-term programs.

  13. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  14. 36 CFR Appendix A to Part 1234 - Minimum Security Standards for Level III Federal Facilities

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Required. Review/establish uniform standards for construction Required. Review/establish new design... critical systems (alarm systems, radio communications, computer facilities, etc.) Required. Occupant... control procedures for service contract personnel Required. Construction/Renovation: Install mylar film...

  15. 36 CFR Appendix A to Part 1234 - Minimum Security Standards for Level III Federal Facilities

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Required. Review/establish uniform standards for construction Required. Review/establish new design... critical systems (alarm systems, radio communications, computer facilities, etc.) Required. Occupant... control procedures for service contract personnel Required. Construction/Renovation: Install mylar film...

  16. Cyber secure systems approach for NPP digital control systems

    SciTech Connect

    McCreary, T. J.; Hsu, A.

    2006-07-01

    Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant and distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to

  17. Assessment on security system of radioactive sources used in hospitals of Thailand

    NASA Astrophysics Data System (ADS)

    Jitbanjong, Petchara; Wongsawaeng, Doonyapong

    2016-01-01

    Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.

  18. [System approach to national health security problems].

    PubMed

    Venediktov, D D

    1998-01-01

    P. K. Anokhin's basic works on functional systems, on space-time continuum and advanced reflection of the reality, on the physiological structure of a behavior act, as well as his fundamental philosophical and scientific postulated are most fruitful for analyzing and solving a number of biomedical, societal, and political problems, among them there are problems of national security in general and its demographic and health aspects. Individual and public health as a measure of balance between the organism (population) and its biosocial environment depends on the efficiency of relevant physiological and societal functional systems is one of the basic prerequisites of national security and timely recognition, avoiding and overcoming numerous challenges, dangers, and threats to the nation. General political and socioeconomic crisis in Russia adversely affects the population's dynamics and public health and it is manifested by depopulatory processes, low birth and high mortality and morbidity rates, growing violence and crime, psychoemotional stress, decreased immunity level of vast majority of population, especially that of children, elderly and other vulnerable groups. Environmental pollution and degradation have reached dangerous proportions. The national health system is unable to meet basic needs of the population. To overcome the crisis, systemic measures should be in the foundation of all health reform concepts and strategies. Monitoring national health, including modelling its future status, as well as progress in health system reforms should be another basic condition for overcoming the national health crisis. PMID:9567717

  19. Intelligent Facial Recognition Systems: Technology advancements for security applications

    SciTech Connect

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

  20. New security system for ID certificates in IT society

    NASA Astrophysics Data System (ADS)

    Nagashima, Hisato; Saito, Kazuharu

    2004-06-01

    This paper introduces a new security solution regarding security documents with secure unique information. Our newly proposed security measure enables outputting ID documents by commercially available printer. On this basis, a citizen can apply and accept his ID certificates to and from Issuing Authority via website. A unique gradational latent image emerges if a third party authenticates it under Infrared ray. The principle of this new measure lies in the complicated microstructure generated by our specially designed software. It is understood that its security feature based on secure software and wide applicability for commercially available printers show profound potentiality to construct new security system for ID documents in IT society.

  1. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  2. Use of Multi-attribute Utility Functions in Evaluating Security Systems

    SciTech Connect

    Meyers, C; Lamont, A; Sicherman, A

    2008-06-13

    In analyzing security systems, we are concerned with protecting a building or facility from an attack by an adversary. Typically, we address the possibility that an adversary could enter a building and cause damage resulting in an immediate loss of life, or at least substantial disruption in the operations of the facility. In response to this setting, we implement security systems including devices, procedures, and facility upgrades designed to (a) prevent the adversary from entering, (b) detect and neutralize him if he does enter, and (c) harden the facility to minimize damage if an attack is carried out successfully. Although we have cast this in terms of physical protection of a building, the same general approach can be applied to non-physical attacks such as cyber attacks on a computer system. A rigorous analytic process is valuable for quantitatively evaluating an existing system, identifying its weaknesses, and proposing useful upgrades. As such, in this paper we describe an approach to assess the degree of overall protection provided by security measures. Our approach evaluates the effectiveness of the individual components of the system, describes how the components work together, and finally assesses the degree of overall protection achieved. This model can then be used to quantify the amount of protection provided by existing security measures, as well as to address proposed upgrades to the system and help identify a robust and cost effective set of improvements. Within the model, we use multiattribute utility functions to perform the overall evaluations of the system.

  3. Implementation of safeguards and security for fissile materials disposition reactor alternative facilities

    SciTech Connect

    Jaeger, C.D.; Duggan, R.A.; Tolk, K.M.

    1995-10-01

    A number of different disposition alternatives are being considered and include facilities which provide for long-ten-n and interim storage, convert and stabilize fissile materials for other disposition alternatives, immobilize fissile material in glass and/or ceramic material, fabricate fissile material into mixed oxide (MOX) fuel for reactors, use reactor based technologies to convert material into spent fuel, and dispose of fissile material using a number of geologic alternatives. Particular attention will be given to the reactor alternatives which include existing, partially completed, advanced or evolutionary LWRs and CANDU reactors. The various reactor alternatives are all very similar and include processing which converts Pu to a usable form for fuel fabrication, a MOX fuel fab facility located in either the US or in Europe, US LWRs or the CANDU reactors and ultimate disposal of spent fuel in a geologic repository. This paper focuses on how the objectives of reducing security risks and strengthening arms reduction and nonproliferation will be accomplished and the possible impacts of meeting these objectives on facility operations and design. Some of the areas in this paper include: (1) domestic and international safeguards requirements, (2) non-proliferation criteria and measures, (3) the threat, and (4) potential proliferation risks, the impacts on the facilities, and safeguards and security issues unique to the presence of Category 1 or strategic special nuclear material.

  4. Secure electronic commerce communication system based on CA

    NASA Astrophysics Data System (ADS)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  5. Radiation Safety Systems for Accelerator Facilities

    SciTech Connect

    James C. Liu; Jeffrey S. Bull; John Drozdoff; Robert May; Vaclav Vylet

    2001-10-01

    The Radiation Safety System (RSS) of an accelerator facility is used to protect people from prompt radiation hazards associated with accelerator operation. The RSS is a fully interlocked, engineered system with a combination of passive and active elements that are reliable, redundant, and fail-safe. The RSS consists of the Access Control System (ACS) and the Radiation Containment System (RCS). The ACS is to keep people away from the dangerous radiation inside the shielding enclosure. The RCS limits and contains the beam/radiation conditions to protect people from the prompt radiation hazards outside the shielding enclosure in both normal and abnormal operations. The complexity of a RSS depends on the accelerator and its operation, as well as associated hazard conditions. The approaches of RSS among different facilities can be different. This report gives a review of the RSS for accelerator facilities.

  6. Capturing security requirements for software systems

    PubMed Central

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  7. Capturing security requirements for software systems.

    PubMed

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  8. Security Management in a Multimedia System

    ERIC Educational Resources Information Center

    Rednic, Emanuil; Toma, Andrei

    2009-01-01

    In database security, the issue of providing a level of security for multimedia information is getting more and more known. For the moment the security of multimedia information is done through the security of the database itself, in the same way, for all classic and multimedia records. So what is the reason for the creation of a security…

  9. A wireless electronic monitoring system for securing milk from farm to processor

    NASA Astrophysics Data System (ADS)

    Womble, Phillip; Hopper, Lindsay; Thompson, Chris; Alexander, Suraj M.; Crist, William; Payne, Fred; Stombaugh, Tim; Paschal, Jon; Moore, Ryan; Luck, Brian; Tabayehnejab, Nasrin

    2008-04-01

    The Department of Homeland Security and the Department of Health and Human Services have targeted bulk food contamination as a focus for attention. The contamination of bulk food poses a high consequence threat to our society. Milk transport falls into three of the 17 targeted NIPP (National Infrastructure Protection Plan) sectors including agriculture-food, public health, and commercial facilities. Minimal security safeguards have been developed for bulk milk transport. The current manual methods of securing milk are paper intensive and prone to errors. The bulk milk transportation sector requires a security enhancement that will both reduce recording errors and enable normal transport activities to occur while providing security against unauthorized access. Milk transportation companies currently use voluntary seal programs that utilize plastic, numbered seals on milk transport tank openings. Our group has developed a Milk Transport Security System which is an electromechanical access control and communication system that assures the secure transport of milk, milk samples, milk data, and security data between locations and specifically between dairy farms, transfer stations, receiving stations, and milk plants. It includes a security monitoring system installed on the milk transport tank, a hand held device, optional printers, data server, and security evaluation software. The system operates automatically and requires minimal or no attention by the bulk milk hauler/sampler. The system is compatible with existing milk transport infrastructure, and has the support of the milk producers, milk transportation companies, milk marketing agencies, and dairy processors. The security protocol developed is applicable for transport of other bulk foods both nationally and internationally. This system adds significantly to the national security infrastructure for bulk food transport. We are currently demonstrating the system in central Kentucky and will report on the results

  10. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    SciTech Connect

    1995-11-30

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met.

  11. Clean Lead Facility (CLF) Inventory System

    1995-07-13

    The CLF Inventory System records shipments of clean or nonradioactive contaminated lead stored at the CLF. The Inventory System provides reports and inventory information to Facility operators. Annual, quarterly, monthly, and current inventory reports may be printed. Profile reports of each shipment of lead may also be printed for verification and documentation of lead transactions.

  12. The BNL Accelerator Test Facility control system

    SciTech Connect

    Malone, R.; Bottke, I.; Fernow, R.; Ben-Zvi, I.

    1993-01-01

    Described is the VAX/CAMAC-based control system for Brookhaven National Laboratory's Accelerator Test Facility, a laser/linac research complex. Details of hardware and software configurations are presented along with experiences of using Vsystem, a commercial control system package.

  13. Centrifuge facility conceptual system study. Volume 2: Facility systems and study summary

    NASA Technical Reports Server (NTRS)

    Synnestvedt, Robert (Editor); Blair, Patricia; Cartledge, Alan; Garces-Porcile, Jorge; Garin, Vladimir; Guerrero, Mike; Haddeland, Peter; Horkachuck, Mike; Kuebler, Ulrich; Nguyen, Frank

    1991-01-01

    The Centrifuge Facility is a major element of the biological research facility for the implementation of NASA's Life Science Research Program on Space Station Freedom using nonhuman species (small primates, rodents, plants, insects, cell tissues, etc.). The Centrifuge Facility consists of a variable gravity Centrifuge to provide artificial gravity up to 2 earth G's' a Holding System to maintain specimens at microgravity levels, a Glovebox, and a Service Unit for servicing specimen chambers. The following subject areas are covered: (1) Holding System; (2) Centrifuge System; (3) Glovebox System; (4) Service System; and (5) system study summary.

  14. Materials and Security Consolidation Complex Facilities Radioactive Waste Management Basis and DOE Manual 435.1-1 Compliance Tables

    SciTech Connect

    Not Listed

    2011-09-01

    Department of Energy Order 435.1, 'Radioactive Waste Management,' along with its associated manual and guidance, requires development and maintenance of a radioactive waste management basis for each radioactive waste management facility, operation, and activity. This document presents a radioactive waste management basis for Idaho National Laboratory's Materials and Security Consolidation Center facilities that manage radioactive waste. The radioactive waste management basis for a facility comprises existing laboratory-wide and facility-specific documents. Department of Energy Manual 435.1-1, 'Radioactive Waste Management Manual,' facility compliance tables also are presented for the facilities. The tables serve as a tool for developing the radioactive waste management basis.

  15. The Role of State Courts in Securing School Facility Adequacy and Equity. Policy Report 31

    ERIC Educational Resources Information Center

    Mason, Mary L.; Arsen, David

    2010-01-01

    This report examines the problem of school facility disparities in Michigan and the prospects of litigation to address this problem. First, the authors briefly review evidence of the important impact of school facilities on students, teachers, and communities. They then provide an overview of litigation aimed at state school finance systems across…

  16. Using SysML to model complex systems for security.

    SciTech Connect

    Cano, Lester Arturo

    2010-08-01

    As security systems integrate more Information Technology the design of these systems has tended to become more complex. Some of the most difficult issues in designing Complex Security Systems (CSS) are: Capturing Requirements: Defining Hardware Interfaces: Defining Software Interfaces: Integrating Technologies: Radio Systems: Voice Over IP Systems: Situational Awareness Systems.

  17. Filling a Security Gap

    ERIC Educational Resources Information Center

    Parks and Recreation, 1978

    1978-01-01

    A new type of public facility security system, utilizing a radio system and voice logging recorder, has effectively improved security at the John F. Kennedy Center for the Performing Arts. The system monitors security operations, provides a reliable record in the case of conflicting claims, and accurately pinpoints the time of events. (DS)

  18. Security aspects of RFID communication systems

    NASA Astrophysics Data System (ADS)

    Bîndar, Valericǎ; Popescu, Mircea; Bǎrtuşicǎ, Rǎzvan; Craciunescu, Razvan; Halunga, Simona

    2015-02-01

    The objective of this study is to provide an overview of basic technical elements and security risks of RFID communication systems and to analyze the possible threats arising from the use of RFID systems. A number of measurements are performed on a communication system including RFID transponder and the tag reader, and it has been determined that the uplink signal level is 62 dB larger than the average value of the noise at the distance of 1m from the tag, therefore the shielding effectiveness has to exceed this threshold. Next, the card has been covered with several shielding materials and measurements were carried, under similar conditions to test the recovery of compromising signals. A very simple protection measure to prevent unauthorized reading of the data stored on the card has been proposed, and some electromagnetic shielding materials have been proposed and tested.

  19. Secured network sensor-based defense system

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Shen, Dan; Ge, Linqiang; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.

  20. Random digital encryption secure communication system

    NASA Technical Reports Server (NTRS)

    Doland, G. D. (Inventor)

    1982-01-01

    The design of a secure communication system is described. A product code, formed from two pseudorandom sequences of digital bits, is used to encipher or scramble data prior to transmission. The two pseudorandom sequences are periodically changed at intervals before they have had time to repeat. One of the two sequences is transmitted continuously with the scrambled data for synchronization. In the receiver portion of the system, the incoming signal is compared with one of two locally generated pseudorandom sequences until correspondence between the sequences is obtained. At this time, the two locally generated sequences are formed into a product code which deciphers the data from the incoming signal. Provision is made to ensure synchronization of the transmitting and receiving portions of the system.

  1. Creating a clinical video-conferencing facility in a security-constrained environment using open-source AccessGrid software and consumer hardware.

    PubMed

    Terrazas, Enrique; Hamill, Timothy R; Wang, Ye; Channing Rodgers, R P

    2007-10-11

    The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components.

  2. Creating a Clinical Video-Conferencing Facility in a Security-Constrained Environment Using Open-Source AccessGrid Software and Consumer Hardware

    PubMed Central

    Terrazas, Enrique; Hamill, Timothy R.; Wang, Ye; Channing Rodgers, R. P.

    2007-01-01

    The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components. PMID:18693930

  3. Power Systems Development Facility. Environmental Assessment

    SciTech Connect

    Not Available

    1993-06-01

    The objective of the PSDF would be to provide a modular facility which would support the development of advanced, pilot-scale, coal-based power systems and hot gas clean-up components. These pilot-scale components would be designed to be large enough so that the results can be related and projected to commercial systems. The facility would use a modular approach to enhance the flexibility and capability for testing; consequently, overall capital and operating costs when compared with stand-alone facilities would be reduced by sharing resources common to different modules. The facility would identify and resolve technical barrier, as well as-provide a structure for long-term testing and performance assessment. It is also intended that the facility would evaluate the operational and performance characteristics of the advanced power systems with both bituminous and subbituminous coals. Five technology-based experimental modules are proposed for the PSDF: (1) an advanced gasifier module, (2) a fuel cell test module, (3) a PFBC module, (4) a combustion gas turbine module, and (5) a module comprised of five hot gas cleanup particulate control devices. The final module, the PCD, would capture coal-derived ash and particles from both the PFBC and advanced gasifier gas streams to provide for overall particulate emission control, as well as to protect the combustion turbine and the fuel cell.

  4. Production Facility System Reliability Analysis Report

    SciTech Connect

    Dale, Crystal Buchanan; Klein, Steven Karl

    2015-10-06

    This document describes the reliability, maintainability, and availability (RMA) modeling of the Los Alamos National Laboratory (LANL) design for the Closed Loop Helium Cooling System (CLHCS) planned for the NorthStar accelerator-based 99Mo production facility. The current analysis incorporates a conceptual helium recovery system, beam diagnostics, and prototype control system into the reliability analysis. The results from the 1000 hr blower test are addressed.

  5. Mirror Fusion Test Facility magnet system

    SciTech Connect

    VanSant, J.H.; Kozman, T.A.; Bulmer, R.H.; Ng, D.S.

    1981-09-11

    In 1979, R.H. Bulmer of Lawrence Livermore National Laboratory (LLNL) discussed a proposed tandem-mirror magnet system for the Mirror Fusion Test Facility (MFTF) at the 8th symposium on Engineering Problems in Fusion Research. Since then, Congress has voted funds for expanding LLNL's MFTF to a tandem-mirror facility (designated MFTF-B). The new facility, scheduled for completion by 1985, will seek to achieve two goals: (1) Energy break-even capability (Q or the ratio of fusion energy to plasma heating energy = 1) of mirror fusion, (2) Engineering feasibility of reactor-scale machines. Briefly stated, 22 superconducting magnets contained in a 11-m-diam by 65-m-long vacuum vessel will confine a fusion plasma fueled by 80 axial streaming-plasma guns and over 40 radial neutral beams. We have already completed a preliminary design of this magnet system.

  6. Examining the Relationship between Organization Systems and Information Security Awareness

    ERIC Educational Resources Information Center

    Tintamusik, Yanarong

    2010-01-01

    The focus of this dissertation was to examine the crucial relationship between organization systems within the framework of the organizational behavior theory and information security awareness (ISA) of users within the framework of the information security theory. Despite advanced security technologies designed to protect information assets,…

  7. Security administration plan for HANDI 2000 business management system

    SciTech Connect

    Wilson, D.

    1998-09-29

    This document encompasses and standardizes the integrated approach for security within the PP and Ps applications, It also identifies the security tools and methods to be used. The Security Administration Plan becomes effective as of this document`s acceptance and will provide guidance through implementation efforts and, as a ``living document`` will support the operations and maintenance of the system.

