Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.
Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less
Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security
NASA Astrophysics Data System (ADS)
Mahmadi, FN; Zaaba, ZF; Osman, A.
2016-11-01
Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.
, NREL Technical Report (2017) Energy Assessment Toolkits, NREL Technical Report (2017) Solid-State Lighting Replacement and Maintenance of Lighting Design Goals, NREL Technical Report (2017) Nevada National Security Site 23 Solar and Storage Assessment, NREL Technical Report (2016) Tiller Ranger Station Net Zero
ERIC Educational Resources Information Center
Branstad, Dennis K., Ed.
The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…
ERIC Educational Resources Information Center
Sommers, Paul; Heg, Deena
A project was conducted to improve the state of Washington's community and technical college system by developing and using an improved occupational forecasting system to assess and respond to education and training needs. First, long-term occupational forecast data from Washington's Employment Security Department were matched with technical and…
NASA Astrophysics Data System (ADS)
Gorlov, A. P.; Averchenkov, V. I.; Rytov, M. Yu; Eryomenko, V. T.
2017-01-01
The article is concerned with mathematical simulation of protection level assessment of complex organizational and technical systems of industrial enterprises by creating automated system, which main functions are: information security (IS) audit, forming of the enterprise threats model, recommendations concerning creation of the information protection system, a set of organizational-administrative documentation.
Health Information Security in Hospitals: the Application of Security Safeguards.
Mehraeen, Esmaeil; Ayatollahi, Haleh; Ahmadi, Maryam
2016-02-01
A hospital information system has potentials to improve the accessibility of clinical information and the quality of health care. However, the use of this system has resulted in new challenges, such as concerns over health information security. This paper aims to assess the status of information security in terms of administrative, technical and physical safeguards in the university hospitals. This was a survey study in which the participants were information technology (IT) managers (n=36) who worked in the hospitals affiliated to the top ranked medical universities (university A and university B). Data were collected using a questionnaire. The content validity of the questionnaire was examined by the experts and the reliability of the questionnaire was determined using Cronbach's coefficient alpha (α=0.75). The results showed that the administrative safeguards were arranged at a medium level. In terms of the technical safeguards and the physical safeguards, the IT managers rated them at a strong level. According to the results, among three types of security safeguards, the administrative safeguards were assessed at the medium level. To improve it, developing security policies, implementing access control models and training users are recommended.
Cooperative global security programs modeling & simulation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Briand, Daniel
2010-05-01
The national laboratories global security programs implement sustainable technical solutions for cooperative nonproliferation, arms control, and physical security systems worldwide. To help in the development and execution of these programs, a wide range of analytical tools are used to model, for example, synthetic tactical environments for assessing infrastructure protection initiatives and tactics, systematic approaches for prioritizing nuclear and biological threat reduction opportunities worldwide, and nuclear fuel cycle enrichment and spent fuel management for nuclear power countries. This presentation will describe how these models are used in analyses to support the Obama Administration's agenda and bilateral/multinational treaties, and ultimately, to reducemore » weapons of mass destruction and terrorism threats through international technical cooperation.« less
Technology and Policy: Looking to the Future
NASA Astrophysics Data System (ADS)
Sylvester, Kory
2009-05-01
As the proper scope and nature of arms control continues to be debated, it is certain that technical capabilities and advice will play a significant role. While national priorities and strategic objectives and broader perspectives of international security and foreign policy will ultimately dictate, technical expertise and assessment is critical to the identification, development and evaluation of alternatives. Strategic linkages between arms control, nonproliferation, and homeland security have perhaps never been so intertwined. Incomplete information and strongly held but disparate views about the potential of science and technology to amplify threats as readily as they mitigate them creates a highly dynamic environment for policymakers. To contribute meaningfully scientists and engineers will have to remain engaged with national security debates and think about the strategic and policy environment in which technical questions are posed to them, and how to identify and frame the important questions that aren't.
Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio
2015-08-01
The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-02
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-63949] Technical Amendments to...: Securities and Exchange Commission. ACTION: Final rule; technical amendments. SUMMARY: The Securities and Exchange Commission (``Commission'') is adopting technical amendments to Rule 17a-8 under the Securities...
1986-12-01
Classification. U Security Marks, Accession *:U00298 AD *. ADA096538 TITLE: Assessment of the Crossed Porro Prism Resonator AUTHOR. Seea, B.A.; Fueloep, K...Laser Range Finder Mechanical Property Stability Resonator Porro Prism Standord Mirror Examine Pgs: 16 Classification: U Security Marks: Accession...Gamma-Ray Laser Graser Mossbauer Effect Borrman Superradiance Nuclear-Magnetic Resonance Pgs: 26 Classification: U Security Marks: Accession *:U00484 AD
Republic of the Marshall Islands. Energy Project Development Options and Technical Assessment (2013)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Conrad, Misty Dawn; Olis, Dan; Ness, J. Erik
2015-09-01
The advancement of renewable energy and energy efficient technologies continues to be fluid. There are many technical opportunities and strategies that can be utilized to guide communities to deploy cost-effective commercial alternative energy options; however, to achieve aggressive economic, environmental, and security goals, it requires a comprehensive, integrated approach. This document reports on the initial findings of an energy assessment that was conducted for the Republic of the Marshall Islands.
Tiger Team Assessment of the Los Alamos National Laboratory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1991-11-01
The purpose of the safety and health assessment was to determine the effectiveness of representative safety and health programs at the Los Alamos National Laboratory (LANL). Within the safety and health programs at LANL, performance was assessed in the following technical areas: Organization and Administration, Quality Verification, Operations, Maintenance, Training and Certification, Auxiliary Systems, Emergency Preparedness, Technical Support, Packaging and Transportation, Nuclear Criticality Safety, Security/Safety Interface, Experimental Activities, Site/Facility Safety Review, Radiological Protection, Personnel Protection, Worker Safety and Health (OSHA) Compliance, Fire Protection, Aviation Safety, Explosives Safety, Natural Phenomena, and Medical Services.
Overview of the CERT Resilience Management Model (CERT-RMM)
2014-01-23
Management Model (CERT®-RMM) Jim Cebula Technical Manager - Cyber Risk Management , CERT® Division Jim Cebula is the Technical Manager of the...Cyber Risk Management team in the Cyber Security Solutions Directorate of the CERT Division at the Software Engineering Institute (SEI), a unit of...Carnegie Mellon University. Cebula’s current activities include risk management methods along with assessment and management of operational
ERIC Educational Resources Information Center
Ogbunaya, T. C.; Udoudo, Ekereobong S.
2015-01-01
The paper focused on repositioning Technical and Vocational Education and Training (TVET) for youth's employment and national security in Nigeria. It examined briefly the concepts of technical vocational education and training (TVET), youths, unemployment and national security as well as the effects of unemployment on national security in Nigeria.…
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1991-06-14
This report summarizes the activities and accomplishments of an US Army technology security project designed to identify and develop effective policy guidelines for militarily critical technologies in specific Army systems and in broad generic technology areas of military interest, Individual systems analyses are documented in separate Weapons Systems Technical Assessments (WSTAs) and the general generic technology areas are evaluated in the Advanced Technology Assessment Reports (ATARs), However, specific details of these assessments are not addressed here, only recommendations regarding aspects of the defined approach, methodology, and format are provided and discussed.
1979-12-01
the Joint Intelligence Organization ( JIO ) came into existence. It was only an analysis and information agency and did not collect intelligence. It was...34to provide expert technical analysis and the best kind of judgment on kinds of security problems that might arise." 3 The JIO brought sections of the... JIO char er detailed its function of intelligence assessments "on military, economic, scientific, and technical matters affecting Australia’s defence
2006-12-01
Supplement DOD Department of Defense DOL Department of Labor DTSA Defense Technology Security Administration EAR Export Administration Regulations...and outreach to companies on the export regulations. DOD: The Defense Technology Security Administration ( DTSA ) represents DOD on export control...and technologies, which DOD oversees. DTSA serves an advisory role in State’s and Commerce’s export license review processes and offers technical
The ISACA Business Model for Information Security: An Integrative and Innovative Approach
NASA Astrophysics Data System (ADS)
von Roessing, Rolf
In recent years, information security management has matured into a professional discipline that covers both technical and managerial aspects in an organisational environment. Information security is increasingly dependent on business-driven parameters and interfaces to a variety of organisational units and departments. In contrast, common security models and frameworks have remained largely technical. A review of extant models ranging from [LaBe73] to more recent models shows that technical aspects are covered in great detail, while the managerial aspects of security are often neglected.Likewise, the business view on organisational security is frequently at odds with the demands of information security personnel or information technology management. In practice, senior and executive level management remain comparatively distant from technical requirements. As a result, information security is generally regarded as a cost factor rather than a benefit to the organisation.
Author-Editor Guide to Technical Publications Preparation. Revision
1990-01-01
meteorology, climatology, military technical publications. ( ") <- 15: Number of Pages: 68 17. Security Classification of Report: Unclassified 1... Security Classification of this Page: Unclassified 19. Security Classification of Abstract: Unclassified 20. Limitation of Abstract: UL Standard Form 298...34 There are, however, February 1983. numerous exceptions. Although some technical material may not be classified in accordance with security AFR 83-2, Air
NASA Astrophysics Data System (ADS)
Peikari, Hamid Reza
Customer satisfaction and loyalty have been cited as the e-commerce critical success factors and various studies have been conducted to find the antecedent determinants of these concepts in the online transactions. One of the variables suggested by some studies is perceived security. However, these studies have referred to security from a broad general perspective and no attempts have been made to study the specific security related variables. This paper intends to study the influence on security statement and technical protection on satisfaction, loyalty and privacy. The data was collected from 337 respondents and after the reliability and validity tests, path analysis was applied to examine the hypotheses. The results suggest that loyalty is influenced by satisfaction and security statement and no empirical support was found for the influence on technical protection and privacy on loyalty. Moreover, it was found that security statement and technical protection have a positive significant influence on satisfaction while no significant effect was found for privacy. Furthermore, the analysis indicated that security statement have a positive significant influence on technical protection while technical protection was found to have a significant negative impact on perceived privacy.
The Shaping of Managers' Security Objectives through Information Security Awareness Training
ERIC Educational Resources Information Center
Harris, Mark A.
2010-01-01
Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mladineo, Stephen V.; Frazar, Sarah L.; Kurzrok, Andrew J.
This paper will explore the development of a framework for conducting an assessment of safety-security-safeguards integration within a State. The goal is to examine State regulatory structures to identify conflicts and gaps that hinder management of the three disciplines at nuclear facilities. Such an analysis could be performed by a State Regulatory Authority (SRA) to provide a self-assessment or as part of technical cooperation with either a newcomer State, or to a State with a fully developed SRA.
Austin, Robert D; Darby, Christopher A
2003-06-01
Few senior executives pay a whole lot of attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems in order to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important thing to realize, they emphasize, is that decisions about digital security are not much different from other cost-benefit decisions. The tools general managers bring to bear on other areas of the business are good models for what they need to do in this technical space.
Contextualizing Secure Information System Design: A Socio-Technical Approach
ERIC Educational Resources Information Center
Charif, Abdul Rahim
2017-01-01
Secure Information Systems (SIS) design paradigms have evolved in generations to adapt to IS security needs. However, modern IS are still vulnerable and are far from secure. The development of an underlying IS cannot be reduced to "technological fixes" neither is the design of SIS. Technical security cannot ensure IS security.…
A transmission security framework for email-based telemedicine.
Caffery, Liam J; Smith, Anthony C
2010-01-01
Encryption is used to convert an email message to an unreadable format thereby securing patient privacy during the transmission of the message across the Internet. Two available means of encryption are: public key infrastructure (PKI) used in conjunction with ordinary email and secure hypertext transfer protocol (HTTPS) used by secure web-mail applications. Both of these approaches have advantages and disadvantages in terms of viability, cost, usability and compliance. The aim of this study was develop an instrument to identify the most appropriate means of encrypting email communication for telemedicine. A multi-method approach was used to construct the instrument. Technical assessment and existing bodies of knowledge regarding the utility of PKI were analyzed, along with survey results from users of Queensland Health's Child and Youth Mental Health Service secure web-mail service. The resultant decision support model identified that the following conditions affect the choice of encryption technology: correspondent's risk perception, correspondent's identification to the security afforded by encryption, email-client used by correspondents, the tolerance to human error and the availability of technical resources. A decision support model is presented as a flow chart to identify the most appropriate encryption for a specific email-based telemedicine service.
6 CFR 9.15 - Professional and technical services.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Professional and technical services. 9.15 Section 9.15 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Activities by Own Employees § 9.15 Professional and technical services. (a) The prohibition on the...
6 CFR 9.23 - Professional and technical services.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Professional and technical services. 9.23 Section 9.23 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY RESTRICTIONS UPON LOBBYING Activities by Other than Own Employees § 9.23 Professional and technical services. (a) The...