  8. 77 FR 11385 - Security Considerations for Lavatory Oxygen Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-27

    ... (Amendment Nos. 21-94, 25-133, 121-354, 129-50; SFAR 111) on security considerations for lavatory oxygen systems (77 FR 12550). The interim final rule addresses a security vulnerability and is needed so the...-94, 25-133, 121-354, 129-50; SFAR 111] RIN 2120-AJ92 Security Considerations for Lavatory...

  9. Mitigations for Security Vulnerabilities Found in Control System Networks

    SciTech Connect

    Trent D. Nelson

    2006-05-01

    Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in on-site CS assessments and suggests mitigation strategies to provide asset owners with the information they need to better protect their systems from common security flows.

  10. Interacting with a security system: The Argus user interface

    SciTech Connect

    Behrin, E.; Davis, G.E.

    1993-12-31

    In the mid-1980s the Lawrence Livermore National Laboratory (LLNL) developed the Argus Security System. Key requirements were to eliminate the telephone as a verification device for opening and closing alarm stations and to allow need-to-know access through local enrollment at alarm stations. Resulting from these requirements was an LLNL-designed user interface called the Remote Access Panel (RAP). The Argus RAP interacts with Argus field processors to allow secure station mode changes and local station enrollment, provides user direction and response, and assists station maintenance personnel. It consists of a tamper-detecting housing containing a badge reader, a keypad with sight screen, special-purpose push buttons and a liquid-crystal display. This paper discusses Argus system concepts, RAP design, functional characteristics and its physical configurations. The paper also describes the RAP`s use in access-control booths, it`s integration with biometrics and its operation for multi-person-rule stations and compartmented facilities.

  11. National Ignition Facility environmental protection systems

    SciTech Connect

    Mintz, J.M.; Reitz, T.C.; Tobin, M.T.

    1994-06-01

    The conceptual design of Environmental Protection Systems (EPS) for the National Ignition Facility (NIF) is described. These systems encompass tritium and activated debris handling, chamber, debris shield and general decontamination, neutron and gamma monitoring, and radioactive, hazardous and mixed waste handling. Key performance specifications met by EPS designs include limiting the tritium inventory to 300 Ci and total tritium release from NIF facilities to less than 10 Ci/yr. Total radiation doses attributable to NIF shall remain below 10 mrem/yr for any member of the general public and 500 mrem/yr for NIF staff. ALARA-based design features and operational procedures will, in most cases, result in much lower measured exposures. Waste minimization, improved cycle time and reduced exposures all result from the proposed CO2 robotic arm cleaning and decontamination system, while effective tritium control is achieved through a modern system design based on double containment and the proven detritiation technology.

  12. BNL ACCELERATOR TEST FACILITY CONTROL SYSTEM UPGRADE.

    SciTech Connect

    MALONE,R.; BEN-ZVI,I.; WANG,X.; YAKIMENKO,V.

    2001-06-18

    Brookhaven National Laboratory's Accelerator Test Facility (ATF) has embarked on a complete upgrade of its decade old computer system. The planned improvements affect every major component: processors (Intel Pentium replaces VAXes), operating system (Linux/Real-Time Linux supplants OpenVMS), and data acquisition equipment (fast Ethernet equipment replaces CAMAC serial highway.) This paper summarizes the strategies and progress of the upgrade along with plans for future expansion.

  13. Biotechnology System Facility: Risk Mitigation on Mir

    NASA Technical Reports Server (NTRS)

    Gonda, Steve R., III; Galloway, Steve R.

    2003-01-01

    NASA is working with its international partners to develop space vehicles and facilities that will give researchers the opportunity to conduct scientific investigations in space. As part of this activity, NASA's Biotechnology Cell Science Program (BCSP) at the Johnson Space Center (JSC) is developing a world-class biotechnology laboratory facility for the International Space Station (ISS). This report describes the BCSP, including the role of the BTS. We identify the purpose and objectives of the BTS and a detailed description of BTS facility design and operational concept, BTS facility and experiment-specific hardware, and scientific investigations conducted in the facility. We identify the objectives, methods, and results of risk mitigation investigations of the effects of microgravity and cosmic radiation on the BTS data acquisition and control system. These results may apply to many other space experiments that use commercial, terrestrial-based data acquisition technology. Another focal point is a description of the end-to-end process of integrating and operating biotechnology experiments on a variety of space vehicles. The identification of lessons learned that can be applied to future biotechnology experiments is an overall theme of the report. We include a brief summary of the science results, but this is not the focus of the report. The report provides some discussion on the successful 130-day tissue engineering experiment performed in BTS on Mir and describes a seminal gene array investigation that identified a set of unique genes that are activated in space.

  14. A Hierarchical Security Architecture for Cyber-Physical Systems

    SciTech Connect

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  15. 3S (Safeguards, Security, Safety) based pyroprocessing facility safety evaluation plan

    SciTech Connect

    Ku, J.H.; Choung, W.M.; You, G.S.; Moon, S.I.; Park, S.H.; Kim, H.D.

    2013-07-01

    The big advantage of pyroprocessing for the management of spent fuels against the conventional reprocessing technologies lies in its proliferation resistance since the pure plutonium cannot be separated from the spent fuel. The extracted materials can be directly used as metal fuel in a fast reactor, and pyroprocessing reduces drastically the volume and heat load of the spent fuel. KAERI has implemented the SBD (Safeguards-By-Design) concept in nuclear fuel cycle facilities. The goal of SBD is to integrate international safeguards into the entire facility design process since the very beginning of the design phase. This paper presents a safety evaluation plan using a conceptual design of a reference pyroprocessing facility, in which 3S (Safeguards, Security, Safety)-By-Design (3SBD) concept is integrated from early conceptual design phase. The purpose of this paper is to establish an advanced pyroprocessing hot cell facility design concept based on 3SBD for the successful realization of pyroprocessing technology with enhanced safety and proliferation resistance.

  16. Security engineering: systems engineering of security through the adaptation and application of risk management

    NASA Technical Reports Server (NTRS)

    Gilliam, David P.; Feather, Martin S.

    2004-01-01

    Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.

  17. 40 CFR 160.43 - Test system care facilities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... testing facility shall have a number of animal rooms or other test system areas separate from those... GOOD LABORATORY PRACTICE STANDARDS Facilities § 160.43 Test system care facilities. (a) A testing facility shall have a sufficient number of animal rooms or other test system areas, as needed, to...

  18. 40 CFR 160.43 - Test system care facilities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... testing facility shall have a number of animal rooms or other test system areas separate from those... GOOD LABORATORY PRACTICE STANDARDS Facilities § 160.43 Test system care facilities. (a) A testing facility shall have a sufficient number of animal rooms or other test system areas, as needed, to...

  19. Process Control Systems in the Chemical Industry: Safety vs. Security

    SciTech Connect

    Jeffrey Hahn; Thomas Anderson

    2005-04-01

    Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

  20. Help for the Developers of Control System Cyber Security Standards

    SciTech Connect

    Robert P. Evans

    2008-05-01

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  1. Control Systems Cyber Security: Defense-in-Depth Strategies

    SciTech Connect

    Mark Fabro

    2007-10-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  2. HPF HIGH PRESSURE FACILITY GAS ANALYSIS SYSTEM IN BASEMENT / HIGH TEMPERATURE GAS FACILITY IN THE E

    NASA Technical Reports Server (NTRS)

    1980-01-01

    HPF HIGH PRESSURE FACILITY GAS ANALYSIS SYSTEM IN BASEMENT / HIGH TEMPERATURE GAS FACILITY IN THE ENGINE RESEARCH BUILDING ERB TEST CELL CE-13 / AUTOMATIC SCAN VALUE SYSTEM ON THE SECOND FLOOR OF THE INSTRUMENT RESEARCH LABORATORY IRL

  3. Long Duration Exposure Facility (LDEF) Archive System

    NASA Technical Reports Server (NTRS)

    Wilson, Brenda K.

    1995-01-01

    The Long Duration Exposure Facility (LDEF) Archive System is designed to provide spacecraft designers and space environment researchers single point access to all available resources from LDEF. These include data, micrographs, photographs, technical reports, papers, hardware and test specimens, as well as technical expertise. Further, the LDEF Archive System is planned such that it could be the foundation for a NASA Space Environments and Effects (SEE) Archive System, with the addition of other spaceflight, laboratory and theoretical space environments and effects data and associated materials. This paper describes the current status and plans of the LDEF Archive System.

  4. Advanced Group Support Systems and Facilities

    NASA Technical Reports Server (NTRS)

    Noor, Ahmed K. (Compiler); Malone, John B. (Compiler)

    1999-01-01

    The document contains the proceedings of the Workshop on Advanced Group Support Systems and Facilities held at NASA Langley Research Center, Hampton, Virginia, July 19-20, 1999. The workshop was jointly sponsored by the University of Virginia Center for Advanced Computational Technology and NASA. Workshop attendees came from NASA, other government agencies, industry, and universities. The objectives of the workshop were to assess the status of advanced group support systems and to identify the potential of these systems for use in future collaborative distributed design and synthesis environments. The presentations covered the current status and effectiveness of different group support systems.

  5. 31 CFR 306.23 - Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... TREASURY DIRECT Book-entry Securities System. 306.23 Section 306.23 Money and Finance: Treasury Regulations... Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System. (a) Eligible issues. The... conversion to the TREASURY DIRECT Book-entry Securities System. The notice shall specify the period...

  6. Energy Systems Test Area (ESTA). Power Systems Test Facilities

    NASA Technical Reports Server (NTRS)

    Situ, Cindy H.

    2010-01-01

    This viewgraph presentation provides a detailed description of the Johnson Space Center's Power Systems Facility located in the Energy Systems Test Area (ESTA). Facilities and the resources used to support power and battery systems testing are also shown. The contents include: 1) Power Testing; 2) Power Test Equipment Capabilities Summary; 3) Source/Load; 4) Battery Facilities; 5) Battery Test Equipment Capabilities Summary; 6) Battery Testing; 7) Performance Test Equipment; 8) Battery Test Environments; 9) Battery Abuse Chambers; 10) Battery Abuse Capabilities; and 11) Battery Test Area Resources.

  7. Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

    PubMed Central

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. PMID:25405226

  8. Security threat assessment of an Internet security system using attack tree and vague sets.

    PubMed

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. PMID:25405226

  9. Potential uses of a wireless network in physical security systems.

    SciTech Connect

    Witzke, Edward L.

    2010-07-01

    Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing physical security is first given. Next, numerous applications of a wireless network are brought forth. The technical issues that arise when using a wireless network to support these applications are then discussed. Finally, a summary is presented.

  10. Computer security plan development using an expert system

    SciTech Connect

    Hunteman, W.J. ); Evans, R.; Brownstein, M.; Chapman, L. )

    1990-01-01

    The Computer Security Plan Assistant (SPA) is an expert system for reviewing Department of Energy (DOE) Automated Data Processing (ADP) Security Plans. DOE computer security policies require ADP security plans to be periodically reviewed and updated by all DOE sites. SPA is written in XI-Plus, an expert system shell. SPA was developed by BDM International, Inc., under sponsorship by the DOE Center for Computer Security at Los Alamos National Laboratory. SPA runs on an IBM or compatible personal computer. It presents a series of questions about the ADP security plan being reviewed. The SPA user references the ADP Security Plan and answers the questions. The SPA user reviews each section of the security plan, in any order, until all sections have been reviewed. The SPA user can stop the review process after any section and restart later. A Security Plan Review Report is available after the review of each section of the Security Plan. The Security Plan Review Report gives the user a written assessment of the completeness of the ADP Security Plan. SPA is being tested at Los Alamos and will soon be available to the DOE community.

  11. Design of a physical security perimeter fencing system.

    SciTech Connect

    Mack, Thomas Kimball; Ross, Michael P.; Lin, Han Wei

    2010-10-01

    Design of a physical security perimeter fencing system requires that security designers provide effective detection, delay, and response functionalities with minimal nuisance alarms. In addition, the designers must take into considerations the security fence system life cycle cost (equipment and grounds maintenance), complexity of the terrain, safety, and environmental conditions (location of where the security fence will be installed). Often, these factors drive the security designers to design a perimeter intrusion detection and assessment system (PIDAS) that includes: (1) larger than desired footprint, (2) one or more animal control fences to minimize the nuisance alarm rate (NAR), and (3) clear zones and an isolation zone to facilitate intrusion detection and assessment by keeping the fence lines clear of vegetation, trash, and other objects that could impede the security system's performance. This paper presents a two-tier PIDAS design that focuses on effective performance specifically in high probability of detection and low NAR that minimizes cost and the footprint of the system.

  12. Security warning system monitors up to fifteen remote areas simultaneously

    NASA Technical Reports Server (NTRS)

    Fusco, R. C.

    1966-01-01

    Security warning system consisting of 15 television cameras is capable of monitoring several remote or unoccupied areas simultaneously. The system uses a commutator and decommutator, allowing time-multiplexed video transmission. This security system could be used in industrial and retail establishments.

  13. 1 CFR 304.29 - Security of systems of records.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Security of systems of records. (a) Administrative and physical controls. The agency will have administrative and physical controls to prevent unauthorized access to its systems of records, to prevent... 1 General Provisions 1 2012-01-01 2012-01-01 false Security of systems of records. 304.29...

  14. Security plan for the Automated Transportation Management System

    SciTech Connect

    Not Available

    1994-04-01

    The Automated Transportation Management System (ATMS) is an unclassified non-sensitive system consisting of hardware and software designed to facilitate the shipment of goods for the US Department of Energy (DOE). The system is secured against waste, fraud, abuse, misuse, and programming errors through a series of security measures that are discussed in detail in this document.

  15. Security Systems Commissioning: An Old Trick for Your New Dog

    ERIC Educational Resources Information Center

    Black, James R.

    2009-01-01

    Sophisticated, software-based security systems can provide powerful tools to support campus security. By nature, such systems are flexible, with many capabilities that can help manage the process of physical protection. However, the full potential of these systems can be overlooked because of unfamiliarity with the products, weaknesses in security…

  16. Electronic Security Systems in Libraries: Measuring the Costs and Benefits.

    ERIC Educational Resources Information Center

    Vincent, Ida

    1978-01-01

    Discusses factors involved in costing and evaluating electronic security systems for libraries including equipment costs, installation and maintenance, labor costs, staff training, public relations, and comparison of systems. Assessing book losses and potential savings from a security system are also addressed. (RAO)

  17. Saturn facility oil transfer automation system

    SciTech Connect

    Joseph, Nathan R.; Thomas, Rayburn Dean; Lewis, Barbara Ann; Malagon, Hector M.

    2014-02-01

    The Saturn accelerator, owned by Sandia National Laboratories, has been in operation since the early 1980s and still has many of the original systems. A critical legacy system is the oil transfer system which transfers 250,000 gallons of transformer oil from outside storage tanks to the Saturn facility. The oil transfer system was iden- ti ed for upgrade to current technology standards. Using the existing valves, pumps, and relay controls, the system was automated using the National Instruments cRIO FGPA platform. Engineered safety practices, including a failure mode e ects analysis, were used to develop error handling requirements. The uniqueness of the Saturn Oil Automated Transfer System (SOATS) is in the graphical user interface. The SOATS uses an HTML interface to communicate to the cRIO, creating a platform independent control system. The SOATS was commissioned in April 2013.

  18. A Sensor and Communications System for Containerized-Cargo Security

    SciTech Connect

    Leach Jr., R R

    2005-02-10

    A public/private collaboration between federal, state, provincial, and local U.S. and Canadian governmental organizations, called the Canada - United States Cargo Security Project has been formed, with the goal to improve security of containerized cargo moving from overseas locations into eastern Canadian provinces and the Northeastern United States. The current phase of this project has two technical objectives. These are: (1) to build and test a prototype in-container sensor system able to detect unauthorized entry into the container and the presence of radioactive material, to record geographical location and environmental data, and to transmit this information via satellite communications to a remote monitoring facility, and (2) to develop a secure website where data from the in-container sensors and other information will be displayed in real or near-real time and can be made available to law enforcement and emergency response organizations as appropriate. This paper will describe these activities, currently being undertaken by the Lawrence Livermore National Laboratory. An additional goal of the project's current phase is to integrate multi-jurisdictional training and first-responder exercises while monitoring and tracking container shipments from overseas to the US via Canadian ports-of-entry into North America. This activity is being undertaken by other project partners, which include the National Infrastructure Institute--Center for Infrastructure Expertise (NI2CIE), Transport Canada, Canadian Provinces of Quebec and Nova Scotia, Ports of Halifax and Montreal, U.S. Coast Guard (First Coast Guard District), States of New Hampshire, Maine, Vermont, and New York and the Port of Portland.

  19. [Social security for health system transformation].

    PubMed

    Echevarría-Zuno, Santiago

    2012-01-01

    The aim of this article is to present the management and medical components within the public health institutions that can contribute to the transformation of the National Health System (NHS). It is expected that these will have an impact in the extent of the medical coverage and will improve the health care services delivered to the Mexican population. A diagnostic study revealed the existence of fragmentation in the NHS. The health institutions are vertically established and operate under isolated mechanisms of financing and administration. Additionally, it is pointed out the problematic derived from the multiplicity in the public insurance conditions among individuals and the lack of census of the insured population within the institutions. As part of the universalization of health services, it is necessary to integrate the health care system; accordingly, a variety of mechanisms for the partial and total integration are arise, such as the exchange of the health care services and the portability and convergence of the institutions. Particularly, we listed the actions carried out by the Mexican Institute of Social Security for the integration of the NHS such as, the independent management medical areas, diagnosis-related groups (DRG), the performing evaluation of the medical units, and the preventive and curative strategies in the implemented programs. Finally, is dealt some reflections in order to improve the public health care.

  20. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    SciTech Connect

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  1. System security in the space flight operations center

    NASA Technical Reports Server (NTRS)

    Wagner, David A.

    1988-01-01

    The Space Flight Operations Center is a networked system of workstation-class computers that will provide ground support for NASA's next generation of deep-space missions. The author recounts the development of the SFOC system security policy and discusses the various management and technology issues involved. Particular attention is given to risk assessment, security plan development, security implications of design requirements, automatic safeguards, and procedural safeguards.

  2. Implementing message systems in multilevel secure environments: Problems and approaches

    NASA Astrophysics Data System (ADS)

    Martins, G. R.; Gaines, R. S.

    1982-07-01

    A study of the problems of building multilevel secure message systems. The need for such systems in the government and commercial sectors is growing. Designs are strongly affected by (1) the granularity of security protection (at the level of folders, messages, paragraphs, or words) and (2) planned departures from the Bell-LaPadula security model, for user convenience. A Taxonomy of design alternatives is defined, and 16 specific approaches are described and compared.

  3. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    SciTech Connect

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  4. Support systems of the orbiting quarantine facility

    NASA Astrophysics Data System (ADS)

    The physical support systems, the personnel management structure, and the contingency systems necessary to permit the Orbiting Quarantine Facility (OQF) to function as an integrated system are described. The interactions between the subsystems within the preassembled modules are illustrated. The Power Module generates and distributes electrical power throughout each of the four modules, stabilizes the OQF's attitude, and dissipates heat generated throughout the system. The Habitation Module is a multifunctional structure designed to monitor and control all aspects of the system's activities. The Logistics Module stores the supplies needed for 30 days of operation and provides storage for waste materials generated during the mission. The Laboratory Module contains the equipment necessary for executing the protocol, as well as an independent life support system.

  5. High Energy X-Ray System Specification for the Device Assembly Facility (DAF) at the NNSS

    SciTech Connect

    Fry, David A.

    2012-08-10

    This specification establishes requirements for an X-Ray System to be used at the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS) to support radiography of experimental assemblies for Laboratory (LANL, LLNL, SNL) programs conducting work at the NNSS.

  6. Catheter Securement Systems for Peripherally Inserted and Nontunneled Central Vascular Access Devices: Clinical Evaluation of a Novel Sutureless Device.

    PubMed

    Krenik, Karen M; Smith, Graham E; Bernatchez, Stéphanie F

    2016-01-01

    Sutureless catheter securement systems are intended to eliminate risks associated with sutures. The clinical acceptability of a novel system was investigated compared with the current method of securement for peripherally inserted central catheters (19 facilities using StatLock or sutures) or nontunneled central vascular access devices (3 facilities using StatLock or sutures or HubGuard + Sorbaview Shield). More than 94% of respondents rated the novel system as same, better, or much better than their current product. More than 82% of respondents were willing to replace their current system with the new one. PMID:27379679

  7. 33 CFR 105.405 - Format and content of the Facility Security Plan (FSP).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Security measures for access control, including designated public access areas; (11) Security measures for restricted areas; (12) Security measures for handling cargo; (13) Security measures for delivery of vessel stores and bunkers; (14) Security measures for monitoring; (15) Security incident procedures; (16)...

  8. Ideal Based Cyber Security Technical Metrics for Control Systems

    SciTech Connect

    W. F. Boyer; M. A. McQueen

    2007-10-01

    Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provide the basis for management decisions that affect the protection of the infrastructure. A cyber security technical metric is the security relevant output from an explicit mathematical model that makes use of objective measurements of a technical object. A specific set of technical security metrics are proposed for use by the operators of control systems. Our proposed metrics are based on seven security ideals associated with seven corresponding abstract dimensions of security. We have defined at least one metric for each of the seven ideals. Each metric is a measure of how nearly the associated ideal has been achieved. These seven ideals provide a useful structure for further metrics development. A case study shows how the proposed metrics can be applied to an operational control system.

  9. Secure control systems with application to cyber-physical systems

    SciTech Connect

    Dong, Jin; Djouadi, Seddik M; Nutaro, James J; Kuruganti, Phani Teja

    2014-01-01

    Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

  10. CLASSIFICATION OF THE MGR SUBSURFACE FACILITY SYSTEM

    SciTech Connect

    R.J. Garrett

    1999-08-31

    The purpose of this analysis is to document the Quality Assurance (QA) classification of the Monitored Geologic Repository (MGR) subsurface facility system structures, systems and components (SSCs) performed by the MGR Safety Assurance Department. This analysis also provides the basis for revision of YMP/90-55Q, Q-List (YMP 1998). The Q-List identifies those MGR SSCs subject to the requirements of DOE/RW-0333P, ''Quality Assurance Requirements and Description'' (QARD) (DOE 1998). This QA classification incorporates the current MGR design and the results of the ''Preliminary Preclosure Design Basis Event Calculations for the Monitored Geologic Repository'' (CRWMS M&O 1998a).

  11. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... endorsed by the agency's chief executive. (b) Document the rail transit agency's process for managing... address the personal security of passengers and employees; (d) Document the rail transit agency's process... system security plan; and (e) Document the rail transit agency's process for making its system...

  12. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... endorsed by the agency's chief executive. (b) Document the rail transit agency's process for managing... address the personal security of passengers and employees; (d) Document the rail transit agency's process... system security plan; and (e) Document the rail transit agency's process for making its system...

  13. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... endorsed by the agency's chief executive. (b) Document the rail transit agency's process for managing... address the personal security of passengers and employees; (d) Document the rail transit agency's process... system security plan; and (e) Document the rail transit agency's process for making its system...

  14. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... endorsed by the agency's chief executive. (b) Document the rail transit agency's process for managing... address the personal security of passengers and employees; (d) Document the rail transit agency's process... system security plan; and (e) Document the rail transit agency's process for making its system...

  15. Applications for cyber security - System and application monitoring

    SciTech Connect

    Marron, J. E.

    2006-07-01

    Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

  16. RFID Based Context Information Security System Architecture for Securing Personal Information under Ubiquitous Environment

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Park, Gil-Cheol; Kim, Seoksoo

    2007-12-01

    In this study, framework for securing personal information among various contexts collected and utilized under ubiquitous environment is proposed. The proposed framework will analyze relativity among information used to determine the exposure of personal information according to circumstances where personal information is used. In addition, the study will define the definition of role-based structure and propose a structure applying password security system according to access level. Furthermore, the study will propose a method for building information security system using RFID tag information which generates context information.

  17. DOE integrated safeguards and security (DISS) system a nation-wide distributed information system for personnel security

    SciTech Connect

    Block, B.

    1997-06-05

    DISS uses secure client-server and relational database technology across open networks to address the problems of security clearance request processing and tracking of security clearances for the Department of energy. The system supports the entire process from data entry by the prospective clearance holders through tracking of all DOE clearances, and use of standard DOE badges in automated access control systems throughout the DOE complex.

  18. Reforming the Ghanaian social security system: prospects and challenges.

    PubMed

    Darkwa, O K

    1997-06-01

    This paper examines the major features of the Ghanaian social security system. It discusses the Ghanaian scheme by examining the extent of coverage, criteria for eligibility, and the method of administration and financing. The paper undertakes an assessment of the existing security scheme and highlights its major limitations and weaknesses. It proposes measures for reforming the security system by suggesting an extension in coverage, adjusting the benefit formula, increasing expenditure on social services for the elderly, adjusting benefits to reflect the cost of living index, creating employer-based private pension schemes, and exploring alternative ways of investing social security accumulated funds.

  19. Computer security: a necessary element of integrated information systems.

    PubMed Central

    Butzen, F; Furler, F

    1986-01-01

    The Matheson Report sees the medical library as playing a key role in a network of interlocking information bases that will extend from central repositories of medical information to each physician's personal records. It appears, however, that the role of security in this vision has not been fully delineated. This paper discusses problems in maintaining the security of confidential medical information, the state of the applicable law, and techniques for security (with special emphasis on the UNIX operating system). It is argued that the absence of security threatens any plan to build an information network, as there will be resistance to any system that may give intruders access to confidential data. PMID:3742113

  20. Information security requirements in patient-centred healthcare support systems.

    PubMed

    Alsalamah, Shada; Gray, W Alex; Hilton, Jeremy; Alsalamah, Hessah

    2013-01-01

    Enabling Patient-Centred (PC) care in modern healthcare requires the flow of medical information with the patient between different healthcare providers as they follow the patient's treatment plan. However, PC care threatens the stability of the balance of information security in the support systems since legacy systems fall short of attaining a security balance when sharing their information due to compromises made between its availability, integrity, and confidentiality. Results show that the main reason for this is that information security implementation in discrete legacy systems focused mainly on information confidentiality and integrity leaving availability a challenge in collaboration. Through an empirical study using domain analysis, observations, and interviews, this paper identifies a need for six information security requirements in legacy systems to cope with this situation in order to attain the security balance in systems supporting PC care implementation in modern healthcare.

  1. A novel wireless local positioning system for airport (indoor) security

    NASA Astrophysics Data System (ADS)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  2. A security scheme of SMS system

    NASA Astrophysics Data System (ADS)

    Zhang, Fangzhou; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.

  3. Evaluation of a Cyber Security System for Hospital Network.

    PubMed

    Faysel, Mohammad A

    2015-01-01

    Most of the cyber security systems use simulated data in evaluating their detection capabilities. The proposed cyber security system utilizes real hospital network connections. It uses a probabilistic data mining algorithm to detect anomalous events and takes appropriate response in real-time. On an evaluation using real-world hospital network data consisting of incoming network connections collected for a 24-hour period, the proposed system detected 15 unusual connections which were undetected by a commercial intrusion prevention system for the same network connections. Evaluation of the proposed system shows a potential to secure protected patient health information on a hospital network. PMID:26262217

  4. Evaluation of a Cyber Security System for Hospital Network.

    PubMed

    Faysel, Mohammad A

    2015-01-01

    Most of the cyber security systems use simulated data in evaluating their detection capabilities. The proposed cyber security system utilizes real hospital network connections. It uses a probabilistic data mining algorithm to detect anomalous events and takes appropriate response in real-time. On an evaluation using real-world hospital network data consisting of incoming network connections collected for a 24-hour period, the proposed system detected 15 unusual connections which were undetected by a commercial intrusion prevention system for the same network connections. Evaluation of the proposed system shows a potential to secure protected patient health information on a hospital network.

  5. Staff management of security personnel at Martin Marietta Energy Systems, Inc. , Portsmouth Gaseous Diffusion Plant

    SciTech Connect

    Not Available

    1991-09-25

    The Portsmouth Gaseous Diffusion Plant Security and Police Operations Department is responsible for protecting the US Department of Energy interests at the Portsmouth Plant from theft, sabotage, and other hostile acts that may adversely affect national security, the public health and safety, or property at the Department of Energy facility. This audit's purpose was to evaluate Martin Marietta Energy Systems, Inc.'s staff management at the Portsmouth Plant Security Department. The Portsmouth Plant Security Department could reduce operating cost up to an estimated $4.4 million over 5 years by: (1) Eliminating up to 14 unnecessary staff positions, and (2) reducing the length of relief breaks. These economies could be realized through implementing written operating procedures and negotiating removal of certain labor union restrictions. 2 tabs.

  6. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    SciTech Connect

    Not Available

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  7. System for Secure Integration of Aviation Data

    NASA Technical Reports Server (NTRS)

    Kulkarni, Deepak; Wang, Yao; Keller, Rich; Chidester, Tom; Statler, Irving; Lynch, Bob; Patel, Hemil; Windrem, May; Lawrence, Bob

    2007-01-01

    The Aviation Data Integration System (ADIS) of Ames Research Center has been established to promote analysis of aviation data by airlines and other interested users for purposes of enhancing the quality (especially safety) of flight operations. The ADIS is a system of computer hardware and software for collecting, integrating, and disseminating aviation data pertaining to flights and specified flight events that involve one or more airline(s). The ADIS is secure in the sense that care is taken to ensure the integrity of sources of collected data and to verify the authorizations of requesters to receive data. Most importantly, the ADIS removes a disincentive to collection and exchange of useful data by providing for automatic removal of information that could be used to identify specific flights and crewmembers. Such information, denoted sensitive information, includes flight data (here signifying data collected by sensors aboard an aircraft during flight), weather data for a specified route on a specified date, date and time, and any other information traceable to a specific flight. The removal of information that could be used to perform such tracing is called "deidentification." Airlines are often reluctant to keep flight data in identifiable form because of concerns about loss of anonymity. Hence, one of the things needed to promote retention and analysis of aviation data is an automated means of de-identification of archived flight data to enable integration of flight data with non-flight aviation data while preserving anonymity. Preferably, such an automated means would enable end users of the data to continue to use pre-existing data-analysis software to identify anomalies in flight data without identifying a specific anomalous flight. It would then also be possible to perform statistical analyses of integrated data. These needs are satisfied by the ADIS, which enables an end user to request aviation data associated with de-identified flight data. The ADIS

  8. Facility Energy Decision Screening (FEDS) software system

    SciTech Connect

    Dirks, J.A.; Wrench, L.E.

    1993-08-01

    The Facility Energy Decision Screening (FEDS) Model is under development at Pacific Northwest Laboratory for the Department of Energy Federal Energy Management Program and the US Army Construction Engineering Research Laboratory. FEDS is a multi-level energy analysis software system designed to provide a comprehensive approach to fuel-neutral, technology-independent, integrated (energy) resource planning and acquisition. The FEDS system includes Level-1, a top-down, first-pass energy systems analysis and energy resource acquisition decision software model for buildings and facilities; and the Level-2 software model, which allows specific engineering inputs and provides detailed output. FEDS Level-1 is a user-friendly, DOS-based, menu-driven software program for assessing the energy efficiency resource at a large federal installation. It uses high-level installation information (number, age, size, and types of buildings and energy systems), an internal data base of typical energy-system configurations and performance data, and sophisticated energy simulation and optimization models to estimate the net present value of potential energy retrofits in federal installations. The FEDS Level-1 analysis will typically be followed by a FEDS Level-2 analysis, which allows FEDS Level-1 information to be augmented with detailed energy-system information, and returns detailed project-by-project technology selection and economic information. FEDS Level-1 was released in October 1992. FEDS Level-2 is planned for release in October 1993. The first release which includes both levels will cover only building systems. The next release in early 1994 will cover other energy systems, including central heating and cooling plants and thermal distribution loops.

  9. Evaluation on Electronic Securities Settlements Systems by AHP Methods

    NASA Astrophysics Data System (ADS)

    Fukaya, Kiyoyuki; Komoda, Norihisa

    Accompanying the spread of Internet and the change of business models, electronic commerce expands buisness areas. Electronic finance commerce becomes popular and especially online security tradings becoome very popular in this area. This online securitiy tradings have some good points such as less mistakes than telephone calls. In order to expand this online security tradings, the transfer of the security paper is one the largest problems to be solved. Because it takes a few days to transfer the security paper from a seller to a buyer. So the dematerialization of security papers is one of the solutions. The demterilization needs the information systems for setteling security. Some countries such as France, German, United Kingdom and U.S.A. have been strating the dematerialization projects. The legacy assesments on these projects focus from the viewpoint of the legal schemes only and there is no assessment from system architectures. This paper focuses on the information system scheme and valuates these dematerlization projects by AHP methods from the viewpoints of “dematerializaion of security papers", “speed of transfer", “usefulness on the system" and “accumulation of risks". This is the first case of valuations on security settlements systems by AHP methods, especially four counties’ systems.

  10. Collection Security.

    ERIC Educational Resources Information Center

    Boss, Richard W.

    1984-01-01

    Presents a systematic approach to the problem of security of library collections and facilities from theft and vandalism. Highlights include responses to losses, defining security needs, typical weaknesses of facilities, policies and procedures that weaken a library's security, conducting a security audit, cost of security, cost-effectiveness, and…

  11. Information Security Management - Part Of The Integrated Management System

    NASA Astrophysics Data System (ADS)

    Manea, Constantin Adrian

    2015-07-01

    The international management standards allow their integrated approach, thereby combining aspects of particular importance to the activity of any organization, from the quality management systems or the environmental management of the information security systems or the business continuity management systems. Although there is no national or international regulation, nor a defined standard for the Integrated Management System, the need to implement an integrated system occurs within the organization, which feels the opportunity to integrate the management components into a cohesive system, in agreement with the purpose and mission publicly stated. The issues relating to information security in the organization, from the perspective of the management system, raise serious questions to any organization in the current context of electronic information, reason for which we consider not only appropriate but necessary to promote and implement an Integrated Management System Quality - Environment - Health and Operational Security - Information Security

  12. Vitrification Facility integrated system performance testing report

    SciTech Connect

    Elliott, D.

    1997-05-01

    This report provides a summary of component and system performance testing associated with the Vitrification Facility (VF) following construction turnover. The VF at the West Valley Demonstration Project (WVDP) was designed to convert stored radioactive waste into a stable glass form for eventual disposal in a federal repository. Following an initial Functional and Checkout Testing of Systems (FACTS) Program and subsequent conversion of test stand equipment into the final VF, a testing program was executed to demonstrate successful performance of the components, subsystems, and systems that make up the vitrification process. Systems were started up and brought on line as construction was completed, until integrated system operation could be demonstrated to produce borosilicate glass using nonradioactive waste simulant. Integrated system testing and operation culminated with a successful Operational Readiness Review (ORR) and Department of Energy (DOE) approval to initiate vitrification of high-level waste (HLW) on June 19, 1996. Performance and integrated operational test runs conducted during the test program provided a means for critical examination, observation, and evaluation of the vitrification system. Test data taken for each Test Instruction Procedure (TIP) was used to evaluate component performance against system design and acceptance criteria, while test observations were used to correct, modify, or improve system operation. This process was critical in establishing operating conditions for the entire vitrification process.

  13. Reliable, efficient systems for biomedical research facility

    SciTech Connect

    Basso, P.

    1997-05-01

    Medical Sciences Research Building III (MSRB III) is a 10-story, 207,000 ft{sup 2} (19,230 m{sup 2}) biomedical research facility on the campus of the University of Michigan. The design of MSRB III required a variety of technological solutions to complex design issues. The systems also had to accommodate future modifications. Closely integrated, modular systems with a high degree of flexibility were designed to respond to this requirement. Additionally, designs were kept as simple as possible for operation and maintenance personnel. Integrated electronic controls were used to provide vital data during troubleshooting and maintenance procedures. Equipment was also specified that provides reliability and minimizes maintenance. Other features include 100% redundancy of all central equipment servicing the animal housing area; redundant temperature controls for each individual animal housing room for fail-safe operation to protect the animals against overheating; and accessibility to all items requiring maintenance through an above-ceiling coordination process. It is critical that the engineering systems for MSRB III provide a safe, comfortable, energy efficient environment. The achievement of this design intent was noted by the University`s Commissioning Review Committee which stated: The Commissioning Process performed during both the design phase and construction phase of MSRB III was a significant success, providing an efficiently functioning facility that has been built in accordance with its design intent.