77 FR 18716 - Transportation Security Administration Postal Zip Code Change; Technical Amendment
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-28
... organizational changes and it has no substantive effect on the public. DATES: Effective March 28, 2012. FOR... No. 1572-9] Transportation Security Administration Postal Zip Code Change; Technical Amendment AGENCY: Transportation Security Administration, DHS. ACTION: Final rule. SUMMARY: This rule is a technical change to...
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
2005-06-01
as a computer fraud case investigated by the Secret Service. Each case was analyzed from a behavioral and a technical perspective to identify...insider threat and address the issue from an approach that draws on human resources, corporate security, and information security perspectives. The ... Secret Service National Threat Assessment Center and the CERT Coordination Center of Carnegie Mellon University’s Software Engineering Institute joined
Fueling the Future: Furthering Theater Security with Burma’s Energy Industry
2014-10-30
Illustrations Figure Title Page 1. Energy Assessment of Geologic Provinces in Burma, USGS 2 2. China’s “Malacca Dilemma” and...extractable” oil and natural gas. A recent geology-based assessment of undiscovered technically recoverable oil, natural gas and gas liquids conducted... Assessment of Geologic Provinces in Burma, U.S. Geological Survey, 2012 1 C.J. Wandey, et al
Army Independent Risk Assessment Guidebook
2014-04-01
17 5.4.2 Step 2: Gather relevant technology and alternative information............... 17 5.4.3 Step 3: Secure SME support for readiness...level assessment. ................... 17 5.4.4 Step 4: SMEs assess TRL, IRL, and MRL for each technology. .............. 17 5.4.5 Step 5: Identify...technical risks, risk ratings, and mitigations. .................. 20 5.4.6 Step 6: SMEs identify key technologies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rizzo, Davinia; Blackburn, Mark
Complex systems are comprised of technical, social, political and environmental factors as well as the programmatic factors of cost, schedule and risk. Testing these systems for enhanced security requires expert knowledge in many different fields. It is important to test these systems to ensure effectiveness, but testing is limited to due cost, schedule, safety, feasibility and a myriad of other reasons. Without an effective decision framework for Test and Evaluation (T&E) planning that can take into consideration technical as well as programmatic factors and leverage expert knowledge, security in complex systems may not be assessed effectively. Therefore, this paper coversmore » the identification of the current T&E planning problem and an approach to include the full variety of factors and leverage expert knowledge in T&E planning through the use of Bayesian Networks (BN).« less
Assessment of the Effects of Climate Change on Federal Hydropower
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sale, Michael J.; Shih-Chieh, Kao; Ashfaq, Moetasim
As directed by Congress in Section 9505 of the SECURE Water Act of 2009 (Public Law 111-11), the US Department of Energy (DOE), in consultation with the federal Power Marketing Administrations (PMAs) and other federal agencies, including federal dam owners, has prepared a comprehensive assessment examining the effects of climate change on water available for hydropower at federal facilities and on the marketing of power from these federal facilities. This Oak Ridge National Laboratory report, referred to as the “9505 Assessment,” describes the technical basis for the report to Congress that was called for in the SECURE Water Act.
ERIC Educational Resources Information Center
Imam, Abbas H.
2013-01-01
Complexity of information security has become a major issue for organizations due to incessant threats to information assets. Healthcare organizations are particularly concerned with security owing to the inherent vulnerability of sensitive information assets in health informatics. While the non-technical security management elements have been at…
Usage of insecure E-mail services among researchers with different scientific background.
Solić, Kresimir; Grgić, Krešimir; Ilakovac, Vesna; Zagar, Drago
2011-08-01
Free web‑based e-mail services are considered to have more security flaws than institutional ones, but they are frequently used among scientific researchers for professional communication. The aim of this study was to analyze frequency of usage of the insecure free e-mail services for professional communication among biomedical, economical and technical researchers, who published papers in one of three different journals: Croatian Medical Journal, Automatika and Economic Research. Contact details of the authors who provided their e‑mail address from the papers published in those three journals during one year period were collected. These e‑mail addresses were collected from the electronic archive of the journals in question. The domains of all e‑mail addresses were assessed and contacts were categorized into three groups according to the following types: world-wide known free web‑based e‑mail services, national Internet Service Provider (ISP) e-mail services, and institutional or corporate e-mail addresses. The proportion of authors using free web-based e-mail services, the least secure group type, was highest among biomedical researchers (17.8%) while every e‑mail address collected from the technical journal belonged to the secured institutional e‑mail group type. It seems that all researchers from the technical scientific field and most of the researchers from the economical field value good security practice and use more secure systems for professional communication. High percentage of the biomedical researchers who use insecure e‑mail services may mean that they need to be warned of the possible security disadvantages of those kinds of e‑mail addresses.
Iran’s Reemergence as a Major Player in Global Security
2013-05-21
economic sanctions levied against the Islamic Republic. Iran continues to deny International Atomic Energy Agency inspectors’ access to possible uranium ...build nuclear weapons.”55 Mr. Clapper went on to say that “Iran’s technical advancement, particularly in uranium enrichment, strengthens our assessment...will to do so.”56 During the briefing, he made clear that Iran is technically capable of producing enough highly enriched uranium for a weapon
6 CFR 27.120 - Designation of a coordinating official; Consultations and technical assistance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... covered facility shall submit a written request for consultation or technical assistance to the...; Consultations and technical assistance. 27.120 Section 27.120 Domestic Security DEPARTMENT OF HOMELAND SECURITY... coordinating official; Consultations and technical assistance. (a) The Assistant Secretary will designate a...
75 FR 75453 - Proposed Information Collection; Comment Request; Technical Data Letter of Explanation
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-03
... Request; Technical Data Letter of Explanation AGENCY: Bureau of Industry and Security. ACTION: Notice....gov . SUPPLEMENTARY INFORMATION: I. Abstract These technical data letters of explanation will assure the Bureau of Industry and Security that U.S.-origin technical data will be exported only for...
78 FR 34264 - Technical Corrections to the HIPAA Privacy, Security, and Enforcement Rules
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-07
...-AA03 Technical Corrections to the HIPAA Privacy, Security, and Enforcement Rules AGENCY: Office for... corrections address certain inadvertent errors and omissions in the HIPAA Privacy, Security, and Enforcement... (HHS or ``the Department'') published a final rule to implement changes to the HIPAA Privacy, Security...
Development and Application of Skill Standards for Security Practitioners
2006-07-01
Development and Application of Skill Standards for Security Practitioners Henry K. Simpson Northrop Grumman Technical Services Lynn F. Fischer...and Application of Skill Standards for Security Practitioners Henry K. Simpson, Northrop Grumman Technical Services Lynn F. Fischer, Defense...described in the present report was driven by a JSTC tasking to develop skill standards for security practitioners in seven different security
Remote video assessment for missile launch facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wagner, G.G.; Stewart, W.A.
1995-07-01
The widely dispersed, unmanned launch facilities (LFs) for land-based ICBMs (intercontinental ballistic missiles) currently do not have visual assessment capability for existing intrusion alarms. The security response force currently must assess each alarm on-site. Remote assessment will enhance manpower, safety, and security efforts. Sandia National Laboratories was tasked by the USAF Electronic Systems Center to research, recommend, and demonstrate a cost-effective remote video assessment capability at missile LFs. The project`s charter was to provide: system concepts; market survey analysis; technology search recommendations; and operational hardware demonstrations for remote video assessment from a missile LF to a remote security center viamore » a cost-effective transmission medium and without using visible, on-site lighting. The technical challenges of this project were to: analyze various video transmission media and emphasize using the existing missile system copper line which can be as long as 30 miles; accentuate and extremely low-cost system because of the many sites requiring system installation; integrate the video assessment system with the current LF alarm system; and provide video assessment at the remote sites with non-visible lighting.« less
Homeland Security Research Improves the Nation's Ability to ...
Technical Brief Homeland Security (HS) Research develops data, tools, and technologies to minimize the impact of accidents, natural disasters, terrorist attacks, and other incidents that can result in toxic chemical, biological or radiological (CBR) contamination. HS Research develops ways to detect contamination, sampling strategies, sampling and analytical methods, cleanup methods, waste management approaches, exposure assessment methods, and decision support tools (including water system models). These contributions improve EPA’s response to a broad range of environmental disasters.
Code of Federal Regulations, 2010 CFR
2010-10-01
... record systems. These security safeguards shall apply to all systems in which identifiable personal data... data and automated systems shall be adequately trained in the security and privacy of personal data. (4... technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of manual and...
Code of Federal Regulations, 2010 CFR
2010-10-01
... record systems. These security safeguards shall apply to all systems in which identifiable personal data... the security and privacy of such records. (7) The disposal and destruction of records within a system... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of...
Code of Federal Regulations, 2010 CFR
2010-10-01
... disclosure or destruction of manual and automatic record systems. These security safeguards shall apply to... use of records contained in a system of records are adequately trained to protect the security and... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of...
Security and emergency management technical assistance for the top 50 transit agencies
DOT National Transportation Integrated Search
2007-04-01
Between May 2002 and July 2006, the Federal Transit Administration (FTA) provided technical assistance to the top 50 transit agencies through the Security and Emergency Management Technical Assistance Program (SEMTAP). The scope and purpose of the pr...
78 FR 30956 - Cruise Vessel Security and Safety Training Provider Certification
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-23
..., practical demonstration, or simulation program. A detailed instructor manual must be submitted. Submissions... simulation programs to be used. If a simulator or simulation program is to be used, include technical... lessons and, if appropriate, for practical demonstrations or simulation exercises and assessments...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pregenzer, Arian Leigh
2011-12-01
The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunitiesmore » for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.« less
DOT National Transportation Integrated Search
2013-12-27
This report presents an analysis by Booz Allen Hamilton (Booz Allen) of the technical design for the Security Credentials Management System (SCMS) intended to support communications security for the connected vehicle system. The SCMS technical design...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hadley, Mark D.; Clements, Samuel L.
2009-01-01
Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less
Rezaeibagha, Fatemeh; Win, Khin Than; Susilo, Willy
Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.
Cyber / Physical Security Vulnerability Assessment Integration
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonald, Douglas G.; Simpkins, Bret E.
Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before penetrating further into the defenses. The proper identification and assessment of the overlapping areas (and interaction between these areas) in the VA process is necessary to accurately assess the true risk.« less
NASA Technical Reports Server (NTRS)
Zelkin, Natalie; Henriksen, Stephen
2011-01-01
This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.
76 FR 16531 - Technical Correction for Neurological Listing Cross-Reference
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-24
... 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www.socialsecurity.gov... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 404 [Docket No. SSA-2011-0019] RIN 0960-AH33 Technical Correction for Neurological Listing Cross-Reference AGENCY: Social Security Administration. ACTION: Final...
75 FR 33167 - Technical Amendment Language Change From “Wholly” to “Fully”
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-11
... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404, 405, 408, 416, and 418 [Docket No. SSA-2009-0062] RIN 0960-AH16 Technical Amendment Language Change From ``Wholly'' to ``Fully'' AGENCY: Social Security... these final rules, call Brian J. Rudick, Office of Regulations, Social Security Administration, 6401...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-24
... DEPARTMENT OF LABOR Employee Benefits Security Administration Technical Correction of the Caption... Mid-Atlantic Region (the Plan) AGENCY: Employee Benefits Security Administration, Department of Labor..., Employee Benefits Security Administration, U.S. Department of Labor. [FR Doc. 2010-23931 Filed 9-23-10; 8...
Status of the World's Soil Resources Report, Intergovernmental Technical Panel on Soils
The scope of main objectives of the report are: (a) to provide a global scientific assessment of current and projected soil conditions built on regional data analysis and expertise (b) to explore the implications of these soil conditions for food security, climate change, water q...
DOT National Transportation Integrated Search
1991-12-09
The System Safety & Security Division at The Volpe National Transportation System Center (VNTSC), Cambridge, MA is participating in an overall risk assessment study on the safety of High Speed Magnetic Levitation Transportation Systems ("MagLev"). Tr...
Guidelines for computer security in general practice.
Schattner, Peter; Pleteshner, Catherine; Bhend, Heinz; Brouns, Johan
2007-01-01
As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice. To develop guidelines for computer security in general practice based on a literature review, an analysis of available information on current practice and a series of key stakeholder interviews. While the guideline was produced in the context of Australian general practice, we have developed a template that is also relevant for other countries. Current data on computer security measures was sought from Australian divisions of general practice. Semi-structured interviews were conducted with general practitioners (GPs), the medical software industry, senior managers within government responsible for health IT (information technology) initiatives, technical IT experts, divisions of general practice and a member of a health information consumer group. The respondents were asked to assess both the likelihood and the consequences of potential risks in computer security being breached. The study suggested that the most important computer security issues in general practice were: the need for a nominated IT security coordinator; having written IT policies, including a practice disaster recovery plan; controlling access to different levels of electronic data; doing and testing backups; protecting against viruses and other malicious codes; installing firewalls; undertaking routine maintenance of hardware and software; and securing electronic communication, for example via encryption. This information led to the production of computer security guidelines, including a one-page summary checklist, which were subsequently distributed to all GPs in Australia. This paper maps out a process for developing computer security guidelines for general practice. The specific content will vary in different countries according to their levels of adoption of IT, and cultural, technical and other health service factors. Making these guidelines relevant to local contexts should help maximise their uptake.