  14. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Management System of Records (74 FR 3084, January 16, 2009) for the collection and maintenance of records... SECURITY Office of the Secretary Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel... to update and reissue Department of Homeland Security/ALL--023 Personnel Security Management...

  15. Assessing DOVID security: a system approach

    NASA Astrophysics Data System (ADS)

    Andrade, Ana A.; Rebordao, Jose M.

    2000-04-01

    Optical variable devices are usually characterized by their physical objective properties, which are key elements to distinguish originals form fakes, especially in the court of law context, however, at the selection, planning or pre- production stages, an evaluation of devices could and should be performed, in view of its classification in a security scale. The ranking in this scale would be indicative of the likelihood of counterfeiting and would have to take into account not only the physical aspects, but also subjective ones such as the security of the legal manufacture or of the technology itself. In this paper, we propose a methodology and elaborate on a model for DOVID security measurement, based on Multi criteria Decision Analysis. Critical evaluation factors, related to technology, design and quality, are proposed, its impacts quantified and grouped in order to allow an evaluation of DOVID samples. Using this methodology all the aspects that contribute to the DOVID security might be assessed and inter-related, leading to a final classification and, in the long term, to a standard of security.

  16. FACELOCK-Lock Control Security System Using Face Recognition-

    NASA Astrophysics Data System (ADS)

    Hirayama, Takatsugu; Iwai, Yoshio; Yachida, Masahiko

    A security system using biometric person authentication technologies is suited to various high-security situations. The technology based on face recognition has advantages such as lower user’s resistance and lower stress. However, facial appearances change according to facial pose, expression, lighting, and age. We have developed the FACELOCK security system based on our face recognition methods. Our methods are robust for various facial appearances except facial pose. Our system consists of clients and a server. The client communicates with the server through our protocol over a LAN. Users of our system do not need to be careful about their facial appearance.

  17. Fast Flux Test Facility core system

    SciTech Connect

    Ethridge, J.L. ); Baker, R.B.; Leggett, R.D.; Pitner, A.L.; Waltar, A.E. )

    1990-11-01

    A review of Liquid Metal Reactor (LMR) core system accomplishments provides an excellent road map through the maze of issues that faced reactor designers 10 years ago. At that time relatively large uncertainties were associated with fuel pin and fuel assembly performance, irradiation of structural materials, and performance of absorber assemblies. The extensive core systems irradiation program at the US Department of Energy's Fast Flux Test Facility (FFTF) has addressed each of these principal issues. As a result of the progress made, the attention of long-range LMR planners and designers can shift away from improving core systems and focus on reducing capital costs to ensure the LMR can compete economically in the 21st century with other nuclear reactor concepts. 3 refs., 6 figs., 1 tab.

  18. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    SciTech Connect

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  19. Engineering Challenges for Closed Ecological System facilities

    NASA Astrophysics Data System (ADS)

    Dempster, William; Nelson, Mark; Allen, John P.

    2012-07-01

    Engineering challenges for closed ecological systems include methods of achieving closure for structures of different materials, and developing methods of allowing energy (for heating and cooling) and information transfer through the materially closed structure. Methods of calculating degree of closure include measuring degradation rates of inert trace gases introduced into the system. An allied problem is developing means of locating where leaks are located so that they may be repaired and degree of closure maintained. Once closure is achieved, methods of dealing with the pressure differentials between inside and outside are needed: from inflatable structures which might adjust to the pressure difference to variable volume chambers attached to the life systems component. These issues are illustrated through the engineering employed at Biosphere 2, the Biosphere 2 Test Module and the Laboratory Biosphere and a discussion of methods used by other closed ecological system facility engineers. Ecological challenges include being able to handle faster cycling rates and accentuated daily and seasonal fluxes of critical life elements such as carbon dioxide, oxygen, water, macro- and mico-nutrients. The problems of achieving sustainability in closed systems for life support include how to handle atmospheric dynamics including trace gases, producing a complete human diet and recycling nutrients and maintaining soil fertility, healthy air and water and preventing the loss of crucial elements from active circulation. In biospheric facilities the challenge is also to produce analogue to natural biomes and ecosystems, studying processes of self-organization and adaptation in systems that allow specification or determination of state variables and cycles which may be followed through all interactions from atmosphere to soils.

  20. 49 CFR 193.2911 - Security lighting.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under §...

  1. Architectural issues in fault-tolerant, secure computing systems

    SciTech Connect

    Joseph, M.K.

    1988-01-01

    This dissertation explores several facets of the applicability of fault-tolerance techniques to secure computer design, these being: (1) how fault-tolerance techniques can be used on unsolved problems in computer security (e.g., computer viruses, and denial-of-service); (2) how fault-tolerance techniques can be used to support classical computer-security mechanisms in the presence of accidental and deliberate faults; and (3) the problems involved in designing a fault-tolerant, secure computer system (e.g., how computer security can degrade along with both the computational and fault-tolerance capabilities of a computer system). The approach taken in this research is almost as important as its results. It is different from current computer-security research in that a design paradigm for fault-tolerant computer design is used. This led to an extensive fault and error classification of many typical security threats. Throughout this work, a fault-tolerance perspective is taken. However, the author did not ignore basic computer-security technology. For some problems he investigated how to support and extend basic-security mechanism (e.g., trusted computing base), instead of trying to achieve the same result with purely fault-tolerance techniques.

  2. Analyzing the security of an existing computer system

    NASA Technical Reports Server (NTRS)

    Bishop, M.

    1986-01-01

    Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines.

  3. Process Control System Cyber Security Standards - An Overview

    SciTech Connect

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  4. Controls system developments for the ERL facility

    SciTech Connect

    Jamilkowski, J.; Altinbas, Z.; Gassner, D.; Hoff, L.; Kankiya, P.; Kayran, D.; Miller, T.; Olsen, R.; Sheehy, B.; Xu, W.

    2011-10-07

    The BNL Energy Recovery LINAC (ERL) is a high beam current, superconducting RF electron accelerator that is being commissioned to serve as a research and development prototype for a RHIC facility upgrade for electron-ion collision (eRHIC). Key components of the machine include a laser, photocathode, and 5-cell superconducting RF cavity operating at a frequency of 703 MHz. Starting with a foundation based on existing ADO software running on Linux servers and on the VME/VxWorks platforms developed for RHIC, we are developing a controls system that incorporates a wide range of hardware I/O interfaces that are needed for machine R&D. Details of the system layout, specifications, and user interfaces are provided.

  5. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect

    Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  6. REPORT ON THE HOMELAND SECURITY WORKSHOP ON TRANSPORT AND DISPOSAL OF WASTES FROM FACILITIES CONTAMINATED WITH CHEMICAL AND BIOLOGICAL AGENTS

    EPA Science Inventory

    This report summarizes discussions from the "Homeland Security Workshop on Transport and Disposal of Wastes From Facilities Contaminated With Chemical or Biological Agents." The workshop was held on May 28-30, 2003, in Cincinnati, Ohio, and its objectives were to:

    .Documen...

  7. The National Criticality Experiments Research Center at the Device Assembly Facility, Nevada National Security Site: Status and Capabilities, Summary Report

    SciTech Connect

    S. Bragg-Sitton; J. Bess; J. Werner

    2011-09-01

    The National Criticality Experiments Research Center (NCERC) was officially opened on August 29, 2011. Located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS), the NCERC has become a consolidation facility within the United States for critical configuration testing, particularly those involving highly enriched uranium (HEU). The DAF is a Department of Energy (DOE) owned facility that is operated by the National Nuclear Security Agency/Nevada Site Office (NNSA/NSO). User laboratories include the Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL). Personnel bring their home lab qualifications and procedures with them to the DAF, such that non-site specific training need not be repeated to conduct work at DAF. The NNSS Management and Operating contractor is National Security Technologies, LLC (NSTec) and the NNSS Safeguards and Security contractor is Wackenhut Services. The complete report provides an overview and status of the available laboratories and test bays at NCERC, available test materials and test support configurations, and test requirements and limitations for performing sub-critical and critical tests. The current summary provides a brief summary of the facility status and the method by which experiments may be introduced to NCERC.

  8. Measurable Control System Security through Ideal Driven Technical Metrics

    SciTech Connect

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based

  9. Key ecological challenges for closed systems facilities

    NASA Astrophysics Data System (ADS)

    Nelson, Mark; Dempster, William F.; Allen, John P.

    2013-07-01

    Closed ecological systems are desirable for a number of purposes. In space life support systems, material closure allows precious life-supporting resources to be kept inside and recycled. Closure in small biospheric systems facilitates detailed measurement of global ecological processes and biogeochemical cycles. Closed testbeds facilitate research topics which require isolation from the outside (e.g. genetically modified organisms; radioisotopes) so their ecological interactions and fluxes can be studied separate from interactions with the outside environment. But to achieve and maintain closure entails solving complex ecological challenges. These challenges include being able to handle faster cycling rates and accentuated daily and seasonal fluxes of critical life elements such as carbon dioxide, oxygen, water, macro- and mico-nutrients. The problems of achieving sustainability in closed systems for life support include how to handle atmospheric dynamics including trace gases, producing a complete human diet, recycling nutrients and maintaining soil fertility, the maintenance of healthy air and water and preventing the loss of critical elements from active circulation. In biospheric facilities, the challenge is also to produce analogues to natural biomes and ecosystems, studying processes of self-organization and adaptation in systems that allow specification or determination of state variables and cycles which may be followed through all interactions from atmosphere to soils. Other challenges include the dynamics and genetics of small populations, the psychological challenges for small isolated human groups and backup technologies and strategic options which may be necessary to ensure long-term operation of closed ecological systems.

  10. Air support facilities. [interface between air and surface transportation systems

    NASA Technical Reports Server (NTRS)

    1975-01-01

    Airports are discussed in terms of the interface between the ground and air for transportation systems. The classification systems, design, facilities, administration, and operations of airports are described.

  11. 40 CFR 160.45 - Test system supply facilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Test system supply facilities. 160.45 Section 160.45 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS GOOD LABORATORY PRACTICE STANDARDS Facilities § 160.45 Test system supply facilities. (a) There...

  12. Comprehensive test ban treaty international monitoring system security threats and proposed security attributes

    SciTech Connect

    Draelos, T.J.; Craft, R.L.

    1996-03-01

    To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

  13. A secure network access system for mobile IPv6

    NASA Astrophysics Data System (ADS)

    Zhang, Hong; Yuan, Man; He, Rui; Jiang, Luliang; Ma, Jian; Qian, Hualin

    2004-03-01

    With the fast development of Internet and wireless and mobile communication technology, the Mobile Internet Age is upcoming. For those providing Mobile Internet services, especially from the view of ISP (Internet Service Provider), current mobile IP protocol is insufficient. Since the Mobile IPv6 protocol will be popular in near future, how to provide a secure mobile IPv6 service is important. A secure mobile IPv6 network access system is highly needed for mobile IPv6 deployment. Current methods and systems are still inadequate, including EAP, PANA, 802.1X, RADIUS, Diameter, etc. In this paper, we describe main security goals for a secure mobile IPv6 access system, and propose a secure network access system to achieve them. This access system consists of access router, attendant and authentication servers. The access procedure is divided into three phases, which are initial phase, authentication and registration phase and termination phase. This system has many advantages, including layer two independent, flexible and extensible, no need to modify current IPv6 address autoconfiguration protocols, binding update optimization, etc. Finally, the security of the protocol in this system is analyzed and proved with Extended BAN logic method, and a brief introduction of system implementation is given.

  14. Secure ADS-B authentication system and method

    NASA Technical Reports Server (NTRS)

    Viggiano, Marc J (Inventor); Valovage, Edward M (Inventor); Samuelson, Kenneth B (Inventor); Hall, Dana L (Inventor)

    2010-01-01

    A secure system for authenticating the identity of ADS-B systems, including: an authenticator, including a unique id generator and a transmitter transmitting the unique id to one or more ADS-B transmitters; one or more ADS-B transmitters, including a receiver receiving the unique id, one or more secure processing stages merging the unique id with the ADS-B transmitter's identification, data and secret key and generating a secure code identification and a transmitter transmitting a response containing the secure code and ADSB transmitter's data to the authenticator; the authenticator including means for independently determining each ADS-B transmitter's secret key, a receiver receiving each ADS-B transmitter's response, one or more secure processing stages merging the unique id, ADS-B transmitter's identification and data and generating a secure code, and comparison processing comparing the authenticator-generated secure code and the ADS-B transmitter-generated secure code and providing an authentication signal based on the comparison result.

  15. Secure, safe, and sensitive solutions.

    PubMed

    Hughan, Tina

    2012-04-01

    Tabloid sensationalism aside, the increase in attacks on health service workers has led to many hospitals and healthcare facilities re-assessing their security systems. Here, Tina Hughan, head of marketing for specialist in door opening systems, Assa Abloy, gives her view on how security providers can help healthcare estates and facilities teams to cope with this disturbing trend. PMID:22574470

  16. ARTEMIS: towards a secure interoperability infrastructure for healthcare information systems.

    PubMed

    Boniface, Mike; Wilken, Paul

    2005-01-01

    The ARTEMIS project is developing a semantic web service based P2P interoperability infrastructure for healthcare information systems. The strict legislative framework in which these systems are deployed means that the interoperability of security and privacy mechanisms is an important requirement in supporting communication of electronic healthcare records across organisation boundaries. In ARTEMIS, healthcare providers define semantically annotated security and privacy policies for web services based on organisational requirements. The ARTEMIS mediator uses these semantic web service descriptions to broker between organisational policies by reasoning over security and clinical concept ontologies.

  17. Radioisotope Power System Facility shielding analysis

    SciTech Connect

    Lu, A.H.; Morford, R.J.

    1989-01-01

    A series of calculations for the Radioisotope Power System Facility have been performed. These analyses have determined the shielding required for storage, testing, and transport of /sup 238/Pu heat source modules using the Monte Carlo code MCNP3B. The source terms and the assumptions used have been verified by comparison of calculated dose rates with measured ones. This paper describes the methodology used for shielding designs and the utilization of available variance reduction techniques to improve the computational efficiency. The new version of MCNP (MCNP3B) with a repeated structure capability was used. It decreased the chance for computer model errors and greatly decreased the model setup time. 2 refs., 3 figs., 2 tabs.

  18. 41 CFR 102-81.20 - Are the security standards for new Federally owned and leased facilities the same as the...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... designed to meet the standards identified in the document entitled “Interagency Security Committee Security Design Criteria for New Federal Office Buildings and Major Modernization Projects,” dated May 28, 2001. The security design criteria for new facilities takes into consideration technology developments,...

  19. 41 CFR 102-81.20 - Are the security standards for new Federally owned and leased facilities the same as the...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... designed to meet the standards identified in the document entitled “Interagency Security Committee Security Design Criteria for New Federal Office Buildings and Major Modernization Projects,” dated May 28, 2001. The security design criteria for new facilities takes into consideration technology developments,...

  20. 41 CFR 102-81.20 - Are the security standards for new Federally owned and leased facilities the same as the...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... designed to meet the standards identified in the document entitled “Interagency Security Committee Security Design Criteria for New Federal Office Buildings and Major Modernization Projects,” dated May 28, 2001. The security design criteria for new facilities takes into consideration technology developments,...

  1. Proposal of Secure VoIP System Using Attribute Certificate

    NASA Astrophysics Data System (ADS)

    Kim, Jin-Mook; Jeong, Young-Ae; Hong, Seong-Sik

    VoIP is a service that changes the analogue audio signal into a digital signal and then transfers the audio information to the users after configuring it as a packet; and it has an advantage of lower price than the existing voice call service and better extensibility. However, VoIP service has a system structure that, compared to the existing PSTN (Public Switched Telephone Network), has poor call quality and is vulnerable in the security aspect. To make up these problems, TLS service was introduced to enhance the security. In practical system, however, since QoS problem occurs, it is necessary to develop the VoIP security system that can satisfy QoS at the same time in the security aspect. In this paper, a user authentication VoIP system that can provide a service according to the security and the user through providing a differential service according to the approach of the users by adding AA server at the step of configuring the existing VoIP session is suggested. It was found that the proposed system of this study provides a quicker QoS than the TLS-added system at a similar level of security. Also, it is able to provide a variety of additional services by the different users.

  2. Facilities management system (FMS). Final report

    SciTech Connect

    1992-04-01

    This report provides a detailed, final status of Andersen Consulting`s participation in the Facilities Management System (FMS) implementation project under contract with Los Alamos National Laboratory (LANL) and offers suggestions for continued FMS improvements. The report presents the following topics of discussion: (1) summary and status of work (2) recommendations for continued success (3) contract deliverables and client satisfaction. The Summary and Status of Work section presents a detailed, final status of the FMS project at the termination of Andersen`s full-time participation. This section discusses the status of each FMS sub-system and of the Andersen major project deliverables. The Recommendations section offers suggestions for continued FMS success. The topics discussed include recommendations for each of the following areas: (1) End User and Business Operations; (2) AISD; Development and Computer Operations; (3) Software; (4) Technical Platform; and (5) Control Procedures The Contract Deliverables and Client Satisfaction section discusses feedback received from Johnson Controls management and FMS system users. The report also addresses Andersen`s observations from the feedback.

  3. Communication Security for Control Systems in Smart Grid

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.

  4. Pilot Implementation and Preliminary Evaluation of START:AV Assessments in Secure Juvenile Correctional Facilities.

    PubMed

    Desmarais, Sarah L; Sellers, Brian G; Viljoen, Jodi L; Cruise, Keith R; Nicholls, Tonia L; Dvoskin, Joel A

    2012-01-01

    The Short-Term Assessment of Risk and Treatability: Adolescent Version (START:AV) is a new structured professional judgment guide for assessing short-term risks in adolescents. The scheme may be distinguished from other youth risk assessment and treatment planning instruments by its inclusion of 23 dynamic factors that are each rated for both vulnerability and strength. In addition, START:AV is also unique in that it focuses on multiple adverse outcomes-namely, violence, self-harm, suicide, unauthorized leave, substance abuse, self-neglect, victimization, and general offending-over the short-term (i.e., weeks to months) rather than long-term (i.e., years). This paper describes a pilot implementation and preliminary evaluation of START:AV in three secure juvenile correctional facilities in the southern United States. Specifically, we examined the descriptive characteristics and psychometric properties of START:AV assessments completed by 21 case managers on 291 adolescent offenders (250 boys and 41 girls) at the time of admission. Results provide preliminary support for the feasibility of completing START:AV assessments as part of routine practice. Findings also highlight differences in the characteristics of START:AV assessments for boys and girls and differential associations between the eight START:AV risk domains. Though results are promising, further research is needed to establish the reliability and validity of START:AV assessments completed in the field. PMID:23316116

  5. A Review of the Security of Insulin Pump Infusion Systems

    SciTech Connect

    Klonoff, David C.; Paul, Nathanael R; Kohno, Tadayoshi

    2011-01-01

    Insulin therapy has enabled diabetic patients to maintain blood glucose control to lead healthier lives. Today, rather than manually injecting insulin using syringes, a patient can use a device, such as an insulin pump, to programmatically deliver insulin. This allows for more granular insulin delivery while attaining blood glucose control. The insulin pump system features have increasingly benefited patients, but the complexity of the resulting system has grown in parallel. As a result security breaches that can negatively affect patient health are now possible. Rather than focus on the security of a single device, we concentrate on protecting the security of the entire system. In this paper we describe the security issues as they pertain to an insulin pump system that includes an embedded system of components including the insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices (e.g., a mobile phone or personal computer). We detail not only the growing wireless communication threat in each system component, but we also describe additional threats to the system (e.g., availability and integrity). Our goal is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we describe mitigating solutions to address identified security issues both for now and in the future.

  6. Pressurized security barrier and alarm system

    DOEpatents

    Carver, D.W.

    1995-04-11

    A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder`s making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed. 7 figures.

  7. Pressurized security barrier and alarm system

    DOEpatents

    Carver, Don W.

    1995-01-01

    A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder's making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed.

  8. Marine asset security and tracking (MAST) system

    DOEpatents

    Hanson, Gregory Richard; Smith, Stephen Fulton; Moore, Michael Roy; Dobson, Eric Lesley; Blair, Jeffrey Scott; Duncan, Christopher Allen; Lenarduzzi, Roberto

    2008-07-01

    Methods and apparatus are described for marine asset security and tracking (MAST). A method includes transmitting identification data, location data and environmental state sensor data from a radio frequency tag. An apparatus includes a radio frequency tag that transmits identification data, location data and environmental state sensor data. Another method includes transmitting identification data and location data from a radio frequency tag using hybrid spread-spectrum modulation. Another apparatus includes a radio frequency tag that transmits both identification data and location data using hybrid spread-spectrum modulation.

  9. New technology for food systems and security.

    PubMed

    Yau, N J Newton

    2009-01-01

    In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Consulting Group (SCG) Ltd. was employed as an example to lead the discussion on security or safety issues that may be caused by these innovative technologies. More technologies related to processing, functional ingredients and quality control technology of food were found in the data base of international technology trade platform. The review was conducted by categorizing technologies into the following subcategories in terms of safety and security issues: (1) agricultural materials/ingredients, (2) processing/engineering, (3) additives, (4) packaging/logistics, (5) functional ingredients, (6) miscellaneous (include detection technology). The author discusses examples listed for each subcategory, including GMO technology, nanotechnology, Chinese medicine based functional ingredients, as well as several innovative technologies. Currently, generation of innovative technology advance at a greater pace due to cross-area research and development activities. At the same time, more attention needs to be placed on the employment of these innovative technologies.

  10. 75 FR 5609 - Privacy Act of 1974; Department of Homeland Security/ALL-024 Facility and Perimeter Access...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-03

    ... DHS/ALL--024 Facility and Perimeter Access Control and Visitor Management System of Records (74 FR... Perimeter Access Control and Visitor Management System of Records AGENCY: Privacy Office; DHS. ACTION... Facility and Perimeter Access Control and Visitor Management System of Records to include record...

  11. Fuzzy assessment of health information system users' security awareness.

    PubMed

    Aydın, Özlem Müge; Chouseinoglou, Oumout

    2013-12-01

    Health information systems (HIS) are a specific area of information systems (IS), where critical patient data is stored and quality health service is only realized with the correct use and efficient dissemination of this data to health workers. Therefore, a balance needs to be established between the levels of security and flow of information on HIS. Instead of implementing higher levels and further mechanisms of control to increase the security of HIS, it is preferable to deal with the arguably weakest link on HIS chain with respect to security: HIS users. In order to provide solutions and approaches for transforming users to the first line of defense in HIS but also to employ capable and appropriate candidates from the pool of newly graduated students, it is important to assess and evaluate the security awareness levels and characteristics of these existing and future users. This study aims to provide a new perspective to understand the phenomenon of security awareness of HIS users with the use of fuzzy analysis, and to assess the present situation of current and future HIS users of a leading medical and educational institution of Turkey, with respect to their security characteristics based on four different security scales. The results of the fuzzy analysis, the guide on how to implement this fuzzy analysis to any health institution and how to read and interpret these results, together with the possible implications of these results to the organization are provided.

  12. Health maintenance facility system effectiveness testing

    NASA Technical Reports Server (NTRS)

    Lloyd, Charles W.; Gosbee, John; Bueker, Richard; Kupra, Debra; Ruta, Mary

    1993-01-01

    The Medical Simulations Working Group conducted a series of medical simulations to evaluate the proposed Health Maintenance Facility (HMF) Preliminary Design Review (PDR) configuration. The goal of these simulations was to test the system effectiveness of the HMF PDR configurations. The objectives of the medical simulations are to (1) ensure fulfillment of requirements with this HMF design, (2) demonstrate the conformance of the system to human engineering design criteria, and (3) determine whether undesirable design or procedural features were introduced into the design. The simulations consisted of performing 6 different medical scenarios with the HMF mockup in the KRUG laboratory. The scenarios included representative medical procedures and used a broad spectrum of HMF equipment and supplies. Scripts were written and simulations performed by medical simulations working group members under observation from others. Data were collected by means of questionnaires, debriefings, and videotapes. Results were extracted and listed in the individual reports. Specific issues and recommendations from each simulation were compiled into the individual reports. General issues regarding the PDR design of the HMF are outlined in the summary report.

  13. Security of healthcare information systems based on the CORBA middleware.

    PubMed

    Blobel, B; Holena, M

    1997-01-01

    The development of healthcare systems in accordance to the "Shared Care" paradigm results in co-operative health information systems across the boundaries of organisational, technological, and policy domains. Increasingly, these distributed and heterogeneous systems are based on middleware approaches, such as CORBA. Regarding the sensitivity of personal and medical data, such open, distributed, and heterogeneous health information systems demand a high level of data protection and data security, both with respect to patient information and with respect to users. The security concepts and measures available and additionally needed in health information systems based on CORBA architecture are described in this paper. The proposed security solution is also open to other middleware approaches, such as DHE or HL7. PMID:10179515

  14. Security of healthcare information systems based on the CORBA middleware.

    PubMed

    Blobel, B; Holena, M

    1997-01-01

    The development of healthcare systems in accordance to the "Shared Care" paradigm results in co-operative health information systems across the boundaries of organisational, technological, and policy domains. Increasingly, these distributed and heterogeneous systems are based on middleware approaches, such as CORBA. Regarding the sensitivity of personal and medical data, such open, distributed, and heterogeneous health information systems demand a high level of data protection and data security, both with respect to patient information and with respect to users. The security concepts and measures available and additionally needed in health information systems based on CORBA architecture are described in this paper. The proposed security solution is also open to other middleware approaches, such as DHE or HL7.

  15. 40 CFR 792.43 - Test system care facilities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    .... (a) A testing facility shall have a sufficient number of animal rooms or other test system areas, as... different tests. (b) A testing facility shall have a number of animal rooms or other test system areas..., quarantine or isolation of animals or other test systems, and routine or specialized housing of animals...

  16. Securely and flexibly sharing a biomedical data management system

    NASA Astrophysics Data System (ADS)

    Wang, Fusheng; Hussels, Phillip; Liu, Peiya

    2009-02-01

    Biomedical database systems need not only to address the issues of managing complex data, but also to provide data security and access control to the system. These include not only system level security, but also instance level access control such as access of documents, schemas, or aggregation of information. The latter is becoming more important as multiple users can share a single scientific data management system to conduct their research, while data have to be protected before they are published or IP-protected. This problem is challenging as users' needs for data security vary dramatically from one application to another, in terms of who to share with, what resources to be shared, and at what access level. We develop a comprehensive data access framework for a biomedical data management system SciPort. SciPort provides fine-grained multi-level space based access control of resources at not only object level (documents and schemas), but also space level (resources set aggregated in a hierarchy way). Furthermore, to simplify the management of users and privileges, customizable role-based user model is developed. The access control is implemented efficiently by integrating access privileges into the backend XML database, thus efficient queries are supported. The secure access approach we take makes it possible for multiple users to share the same biomedical data management system with flexible access management and high data security.

  17. Securely and Flexibly Sharing a Biomedical Data Management System.

    PubMed

    Wang, Fusheng; Hussels, Phillip; Liu, Peiya

    2009-02-11

    Biomedical database systems need not only to address the issues of managing complex data, but also to provide data security and access control to the system. These include not only system level security, but also instance level access control such as access of documents, schemas, or aggregation of information. The latter is becoming more important as multiple users can share a single scientific data management system to conduct their research, while data have to be protected before they are published or IP-protected. This problem is challenging as users' needs for data security vary dramatically from one application to another, in terms of who to share with, what resources to be shared, and at what access level. We develop a comprehensive data access framework for a biomedical data management system SciPort. SciPort provides fine-grained multi-level space based access control of resources at not only object level (documents and schemas), but also space level (resources set aggregated in a hierarchy way). Furthermore, to simplify the management of users and privileges, customizable role-based user model is developed. The access control is implemented efficiently by integrating access privileges into the backend XML database, thus efficient queries are supported. The secure access approach we take makes it possible for multiple users to share the same biomedical data management system with flexible access management and high data security.

  18. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal

  19. The deep space network, volume 18. [Deep Space Instrumentation Facility, Ground Communication Facility, and Network Control System

    NASA Technical Reports Server (NTRS)

    1973-01-01

    The objectives, functions, and organization of the Deep Space Network are summarized. The Deep Space Instrumentation Facility, the Ground Communications Facility, and the Network Control System are described.

  20. Security framework for networked storage system based on artificial immune system

    NASA Astrophysics Data System (ADS)

    Huang, Jianzhong; Xie, Changsheng; Zhang, Chengfeng; Zhan, Ling

    2007-11-01

    This paper proposed a theoretical framework for the networked storage system addressing the storage security. The immune system is an adaptive learning system, which can recognize, classify and eliminate 'non-self' such as foreign pathogens. Thus, we introduced the artificial immune technique to the storage security research, and proposed a full theoretical framework for storage security system. Under this framework, it is possible to carry out the quantitative evaluation for the storage security system using modeling language of artificial immune system (AIS), and the evaluation can offer security consideration for the deployment of networked storage system. Meanwhile, it is potential to obtain the active defense technique suitable for networked storage system via exploring the principle of AIS and achieve a highly secure storage system with immune characteristic.

  1. REPOSITORY SURFACE FACILITIES PRIMARY SYSTEM CRANE DATA

    SciTech Connect

    K. Schwartztrauber

    2005-03-14

    The purpose of this calculation is to compile crane design data for the mechanical primary structures, systems, and components (SSCs) required for the repository Waste Handling Building (WHB) and Carrier Preparation Building (CPB). The work presented in this document has been prepared in accordance with Office of Civilian Radioactive Waste Management approved program document AP-3.12Q, Calculations. This calculation has been developed to supplement information previously prepared using the development plan for ''WHB/WTB Space Program Analysis for Site Recommendation'' (Reference 5), which concentrates on the primary, primary support, facility support, and miscellaneous building support areas located in the WHB and Waste Treatment Building (WTB). The development plan was completed in accordance with AP-2.13Q, ''Technical Product Development Planning''. The work in this calculation is a continuance of the work described in the previous development plan; therefore, in accordance with AP-2.21Q, ''Quality Determinations and Planning for Scientific, Engineering, and Regulatory Compliance Activities'', a new Technical Work Plan is not required.

  2. OpenID connect as a security service in Cloud-based diagnostic imaging systems

    NASA Astrophysics Data System (ADS)

    Ma, Weina; Sartipi, Kamran; Sharghi, Hassan; Koff, David; Bak, Peter

    2015-03-01

    The evolution of cloud computing is driving the next generation of diagnostic imaging (DI) systems. Cloud-based DI systems are able to deliver better services to patients without constraining to their own physical facilities. However, privacy and security concerns have been consistently regarded as the major obstacle for adoption of cloud computing by healthcare domains. Furthermore, traditional computing models and interfaces employed by DI systems are not ready for accessing diagnostic images through mobile devices. RESTful is an ideal technology for provisioning both mobile services and cloud computing. OpenID Connect, combining OpenID and OAuth together, is an emerging REST-based federated identity solution. It is one of the most perspective open standards to potentially become the de-facto standard for securing cloud computing and mobile applications, which has ever been regarded as "Kerberos of Cloud". We introduce OpenID Connect as an identity and authentication service in cloud-based DI systems and propose enhancements that allow for incorporating this technology within distributed enterprise environment. The objective of this study is to offer solutions for secure radiology image sharing among DI-r (Diagnostic Imaging Repository) and heterogeneous PACS (Picture Archiving and Communication Systems) as well as mobile clients in the cloud ecosystem. Through using OpenID Connect as an open-source identity and authentication service, deploying DI-r and PACS to private or community clouds should obtain equivalent security level to traditional computing model.

  3. Centrifuge Facility Conceptual System Study. Volume 1: Facility overview and habitats

    NASA Technical Reports Server (NTRS)

    Synnestvedt, Robert (Editor)

    1990-01-01

    The results are presented for a NASA Phase 1 study conducted from mid 1987 through mid 1989 at Ames Research Center. The Centrifuge Facility is the major element of the biological research facility for the implementation of NASA's Life Science Research Program on Space Station Freedom using non-human specimens (such as small primates, rodents, plants, insects, cell tissues). Five systems are described which comprise the Facility: habitats, holding units, centrifuge, glovebox, and service unit. Volume 1 presents a facility overview and describes the habitats - modular units which house living specimens.

  4. State Regulatory Authority (SRA) Coordination of Safety, Security, and Safeguards of Nuclear Facilities: A Framework for Analysis

    SciTech Connect

    Mladineo, Stephen V.; Frazar, Sarah L.; Kurzrok, Andrew J.; Martikka, Elina; Hack, Tapani; Wiander, Timo

    2013-05-30

    This paper will explore the development of a framework for conducting an assessment of safety-security-safeguards integration within a State. The goal is to examine State regulatory structures to identify conflicts and gaps that hinder management of the three disciplines at nuclear facilities. Such an analysis could be performed by a State Regulatory Authority (SRA) to provide a self-assessment or as part of technical cooperation with either a newcomer State, or to a State with a fully developed SRA.

  5. Using Multiple Unmanned Systems for a Site Security Task

    SciTech Connect

    Matthew O. Anderson; Curtis W. Nielsen; Mark D. McKay; Derek C. Wadsworth; Ryan C. Hruska; John A. Koudelka

    2009-04-01

    Unmanned systems are often used to augment the ability of humans to perform challenging tasks. While the value of individual unmanned vehicles have been proven for a variety of tasks, it is less understood how multiple unmanned systems should be used together to accomplish larger missions such as site security. The purpose of this paper is to discuss efforts by researchers at the Idaho National Laboratory (INL) to explore the utility and practicality of operating multiple unmanned systems for a site security mission. This paper reviews the technology developed for a multi-agent mission and summarizes the lessons-learned from a technology demonstration.

  6. Food security in complex emergencies: enhancing food system resilience.

    PubMed

    Pingali, Prabhu; Alinovi, Luca; Sutton, Jacky

    2005-06-01

    This paper explores linkages between food security and crisis in different contexts, outlining the policy and institutional conditions needed to manage food security during a crisis and to rebuild the resilience of food systems in periods of relative peace. The paper reviews experiences over the past decade of countries in protracted crisis and draws lessons for national and international policy. It assesses the different alternatives on offer in fragile countries to address, for example, the disruption of institutional mechanisms and the decreasing level of support offered by international donors with respect to longer-term expectations. It proposes a Twin Track Approach to enhance food security resilience through specific policies for protracted crises that link immediate hunger relief interventions with a long-term strategy for sustainable growth. Finally, the article analyses policy options and the implications for both short- and longer-term responses vis-a-vis the three dimensions of food security: availability; access; and stability.

  7. SecureCPS: Defending a nanosatellite cyber-physical system

    NASA Astrophysics Data System (ADS)

    Forbes, Lance; Vu, Huy; Udrea, Bogdan; Hagar, Hamilton; Koutsoukos, Xenofon D.; Yampolskiy, Mark

    2014-06-01

    Recent inexpensive nanosatellite designs employ maneuvering thrusters, much as large satellites have done for decades. However, because a maneuvering nanosatellite can threaten HVAs on-­orbit, it must provide a level of security typically reserved for HVAs. Securing nanosatellites with maneuvering capability is challenging due to extreme cost, size, and power constraints. While still in the design process, our low-­cost SecureCPS architecture promises to dramatically improve security, to include preempting unknown binaries and detecting abnormal behavior. SecureCPS also applies to a broad class of cyber-­physical systems (CPS), such as aircraft, cars, and trains. This paper focuses on Embry-­Riddle's ARAPAIMA nanosatellite architecture, where we assume any off-­the-­shelf component could be compromised by a supply chain attack.1 Based on these assumptions, we have used Vanderbilt's Cyber Physical -­ Attack Description Language (CP-­ADL) to represent realistic attacks, analyze how these attacks propagate in the ARAPAIMA architecture, and how to defeat them using the combination of a low-­cost Root of Trust (RoT) Module, Global InfoTek's Advanced Malware Analysis System (GAMAS), and Anomaly Detection by Machine Learning (ADML).2 Our most recent efforts focus on refining and validating the design of SecureCPS.

  8. Integrated homeland security system with passive thermal imaging and advanced video analytics

    NASA Astrophysics Data System (ADS)

    Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert

    2007-04-01

    A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection

  9. Integration of the advanced transparency framework to advanced nuclear systems : enhancing Safety, Operations, Security and Safeguards (SOSS).

    SciTech Connect

    Mendez, Carmen Margarita; Rochau, Gary Eugene; Cleary, Virginia D.