6 CFR 27.120 - Designation of a coordinating official; Consultations and technical assistance.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Designation of a coordinating official; Consultations and technical assistance. 27.120 Section 27.120 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS General § 27.120 Designation of a...
6 CFR 27.120 - Designation of a coordinating official; Consultations and technical assistance.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Designation of a coordinating official; Consultations and technical assistance. 27.120 Section 27.120 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS General § 27.120 Designation of a...
6 CFR 27.120 - Designation of a coordinating official; Consultations and technical assistance.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Designation of a coordinating official; Consultations and technical assistance. 27.120 Section 27.120 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS General § 27.120 Designation of a...
6 CFR 27.120 - Designation of a coordinating official; Consultations and technical assistance.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Designation of a coordinating official; Consultations and technical assistance. 27.120 Section 27.120 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS General § 27.120 Designation of a...
NASA Technical Reports Server (NTRS)
2005-01-01
This document provides a study of the technical literature related to Command and Control (C2) link security for Unmanned Aircraft Systems (UAS) for operation in the National Airspace System (NAS). Included is a preliminary set of functional requirements for C2 link security.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-11
... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA 2008-0034] RIN 0960-AG66 Technical Revisions to the Supplemental Security Income (SSI) Regulations on Income and Resources AGENCY: Social... revisions reflect legislative changes found in the Consolidated Appropriations Act of 2001 (CAA), the...
Gauging Skills of Hospital Security Personnel: a Statistically-driven, Questionnaire-based Approach.
Rinkoo, Arvind Vashishta; Mishra, Shubhra; Rahesuddin; Nabi, Tauqeer; Chandra, Vidha; Chandra, Hem
2013-01-01
This study aims to gauge the technical and soft skills of the hospital security personnel so as to enable prioritization of their training needs. A cross sectional questionnaire based study was conducted in December 2011. Two separate predesigned and pretested questionnaires were used for gauging soft skills and technical skills of the security personnel. Extensive statistical analysis, including Multivariate Analysis (Pillai-Bartlett trace along with Multi-factorial ANOVA) and Post-hoc Tests (Bonferroni Test) was applied. The 143 participants performed better on the soft skills front with an average score of 6.43 and standard deviation of 1.40. The average technical skills score was 5.09 with a standard deviation of 1.44. The study avowed a need for formal hands on training with greater emphasis on technical skills. Multivariate analysis of the available data further helped in identifying 20 security personnel who should be prioritized for soft skills training and a group of 36 security personnel who should receive maximum attention during technical skills training. This statistically driven approach can be used as a prototype by healthcare delivery institutions worldwide, after situation specific customizations, to identify the training needs of any category of healthcare staff.
Gauging Skills of Hospital Security Personnel: a Statistically-driven, Questionnaire-based Approach
Rinkoo, Arvind Vashishta; Mishra, Shubhra; Rahesuddin; Nabi, Tauqeer; Chandra, Vidha; Chandra, Hem
2013-01-01
Objectives This study aims to gauge the technical and soft skills of the hospital security personnel so as to enable prioritization of their training needs. Methodology A cross sectional questionnaire based study was conducted in December 2011. Two separate predesigned and pretested questionnaires were used for gauging soft skills and technical skills of the security personnel. Extensive statistical analysis, including Multivariate Analysis (Pillai-Bartlett trace along with Multi-factorial ANOVA) and Post-hoc Tests (Bonferroni Test) was applied. Results The 143 participants performed better on the soft skills front with an average score of 6.43 and standard deviation of 1.40. The average technical skills score was 5.09 with a standard deviation of 1.44. The study avowed a need for formal hands on training with greater emphasis on technical skills. Multivariate analysis of the available data further helped in identifying 20 security personnel who should be prioritized for soft skills training and a group of 36 security personnel who should receive maximum attention during technical skills training. Conclusion This statistically driven approach can be used as a prototype by healthcare delivery institutions worldwide, after situation specific customizations, to identify the training needs of any category of healthcare staff. PMID:23559904
Analysis of Security Contractors in Deployed Environments
2006-12-01
35 2. Proper Training and Education .......................................................36 3. Improve Overall Contract Visibility...like to acknowledge the work of P. W. Singer , author of the book titled “Corporate Warriors,” whose dedicated research and thorough analysis on the...skills, including combat operations, strategic planning, intelligence, risk assessment, operational support, training , and technical skills.”3 CPFF
Security practices and regulatory compliance in the healthcare industry.
Kwon, Juhee; Johnson, M Eric
2013-01-01
Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance. We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured using dichotomous data indicating the presence or absence of each security practice. Using t tests, we identified the relationships between the clusters of security practices and their regulatory compliance. We utilized the results from the Kroll/Healthcare Information and Management Systems Society telephone-based survey of 250 US healthcare organizations including adoption status of security practices, breach incidents, and perceived compliance levels on Health Information Technology for Economic and Clinical Health, Health Insurance Portability and Accountability Act, Red Flags rules, Centers for Medicare and Medicaid Services, and state laws governing patient information security. Our analysis identified three clusters (which we call leaders, followers, and laggers) based on the variance of security practice patterns. The clusters have significant differences among non-technical practices rather than technical practices, and the highest level of compliance was associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-off and cultural practices). Hospitals in the highest level of compliance were significantly managing third parties' breaches and training. Audit practices were important to those who scored in the middle of the pack on compliance. Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption.
Security practices and regulatory compliance in the healthcare industry
Kwon, Juhee; Johnson, M Eric
2013-01-01
Objective Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance. Design We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured using dichotomous data indicating the presence or absence of each security practice. Using t tests, we identified the relationships between the clusters of security practices and their regulatory compliance. Measurement We utilized the results from the Kroll/Healthcare Information and Management Systems Society telephone-based survey of 250 US healthcare organizations including adoption status of security practices, breach incidents, and perceived compliance levels on Health Information Technology for Economic and Clinical Health, Health Insurance Portability and Accountability Act, Red Flags rules, Centers for Medicare and Medicaid Services, and state laws governing patient information security. Results Our analysis identified three clusters (which we call leaders, followers, and laggers) based on the variance of security practice patterns. The clusters have significant differences among non-technical practices rather than technical practices, and the highest level of compliance was associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-off and cultural practices). Conclusions Hospitals in the highest level of compliance were significantly managing third parties’ breaches and training. Audit practices were important to those who scored in the middle of the pack on compliance. Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption. PMID:22955497
Empowering Accountability for Vocational-Technical Education: The Analysis and Use of Wage Records.
ERIC Educational Resources Information Center
Jarosik, Daniel; Phelps, L. Allen
Since 1988, state governments have been required to collect quarterly from private sector employers gross earnings by Social Security numbers, industry of employment, and county of employment. A study was conducted of 13 states' efforts to use this wage record database as a tool for improving educational accountability and assessing the impact of…
USDA-ARS?s Scientific Manuscript database
Corn (Zea mays L.) is the most important crop for food security in several regions of Ecuador. Small farmers are using nitrogen (N) fertilizer without technical advice based on soil, crop and climatological data. The scientific literature lacks studies where tools are validated that can be used to q...
Key Points to Facilitate the Adoption of Computer-Based Assessments.
Burr, S A; Chatterjee, A; Gibson, S; Coombes, L; Wilkinson, S
2016-01-01
There are strong pedagogical arguments in favor of adopting computer-based assessment. The risks of technical failure can be managed and are offset by improvements in cost-effectiveness and quality assurance capability. Academic, administrative, and technical leads at an appropriately senior level within an institution need to be identified, so that they can act as effective advocates. All stakeholder groups need to be represented in undertaking a detailed appraisal of requirements and shortlisting software based on core functionality, summative assessment life cycle needs, external compatibility, security, and usability. Any software that is a candidate for adoption should be trialed under simulated summative conditions, with all stakeholders having a voice in agreeing the optimum solution. Transfer to a new system should be carefully planned and communicated, with a programme of training established to maximize the success of adoption.
Key Points to Facilitate the Adoption of Computer-Based Assessments
Burr, S.A.; Chatterjee, A.; Gibson, S.; Coombes, L.; Wilkinson, S.
2016-01-01
There are strong pedagogical arguments in favor of adopting computer-based assessment. The risks of technical failure can be managed and are offset by improvements in cost-effectiveness and quality assurance capability. Academic, administrative, and technical leads at an appropriately senior level within an institution need to be identified, so that they can act as effective advocates. All stakeholder groups need to be represented in undertaking a detailed appraisal of requirements and shortlisting software based on core functionality, summative assessment life cycle needs, external compatibility, security, and usability. Any software that is a candidate for adoption should be trialed under simulated summative conditions, with all stakeholders having a voice in agreeing the optimum solution. Transfer to a new system should be carefully planned and communicated, with a programme of training established to maximize the success of adoption. PMID:29349322
Assessing staff attitudes towards information security in a European healthcare establishment.
Furnell, S M; Gaunt, P N; Holben, R F; Sanders, P W; Stockel, C T; Warren, M J
1996-01-01
Information security is now recognized as an important consideration in modern healthcare establishments (HCEs), with a variety of guidelines and standards currently available to enable the environments to be properly protected. However, financial and operational constraints often exist which influence the practicality of these recommendations. This paper establishes that the staff culture of the organization is of particular importance in determining the level and types of security that will be accepted. This culture will be based upon staff awareness of and attitudes towards security and it is, therefore, important to have a clear idea of what these attitudes are. To this end, two surveys have been conducted within a reference environment to establish the attitudes of general users and technical staff, allowing the results to be fed back to HCE management to enable security policy to be appropriately defined. These results indicated that, although the establishment had participated in a European healthcare security initiative, staff attitudes and awareness were still weak in some areas.
45 CFR 164.312 - Technical safeguards.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 45 Public Welfare 1 2014-10-01 2014-10-01 false Technical safeguards. 164.312 Section 164.312 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health...
Computer Security Systems Enable Access.
ERIC Educational Resources Information Center
Riggen, Gary
1989-01-01
A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)
Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research
NASA Astrophysics Data System (ADS)
Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne
This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.
1989-08-01
Include in this plan the role of the Defense Technical Information Center (DTIC), the Defense Technology Security Administration ( DTSA ), and ODDR&E’s...DTIC = Defense Technical Information Center DTSA = Defense Technology Security Administration DUSD = Deputy Under Secretary of Defense Gloss. 2 DUSD...technologically sensitive requests. The Defense Technology Security Administi ation ( DTSA ) is developing a large system to track foreign military sales
Privacy and Security: A Bibliography.
ERIC Educational Resources Information Center
Computer and Business Equipment Manufacturers Association, Washington, DC.
Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…
Mense, Alexander; Hoheiser-Pförtner, Franz; Schmid, Martin; Wahl, Harald
2013-01-01
Working with health related data necessitates appropriate levels of security and privacy. Information security, meaning ensuring confidentiality, integrity, and availability, is more organizational, than technical in nature. It includes many organizational and management measures, is based on well-defined security roles, processes, and documents, and needs permanent adaption of security policies, continuously monitoring, and measures assessment. This big challenge for any organization leads to implementation of an information security management system (ISMS). In the context of establishing a regional or national electronic health record for integrated care (ICEHR), the situation is worse. Changing the medical information exchange from on-demand peer-to-peer connections to health information networks requires all organizations participating in the EHR system to have consistent security levels and to follow the same security guidelines and rules. Also, the implementation must be monitored and audited, establishing cross-organizational information security management systems (ISMS) based on international standards. This paper evaluates requirements and defines basic concepts for an ISO 27000 series-based cross-organizational ISMS in the healthcare domain and especially for the implementation of the nationwide electronic health record in Austria (ELGA).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Branch, Kristi M.; Baker, Kathryn A.
A technical letter report to the NRC summarizing the findings of a benchmarking study, literature review, and workshop with experts on current industry standards and expert judgments about needs for security during the construction phase of critical infrastructure facilities in the post-September 11 U.S. context, with a special focus on the construction phase of nuclear power plants and personnel security measures.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-28
... information as part of the research needed to write a NIST Special Publication (SP) to help Computer Security.... The NIST SP will identify technical standards, methodologies, procedures, and processes that facilitate prompt and effective response. This RFI requests information regarding technical best practices...
Teaching Context in Information Security
ERIC Educational Resources Information Center
Bishop, Matt
2006-01-01
This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer security must be made, we suggest questions and scenarios drawn from political science, history, as well as…
Sensing systems efficiency evaluation and comparison for homeland security and homeland defense
NASA Astrophysics Data System (ADS)
Pakhomov, Alexander A.