    2008-08-01

    The advent of the nuclear renaissance gives rise to a concern for the effective design of nuclear fuel cycle systems that are safe, secure, nonproliferating and cost-effective. We propose to integrate the monitoring of the four major factors of nuclear facilities by focusing on the interactions between Safeguards, Operations, Security, and Safety (SOSS). We proposed to develop a framework that monitors process information continuously and can demonstrate the ability to enhance safety, operations, security, and safeguards by measuring and reducing relevant SOSS risks, thus ensuring the safe and legitimate use of the nuclear fuel cycle facility. A real-time comparison between expected and observed operations provides the foundation for the calculation of SOSS risk. The automation of new nuclear facilities requiring minimal manual operation provides an opportunity to utilize the abundance of process information for monitoring SOSS risk. A framework that monitors process information continuously can lead to greater transparency of nuclear fuel cycle activities and can demonstrate the ability to enhance the safety, operations, security and safeguards associated with the functioning of the nuclear fuel cycle facility. Sandia National Laboratories (SNL) has developed a risk algorithm for safeguards and is in the process of demonstrating the ability to monitor operational signals in real-time though a cooperative research project with the Japan Atomic Energy Agency (JAEA). The risk algorithms for safety, operations and security are under development. The next stage of this work will be to integrate the four algorithms into a single framework.

  10. Instrument Systems Analysis and Verification Facility (ISAVF) users guide

    NASA Technical Reports Server (NTRS)

    Davis, J. F.; Thomason, J. O.; Wolfgang, J. L.

    1985-01-01

    The ISAVF facility is primarily an interconnected system of computers, special purpose real time hardware, and associated generalized software systems, which will permit the Instrument System Analysts, Design Engineers and Instrument Scientists, to perform trade off studies, specification development, instrument modeling, and verification of the instrument, hardware performance. It is not the intent of the ISAVF to duplicate or replace existing special purpose facilities such as the Code 710 Optical Laboratories or the Code 750 Test and Evaluation facilities. The ISAVF will provide data acquisition and control services for these facilities, as needed, using remote computer stations attached to the main ISAVF computers via dedicated communication lines.

  11. The Study on Flood Reduction and Securing Instreamflow by applying Decentralized Rainwater Retention Facilities for Chunggyechun in Seoul of Korea

    NASA Astrophysics Data System (ADS)

    Park, J. H.; Jun, S. M.; Park, C. G.

    2014-12-01

    Recently abnormal climate phenomena and urbanization recently causes the changes of the hydrological environment. To restore the hydrological cycle in urban area some fundamental solutions such as decentralized rainwater management system and Low Impact Development (LID) techniques may be choosed. In this study, SWMM 5 was used to analyze the effects of decentralized stormwater retention for preventing the urban flood and securing the instreamflow. The Chunggyechun stream watershed(21.29㎢) which is located in Seoul city(Korea) and fully developed as urban area was selected as the study watershed, and the runoff characteristics of urban stream with various methods of LID techniques (Permeable pavement, small rainwater storage tank, large rainwater storage tank) were analyzed. By the simulation results, the permeability of pavement materials and detention storage at the surface soil layer make high effect to the flood discharge, and the initial rainfall retention at the rainwater storage tank effected to reduce the flood peak. The peak discharge was decreased as 22% for the design precipitation. Moreover the instreamflow was increased as 55% by using adequate LID techniques These kind of data could be used as the basis data for designing urban flood prevention facilities, urban regeneration planning in the view of the integrated watershed management.

  12. RCRA COVER SYSTEMS FOR WASTE MANAGEMENT FACILITIES

    EPA Science Inventory

    The closure of waste management facilities, whether Subtitle C, Subtitle D or CERCLA, requires consideration of site-specific information, the Federal regulations and applicability of state regulations and the liquids management strategy. This paper will present the current EPA ...

  13. IT Security Support for Spaceport Command and Control System

    NASA Technical Reports Server (NTRS)

    McLain, Jeffrey

    2013-01-01

    During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.

  14. 49 CFR 659.21 - System security plan: general requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... shall require the rail transit agency to implement a system security plan that, at a minimum, complies... must be developed and maintained as a separate document and may not be part of the rail transit agency's system safety program plan. (b) The oversight agency may prohibit a rail transit agency...

  15. 49 CFR 659.21 - System security plan: general requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... shall require the rail transit agency to implement a system security plan that, at a minimum, complies... must be developed and maintained as a separate document and may not be part of the rail transit agency's system safety program plan. (b) The oversight agency may prohibit a rail transit agency...

  16. 49 CFR 659.21 - System security plan: general requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... shall require the rail transit agency to implement a system security plan that, at a minimum, complies... must be developed and maintained as a separate document and may not be part of the rail transit agency's system safety program plan. (b) The oversight agency may prohibit a rail transit agency...

  17. 49 CFR 659.21 - System security plan: general requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... shall require the rail transit agency to implement a system security plan that, at a minimum, complies... must be developed and maintained as a separate document and may not be part of the rail transit agency's system safety program plan. (b) The oversight agency may prohibit a rail transit agency...

  18. 49 CFR 659.21 - System security plan: general requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... shall require the rail transit agency to implement a system security plan that, at a minimum, complies... must be developed and maintained as a separate document and may not be part of the rail transit agency's system safety program plan. (b) The oversight agency may prohibit a rail transit agency...

  19. 13 CFR 102.33 - Security of systems of records.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... administrative and physical controls to prevent unauthorized access to its systems of records, to prevent... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Security of systems of records... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 §...

  20. 13 CFR 102.33 - Security of systems of records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... administrative and physical controls to prevent unauthorized access to its systems of records, to prevent... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Security of systems of records... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 §...

  1. Cost-Effective School Alarm Systems. Security Topics Series.

    ERIC Educational Resources Information Center

    Kaufer, Steve

    This document outlines considerations in the selection of a cost-effective school-alarm system. Steps in the planning process include: conducting a district needs assessment; gathering input from all staff levels; consulting technical expertise; and selecting a security system that can be integrated with other site needs. It further describes the…

  2. Security of Personal Computer Systems: A Management Guide.

    ERIC Educational Resources Information Center

    Steinauer, Dennis D.

    This report describes management and technical security considerations associated with the use of personal computer systems as well as other microprocessor-based systems designed for use in a general office environment. Its primary objective is to identify and discuss several areas of potential vulnerability and associated protective measures. The…

  3. IT Security Support for the Spaceport Command Control System Development

    NASA Technical Reports Server (NTRS)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  4. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  5. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  6. Use of a hybrid technology in a critical security system.

    SciTech Connect

    Trujillo, David J.

    2010-10-01

    Assigning an acceptable level of power reliability in a security system environment requires a methodical approach to design when considering the alternatives tied to the reliability and life of the system. The downtime for a piece of equipment, be it for failure, routine maintenance, replacement, or refurbishment or connection of new equipment is a major factor in determining the reliability of the overall system. In addition to these factors is the condition where the system is static or dynamic in its growth. Most highly reliable security power source systems are supplied by utility power with uninterruptable power source (UPS) and generator backup. The combination of UPS and generator backup with a reliable utility typically provides full compliance to security requirements. In the energy market and from government agencies, there is growing pressure to utilize alternative sources of energy other than fossil fuel to increase the number of local generating systems to reduce dependence on remote generating stations and cut down on carbon effects to the environment. There are also conditions where a security system may be limited on functionality due to lack of utility power in remote locations. One alternative energy source is a renewable energy hybrid system including a photovoltaic or solar system with battery bank and backup generator set. This is a viable source of energy in the residential and commercial markets where energy management schemes can be incorporated and systems are monitored and maintained regularly. But, the reliability of this source could be considered diminished when considering the security system environment where stringent uptime requirements are required.

  7. Use of a hybrid technology in a critical security system.

    SciTech Connect

    Scharmer, Carol; Trujillo, David J.

    2010-08-01

    Assigning an acceptable level of power reliability in a security system environment requires a methodical approach to design when considering the alternatives tied to the reliability and life of the system. The downtime for a piece of equipment, be it for failure, routine maintenance, replacement, or refurbishment or connection of new equipment is a major factor in determining the reliability of the overall system. In addition to these factors is the condition where the system is static or dynamic in its growth. Most highly reliable security power source systems are supplied by utility power with uninterruptable power source (UPS) and generator backup. The combination of UPS and generator backup with a reliable utility typically provides full compliance to security requirements. In the energy market and from government agencies, there is growing pressure to utilize alternative sources of energy other than fossil fuel to increase the number of local generating systems to reduce dependence on remote generating stations and cut down on carbon effects to the environment. There are also conditions where a security system may be limited on functionality due to lack of utility power in remote locations. One alternative energy source is a renewable energy hybrid system including a photovoltaic or solar system with battery bank and backup generator set. This is a viable source of energy in the residential and commercial markets where energy management schemes can be incorporated and systems are monitored and maintained regularly. But, the reliability of this source could be considered diminished when considering the security system environment where stringent uptime requirements are required.

  8. Verification of Security Policy Enforcement in Enterprise Systems

    NASA Astrophysics Data System (ADS)

    Gupta, Puneet; Stoller, Scott D.

    Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

  9. The Zwicky transient facility observing system

    NASA Astrophysics Data System (ADS)

    Smith, Roger M.; Dekany, Richard G.; Bebek, Christopher; Bellm, Eric; Bui, Khanh; Cromer, John; Gardner, Paul; Hoff, Matthew; Kaye, Stephen; Kulkarni, Shrinivas; Lambert, Andrew; Levi, Michael; Reiley, Dan

    2014-07-01

    The Zwicky Transient Facility (ZTF) is a synoptic optical survey for high-cadence time-domain astronomy. Building upon the experience and infrastructure of the highly successful Palomar Transient Factory (PTF) team, ZTF will survey more than an order of magnitude faster than PTF in sky area and volume in order to identify rare, rapidly varying optical sources. These sources will include a trove of supernovae, exotic explosive transients, unusual stellar variables, compact binaries, active galactic nuclei, and asteroids. The single-visit depth of 20.4 mag is well matched to spectroscopic follow-up observations, while the co-added images will provide wide sky coverage 1.5 - 2 mag deeper than SDSS. The ZTF survey will cover the entire Northern Sky and revisit fields on timescales of a few hours, providing hundreds of visits per field each year, an unprecedented cadence, as required to detect fast transients and variability. This high-cadence survey is enabled by an observing system based on a new camera having 47 deg2 field of view - a factor of 6.5 greater than the existing PTF camera - equipped with fast readout electronics, a large, fast exposure shutter, faster telescope and dome drives, and various measures to optimize delivered image quality. Our project has already received an initial procurement of e2v wafer-scale CCDs and we are currently fabricating the camera cryostat. International partners and the NSF committed funds in June 2014 so construction can proceed as planned to commence engineering commissioning in 2016 and begin operations in 2017. Public release will allow broad utilization of these data by the US astronomical community. ZTF will also promote the development of transient and variable science methods in preparation for the seminal first light of LSST.

  10. 40 CFR 792.45 - Test system supply facilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 31 2010-07-01 2010-07-01 true Test system supply facilities. 792.45 Section 792.45 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT (CONTINUED) GOOD LABORATORY PRACTICE STANDARDS Facilities § 792.45 Test system...

  11. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  12. Closure Report for Corrective Action Unit 116: Area 25 Test Cell C Facility, Nevada National Security Site, Nevada

    SciTech Connect

    NSTec Environmental Restoration

    2011-09-29

    This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 116, Area 25 Test Cell C Facility. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 [as amended March 2010]). CAU 116 consists of the following two Corrective Action Sites (CASs), located in Area 25 of the Nevada National Security Site: (1) CAS 25-23-20, Nuclear Furnace Piping and (2) CAS 25-41-05, Test Cell C Facility. CAS 25-41-05 consisted of Building 3210 and the attached concrete shield wall. CAS 25-23-20 consisted of the nuclear furnace piping and tanks. Closure activities began in January 2007 and were completed in August 2011. Activities were conducted according to Revision 1 of the Streamlined Approach for Environmental Restoration Plan for CAU 116 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2008). This CR provides documentation supporting the completed corrective actions and provides data confirming that closure objectives for CAU 116 were met. Site characterization data and process knowledge indicated that surface areas were radiologically contaminated above release limits and that regulated and/or hazardous wastes were present in the facility.

  13. Integrating security in a group oriented distributed system

    NASA Technical Reports Server (NTRS)

    Reiter, Michael; Birman, Kenneth; Gong, LI

    1992-01-01

    A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.

  14. Process Control System Cyber Security Standards - An Overview

    SciTech Connect

    Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

    2005-10-01

    The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

  15. 49 CFR 1549.111 - Security threat assessments for personnel of certified cargo screening facilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... cargo screening facility, an indirect air carrier under 49 CFR part 1548 for transport on a passenger...) Each certified screening facility must complete the requirements in 49 CFR part 1540, subpart C. ... certified cargo screening facilities. 1549.111 Section 1549.111 Transportation Other Regulations Relating...

  16. Analysis of LNG peakshaving-facility release-prevention systems

    SciTech Connect

    Pelto, P.J.; Baker, E.G.; Powers, T.B.; Schreiber, A.M.; Hobbs, J.M.; Daling, P.M.

    1982-05-01

    The purpose of this study is to provide an analysis of release prevention systems for a reference LNG peakshaving facility. An overview assessment of the reference peakshaving facility, which preceeded this effort, identified 14 release scenarios which are typical of the potential hazards involved in the operation of LNG peakshaving facilities. These scenarios formed the basis for this more detailed study. Failure modes and effects analysis and fault tree analysis were used to estimate the expected frequency of each release scenario for the reference peakshaving facility. In addition, the effectiveness of release prevention, release detection, and release control systems were evaluated.

  17. A Layered Decision Model for Cost-Effective System Security

    SciTech Connect

    Wei, Huaqiang; Alves-Foss, James; Soule, Terry; Pforsich, Hugh; Zhang, Du; Frincke, Deborah A.

    2008-10-01

    System security involves decisions in at least three areas: identification of well-defined security policies, selection of cost-effective defence strategies, and implementation of real-time defence tactics. Although choices made in each of these areas affect the others, existing decision models typically handle these three decision areas in isolation. There is no comprehensive tool that can integrate them to provide a single efficient model for safeguarding a network. In addition, there is no clear way to determine which particular combinations of defence decisions result in cost-effective solutions. To address these problems, this paper introduces a Layered Decision Model (LDM) for use in deciding how to address defence decisions based on their cost-effectiveness. To validate the LDM and illustrate how it is used, we used simulation to test model rationality and applied the LDM to the design of system security for an e-commercial business case.

  18. Derived virtual devices: a secure distributed file system mechanism

    NASA Technical Reports Server (NTRS)

    VanMeter, Rodney; Hotz, Steve; Finn, Gregory

    1996-01-01

    This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.

  19. 33 CFR 106.230 - OCS facility recordkeeping requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.230 OCS facility recordkeeping requirements. (a)...

  20. 33 CFR 106.230 - OCS facility recordkeeping requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.230 OCS facility recordkeeping requirements. (a)...

  1. 33 CFR 106.230 - OCS facility recordkeeping requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.230 OCS facility recordkeeping requirements. (a)...

  2. Cyber-Physical System Security of Smart Grids

    SciTech Connect

    Dagle, Jeffery E.

    2012-01-31

    Abstract—This panel presentation will provide perspectives of cyber-physical system security of smart grids. As smart grid technologies are deployed, the interconnected nature of these systems is becoming more prevalent and more complex, and the cyber component of this cyber-physical system is increasing in importance. Studying system behavior in the face of failures (e.g., cyber attacks) allows a characterization of the systems’ response to failure scenarios, loss of communications, and other changes in system environment (such as the need for emergent updates and rapid reconfiguration). The impact of such failures on the availability of the system can be assessed and mitigation strategies considered. Scenarios associated with confidentiality, integrity, and availability are considered. The cyber security implications associated with the American Recovery and Reinvestment Act of 2009 in the United States are discussed.

  3. neu-VISION: an explosives detection system for transportation security

    NASA Astrophysics Data System (ADS)

    Warman, Kieffer; Penn, David

    2008-04-01

    Terrorists were targeting commercial airliners long before the 9/11 attacks on the World Trade Center and the Pentagon. Despite heightened security measures, commercial airliners remain an attractive target for terrorists, as evidenced by the August 2006 terrorist plot to destroy as many as ten aircraft in mid-flight from the United Kingdom to the United States. As a response to the security threat air carriers are now required to screen 100-percent of all checked baggage for explosives. The scale of this task is enormous and the Transportation Security Administration has deployed thousands of detection systems. Although this has resulted in improved security, the performance of the installed systems is not ideal. Further improvements are needed and can only be made with new technologies that ensure a flexible Concept of Operations and provide superior detection along with low false alarm rates and excellent dependability. To address security needs Applied Signal Technology, Inc. is developing an innovative and practical solution to meet the performance demands of aviation security. The neu-VISION TM system is expected to provide explosives detection performance for checked baggage that both complements and surpasses currently deployed performance. The neu-VISION TM system leverages a 5 year R&D program developing the Associated Particle Imaging (API) technique; a neutron based non-intrusive material identification and imaging technique. The superior performance afforded by this neutron interrogation technique delivers false alarm rates much lower than deployed technologies and "sees through" dense, heavy materials. Small quantities of explosive material are identified even in the cluttered environments.

  4. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    PubMed

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS. PMID:26812732

  5. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    PubMed

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.

  6. Lightning Protection System for HE Facilities at LLNL - Certification Template

    SciTech Connect

    Clancy, T J; Ong, M M; Brown, C G

    2005-12-08

    This document is meant as a template to assist in the development of your own lighting certification process. Aside from this introduction and the mock representative name of the building (Building A), this document is nearly identical to a lightning certification report issued by the Engineering Directorate at Lawrence Livermore National Laboratory. At the date of this release, we have certified over 70 HE processing and storage cells at our Site 300 facilities. In Chapters 1 and 2 respectively, we address the need and methods of lightning certification for HE processing and storage facilities at LLNL. We present the preferred method of lightning protection in Chapter 3, as well as the likely building modifications that are needed to comply with this method. In Chapter 4, we present the threat assessment and resulting safe work areas within a cell. After certification, there may be changes to operations during a lightning alert, and this is discussed in Chapter 5. Chapter 6 lists the maintenance requirements for the continuation of lighting certification status. Appendices of this document are meant as an aid in developing your own certification process, and they include a bonding list, an inventory of measurement equipment, surge suppressors in use at LLNL, an Integrated Work and Safety form (IWS), and a template certification sign-off sheet. The lightning certification process involves more that what is spelled out in this document. The first steps involve considerable planning, the securing of funds, and management and explosives safety buy-in. Permits must be obtained, measurement equipment must be assembled and tested, and engineers and technicians must be trained in their use. Cursory building inspections are also recommended, and surge suppression for power systems must be addressed. Upon completion of a certification report and its sign-off by management, additional work is required. Training will be needed in order to educate workers and facility managers

  7. Container Security - part of the CORE system

    SciTech Connect

    2009-10-02

    A data integration system to support the US Customs and Border Protection Officers to supervise and make decisions for container inspections. CORE is designed to act as a framework to bridge the gaps between disparate data integration and delivery of disparate information visualization.