2010-04-01
Designers and consumers of various security, intelligence, surveillance and reconnaissance (ISR) systems as well as various unattended ground sensors pay most attention to their commonly used performance characteristics such as probability of a target detection and probability of a false alarm. These characteristics are used for systems comparison and evaluation. However, it is not enough for end-users of these systems as well as for their total/final effectiveness assessment. This article presents and discusses a system approach to an efficiency estimation of the security and ISR systems. Presented approach aims at final result of the system's function and use. It allows setting up reasonable technical and structural requirements for the security and ISR systems, to make trustworthy comparison and practical application planning of such systems. It also allows finding forward-looking, perspective ways of systems development. Presented results can be guidance to both designers and consumers.
Assessing security technology's impact: old tools for new problems.
Kreissl, Reinhard
2014-09-01
The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.
Bell, Elizabeth; Ijaz, Kashef; Bartee, Maureen; Fernandez, Jose; Burris, Hannah; Sliter, Karen; Nikkari, Simo; Chungong, Stella; Rodier, Guenael; Jafari, Hamid
2017-01-01
The Joint External Evaluation (JEE), a consolidation of the World Health Organization (WHO) International Health Regulations 2005 (IHR 2005) Monitoring and Evaluation Framework and the Global Health Security Agenda country assessment tool, is an objective, voluntary, independent peer-to-peer multisectoral assessment of a country’s health security preparedness and response capacity across 19 IHR technical areas. WHO approved the standardized JEE tool in February 2016. The JEE process is wholly transparent; countries request a JEE and are encouraged to make its findings public. Donors (e.g., member states, public and private partners, and other public health institutions) can support countries in addressing identified JEE gaps, and implementing country-led national action plans for health security. Through July 2017, 52 JEEs were completed, and 25 more countries were scheduled across WHO’s 6 regions. JEEs facilitate progress toward IHR 2005 implementation, thereby building trust and mutual accountability among countries to detect and respond to public health threats. PMID:29155678
Computer Security Incident Response Team Effectiveness: A Needs Assessment
Van der Kleij, Rick; Kleinhuis, Geert; Young, Heather
2017-01-01
Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security. CSIRTs often have to work on an ad hoc basis, in close cooperation with other teams, and in time constrained environments. It could be argued that under these working conditions CSIRTs would be likely to encounter problems. A needs assessment was done to see to which extent this argument holds true. We constructed an incident response needs model to assist in identifying areas that require improvement. We envisioned a model consisting of four assessment categories: Organization, Team, Individual and Instrumental. Central to this is the idea that both problems and needs can have an organizational, team, individual, or technical origin or a combination of these levels. To gather data we conducted a literature review. This resulted in a comprehensive list of challenges and needs that could hinder or improve, respectively, the performance of CSIRTs. Then, semi-structured in depth interviews were held with team coordinators and team members of five public and private sector Dutch CSIRTs to ground these findings in practice and to identify gaps between current and desired incident handling practices. This paper presents the findings of our needs assessment and ends with a discussion of potential solutions to problems with performance in incident response. PMID:29312051
Computer Security Incident Response Team Effectiveness: A Needs Assessment.
Van der Kleij, Rick; Kleinhuis, Geert; Young, Heather
2017-01-01
Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security. CSIRTs often have to work on an ad hoc basis, in close cooperation with other teams, and in time constrained environments. It could be argued that under these working conditions CSIRTs would be likely to encounter problems. A needs assessment was done to see to which extent this argument holds true. We constructed an incident response needs model to assist in identifying areas that require improvement. We envisioned a model consisting of four assessment categories: Organization, Team, Individual and Instrumental. Central to this is the idea that both problems and needs can have an organizational, team, individual, or technical origin or a combination of these levels. To gather data we conducted a literature review. This resulted in a comprehensive list of challenges and needs that could hinder or improve, respectively, the performance of CSIRTs. Then, semi-structured in depth interviews were held with team coordinators and team members of five public and private sector Dutch CSIRTs to ground these findings in practice and to identify gaps between current and desired incident handling practices. This paper presents the findings of our needs assessment and ends with a discussion of potential solutions to problems with performance in incident response.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Qojas, M.
1999-03-01
This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of themore » intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.« less
Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe
2017-01-01
Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in early age. Diagnosis relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology, and ophthalmology. To support clinicians, researchers, and public health decision makers, we developed an information system dedicated to ASD, called TEDIS. It was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured internet connections. TEDIS will be deployed in nine ASD expert assessment centers in Ile-DeFrance district. We present security policy and infrastructure developed in context of TEDIS to protect patient privacy and clinical information. TEDIS security policy was organized around governance, ethical and organisational chart-agreement, patients consents, controlled user access, patients' privacy protection, constrained patients' data access. Security infrastructure was enriched by further technical solutions to reinforce ASD patients' privacy protection. Solutions were tested on local secured intranet environment and showed fluid functionality with consistent, transparent and safe encrypting-decrypting results.
NASA Technical Reports Server (NTRS)
Zelkin, Natalie; Henriksen, Stephen
2011-01-01
This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed C-band (5091- to 5150-MHz) airport surface communication system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents an initial high-level safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the C-band communication system after the profile is finalized and system rollout timing is determined. A security risk assessment has been performed by NASA as a parallel activity. While safety analysis is concerned with a prevention of accidental errors and failures, the security threat analysis focuses on deliberate attacks. Both processes identify the events that affect operation of the system; and from a safety perspective the security threats may present safety risks.
Information Systems, Security, and Privacy.
ERIC Educational Resources Information Center
Ware, Willis H.
1984-01-01
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
Assessment of Pilot Needs for Shipboard Data and Informational Documents
1990-03-01
may differ from that shown on the poster due to environmental , hull and loading conditions. 3.3 Manoeuvring booklet (appendix 3) The manoeuvring...familiarize a broad cross-section of pilots with International Maritime Organization (IMO) proposals for pilot cards and wheelhouse posters and the...through the National Technical Informa- wheelhouse poster tion Service, Springfield, VA 22161 ship pilots. 19. Security Clasaif. (of this report) 20
Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wheeler, Timothy A.; Denman, Matthew R.; Williams, R. A.
Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities.more » iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.« less
Information Security Risk Assessment in Hospitals.
Ayatollahi, Haleh; Shagerdi, Ghazal
2017-01-01
To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. The aim of this study was to assess the risks threatening information security in the hospitals located in one of the northwest cities of Iran. This study was completed in 2014. The participants were information technology managers who worked in the hospitals (n=27). The research instrument was a questionnaire composed of a number of open and closed questions. The content validity of the questionnaire was confirmed, and the reliability of the closed questions was measured by using the test-retest method (r =0.78). The results showed that among the information security risks, fire found to be a high probability/high impact risk factor. Human and physical/environmental threats were among the low probability risk factors. Regarding the information security safeguards used in the hospitals, the results showed that the use of the technical safeguards was the most frequent one (n =22, 91.7%) compared to the administrative (n =21, 87.5%) and the physical safeguards (n =16, 66.7%). The high probability risk factors require quick corrective actions to be taken. Therefore, the underlying causes of such threats should be identified and controlled before experiencing adverse effects. It is also important to note that information security in health care systems needs to be considered at a macro level with respect to the national interests and policies.
75 FR 20817 - Information Systems Technical Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-21
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Information Systems Technical Advisory Committee Notice of Partially Closed Meeting The Information Systems Technical Advisory Committee (ISTAC... Administration on technical questions that affect the level of export controls applicable to information systems...
Sandia National Laboratories: National Security Missions: International
Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts
Information risk and security modeling
NASA Astrophysics Data System (ADS)
Zivic, Predrag
2005-03-01
This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-05
... DEPARTMENT OF LABOR Employee Benefits Security Administration 29 CFR Part 2520 Technical Revisions... Alternatives Under Pension Relief Act of 2010 AGENCY: Employee Benefits Security Administration, Labor. ACTION... 5500 Annual Return/Report of Employee Benefit Plan have been adopted in IRS Notice 2010-83 (2010-51 I.R...
Model-Driven Configuration of SELinux Policies
NASA Astrophysics Data System (ADS)
Agreiter, Berthold; Breu, Ruth
The need for access control in computer systems is inherent. However, the complexity to configure such systems is constantly increasing which affects the overall security of a system negatively. We think that it is important to define security requirements on a non-technical level while taking the application domain into respect in order to have a clear and separated view on security configuration (i.e. unblurred by technical details). On the other hand, security functionality has to be tightly integrated with the system and its development process in order to provide comprehensive means of enforcement. In this paper, we propose a systematic approach based on model-driven security configuration to leverage existing operating system security mechanisms (SELinux) for realising access control. We use UML models and develop a UML profile to satisfy these needs. Our goal is to exploit a comprehensive protection mechanism while rendering its security policy manageable by a domain specialist.
32 CFR 2001.1 - Purpose and scope.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...
32 CFR 2001.1 - Purpose and scope.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...
32 CFR 2001.1 - Purpose and scope.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...
32 CFR 2001.1 - Purpose and scope.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...
32 CFR 2001.1 - Purpose and scope.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...
Digital government and public health.
Fountain, Jane E
2004-10-01
Digital government is typically defined as the production and delivery of information and services inside government and between government and the public using a range of information and communication technologies. Two types of government relationships with other entities are government-to-citizen and government-to-government relationships. Both offer opportunities and challenges. Assessment of a public health agency's readiness for digital government includes examination of technical, managerial, and political capabilities. Public health agencies are especially challenged by a lack of funding for technical infrastructure and expertise, by privacy and security issues, and by lack of Internet access for low-income and marginalized populations. Public health agencies understand the difficulties of working across agencies and levels of government, but the development of new, integrated e-programs will require more than technical change - it will require a profound change in paradigm.
Execution of a self-directed risk assessment methodology to address HIPAA data security requirements
NASA Astrophysics Data System (ADS)
Coleman, Johnathan
2003-05-01
This paper analyzes the method and training of a self directed risk assessment methodology entitled OCTAVE (Operationally Critical Threat Asset and Vulnerability Evaluation) at over 170 DOD medical treatment facilities. It focuses specifically on how OCTAVE built interdisciplinary, inter-hierarchical consensus and enhanced local capabilities to perform Health Information Assurance. The Risk Assessment Methodology was developed by the Software Engineering Institute at Carnegie Mellon University as part of the Defense Health Information Assurance Program (DHIAP). The basis for its success is the combination of analysis of organizational practices and technological vulnerabilities. Together, these areas address the core implications behind the HIPAA Security Rule and can be used to develop Organizational Protection Strategies and Technological Mitigation Plans. A key component of OCTAVE is the inter-disciplinary composition of the analysis team (Patient Administration, IT staff and Clinician). It is this unique composition of analysis team members, along with organizational and technical analysis of business practices, assets and threats, which enables facilities to create sound and effective security policies. The Risk Assessment is conducted in-house, and therefore the process, results and knowledge remain within the organization, helping to build consensus in an environment of differing organizational and disciplinary perspectives on Health Information Assurance.
Output congestion leads to compromised care in Peruvian public hospital neonatal units.
Arrieta, Alejandro; Guillén, Jorge
2017-06-01
Peru is moving toward a universal health insurance system, and it is facing important challenges in the provision of public health services. As more citizens gain access to health insurance, the flow of patients exceeds the capacity of public hospitals to provide care with quality. In this study we explore the relationship between technical efficiency and patient safety events in neonatal care units of Peru's public hospitals. We use Data Envelope Analysis (DEA) with output congestion to assess the association between technical efficiency and patient safety events. We study 35 neonatal care units of public hospitals in Peru's Social Security Health System, and identify two undesirable (risk-adjusted) safety outcomes: neonatal mortality and near-miss neonatal mortality. We found that for about half of hospital's neonatal care units, technical efficiency is affected by output congestion. For those hospitals, patient safety is being compromised by receiving too many patients. Our results are consistent with public reports indicating that hospitals in the Peru's Social Security Health System are overcrowded, affecting efficiency and jeopardizing quality of care. We found that most congested hospitals are located in the capital city and suburban areas, and are more likely to be hospitals with the lowest and the highest level of care. Our results call for improvements in the patient referral system and capacity expansion.
The informatics capability maturity of integrated primary care centres in Australia.
Liaw, Siaw-Teng; Kearns, Rachael; Taggart, Jane; Frank, Oliver; Lane, Riki; Tam, Michael; Dennis, Sarah; Walker, Christine; Russell, Grant; Harris, Mark
2017-09-01
Integrated primary care requires systems and service integration along with financial incentives to promote downward substitution to a single entry point to care. Integrated Primary Care Centres (IPCCs) aim to improve integration by co-location of health services. The Informatics Capability Maturity (ICM) describes how well health organisations collect, manage and share information; manage eHealth technology, implementation, change, data quality and governance; and use "intelligence" to improve care. Describe associations of ICM with systems and service integration in IPCCs. Mixed methods evaluation of IPCCs in metropolitan and rural Australia: an enhanced general practice, four GP Super Clinics, a "HealthOne" (private-public partnership) and a Community Health Centre. Data collection methods included self-assessed ICM, document review, interviews, observations in practice and assessment of electronic health record data. Data was analysed and compared across IPCCs. The IPCCs demonstrated a range of funding models, ownership, leadership, organisation and ICM. Digital tools were used with varying effectiveness to collect, use and share data. Connectivity was problematic, requiring "work-arounds" to communicate and share information. The lack of technical, data and software interoperability standards, clinical coding and secure messaging were barriers to data collection, integration and sharing. Strong leadership and governance was important for successful implementation of robust and secure eHealth systems. Patient engagement with eHealth tools was suboptimal. ICM is positively associated with integration of data, systems and care. Improved ICM requires a health workforce with eHealth competencies; technical, semantic and software standards; adequate privacy and security; and good governance and leadership. Copyright © 2017 Elsevier B.V. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eto, Joseph H.; Parashar, Manu; Lewis, Nancy Jo
The Real Time System Operations (RTSO) 2006-2007 project focused on two parallel technical tasks: (1) Real-Time Applications of Phasors for Monitoring, Alarming and Control; and (2) Real-Time Voltage Security Assessment (RTVSA) Prototype Tool. The overall goal of the phasor applications project was to accelerate adoption and foster greater use of new, more accurate, time-synchronized phasor measurements by conducting research and prototyping applications on California ISO's phasor platform - Real-Time Dynamics Monitoring System (RTDMS) -- that provide previously unavailable information on the dynamic stability of the grid. Feasibility assessment studies were conducted on potential application of this technology for small-signal stabilitymore » monitoring, validating/improving existing stability nomograms, conducting frequency response analysis, and obtaining real-time sensitivity information on key metrics to assess grid stress. Based on study findings, prototype applications for real-time visualization and alarming, small-signal stability monitoring, measurement based sensitivity analysis and frequency response assessment were developed, factory- and field-tested at the California ISO and at BPA. The goal of the RTVSA project was to provide California ISO with a prototype voltage security assessment tool that runs in real time within California ISO?s new reliability and congestion management system. CERTS conducted a technical assessment of appropriate algorithms, developed a prototype incorporating state-of-art algorithms (such as the continuation power flow, direct method, boundary orbiting method, and hyperplanes) into a framework most suitable for an operations environment. Based on study findings, a functional specification was prepared, which the California ISO has since used to procure a production-quality tool that is now a part of a suite of advanced computational tools that is used by California ISO for reliability and congestion management.« less
DOT National Transportation Integrated Search
2000-05-01
The member countries of the Organization of American States (OAS) have recognized that a coordinated multilateral approach to improving port security in the Western Hemisphere is needed and has established a Technical Advisory Group on Port Security ...
7 CFR 274.8 - Functional and technical EBT system requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...
7 CFR 274.8 - Functional and technical EBT system requirements.
Code of Federal Regulations, 2011 CFR
2011-01-01
... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...
7 CFR 274.8 - Functional and technical EBT system requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...
7 CFR 274.8 - Functional and technical EBT system requirements.
Code of Federal Regulations, 2013 CFR
2013-01-01
... card is deactivated; (C) Communications network security that utilizes the Data Encryption Standard... PIN and/or PIN offset, to ensure data security during electronic transmission. Any of the network... household data and providing benefit and data security; (x) Inventorying and securing accountable documents...
ERIC Educational Resources Information Center
Edu, Chukwuma Nwofe; Ogba, Ernest Ituma
2016-01-01
The study identifies technical training skills needs of youth for sustainable job security in rice production in Ebonyi State, Nigeria. This study was carried out in secondary schools in three educational zones in Ebonyi State, Nigeria. Ebonyi state is one of the states in the southeast geopolitical zone in Nigeria. Descriptive survey design was…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-06
..., Inc. To Make a Technical Adjustment to Its Rules To Allow Sub-Penny Quoting of Certain Securities... adjustment to its rules to allow sub-penny quoting of certain securities priced less than $1.00. The text of... to make a technical adjustment its rules to allow sub-penny quoting of Investment Company Units...
2004-06-01
Viewpoint Component Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business...security concern, when applied to the different viewpoints, addresses both stakeholders, and is described as a business security model or component...Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business Stakeholder IT Architect
44 CFR 300.2 - Technical assistance.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Technical assistance. 300.2... HOMELAND SECURITY PREPAREDNESS DISASTER PREPAREDNESS ASSISTANCE § 300.2 Technical assistance. Requests for technical assistance under section 201(b) of the Act shall be made by the Governor or his/her designated...
Cyber Security and Resilient Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson
2009-07-01
The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.« less
Security Assessment Simulation Toolkit (SAST) Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.
2009-11-15
The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSDmore » NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.« less
78 FR 65689 - Technical Mapping Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-01
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2013-0039] Technical Mapping Advisory Council AGENCY: Federal Emergency Management Agency, DHS. ACTION: Committee Management; Request for Applicants for Appointment to the Federal Emergency Management Agency's Technical...
78 FR 70569 - Technical Mapping Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-26
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0039] Technical Mapping Advisory Council AGENCY: Federal Emergency Management Agency, DHS. ACTION: Notice... Technical Mapping Advisory Council (TMAC). The notice incorrectly stated that contractors and potential...
22 CFR 125.3 - Exports of classified technical data and classified defense articles.
Code of Federal Regulations, 2010 CFR
2010-04-01
... in the Department of Defense National Industrial Security Program Operating Manual (unless such.... It should also list the facility security clearance code of all U.S. parties on the license and include the Defense Security Service cognizant security office of the party responsible for packaging the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-30
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 230 and 270 [Release No. 33-9503; IC-30845...; Applications Regarding Joint Enterprises or Arrangements and Certain Profit-Sharing Plans AGENCY: Securities and Exchange Commission. ACTION: Final rule; technical amendments. SUMMARY: The Securities and...
Exploring Factors That Affect Adoption of Computer Security Practices among College Students
ERIC Educational Resources Information Center
Alqarni, Amani
2017-01-01
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Information Security Risk Assessment in Hospitals
Ayatollahi, Haleh; Shagerdi, Ghazal
2017-01-01
Background: To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. Objective: The aim of this study was to assess the risks threatening information security in the hospitals located in one of the northwest cities of Iran. Method: This study was completed in 2014. The participants were information technology managers who worked in the hospitals (n=27). The research instrument was a questionnaire composed of a number of open and closed questions. The content validity of the questionnaire was confirmed, and the reliability of the closed questions was measured by using the test-retest method (r =0.78). Results: The results showed that among the information security risks, fire found to be a high probability/high impact risk factor. Human and physical/environmental threats were among the low probability risk factors. Regarding the information security safeguards used in the hospitals, the results showed that the use of the technical safeguards was the most frequent one (n =22, 91.7%) compared to the administrative (n =21, 87.5%) and the physical safeguards (n =16, 66.7%). Conclusion: The high probability risk factors require quick corrective actions to be taken. Therefore, the underlying causes of such threats should be identified and controlled before experiencing adverse effects. It is also important to note that information security in health care systems needs to be considered at a macro level with respect to the national interests and policies. PMID:29204226
76 FR 38608 - Sensors and Instrumentation Technical Advisory Committee;
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-01
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... of export controls applicable to sensors and instrumentation equipment and technology. Agenda Public...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-14
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... of export controls applicable to sensors [[Page 20949
77 FR 64464 - Information Systems Technical Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-22
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Information Systems Technical Advisory Committee Notice of Partially Closed Meeting The Information Systems Technical Advisory Committee (ISTAC... of export controls applicable to information systems equipment and technology. Wednesday, November 7...
The Current State and TRL Assessment of Unattended and Left-Behind Object Detection Technology
2014-09-01
for Security Science, in partnership with Public Safety Canada. Led by Canada Border Services Agency partners included: Royal Canadian Mounted...Queen in Right of Canada, as represented by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée...methodology established in previous technical challenges that were put in place during international conferences. Keywords: video-surveillance
e-Assessment in a Limited-Resources Dental School Using an Open-Source Learning Management System.
El Tantawi, Maha M A; Abdelsalam, Maha M; Mourady, Ahmed M; Elrifae, Ismail M B
2015-05-01
e-Assessment provides solutions to some problems encountered in dental students' evaluation. The aim of this study was to evaluate the experience of a limited-resources dental school with e-assessment provided through an open-source learning management system (LMS). Data about users' access and types of e-assessment activities at the Faculty of Dentistry, Alexandria University, Egypt, were obtained from the web-based LMS Moodle. A questionnaire developed to assess students' perceptions of the e-assessment was also sent to students registered in two courses (undergraduate and postgraduate) with the same instructor. The results showed that most e-courses at the school had one form of e-assessment (82%) and, of these, 16.7% had summative assessment activities. There were significant differences among departments in the number of e-courses with e-assessment. One-quarter of e-courses with e-assessment used Moodle quizzes. Of 285 students registered in the two courses that included the questionnaire, 170 responded (response rate=59.6%). The responding students positively perceived the impact of e-assessment on learning and its reliability and security, whereas technical issues and related stresses were negatively perceived. This study suggests that e-assessment can be used at minimal cost in dental schools with limited resources and large class sizes with the least demands on faculty members and teaching staff time. For these schools, an open-source LMS such as Moodle provides formative e-assessment not available otherwise and accommodates various question formats and varying levels of instructors' technical skills. These students seemed to have a positive impression of the e-assessment although technical problems and related stresses are issues that need to be addressed.
Congenital rubella syndrome surveillance in Honduras.
Molina, Ida Berenice; Mendoza, Lourdes Otilia; Palma, María Aparicia
2011-09-01
Congenital rubella syndrome (CRS) surveillance was established in Honduras to determine the scope of the problem and assess the impact of vaccination. Implementation of the surveillance system required the drafting of national CRS epidemiological surveillance guidelines, the development of a laboratory diagnostic method, and training of physicians, nurses, and microbiologists in the Honduran hospital network and social security system on CRS surveillance guidelines. Honduras' experience with the surveillance of other vaccine-preventable diseases facilitated the implementation of hospital-based CRS surveillance. The surveillance system operates in 23 of the 25 public hospitals that offer services to children and at 2 social security hospitals; the private sector has not been integrated into this system. Clinical and technical staff, including representatives from various disciplines such as pediatrics, neonatology, general medicine, epidemiology, nursing, and microbiology, participate in the hospital network, as well as follow up on cases in accordance with the standardized guidelines, depending on their areas of expertise. Implementation of the CRS surveillance system requires technical guidelines, laboratory diagnostic capacity, and trained multidisciplinary human resources for its systematization and operation.
76 FR 72902 - Materials Processing Equipment Technical Advisory Committee;
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-28
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Processing Equipment Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Processing Equipment Technical... questions that affect the level of export controls applicable to materials processing equipment and related...
Privacy and security compliance in the E-healthcare marketplace.
Lutes, M
2000-03-01
Complying with security and privacy regulations proposed by HHS in response to the Health Insurance Portability and Accountability Act (HIPAA) will require healthcare managers to address both internal and external business interactions and initiatives. The proposed regulations mandate certain procedures regarding administration, physical safeguards, technical security for data integrity and confidentiality, and technical security against unauthorized access. In particular, the proposed regulations require organizations to contractually ensure that vendors adhere to the regulations. Healthcare organizations also must implement training procedures for staff members who have contact with protected health information and designate a privacy officer to guard against improper disclosure of such information. Documented policies for organizational decision making are vital to an organization's efforts to implement procedures for compliance with the regulations.
Application of DNA Profiling in Resolving Aviation Forensic Toxicology Issues
2009-10-01
National Technical Information Service, Springfield, VA 22161 19. Security Classif. (of this report) 20. Security Classif. (of this page) 21 ...J,. Schumm. JW ..Development. of. highly. polymorphic.pentanucleotide.tandem.repeat.loci. with.low.stutter ..Profiles in DNA ..1998;2:3–6 . 21 ... PowerPlex ™ 16 System, Technical Manual No. D012 ..Madison,.WI:.Promega.Cor- poration;. 2000. (Available. at:. www .cstl .nist .gov/ strbase/images
Specifying Skill-Based Training Strategies and Devices: A Model Description
1990-06-01
Technical Report 897 Specifying Skill-Based Training N Strategies and Devices: A Model Description I Paui J. Sticha and Mark Schlager Human Resources...unlimied 90 ’ Technical Report 897 Specifying Skill-Based Training Strategies and Devices: A Model Description Paul J. Sticha and Mark Schlager Human...SECURITY CLASSIFICATION OF THIS PAGE Form Approved REPORT DOCUMENTATION PAGE FMNo o7 ote la. REPORT SECURITY CLASSIFICATION lb. RESTRICTWE MARKINGS
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-25
... securities. Corporate debt securities are fixed-income securities issued by businesses to finance their... fundamental factors such as sales, earnings and cash flow growth; valuation factors such as price/earnings... fundamentals, valuation and technical factors, the security's relative valuation and other qualitative factors...
Securing medical research: a cybersecurity point of view.
Schneier, Bruce
2012-06-22
The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work.
Computer and Network Security in Small Libraries: A Guide for Planning.