  8. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  9. Secure authentication system that generates seed from biometric information.

    PubMed

    Kim, Yeojin; Ahn, Jung-Ho; Byun, Hyeran

    2005-02-10

    As biometric recognition techniques are gradually improved, the stability of biometric authentication systems are enhanced. Although bioinformation has properties that make it resistant to fraud, biometric authentication systems are not immune to hacking. We show a secure biometric authentication system (1) to guarantee the integrity of biometric information by mixing data by use of a biometric key and (2) to raise recognition rates by use of bimodal biometrics. PMID:15751854

  10. Special report. Integrated security systems in hospitals--an update.

    PubMed

    1994-12-01

    Comprehensive security management systems which include voice, data, and video components are being employed in a number of hospital environments. Such systems may include a host computer for data gathering, remote panels for alarm monitoring, video cameras for surveillance, intercoms and phones for client communication, and access control devices for prevention and deterrence. In this report, we will present details of three such systems as installed and planned.

  11. Secure Control Systems for the Energy Sector

    SciTech Connect

    Smith, Rhett; Stewart, John; Chavez, Adrian

    2014-10-22

    The Padlock Project is an alliance between Tennessee Valley Authority (TVA), Sandia National Laboratories (SNL), and Schweitzer Engineering Laboratories Inc. (SEL). SEL is the prime contractor on the Padlock project. Rhett Smith (SEL) is the project director and Adrian Chaves (SNL) and John Stewart (TVA) are principle investigators. SEL is the world’s leader in microprocessor-based electronic equipment for protecting electric power systems. The Tennessee Valley Authority, a corporation owned by the U.S. government, provides electricity for 9 million people in parts of seven southeastern states at prices below the national average. TVA, which receives no taxpayer money and makes no profits, also provides flood control, navigation and land management for the Tennessee River system and assists utilities, and state and local governments with economic development.

  12. Security in Wiki-Style Authoring Systems

    NASA Astrophysics Data System (ADS)

    Jensen, Christian Damsgaard

    During the past decade, online collaboration has grown from a practice primarily associated with the workplace to a social phenomenon, where ordinary people share information about their life, hobbies, interests, politics etc. In particular, social software, such as open collaborative authoring systems like wikis, has become increasingly popular. This is probably best illustrated through the immense popularity of the Wikipedia, which is a free encyclopedia collaboratively edited by thousands of Internet users with a minimum of administration.

  13. Security proof for quantum key distribution using qudit systems

    SciTech Connect

    Sheridan, Lana; Scarani, Valerio

    2010-09-15

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  14. 28 CFR 700.24 - Security of systems of records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    .... (b) The Office shall establish administrative and physical controls to prevent unauthorized access to... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... OR INFORMATION OF THE OFFICE OF INDEPENDENT COUNSEL Protection of Privacy and Access to...

  15. 28 CFR 700.24 - Security of systems of records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    .... (b) The Office shall establish administrative and physical controls to prevent unauthorized access to... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Security of systems of records. 700.24... OR INFORMATION OF THE OFFICE OF INDEPENDENT COUNSEL Protection of Privacy and Access to...

  16. 28 CFR 16.51 - Security of systems of records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Security of systems of records. 16.51 Section 16.51 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR DISCLOSURE OF MATERIAL OR... administrative and physical controls shall ensure that: (1) Records are protected from public view; (2) The...

  17. 32 CFR 637.20 - Security surveillance systems.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Security surveillance systems. 637.20 Section 637.20 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.20...

  18. 32 CFR 637.20 - Security surveillance systems.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 4 2012-07-01 2011-07-01 true Security surveillance systems. 637.20 Section 637.20 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.20...

  19. 32 CFR 637.20 - Security surveillance systems.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 4 2014-07-01 2013-07-01 true Security surveillance systems. 637.20 Section 637.20 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.20...

  20. 32 CFR 637.20 - Security surveillance systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 4 2011-07-01 2011-07-01 false Security surveillance systems. 637.20 Section 637.20 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.20...

  1. 32 CFR 637.20 - Security surveillance systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 4 2013-07-01 2013-07-01 false Security surveillance systems. 637.20 Section 637.20 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MILITARY POLICE INVESTIGATION Investigations § 637.20...

  2. A Model for Data Secure Systems (Part 1).

    ERIC Educational Resources Information Center

    Hsiao, D. K.; And Others

    A description is provided of a conceptual model for a data secure system. The discussion first offers a formal working vocabulary and next, using the intuitive idea of a dichotomy between permissible and impermissible accesses, formalizes the idea with an Extended Logical Data Base and with protection specifications and patterns. These…

  3. The social security system of the Federal Republic of Germany.

    PubMed

    Eska, B

    1980-03-01

    This article summarizes the major provisions of the West German social security system, briefly outlining coverage, funding sources, and unique features of insurance programs concerned with old age, invalidity and death, sickness and maternity, work injury, and unemployment. The universal program of family allowance and the means-tested program of social aid are also reviewed. PMID:10313638

  4. 28 CFR 16.51 - Security of systems of records.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Security of systems of records. 16.51 Section 16.51 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR DISCLOSURE OF MATERIAL OR INFORMATION Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 §...

  5. Privacy and Security in an Oncology Information System

    PubMed Central

    Blum, Bruce I.; Lenhard, Raymond E.

    1978-01-01

    The growing number of automated medical data bases has focused attention upon the problems associated with privacy and security of patient data. This paper briefly reviews some of the approaches to data base protection and then describes the solution to these problems which have been implemented in the Johns Hopkins Oncology Center Clinical Information System.

  6. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Convention or 33 CFR 101.310 may utilize: (1) Equipment that complies with RTCM Paper 110-2004/SC110-STD...) and 1 CFR part 51. Copies of these standards can be inspected at the Federal Communications Commission... 47 Telecommunication 5 2010-10-01 2010-10-01 false Ship Security Alert System (SSAS)....

  7. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Convention or 33 CFR 101.310 may utilize: (1) Equipment that complies with RTCM 11020.1 (incorporated by... 47 Telecommunication 5 2014-10-01 2014-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277...

  8. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Convention or 33 CFR 101.310 may utilize: (1) Equipment that complies with RTCM 11020.1 (incorporated by... 47 Telecommunication 5 2012-10-01 2012-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277...

  9. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Convention or 33 CFR 101.310 may utilize: (1) Equipment that complies with RTCM 11020.1 (incorporated by... 47 Telecommunication 5 2013-10-01 2013-10-01 false Ship Security Alert System (SSAS). 80.277... SERVICES STATIONS IN THE MARITIME SERVICES Equipment Authorization for Compulsory Ships § 80.277...

  10. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Convention or 33 CFR 101.310 may utilize: (1) Equipment that complies with RTCM Paper 110-2004/SC110-STD...) and 1 CFR part 51. Copies of these standards can be inspected at the Federal Communications Commission... 47 Telecommunication 5 2011-10-01 2011-10-01 false Ship Security Alert System (SSAS)....

  11. Secure Video Surveillance System Acquisition Software

    SciTech Connect

    2009-12-04

    The SVSS Acquisition Software collects and displays video images from two cameras through a VPN, and store the images onto a collection controller. The software is configured to allow a user to enter a time window to display up to 2 1/2, hours of video review. The software collects images from the cameras at a rate of 1 image per second and automatically deletes images older than 3 hours. The software code operates in a linux environment and can be run in a virtual machine on Windows XP. The Sandia software integrates the different COTS software together to build the video review system.

  12. Security of information in IT systems

    NASA Astrophysics Data System (ADS)

    Kaliczynska, Malgorzata

    2005-02-01

    The aim of the paper is to increase human awareness of the dangers connected with social engineering methods of obtaining information. The article demonstrates psychological and sociological methods of influencing people used in the attacks on IT systems. Little known techniques are presented about one of the greater threats that is electromagnetic emission or corona effect. Moreover, the work shows methods of protecting against this type of dangers. Also, in the paper one can find information on devices made according to the TEMPEST technology. The article not only discusses the methods of gathering information, but also instructs how to protect against its out-of-control loss.

  13. Secure Video Surveillance System Acquisition Software

    2009-12-04

    The SVSS Acquisition Software collects and displays video images from two cameras through a VPN, and store the images onto a collection controller. The software is configured to allow a user to enter a time window to display up to 2 1/2, hours of video review. The software collects images from the cameras at a rate of 1 image per second and automatically deletes images older than 3 hours. The software code operates in amore » linux environment and can be run in a virtual machine on Windows XP. The Sandia software integrates the different COTS software together to build the video review system.« less

  14. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    PubMed

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  15. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    PubMed

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS. PMID:25298362

  16. T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security

    SciTech Connect

    Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

    2009-07-20

    Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

  17. Plasma system of the GOL-3T facility

    SciTech Connect

    Arzhannikov, A. V.; Burdakov, A. V.; Burmasov, V. S.; Ivanov, I. A.; Kuznetsov, S. A.; Kuklin, K. N.; Mekler, K. I.; Polosatkin, S. V.; Postupaev, V. V. Rovenskikh, A. F.; Sinitsky, S. L.; Sklyarov, V. F.

    2015-11-15

    The plasma system and diagnostics of the new facility GOL-3T are described. This facility is the final result of the first stage in the deep upgrade of the GOL-3 multiple-mirror system, which has operated at the Budker Institute of Nuclear Physics since 1988. The upgrade project supposes creation of two new independent facilities at the site of GOL-3. The GOL-3T facility is intended to study the physics of beam—plasma interaction and generation of subterahertz electromagnetic radiation during the collective relaxation of a high-power relativistic electron beam with a duration of 5–10 μs. Studies on the physics of multiple-mirror plasma confinement in axisymmetric magnetic systems will be continued in a new range of experiment parameters at the second facility, named GOL-NB.

  18. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  19. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  20. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  1. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive...

  2. Users Guide for the National Transonic Facility Research Data System

    NASA Technical Reports Server (NTRS)

    Foster, Jean M.; Adcock, Jerry B.

    1996-01-01

    The National Transonic Facility is a complex cryogenic wind tunnel facility. This report briefly describes the facility, the data systems, and the instrumentation used to acquire research data. The computational methods and equations are discussed in detail and many references are listed for those who need additional technical information. This report is intended to be a user's guide, not a programmer's guide; therefore, the data reduction code itself is not documented. The purpose of this report is to assist personnel involved in conducting a test in the National Transonic Facility.

  3. Redesigning Facilities Management Information Systems for the 21st Century.

    ERIC Educational Resources Information Center

    McDonald, Fred; Lancaster, Michael; Graham, Mike

    1997-01-01

    Describes one Canadian school district's use of an integrated Facilities Management Information System (FMIS) to help address the effective and efficient planning, building, operating, and maintaining of their schools and other Board facilities. Development of the FMIS and its demands for organizational restructuring and change in the workplace…

  4. Power Systems Development Facility: Design, Construction, and Commissioning Status

    SciTech Connect

    Powell, C.A.; Vimalchand; Hendrix, H.L.; Honeycut, P.M.

    1996-12-31

    This paper will provide an introduction to the Power Systems Development Facility, a Department of Energy sponsored, engineering scale demonstration of two advanced coal-fired power technologies; and discuss current status of design, construction and commissioning of this facility. 28 viewgraphs, including 2 figs.

  5. History Data Facility in the SLC control system

    SciTech Connect

    Johnson, R.G.; White, G.R.

    1991-10-01

    Two major enhancements to the SLC History Data Facility are described separately. First the internal design and procedures used for saving and using long term history data. Second the user interface, facilities and application of the History Data Comparisons sub-system, which is used for analyzing and correlating two or more accelerator device histories.

  6. Mach 6 Integrated Systems Tests of Lewis' Hypersonic Tunnel Facility

    NASA Technical Reports Server (NTRS)

    1996-01-01

    A series of 15 integrated systems tests were conducted at the NASA Lewis Research Center's Hypersonic Tunnel Facility (HTF) with test conditions simulating flight up to Mach 6. Facility stagnation conditions up to 3050 R and 1050 psia were obtained with typical test times of 20 to 45 sec.

  7. Security core to the edge: securing critical information through enhanced Cross Domain Systems (CDS) to the tactical edge

    NASA Astrophysics Data System (ADS)

    Farroha, Bassam S.; Farroha, Deborah L.; Whitfield, Melinda M.

    2010-04-01

    This paper analyzes secure data sharing outside its security domain with services, agencies, coalition partners and state/local authorities. There is a high demand for multiple levels of secure data at the tactical edge; however the threat level at that point is elevated compared to the enterprise environment. This paper investigates the requirements, technologies and risk mitigation techniques for securely sharing information with the tactical warfighter while protecting the data and the information systems from intruders and malware. The new CD Systems need to eliminate the stovepipe architectures and open the doors to share information across traditional and non-traditional domain boundaries.

  8. Upgrade of the Los Alamos Plutonium Facility control system

    SciTech Connect

    Pope, N.G.; Turner, W.J.; Brown, R.E.; Bibeau, R.A.; Davis, R.R.; Hogan, K.

    1996-05-01

    After 20 yrs service, the Los Alamos Plutonium Facility is undergoing an upgrade to its aging Facility Control System. The new system design includes a network of redundantly-paired programmable logic controllers that will interface with about 2200 field data points. The data communications network that has been designed includes a redundant, self-healing fiber optic data highway as well as a fiber optic ethernet. Commercially available human-machine interface software running on a UNIX-based system displays facility subsystem status operator X-terminals. Project design features, methods, costs, and schedule are discussed.

  9. The assess facility descriptor module

    SciTech Connect

    Jordan, S.E.; Winblad, A.; Key, B.; Walker, S.; Renis, T.; Saleh, R.

    1989-01-01

    The Facility Descriptor (Facility) module is part of the Analytic System and Software for Evaluating Safeguards and Security (ASSESS). Facility is the foundational software application in the ASSESS system for modelling a nuclear facility's safeguards and security system to determine the effectiveness against theft of special nuclear material. The Facility module provides the tools for an analyst to define a complete description of a facility's physical protection system which can then be used by other ASSESS software modules to determine vulnerability to a spectrum of insider and outsider threats. The analyst can enter a comprehensive description of the protection system layout including all secured areas, target locations, and detailed safeguards specifications. An extensive safeguard component catalog provides the reference data for calculating delay and detection performance. Multiple target locations within the same physical area may be specified, and the facility may be defined for two different operational states such as dayshift and nightshift. 6 refs., 5 figs.

  10. A secure and user-friendly multimodal biometric system

    NASA Astrophysics Data System (ADS)

    Takahashi, Kenta; Mimura, Masahiro; Isobe, Yoshiaki; Seto, Yoichi

    2004-08-01

    Biometric verification has attracted attention recently because it is more secure than knowledge- or token-based verification techniques. Multi-modal biometric verification can provide even greater accuracy by combining several forms of biometrics. However, there are problems with the availability, usability and acceptability of the technique. In this paper, we take a new approach in proposing a multi-modal biometric system that enables users to select which biometrics they prefer to be matched at the time of verification. This system also reduces the number of inputs required by adopting a sequential test based on statistical methods. In addition, the accuracy of the system can be controlled according to the security level required. We demonstrated the effectiveness of the proposed system experimentally.

  11. Game theory and decision support system for use in security reviews of nuclear material tracking and accountancy systems

    SciTech Connect

    Goutal, P.; Werkoff, F.; Le Manchec, K.; Preston, N.; Roche, F.

    1995-12-31

    Tracking and accountancy arrangements help guarantee the security of nuclear materials. Verifications consisting of comparisons between physical identifications or measurements on one hand and material accountancy on the other hand are carried out, in order to detect any unexpected absence of nuclear material. This paper studies two different aspects of the problem of the efficiency of these verifications. First, a decision support system for use in security reviews of nuclear material accountancy systems is presented. Its purpose is firstly to represent a facility and the associated verifications, tracking and accountancy operations and secondly, to calculate the detection delay in the case of an absence of nuclear material. Next, in order to minimize the detection delay for a limited, fixed number of physical identifications, a two-person, zero-sum game with incomplete information is described. The first results obtained from this analysis indicate shorter detection times than those given by games with complete information.

  12. Online power system security classifier and enhancement control

    NASA Astrophysics Data System (ADS)

    de Arizon, Maria Paloma

    Today, the stable and reliable operation of power systems is becoming increasingly difficult. While, on the one hand, due to regulatory reforms, an increasing number of merchant plants and co-generators are being connected to the network, on the other, the expansion of transmission systems has been increasingly difficult due to environmental and land issues. As a result, thousands of power flow schedules are changed hourly, complicating the systems operation. This scenario has rendered the. traditional system operation criteria, based on off-line studies, inadequate to cope with the constantly changing nature, and online assessment techniques are becoming increasingly important. In this work, an approach based on "approximate reasoning techniques" is presented for the classification of dynamic security conditions in the power system and for the selection of dynamic security enhancement strategies (preventive control actions). The algorithm proposed combines energy functions and sensitivities to find the "membership" of the system to the subsets that determine its security status, as well as, the "membership" of the different generators to specific control related subsets. The algorithm proposed combines energy functions and sensitivities, together with physical equipment limitations, to select the generators voltage and power output such that the required security level is met. The procedure uses optimisation methods for tuning the threshold values that describe the membership functions in order to obtain optimum preventive control strategies. The developed procedure was also designed to produce a simultaneous preventive control for a set of non-disjoint contingencies. Finally to enhance the speed of the algorithm a new and time-saving technique for efficient [Ybus] matrix evaluations was developed in this work. The results presented in the work show that the proposed method achieves the following objectives: (a) A fast and accurate classification of the system

  13. The impact of changes in DOE computer security on safeguards systems

    SciTech Connect

    Hunteman, W.J.; Caldwell, R.J.