ERIC Educational Resources Information Center
Williams, Robert L.
This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…
Beyond a series of security nets: Applying STAMP & STPA to port security
Williams, Adam D.
2015-11-17
Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less
Beyond a series of security nets: Applying STAMP & STPA to port security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Williams, Adam D.
Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less
32 CFR 2001.51 - Technical security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Surveillance Countermeasures and TEMPEST necessary to detect or deter exploitation of classified information..., TEMPEST Countermeasures for Facilities, and SPB Issuance 6-97, National Policy on Technical Surveillance...
32 CFR 2001.51 - Technical security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Surveillance Countermeasures and TEMPEST necessary to detect or deter exploitation of classified information..., TEMPEST Countermeasures for Facilities, and SPB Issuance 6-97, National Policy on Technical Surveillance...
32 CFR 2001.51 - Technical security.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Surveillance Countermeasures and TEMPEST necessary to detect or deter exploitation of classified information..., TEMPEST Countermeasures for Facilities, and SPB Issuance 6-97, National Policy on Technical Surveillance...
32 CFR 2001.51 - Technical security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Surveillance Countermeasures and TEMPEST necessary to detect or deter exploitation of classified information..., TEMPEST Countermeasures for Facilities, and SPB Issuance 6-97, National Policy on Technical Surveillance...
32 CFR 2001.51 - Technical security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Surveillance Countermeasures and TEMPEST necessary to detect or deter exploitation of classified information..., TEMPEST Countermeasures for Facilities, and SPB Issuance 6-97, National Policy on Technical Surveillance...
75 FR 33682 - Export Administration Regulations; Technical Amendments
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-15
...-01] RIN 0694-AE93 Export Administration Regulations; Technical Amendments AGENCY: Bureau of Industry... Bureau of Industry and Security (BIS) makes a technical amendment to the Export Administration... review of final decisions and orders issued in BIS export control administrative enforcement proceedings...
76 FR 39845 - Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-07
... export controls applicable to information systems equipment and technology. Wednesday, July 27 Public... DEPARTMENT OF COMMERCE Bureau of Industry and Security Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting The Information Systems Technical Advisory Committee (ISTAC...
78 FR 63162 - Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-23
... of export controls applicable to information systems equipment and technology. Wednesday, November 6... DEPARTMENT OF COMMERCE Bureau of Industry and Security Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting The Information Systems Technical Advisory Committee (ISTAC...
75 FR 64258 - Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-19
... export controls applicable to information systems equipment and technology. Wednesday, November 3 Public... DEPARTMENT OF COMMERCE Bureau of Industry and Security Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting The Information Systems Technical Advisory Committee (ISTAC...
78 FR 42753 - Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-17
... of export controls applicable to information systems equipment and technology. Wednesday, July 31... DEPARTMENT OF COMMERCE Bureau of Industry and Security Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting The Information Systems Technical Advisory Committee (ISTAC...
2000-01-24
Security Administration ( DTSA ). d. Reporting requirements (1) General. Army organizations with security assistance responsibility for ad- ministering...by the Department of State (DOS) and the Director, Defense Technology Security Administration ( DTSA ). The term “munitions case” includes in its scope...also formulate the Army position for ARSTAF coordination before responding to Defense Technology Security Agency ( DTSA ). AR 12-1 • 24 January 2000
2007-05-01
business processes and services. 4. Security operations management addresses the day-to-day activities that the organization performs to protect the...Management TM – Technology Management Security Operations Management SOM – Security Operations Management 5.7.2 Important Operations Competency...deals with the provision of access rights to informa- tion and technical assets SOM – Security Operations Management , which addresses the fundamental
Pacific Operational Science and Technology Conference
2008-07-17
AOR • Think long term-ten to fifty years • Technology assessment • Systems thinking and interaction • Capitalize on technology futures – Renewable ... Renewable energy • Improved mobility • Transportation security • National competitiveness 24 Managed by UT-Battelle for the Department of Energy...Started Cost Schedule Technical TTA CB-034 Tools and Protocols for Agro Screening Ag Screening Tools 500 4,138 3,500 2,500 2,525 3,163 N CB-011 CB-042 Ag
2009-07-08
meters; noisy urban daytime 70 – 80 Shouting at one meter; vacuum cleaner at three meters Gas lawnmower at 30 meters 60 – 70 Normal speech at one...military and political leaders during the Cold War. Since the National Aeronautics and Space Administration ( NASA ) was established in 1958, the...Preservation Needs with the Operation of Highly Technical or Scientific Facilities, specifically refers to the many active NASA and U.S. Air Force
1998-05-01
distribution limitations recommended if public release is not approved. The ASD(PA) shall also process appeals when public release denial is based upon...Rules of Evidence, and all other applicable laws. An interlocutory appeal by the United States shall lie from a decision or order of a district court... limitations ; document markings; document preparation; scientific and technical information; STINFO; information security; security training
CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 3, March 2007
2007-03-01
Capability Maturity Model ® Integration (CMMI®). CMU Software Engineering Institute <www.sei.cmu.edu/cmmi>. 5. ISO /IEC 27001 :2005. Information Security...international standards bodies – International Organization for Standardi- zation ( ISO ) and International Electro- technical Commission (IEC) – are working on a...number of projects that affect soft- ware security: • The ISO Technical Management Board (TMB) performs strategic planning and coordination for ISO
2008-07-28
continue to be beyond our technical ability to realize aggresively pursue advanced technical solutions to stay at the leading edge of technological...inherent to each caf Way and to seek continual improvement through exploration of innovative concepts, advanced capabilities, game -changing...available online at the air force portal: https://wwwd.my.af.mil/afknprod/strat_plan COMBAT AIR FORCE STRATEGIC PLAN Points of Contact securing the high
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2012 CFR
2012-01-01
... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2013 CFR
2013-01-01
... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) A cyber security plan in accordance with the criteria set forth in § 73.54 of this chapter; (iv) A... cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan, shall protect the plans and...
10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.
Code of Federal Regulations, 2014 CFR
2014-01-01
... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...
ERIC Educational Resources Information Center
Johnson, David P.
2017-01-01
The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-06
... questions that affect the level of export controls applicable to materials processing equipment and related... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Processing Equipment; Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Processing Equipment Technical...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-28
... questions that affect the level of export controls applicable to materials processing equipment and related... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Processing Equipment Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Processing Equipment Technical...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-28
... questions that affect the level of export controls applicable to materials processing equipment and related... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Processing Equipment Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Processing Equipment Technical...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-31
... questions that affect the level of export controls applicable to materials processing equipment and related... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Processing Equipment Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Processing Equipment Technical...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-14
... that affect the level of export controls applicable to materials processing equipment and related... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Processing Equipment Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Processing Equipment Technical...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-19
... questions that affect the level of export controls applicable to materials processing equipment and related... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Processing Equipment Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Processing Equipment Technical...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-24
... questions that affect the level of export controls applicable to materials processing equipment and related... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Processing Equipment Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Processing Equipment Technical...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... questions that affect the level of export controls applicable to materials processing equipment and related... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Processing Equipment Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Processing Equipment Technical...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-17
... questions that affect the level of export controls applicable to materials processing equipment and related... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Processing Equipment Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Processing Equipment Technical...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-19
... questions that affect the level of export controls applicable to materials processing equipment and related... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Processing Equipment; Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Processing Equipment Technical...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-23
... questions that affect the level of export controls applicable to materials processing equipment and related... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Processing Equipment Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Processing Equipment Technical...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-04
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... level of export controls applicable to sensors and instrumentation equipment and technology. Agenda...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-11
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... level of export controls applicable to sensors and instrumentation equipment and technology. Agenda...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-13
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... level of export controls applicable to sensors and instrumentation equipment and technology. Agenda...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-02
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... level of export controls applicable to sensors and instrumentation equipment and technology. Agenda...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-11
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... level of export controls applicable to sensors and instrumentation equipment and technology. Agenda...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-18
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... of export controls applicable to sensors and instrumentation equipment and technology. Agenda Public...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-25
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... of export controls applicable to sensors and instrumentation equipment and technology. Agenda Public...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-08
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... level of export controls applicable to sensors and instrumentation equipment and technology. Agenda...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-01
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... level of export controls applicable to sensors and instrumentation equipment and technology. [[Page...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-22
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... of export controls applicable to sensors and instrumentation equipment and technology. Agenda Public...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-12
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... level of export controls applicable to sensors and instrumentation equipment and technology. Agenda...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... the level of export controls applicable to sensors and instrumentation equipment and technology...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-13
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... of export controls applicable to sensors and instrumentation equipment and technology. Agenda Public...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-03
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors And Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting The Sensors and Instrumentation Technical Advisory... of export controls applicable to sensors and instrumentation equipment and technology. Agenda Public...
77 FR 37652 - Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-22
... that affect the level of export controls applicable to information systems equipment and technology... DEPARTMENT OF COMMERCE Bureau of Industry and Security Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting The Information Systems Technical Advisory Committee (ISTAC...
46 CFR 163.002-3 - Applicable technical regulations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 6 2010-10-01 2010-10-01 false Applicable technical regulations. 163.002-3 Section 163.002-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL CONSTRUCTION Pilot Hoist § 163.002-3 Applicable technical regulations...
43 CFR 2.51 - Assuring integrity of records.
Code of Federal Regulations, 2011 CFR
2011-10-01
... on those recommended in the National Bureau of Standard's booklet “Computer Security Guidelines for..., technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in...
43 CFR 2.51 - Assuring integrity of records.
Code of Federal Regulations, 2010 CFR
2010-10-01
... on those recommended in the National Bureau of Standard's booklet “Computer Security Guidelines for..., technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in...
43 CFR 2.51 - Assuring integrity of records.
Code of Federal Regulations, 2012 CFR
2012-10-01
... on those recommended in the National Bureau of Standard's booklet “Computer Security Guidelines for..., technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in...
43 CFR 2.226 - Assuring integrity of records.
Code of Federal Regulations, 2014 CFR
2014-10-01
... on those recommended in the National Bureau of Standard's booklet “Computer Security Guidelines for..., technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in...
43 CFR 2.226 - Assuring integrity of records.
Code of Federal Regulations, 2013 CFR
2013-10-01
... on those recommended in the National Bureau of Standard's booklet “Computer Security Guidelines for..., technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in...
Minimum Requirements for Taxicab Security Cameras.
Zeng, Shengke; Amandus, Harlan E; Amendola, Alfred A; Newbraugh, Bradley H; Cantis, Douglas M; Weaver, Darlene
2014-07-01
The homicide rate of taxicab-industry is 20 times greater than that of all workers. A NIOSH study showed that cities with taxicab-security cameras experienced significant reduction in taxicab driver homicides. Minimum technical requirements and a standard test protocol for taxicab-security cameras for effective taxicab-facial identification were determined. The study took more than 10,000 photographs of human-face charts in a simulated-taxicab with various photographic resolutions, dynamic ranges, lens-distortions, and motion-blurs in various light and cab-seat conditions. Thirteen volunteer photograph-evaluators evaluated these face photographs and voted for the minimum technical requirements for taxicab-security cameras. Five worst-case scenario photographic image quality thresholds were suggested: the resolution of XGA-format, highlight-dynamic-range of 1 EV, twilight-dynamic-range of 3.3 EV, lens-distortion of 30%, and shutter-speed of 1/30 second. These minimum requirements will help taxicab regulators and fleets to identify effective taxicab-security cameras, and help taxicab-security camera manufacturers to improve the camera facial identification capability.
Verma, Mahendra K.; Warwick, Peter D.
2011-01-01
The Energy Independence and Security Act of 2007 (Public Law 110-140) authorized the U.S. Geological Survey (USGS) to conduct a national assessment of geologic storage resources for carbon dioxide (CO2) and requested that the USGS estimate the "potential volumes of oil and gas recoverable by injection and sequestration of industrial carbon dioxide in potential sequestration formations" (121 Stat. 1711). The USGS developed a noneconomic, probability-based methodology to assess the Nation's technically assessable geologic storage resources available for sequestration of CO2 (Brennan and others, 2010) and is currently using the methodology to assess the Nation's CO2 geologic storage resources. Because the USGS has not developed a methodology to assess the potential volumes of technically recoverable hydrocarbons that could be produced by injection and sequestration of CO2, the Geologic Carbon Sequestration project initiated an effort in 2010 to develop a methodology for the assessment of the technically recoverable hydrocarbon potential in the sedimentary basins of the United States using enhanced oil recovery (EOR) techniques with CO2 (CO2-EOR). In collaboration with Stanford University, the USGS hosted a 2-day CO2-EOR workshop in May 2011, attended by 28 experts from academia, natural resource agencies and laboratories of the Federal Government, State and international geologic surveys, and representatives from the oil and gas industry. The geologic and the reservoir engineering and operations working groups formed during the workshop discussed various aspects of geology, reservoir engineering, and operations to make recommendations for the methodology.
Reviews of the Comprehensive Nuclear-Test-Ban Treaty and U.S. security
NASA Astrophysics Data System (ADS)
Jeanloz, Raymond
2017-11-01
Reviews of the Comprehensive Nuclear-Test-Ban Treaty (CTBT) by the National Academy of Sciences concluded that the United States has the technical expertise and physical means to i) maintain a safe, secure and reliable nuclear-weapons stockpile without nuclear-explosion testing, and ii) effectively monitor global compliance once the Treaty enters into force. Moreover, the CTBT is judged to help constrain proliferation of nuclear-weapons technology, so it is considered favorable to U.S. security. Review of developments since the studies were published, in 2002 and 2012, show that the study conclusions remain valid and that technical capabilities are better than anticipated.
76 FR 3612 - Materials Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-20
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Technical Advisory Committee will meet on February 10... materials and related technology. Agenda Open Session 1. Opening Remarks and Introduction. 2. Remarks from...
75 FR 22553 - Materials Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-29
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Technical Advisory Committee will meet on May 13, 2010... applicable to materials and related technology. Agenda Open Session 1. Opening Remarks and Introduction. 2...
75 FR 67347 - Materials Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-02
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Technical Advisory Committee will meet on November 12... materials and related technology. Agenda Open Session 1. Opening remarks by the Chairman and Introduction. 2...
77 FR 25960 - Materials Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Technical Advisory Committee will meet on May 17, 2012... materials and related technology. Agenda Open Session 1. Opening remarks and introductions. 2. Remarks from...
75 FR 44227 - Materials Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-28
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Technical Advisory Committee will meet on August 12... applicable to materials and related technology. Agenda Open Session 1. Opening Remarks and Introduction. 2...
77 FR 3440 - Materials Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-24
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Technical Advisory Committee will meet on February 9... materials and related technology. Agenda Open Session: 1. Opening Remarks and Introductions. 2. Remarks from...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2011 CFR
2011-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2013 CFR
2013-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2012 CFR
2012-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which...
25 CFR 43.22 - Assuring integrity of records.
Code of Federal Regulations, 2014 CFR
2014-04-01
..., “Computer Security Guidelines for Implementing the Privacy Act of 1974” (May 30, 1975), and any supplements... with appropriate administrative, technical and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or...
New Frameworks for Detecting and Minimizing Information Leakage in Anonymized Network Data
2011-10-01
researcher the exact extent to which a particular utility is affected by the anonymization. For instance, Karr et al.’s use of the Kullback - Leibler ...technical, legal, policy, and privacy issues limit the ability of operators to produce data sets for information security testing . In an effort to...technical, legal, policy, and privacy issues limit the ability of operators to produce datasets for information security testing . In an effort to help
A data protection scheme for a remote vital signs monitoring healthcare service.
Gritzalis, D; Lambrinoudakis, C
2000-01-01
Personal and medical data processed by Healthcare Information Systems must be protected against unauthorized access, modification and withholding. Security measures should be selected to provide the required level of protection in a cost-efficient manner. This is only feasible if specific characteristics of the information system are examined on a basis of a risk analysis methodology. This paper presents the results of a risk analysis, based on the CRAMM methodology, for a healthcare organization offering a patient home-monitoring service through the transmission of vital signs, focusing on the identified security needs and the proposed countermeasures. The architectural and functional models of this service were utilized for identifying and valuating the system assets, the associated threats and vulnerabilities, as well as for assessing the impact on the patients and on the service provider, should the security of any of these assets is affected. A set of adequate organizational, administrative and technical countermeasures is described for the remote vital signs monitoring service, thus providing the healthcare organization with a data protection framework that can be utilized for the development of its own security plan.
78 FR 1198 - Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-08
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting The Information Systems Technical Advisory Committee (ISTAC) will meet on January 23 and 24, 2013, 9:00 a.m., at Qualcomm Incorporated, 5775 Morehouse Drive...
77 FR 1666 - Information Systems, Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-11
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Information Systems, Technical Advisory Committee; Notice of Partially Closed Meeting The Information Systems Technical Advisory Committee (ISTAC) will meet on January 25 and 26, 2012, 9 a.m., at Qualcomm Incorporated, 5775 Morehouse Drive, Building...
19 CFR 115.30 - Technical requirements for containers by design type.
Code of Federal Regulations, 2011 CFR
2011-04-01
... SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO INTERNATIONAL CUSTOMS CONVENTIONS Procedures for Approval of Containers by Design Type § 115.30 Technical... 19 Customs Duties 1 2011-04-01 2011-04-01 false Technical requirements for containers by design...
19 CFR 115.30 - Technical requirements for containers by design type.
Code of Federal Regulations, 2012 CFR
2012-04-01
... SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO INTERNATIONAL CUSTOMS CONVENTIONS Procedures for Approval of Containers by Design Type § 115.30 Technical... 19 Customs Duties 1 2012-04-01 2012-04-01 false Technical requirements for containers by design...
19 CFR 115.30 - Technical requirements for containers by design type.
Code of Federal Regulations, 2014 CFR
2014-04-01
... SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO INTERNATIONAL CUSTOMS CONVENTIONS Procedures for Approval of Containers by Design Type § 115.30 Technical... 19 Customs Duties 1 2014-04-01 2014-04-01 false Technical requirements for containers by design...
19 CFR 115.30 - Technical requirements for containers by design type.
Code of Federal Regulations, 2010 CFR
2010-04-01
... SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO INTERNATIONAL CUSTOMS CONVENTIONS Procedures for Approval of Containers by Design Type § 115.30 Technical... 19 Customs Duties 1 2010-04-01 2010-04-01 false Technical requirements for containers by design...
19 CFR 115.30 - Technical requirements for containers by design type.
Code of Federal Regulations, 2013 CFR
2013-04-01
... SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO INTERNATIONAL CUSTOMS CONVENTIONS Procedures for Approval of Containers by Design Type § 115.30 Technical... 19 Customs Duties 1 2013-04-01 2013-04-01 false Technical requirements for containers by design...
76 FR 21331 - Materials Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-15
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Materials Technical Advisory Committee; Notice of Partially Closed Meeting The Materials Technical Advisory Committee will meet on May 12, 2011... materials and related technology. Agenda Open Session 1. Opening Remarks by the Chairman and Introduction. 2...
ERIC Educational Resources Information Center
Schaffhauser, Dian
2009-01-01
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-30
... decisions. Data elements with respect to the SHORT subscription service that would be provided through the... information about technical data elements to support transmission and data-integrity processes between the... Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities [[Page...
Security Controls Hurt Research, NAS Warns.
ERIC Educational Resources Information Center
Kolata, Gina
1982-01-01
A National Academy of Sciences (NAS) report found no evidence that leaks of technical information from universities or other research centers have damaged national security. However, in areas where control is warranted, decisions should be based on criteria. These criteria and issues related to security control and technological transfer are…
ERIC Educational Resources Information Center
Sedlack, Derek J.
2012-01-01
A critical overreliance on the technical dimension of information security has recently shifted toward more robust, organizationally focused information security methods to countermand $54 billion lost from computer security incidents. Developing a more balanced approach is required since protecting information is not an all or nothing…
36 CFR 1202.30 - How does NARA safeguard its systems of records?
Code of Federal Regulations, 2012 CFR
2012-07-01
... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...
36 CFR 1202.30 - How does NARA safeguard its systems of records?
Code of Federal Regulations, 2011 CFR
2011-07-01
... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...
36 CFR 1202.30 - How does NARA safeguard its systems of records?
Code of Federal Regulations, 2010 CFR
2010-07-01
... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...
36 CFR 1202.30 - How does NARA safeguard its systems of records?
Code of Federal Regulations, 2014 CFR
2014-07-01
... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...
Network Security: What Non-Technical Administrators Must Know
ERIC Educational Resources Information Center
Council, Chip
2005-01-01
Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…
Development of a Multifuel Individual/Squad Stove
1990-02-01
1 . Final Letter Report, Fix Verification Test of the MISS, U.S. Army CRTC , April 1989. m. Health Hazard Assessment, 4 April 1989, enclosed. n...CIVIL, 1 \\48ABIpPTR TECHNICAL REPORT __...__AD _ NATICK/TR-90/020 ceq DEVELOPMENT OF A00 O MULTIFUEL o INDIVIDUAL/SQUAD STOVE N I O BY DONALD W...NUMBERS PROGRAM PROJECT ITASK ~ WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. D5i48 24 1 146 TITLE (Include Security Classification) D 2 Development of a
Security system signal supervision
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chritton, M.R.; Matter, J.C.
1991-09-01
This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.
Grelier, S; Thetio, M; Quentin, V; Achache, V; Sanchez, N; Leroux, V; Durand, E; Pequignot, R
2011-03-01
The National Hospital of Saint Maurice (HNSM) for Physical Medicine and Rehabilitation aims at strengthening its position as a pivot rehabilitation and physical therapy center. The opening in 2011 of a new unit for the evaluation and treatment of motor disabilities meets this objective. This project includes several parts: clinical, financial, architectural, organizational, applied clinical research as well as dealing with medical equipments and information system. This study focuses on the risk assessment of this future technical unit. This study was conducted by a group of professionals working for the hospital. It started with the design of a functional model to better comprehend the system to be analyzed. Risk assessment consists in confronting this functional model to a list of dangers in order to determine the vulnerable areas of the system. Then the team designed some scenarios to identify the causes, securities barriers and consequences in order to rank the risks. The analysis targeted various dangers, e.g. political, strategic, financial, economical, marketing, clinical and operational. The team identified more than 70 risky scenarios. For 75% of them the criticality level was deemed initially tolerable and under control or unacceptable. The implementation of an action plan for reducing the level of risks before opening this technical unit brought the system down to an acceptable level at 66%. A year prior to opening this technical unit for the evaluation and treatment of motor disabilities, conducting this preliminary risk assessment, with its exhaustive and rigorous methodology, enabled the concerned professionals to work together around an action plan for reducing the risks. 2011 Elsevier Masson SAS. All rights reserved.
Cox report and the US-China arms control technical exchange program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Di Capua, M S
The ACE program furthered the national security interests of the US by promoting technical approaches to the implementation and verification of arms control treaties that the international community embraces. The Cox Committee report suggests that uncontrolled interactions were taking place between US and Chinese nuclear weapons scientists in the course of the ACE program. On the contrary, elaborate controls were in place at the very beginning and remained in place to control the interactions and protect US national security information. The ACE program payoff to national security was just beginning and its suspension, resulting from the Cox reports allegations, ismore » a setback to US-China progress on arms control.« less
Reynolds, P A; Harper, J; Dunne, S; Cox, M; Myint, Y K
2007-04-28
To describe a simple technical evaluation of the access, security issues and uses of wireless networked PDAs in a dental clinic and report a pilot study investigating students' educational use of PDAs to access a Virtual Learning Environment (VLE) in a dental clinic. To undertake a technical evaluation of wireless networking to PDAs focusing on security issues, robustness of the system and accessibility particularly to educational resources. To evaluate the impact of using a PDA on undergraduate students in the dental clinic and at home. Part II describes the technical and educational evaluation of PDAs used by one group of 12 undergraduate fourth year students in the Primary Dental Care clinic. A cross over trial of six students with PDAs and six without was carried out during one semester of 12 weeks. Technical issues such as secure internet access using wireless connectivity were addressed. An assessment of the general and educational use and the students' attitudes towards using PDAs was undertaken using online questionnaires and focus group discussions. Over 90% of participants wanted PDAs as part of their dental kit. The potential of PDA use in dental training was demonstrated by a good to excellent response by over 75% of participants to having access to online support materials, particularly videos, being able to make notes for individual study and to keep a diary of their commitments to teaching sessions. Recreational use included a 100% good to excellent response to playing games and keeping a diary. The PDA proved to be a convenient and versatile mode of access to online education. Technical solutions enabled a substantial proportion of the functionality of WebCT (Web Course Tools) to be accessed by the students in a clinical environment. Both novice and experienced users were able to appreciate the use of the PDA and the less able considered that their ICT skills had improved. However, further research is needed to determine how students use a range of new technologies in their undergraduate programmes. The Dental Institute plans to recommend that all students will use this device in the future throughout their five-year curriculum, and the scoping of the implications of this recommendation is underway.
Secure Internet video conferencing for assessing acute medical problems in a nursing facility.
Weiner, M.; Schadow, G.; Lindbergh, D.; Warvel, J.; Abernathy, G.; Dexter, P.; McDonald, C. J.