    1994-08-01

    Recent changes in the Department of Energy regulations on classified computer security have introduced a number of significant requirements for automated information systems land networks. These changes are necessary because of changes in computer technology, a reduced level of clearances, and increased personnel access, such as DOE ``L`` clearances and international inspections, in the facilities. These changes will affect all computer-based systems that process, or are connected to computers that process, classified data. The additional and modified requirements are identified and described. The impact of the requirements on safeguards computer-based systems, such as instruments, database systems, and networks, is reviewed. Some simple examples of typical safeguards systems are discussed with suggestions on how the systems can comply with the requirements.

  14. CLASSIFICATION OF THE MGR SAFEGUARDS AND SECURITY SYSTEM

    SciTech Connect

    J.A. Ziegler

    1999-08-31

    The purpose of this analysis is to document the Quality Assurance (QA) classification of the Monitored Geologic Repository (MGR) safeguards and security system structures, systems and components (SSCs) performed by the MGR Safety Assurance Department. This analysis also provides the basis for revision of YMP/90-55Q, Q-List (YMP 1998). The Q-List identifies those MGR SSCs subject to the requirements of DOE/RW-0333P, ''Quality Assurance Requirements and Description'' (QARD) (DOE 1998).

  15. The enhancement of security in healthcare information systems.

    PubMed

    Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De

    2012-06-01

    With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.

  16. IT and SLT characterizations of secured biometric authentication systems

    NASA Astrophysics Data System (ADS)

    Schmid, Natalia A.; Wechsler, Harry

    2010-01-01

    This paper provides an information theoretical description of biometric systems at the system level. A number of basic models to characterize performance of biometric systems are presented. All models compare performance of an automatic biometric recognition system against performance of an ideal biometric system that knows correct decisions. The correct decision can be visualized as an input to a new decision system, and the decision by an automatic recognition system is the output of this decision system. The problem of performance evaluation for a biometric recognition system is formulated as (1) the problem of finding the maximum information that the output of the system has about the input, and (2) the problem of finding the maximum distortion that the output can experience with respect to the input of the system to guarantee a bounded average probability of recognition error. The first formulation brings us to evaluation of capacity of a binary asymmetric and M-ary channels. The second formulation falls under the scope of rate-distortion theory. We further describe the problem of physical signature authentication used to authenticate a biometric acquisition device and state the problem of secured biometric authentication as the problem of joint biometric and physical signature authentication. One novelty of this work is in restating the problem of secured biometric authentication as the problem of finding capacity and rate-distortion curve for a secured biometric authentication system. Another novelty is in application of transductive methods from statistical learning theory to estimate the conditional error probabilities of the system. This set of parameters is used to optimize the system performance.

  17. Assessing Children's Appraisals of Security in the Family System: The Development of the Security in the Family System (SIFS) Scales

    ERIC Educational Resources Information Center

    Forman, Evan M.; Davies, Patrick T.

    2005-01-01

    Background: Although delineating the processes by which children appraise the family as a source of security from their collective experiences in the family subsystem has assumed center stage in many conceptualizations of child development, the dearth of measures of child adaptation in the family system has hindered empirical advances. Therefore,…

  18. Power systems development facility. Quarterly report, January 1995--March 1995

    SciTech Connect

    1995-05-01

    The objective of this project is to evaluate hot gas particle control technologies using coal-derived gas streams. This will entail the design, construction, installation, and use of a flexible test facility which can operate under realistic gasification and combustion conditions. The major particulate control device issues to be addressed include the integration of the particulate control devices into coal utilization systems, on-line cleaning techniques, chemical and thermal degradation of components, fatigue or structural failures, blinding, collection efficiency as a function of particle size, and scale-up of particulate control systems to commercial size. The conceptual design of the facility was extended to include a within scope, phased expansion of the existing Hot Gas Cleanup Test Facility Cooperative Agreement to also address systems integration issues of hot particulate removal in advanced coal-based power generation systems. This expansion included the consideration of the following modules at the test facility in addition to the original Transport Reactor gas source and Hot Gas Cleanup Units: (1) Carbonizer/Pressurized Circulating Fluidized Bed Gas Source. (2) Hot Gas Cleanup Units to mate to all gas streams. (3) Combustion Gas Turbine. (4) Fuel Cell and associated gas treatment. This expansion to the Hot Gas Cleanup Test Facility is herein referred to as the Power Systems Development Facility (PSDF). The major emphasis during this reporting period was continuing the detailed design of the facility and integrating the particulate control devices (PCDs) into structural and process designs.

  19. Towards a Standard for Highly Secure SCADA Systems

    SciTech Connect

    Carlson, R.

    1998-09-25

    The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied to automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the

  20. CVD facility electrical system captor/dapper study

    SciTech Connect

    SINGH, G.

    1999-10-28

    Project W-441, CVD Facility Electrical System CAPTOWDAPPER Study validates Meier's hand calculations. This study includes Load flow, short circuit, voltage drop, protective device coordination, and transient motor starting (TMS) analyses.

  1. Wake Shield Facility in grasp of the Remote Manipulator System

    NASA Technical Reports Server (NTRS)

    1994-01-01

    The Wake Shield Facility (WSF) is held in the grasp of Discovery's Remote Manipulator System (RMS). The 70mm image, backdropped against the blackness of space, also shows the SPACEHAB module in the forward cargo area.

  2. VIEW OF FLIGHT CREW SYSTEMS, FLIGHT KITS FACILITY, ROOM NO. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    VIEW OF FLIGHT CREW SYSTEMS, FLIGHT KITS FACILITY, ROOM NO. 1N12, FACING NORTH - Cape Canaveral Air Force Station, Launch Complex 39, Vehicle Assembly Building, VAB Road, East of Kennedy Parkway North, Cape Canaveral, Brevard County, FL

  3. VIEW OF FLIGHT CREW SYSTEMS, FLIGHT KITS FACILITY, ROOM NO. ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    VIEW OF FLIGHT CREW SYSTEMS, FLIGHT KITS FACILITY, ROOM NO. 1N12, FACING SOUTH - Cape Canaveral Air Force Station, Launch Complex 39, Vehicle Assembly Building, VAB Road, East of Kennedy Parkway North, Cape Canaveral, Brevard County, FL

  4. Towards a Scalable Group Vehicle-based Security System

    SciTech Connect

    Carter, Jason M

    2016-01-01

    In August 2014, the National Highway Traffic Safety Administration (NHTSA) proposed new rulemaking to require V2V communication in light vehicles. To establish trust in the basic safety messages (BSMs) that are exchanged by vehicles to improve driver safety, a vehicle public key infrastructure (VPKI) is required. We outline a system where a group or groups of vehicles manage and generate their own BSM signing keys and authenticating certificates -- a Vehicle-Based Security System (VBSS). Based on our preliminary examination, we assert the mechanisms exist to implement a VBSS that supports V2V communications; however, maintaining uniform trust throughout the system while protecting individual privacy does require reliance on nascent group signature technology which may require a significant amount of communication overhead for trust maintenance. To better evaluate the VBSS approach, we compare it to the proposed Security Credential Management System (SCMS) in four major areas including bootstrapping, pseudonym provisioning, BSM signing and authentication, and revocation. System scale, driver privacy, and the distribution and dynamics of participants make designing an effective VPKI an interesting and challenging problem; no clear-cut strategy exists to satisfy the security and privacy expectations in a highly efficient way. More work is needed in VPKI research, so the life-saving promise of V2V technology can be achieved.

  5. Security issues of quantum cryptographic systems with imperfect detectors

    NASA Astrophysics Data System (ADS)

    Burenkov, Viacheslav

    The laws of quantum physics can be used to secure communications between two distant parties in a scheme called quantum key distribution (QKD), even against a technologically unlimited eavesdropper. While the theoretical security of QKD has been proved rigorously, current implementations of QKD are generally insecure. In particular, mathematical models of devices, such as detectors, do not accurately describe their real-life behaviour. Such seemingly insignificant discrepancies can compromise the security of the entire scheme, especially as novel detector technologies are being developed with little regard for potential vulnerabilities. In this thesis, we study how detector imperfections can impact the security of QKD and how to overcome such technological limitations. We first analyze the security of a high-speed QKD system with finite detector dead time tau. We show that the previously reported sifting approaches are not guaranteed to be secure in this regime. More specifically, Eve can induce a basis-dependent detection efficiency at the receiver's end. Modified key sifting schemes that are basis-independent, and thus secure in the presence of dead time and an active eavesdropper, are discussed and compared. It is shown that the maximum key generation rate is 1/(2tau) for passive basis selection, and 1/tau for active basis selection. The security analysis is also extended to the decoy state BB84 protocol. We then study a relatively new type of single-photon detector called the superconducting nanowire single-photon detector (SNSPD), and discover some unexpected behaviour. We report an afterpulsing effect present when the SNSPD is operated in the high bias current regime. In our standard set-up, the afterpulsing is most likely to occur at around 180 ns following a detection event, for both real counts and dark counts. We characterize the afterpulsing behaviour and speculate that it is not due to the SNSPD itself but rather the associated read-out circuit. We also

  6. Optimization of power systems with voltage security constraints

    NASA Astrophysics Data System (ADS)

    Rosehart, William Daniel

    As open access market principles are applied to power systems, significant changes in their operation and control are occurring. In the new marketplace, power systems are operating under higher loading conditions as market influences demand greater attention to operating cost versus stability margins. Since stability continues to be a basic requirement in the operation of any power system, new tools are being considered to analyze the effect of stability on the operating cost of the system, so that system stability can be incorporated into the costs of operating the system. In this thesis, new optimal power flow (OPF) formulations are proposed based on multi-objective methodologies to optimize active and reactive power dispatch while maximizing voltage security in power systems. The effects of minimizing operating costs, minimizing reactive power generation and/or maximizing voltage stability margins are analyzed. Results obtained using the proposed Voltage Stability Constrained OPF formulations are compared and analyzed to suggest possible ways of costing voltage security in power systems. When considering voltage stability margins the importance of system modeling becomes critical, since it has been demonstrated, based on bifurcation analysis, that modeling can have a significant effect of the behavior of power systems, especially at high loading levels. Therefore, this thesis also examines the effects of detailed generator models and several exponential load models. Furthermore, because of its influence on voltage stability, a Static Var Compensator model is also incorporated into the optimization problems.

  7. A security architecture for interconnecting health information systems.

    PubMed

    Gritzalis, Dimitris; Lambrinoudakis, Costas

    2004-03-31

    Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.

  8. Ground Software Maintenance Facility (GSMF) system manual

    NASA Technical Reports Server (NTRS)

    Derrig, D.; Griffith, G.

    1986-01-01

    The Ground Software Maintenance Facility (GSMF) is designed to support development and maintenance of spacelab ground support software. THE GSMF consists of a Perkin Elmer 3250 (Host computer) and a MITRA 125s (ATE computer), with appropriate interface devices and software to simulate the Electrical Ground Support Equipment (EGSE). This document is presented in three sections: (1) GSMF Overview; (2) Software Structure; and (3) Fault Isolation Capability. The overview contains information on hardware and software organization along with their corresponding block diagrams. The Software Structure section describes the modes of software structure including source files, link information, and database files. The Fault Isolation section describes the capabilities of the Ground Computer Interface Device, Perkin Elmer host, and MITRA ATE.

  9. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    NASA Technical Reports Server (NTRS)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  10. Correlation Research of Medical Security Management System Network Platform in Medical Practice

    NASA Astrophysics Data System (ADS)

    Jie, Wang; Fan, Zhang; Jian, Hao; Li-nong, Yu; Jun, Fei; Ping, Hao; Ya-wei, Shen; Yue-jin, Chang

    Objective-The related research of medical security management system network in medical practice. Methods-Establishing network platform of medical safety management system, medical security network host station, medical security management system(C/S), medical security management system of departments and sections, comprehensive query, medical security disposal and examination system. Results-In medical safety management, medical security management system can reflect the hospital medical security problem, and can achieve real-time detection and improve the medical security incident detection rate. Conclusion-The application of the research in the hospital management implementation, can find hospital medical security hidden danger and the problems of medical disputes, and can help in resolving medical disputes in time and achieve good work efficiency, which is worth applying in the hospital practice.

  11. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  12. Regulation study for the facility control system design at the Facility Operations Center at TA55

    SciTech Connect

    1994-03-16

    NMT-8 is proposing to upgrade the existing Facility Control System (FCS) located within the Facility Operations Center (FOC) at the TA-55 Plutonium Processing and Handling Facility (PPHF). The FCS modifications will upgrade the existing electronics to provide better reliability of system functions. Changes include replacement of the FCS computers and field multiplex units which are used for transmitting systems data. Data collected at the FCS include temperature, pressure, contact closures, etc., and are used for monitoring and/or control of key systems at TA-55. Monitoring is provided for the electrical power system status, PF-4 HVAC air balance status (Static Differential pressure), HVAC fan system status, site chill water return temperature, fire system information, and radioactive constant air monitors alarm information, site compressed air pressure and other key systems used at TA-55. Control output signals are provided for PF-4 HVAC systems, and selected alarms for criticality, fire, loss of pressure in confinement systems. A detailed description of the FCS modifications is provided in Section 2.

  13. Safety systems and access control in the National Ignition Facility.

    PubMed

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design. PMID:23629061

  14. Resolution of sick building syndrome in a high-security facility.

    PubMed

    Hiipakka, D W; Buffington, J R

    2000-08-01

    The main objective of this article is to serve as a case study for other industrial hygiene (IH) professionals' review as a "real world" effort in responding to a facility perceived as "sick" by its occupants. As many industrial hygienists do not have extensive backgrounds in evaluating microbial air contaminants or the mechanical function of building HVAC units, the overall intent is to provide "lessons learned" to IH generalists who may be asked to participate in indoor environmental quality (IEQ) surveys. In September 1994, a suspected case of "sick building syndrome" was investigated (with significant airborne fungal loads confirmed) at a communications center after numerous occupants reported upper respiratory disease and/or allergy-type symptoms. The setting was a two-story structure approximately 30 years old, with a normal occupancy load of 350 to 400 persons. In addition to continual structural modifications, the central HVAC air conditioning systems had poor maintenance histories. Inspection of HVAC components revealed visible fungal growth on air filters and air ducts and in cooling fan condensate drip pans. Fungal air samples were collected with an Anderson N6 air sampler and Sabouraund dextrose agar media. Over a study period of 23 months, three rounds of 26 air samples were collected for 5 minutes each at 28.3 liters/minute airflow. Cultures exhibited fungi such as Aspergillus, Penicillium, Alternaria, and Cladosporium. Certain strains of these fungi produce mycotoxins that may cause a variety of deleterious health effects such as those described by occupants. Initial 1994 airborne fungal concentrations ranged from 85 to 6157 colony forming units (CFUs) per cubic meter of sampled air (CFU/m3). Some investigators have reported fungal concentrations as low as 245 CFU/m3 associated with complaint sites in other buildings. Remediation efforts involved hiring a dedicated mechanic to implement a HVAC preventive maintenance program (including regular

  15. 40. View of dual projector system located in MWOC facility ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    40. View of dual projector system located in MWOC facility in transmitter building no. 102 by Bessler Company. System used to project images in MWOC on backlit screen system with fiber optic electro/mechanical system linked to computer output to indicate information on screen linked with display from projector system. - Clear Air Force Station, Ballistic Missile Early Warning System Site II, One mile west of mile marker 293.5 on Parks Highway, 5 miles southwest of Anderson, Anderson, Denali Borough, AK

  16. 78 FR 77606 - Security Requirements for Facilities Storing Spent Nuclear Fuel

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-24

    ... SECY-07- 0148, to strengthen security requirements at ISFSIs. On December 16, 2009 (74 FR 66589), the... requirements for storing spent nuclear fuel (SNF) in an independent spent fuel storage installation (ISFSI), and for storing SNF and/or high-level radioactive waste (HLW) in a monitored retrievable...

  17. 76 FR 10947 - Registration and Regulation of Security-Based Swap Execution Facilities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-28

    ..., 2010), 75 FR 80174 (December 21, 2010) (File No. S7-39-10) (proposed rulemaking regarding definitions... separate proposed rulemaking. See also Securities Exchange Act Release No. 62717 (August 13, 2010), 75 FR.... 63347 (November 19, 2010), 75 FR 77306 (December 10, 2010) (File No. S7- 35-10) (``SDR Release'')...

  18. ERDA/Lewis research center photovoltaic systems test facility

    NASA Technical Reports Server (NTRS)

    Forestieri, A. F.; Johnson, J. A.; Knapp, W. D.; Rigo, H.; Stover, J.; Suhay, R.

    1977-01-01

    A national photovoltaic power systems test facility (of initial 10-kW peak power rating) is described. It consists of a solar array to generate electrical power, test-hardware for several alternate methods of power conversion, electrical energy storage systems, and an instrumentation and data acquisition system.

  19. Federal Government Information Systems Security Management and Governance Are Pacing Factors for Innovation

    ERIC Educational Resources Information Center

    Edwards, Gregory

    2011-01-01

    Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…

  20. ASSESS (Analytic System and Software for Evaluating Safeguards and Security) update: Current status and future developments

    SciTech Connect

    Al-Ayat, R.A. ); Cousins, T.D. ); Hoover, E.R. )

    1990-07-15

    The Analytic System and Software for Evaluating Safeguards and Security (ASSESS) has been released for use by DOE field offices and their contractors. In October, 1989, we offered a prototype workshop to selected representatives of the DOE community. Based on the prototype results, we held the first training workshop at the Central Training Academy in January, 1990. Four additional workshops are scheduled for FY 1990. ASSESS is a state-of-the-art analytical tool for management to conduct integrated evaluation of safeguards systems at facilities handling facilities. Currently, ASSESS focuses on the threat of theft/diversion of special nuclear material by insiders, outsiders, and a special form of insider/outsider collusion. ASSESS also includes a neutralization module. Development of the tool is continuing. Plans are underway to expand the capabilities of ASSESS to evaluate against violent insiders, to validate the databases, to expand the neutralization module, and to assist in demonstrating compliance with DOE Material Control and Accountability (MC A) Order 5633.3. These new capabilities include the ability to: compute a weighted average for performance capability against a spectrum of insider adversaries; conduct defense-in-depth analyses; and analyze against protracted theft scenarios. As they become available, these capabilities will be incorporated in our training program. ASSESS is being developed jointly by Lawrence Livermore and Sandia National Laboratories under the sponsorship of the Department of Energy (DOE) Office of Safeguards and Security.