2001-01-01
Although video-based teleconferencing is becoming more widespread in the medical profession, especially for scheduled consultations, applications for rapid assessment of acute medical problems are rare. Use of such a video system in a nursing facility may be especially beneficial, because physicians are often not immediately available to evaluate patients. We have assembled and tested a portable, wireless conferencing system to prepare for a randomized trial of the system s influence on resource utilization and satisfaction. The system includes a rolling cart with video conferencing hardware and software, a remotely controllable digital camera, light, wireless network, and battery. A semi-automated paging system informs physicians of patient s study status and indications for conferencing. Data transmission occurs wirelessly in the nursing home and then through Internet cables to the physician s home. This provides sufficient bandwidth to support quality motion images. IPsec secures communications. Despite human and technical challenges, this system is affordable and functional. Images Figure 1 PMID:11825286
Brownfields Grants Information
This asset includes all types of information regarding Brownfields grant programs that subsidize/support Brownfield cleanup. This includes EPA's Brownfields Program grant funding for brownfields assessment, cleanup, revolving loans, and environmental job training. Assessment grants provide funding for a grant recipient to inventory, characterize, assess, and conduct planning and community involvement related to brownfield sites. Revolving Loan Fund Grants enable States, political subdivisions, and Indian tribes to make low interest loans to carryout cleanup activities at brownfields properties. Cleanup grants provide funding for a grant recipient to carry out cleanup activities at brownfield sites. Environmental Workforce Development and Job Training Grants are designed to provide funding to eligible entities, including nonprofit organizations, to recruit, train, and place predominantly low-income and minority, unemployed and under-employed residents of solid and hazardous waste-impacted communities with the skills needed to secure full-time, sustainable employment in the environmental field and in the assessment and cleanup work taking place in their communities. Training, Research, and Technical Assistance Grants provide funding to eligible organizations to provide training, research, and technical assistance to facilitate brownfields cleanup. Regulatory authority for the collection and use of this information is found in the Small Business Liability Relief
Development and testing for physical security robots
NASA Astrophysics Data System (ADS)
Carroll, Daniel M.; Nguyen, Chinh; Everett, H. R.; Frederick, Brian
2005-05-01
The Mobile Detection Assessment Response System (MDARS) provides physical security for Department of Defense bases and depots using autonomous unmanned ground vehicles (UGVs) to patrol the site while operating payloads for intruder detection and assessment, barrier assessment, and product assessment. MDARS is in the System Development and Demonstration acquisition phase and is currently undergoing developmental testing including an Early User Appraisal (EUA) at the Hawthorne Army Depot, Nevada-the world's largest army depot. The Multiple Resource Host Architecture (MRHA) allows the human guard force to command and control several MDARS platforms simultaneously. The MRHA graphically displays video, map, and status for each resource using wireless digital communications for integrated data, video, and audio. Events are prioritized and the user is prompted with audio alerts and text instructions for alarms and warnings. The MRHA also interfaces to remote resources to automate legacy physical devices such as fence gate controls, garage doors, and remote power on/off capability for the MDARS patrol units. This paper provides an overview and history of the MDARS program and control station software with details on the installation and operation at Hawthorne Army Depot, including discussions on scenarios for EUA excursions. Special attention is given to the MDARS technical development strategy for spiral evolutions.
Takeda, Hiroshi; Matsumura, Yasushi; Kuwata, Shigeki; Nakano, Hirohiko; Shanmai, Ji; Qiyan, Zhang; Yufen, Chen; Kusuoka, Hideo; Matsuoka, Masaki
2004-03-31
To enhance medical cooperation between the hospitals and clinics around Osaka local area, the healthcare network system, named Osaka Community Healthcare Information System (OCHIS), was established with support of a supplementary budget from the Japanese government in fiscal year 2002. Although the system has been based on healthcare public key infrastructure (PKI), there remain security issues to be solved technically and operationally. An experimental study was conducted to elucidate the central and the local function in terms of a registration authority and a time stamp authority in contract with the Japanese Medical Information Systems Organization (MEDIS) in 2003. This paper describes the experimental design and the results of the study concerning message security.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-31
... scientific and technical analyses, OSHA requests that you disclose: (1) The nature of any financial... such as social security numbers and birthdates. If you submit scientific or technical studies or other... data and technical information submitted to the record. This request is consistent with Executive Order...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-27
... the provisions of the Department of Defense National Industrial Security Program Operating Manual, an... Department of Defense National Industrial Security Program Operating Manual (unless such requirements are in..., Arms Control and International Security, Department of State. [FR Doc. 2010-21450 Filed 8-26-10; 8:45...
36 CFR § 1202.30 - How does NARA safeguard its systems of records?
Code of Federal Regulations, 2013 CFR
2013-07-01
... records are protected in accordance with the Computer Security Act, OMB Circular A-11 requiring privacy... appropriate administrative, technical, and physical safeguards are established to ensure the security and confidentiality of records. In order to protect against any threats or hazards to their security or loss of...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Procedures to safeguard... and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM... administrative, technical, and physical safeguards for the protection of customer records and information. These...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Procedures to safeguard... and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P, S-AM, AND S... administrative, technical, and physical safeguards for the protection of customer records and information. These...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Procedures to safeguard... and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM... administrative, technical, and physical safeguards for the protection of customer records and information. These...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Procedures to safeguard... and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM... administrative, technical, and physical safeguards for the protection of customer records and information. These...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Procedures to safeguard... and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) REGULATIONS S-P AND S-AM... administrative, technical, and physical safeguards for the protection of customer records and information. These...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-03
... that, due to technical limitations in order management systems and routing networks, such member... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69643; File Nos. SR-BYX-2013-008] Self... the Securities and Exchange Commission (``Commission'') pursuant to Section 19(b)(1) of the Securities...
Minimum Requirements for Taxicab Security Cameras*
Zeng, Shengke; Amandus, Harlan E.; Amendola, Alfred A.; Newbraugh, Bradley H.; Cantis, Douglas M.; Weaver, Darlene
2015-01-01
Problem The homicide rate of taxicab-industry is 20 times greater than that of all workers. A NIOSH study showed that cities with taxicab-security cameras experienced significant reduction in taxicab driver homicides. Methods Minimum technical requirements and a standard test protocol for taxicab-security cameras for effective taxicab-facial identification were determined. The study took more than 10,000 photographs of human-face charts in a simulated-taxicab with various photographic resolutions, dynamic ranges, lens-distortions, and motion-blurs in various light and cab-seat conditions. Thirteen volunteer photograph-evaluators evaluated these face photographs and voted for the minimum technical requirements for taxicab-security cameras. Results Five worst-case scenario photographic image quality thresholds were suggested: the resolution of XGA-format, highlight-dynamic-range of 1 EV, twilight-dynamic-range of 3.3 EV, lens-distortion of 30%, and shutter-speed of 1/30 second. Practical Applications These minimum requirements will help taxicab regulators and fleets to identify effective taxicab-security cameras, and help taxicab-security camera manufacturers to improve the camera facial identification capability. PMID:26823992
Web vulnerability study of online pharmacy sites.
Kuzma, Joanne
2011-01-01
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems.
Development of an Internet Security Policy for health care establishments.
Ilioudis, C; Pangalos, G
2000-01-01
The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.
Advanced Simulation and Computing Business Plan
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rummel, E.
To maintain a credible nuclear weapons program, the National Nuclear Security Administration’s (NNSA’s) Office of Defense Programs (DP) needs to make certain that the capabilities, tools, and expert staff are in place and are able to deliver validated assessments. This requires a complete and robust simulation environment backed by an experimental program to test ASC Program models. This ASC Business Plan document encapsulates a complex set of elements, each of which is essential to the success of the simulation component of the Nuclear Security Enterprise. The ASC Business Plan addresses the hiring, mentoring, and retaining of programmatic technical staff responsiblemore » for building the simulation tools of the nuclear security complex. The ASC Business Plan describes how the ASC Program engages with industry partners—partners upon whom the ASC Program relies on for today’s and tomorrow’s high performance architectures. Each piece in this chain is essential to assure policymakers, who must make decisions based on the results of simulations, that they are receiving all the actionable information they need.« less
Noonan, Vanessa K; Thorogood, Nancy P; Joshi, Phalgun B; Fehlings, Michael G; Craven, B Catharine; Linassi, Gary; Fourney, Daryl R; Kwon, Brian K; Bailey, Christopher S; Tsai, Eve C; Drew, Brian M; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F
2013-05-01
Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. Copyright © 2013 Longwoods Publishing.
Noonan, Vanessa K.; Thorogood, Nancy P.; Joshi, Phalgun B.; Fehlings, Michael G.; Craven, B. Catharine; Linassi, Gary; Fourney, Daryl R.; Kwon, Brian K.; Bailey, Christopher S.; Tsai, Eve C.; Drew, Brian M.; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F.
2013-01-01
Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. PMID:23968640
Code of Federal Regulations, 2010 CFR
2010-07-01
... access to classified national security information, restricted data, and/or sensitive but unclassified... ON TECHNICAL SURVEILLANCE COUNTERMEASURES § 149.3 Definitions. Classified National Security... is marked to indicate its classified status when in documentary form. Restricted Data (RD). All data...
Kamenopoulou, Vassiliki; Dimitriou, Panayiotis; Hourdakis, Constantine J; Maltezos, Antonios; Matikas, Theodore; Potiriadis, Constantinos; Camarinopoulos, Leonidas
2006-10-01
In light of the exceptional circumstances that arose from hosting the Olympic Games in Athens in 2004 and from recent terrorist events internationally, Greece attributes the highest priority to security issues. According to its statutory role, the Greek Atomic Energy Commission is responsible for emergency preparedness and response in case of nuclear and radiological events, and advises the Government on the measures and interventions necessary to protect the public. In this context, the Commission participated in the Nuclear, Radiological, Biological, and Chemical Threat National Emergency Plan, specially developed for the Olympic Games, and coordinated by the Olympic Games Security Division. The objective of this paper is to share the experience gained during the organization of the Olympic Games and to present the nuclear security program implemented prior to, during, and beyond the Games, in order to prevent, detect, assess, and respond to the threat of nuclear terrorism. This program adopted a multi-area coverage of nuclear security, including physical protection of nuclear and radiological facilities, prevention of smuggling of radioactive materials through borders, prevention of dispersion of these materials into the Olympic venues, enhancement of emergency preparedness and response to radiological events, upgrading of the technical infrastructure, establishment of new procedures for assessing the threat and responding to radiological incidents, and training personnel belonging to several organizations involved in the National Emergency Response Plan. Finally, the close cooperation of Greek Authorities with the International Atomic Energy Agency and the U.S. Department of Energy, under the coordination of the Greek Atomic Energy Commission, is also discussed.
New Nuclear Emergency Prognosis system in Korea
NASA Astrophysics Data System (ADS)
Lee, Hyun-Ha; Jeong, Seung-Young; Park, Sang-Hyun; Lee, Kwan-Hee
2016-04-01
This paper reviews the status of assessment and prognosis system for nuclear emergency response in Korea, especially atmospheric dispersion model. The Korea Institute of Nuclear Safety (KINS) performs the regulation and radiological emergency preparedness of the nuclear facilities and radiation utilizations. Also, KINS has set up the "Radiological Emergency Technical Advisory Plan" and the associated procedures such as an emergency response manual in consideration of the IAEA Safety Standards GS-R-2, GS-G-2.0, and GS-G-2.1. The Radiological Emergency Technical Advisory Center (RETAC) organized in an emergency situation provides the technical advice on radiological emergency response. The "Atomic Computerized Technical Advisory System for nuclear emergency" (AtomCARE) has been developed to implement assessment and prognosis by RETAC. KINS developed Accident Dose Assessment and Monitoring (ADAMO) system in 2015 to reflect the lessons learned from Fukushima accident. It incorporates (1) the dose assessment on the entire Korean peninsula, Asia region, and global region, (2) multi-units accident assessment (3) applying new methodology of dose rate assessment and the source term estimation with inverse modeling, (4) dose assessment and monitoring with the environmental measurements result. The ADAMO is the renovated version of current FADAS of AtomCARE. The ADAMO increases the accuracy of the radioactive material dispersion with applying the LDAPS(Local Data Assimilation Prediction System, Spatial resolution: 1.5 km) and RDAPS(Regional Data Assimilation Prediction System, Spatial resolution: 12km) of weather prediction data, and performing the data assimilation of automatic weather system (AWS) data from Korea Meteorological Administration (KMA) and data from the weather observation tower at NPP site. The prediction model of the radiological material dispersion is based on the set of the Lagrangian Particle model and Lagrangian Puff model. The dose estimation methodology incorporate the dose assessment methods of IAEA, WHO, and USNRC. The dose assessment result will express on the GIS (GIS (Geographic Information System) to provide to the local- governments and the central government. Acknowledgements This research has been supported by the Nuclear Safety and Security Commission [Reference No.1305020-0315-SB110
Security measures required for HIPAA privacy.
Amatayakul, M
2000-01-01
HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-21
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Transportation and Related Equipment Technical Advisory Committee; Notice of Partially Closed Meeting The Transportation and Related Equipment Technical Advisory Committee will meet on May 5, 2010, 9:30 a.m., in the Herbert C. Hoover Building, Room 6087B, 14th Street between Constitution &...
Code of Federal Regulations, 2010 CFR
2010-04-01
... Defense Trade Controls to the Defense Security Service of the Department of Defense in accordance with the provisions of the Department of Defense National Industrial Security Program Operating Manual (unless such... a copy of the license to the applicant for the applicant's information. The Defense Security Service...
76 FR 79536 - Security Zones; Captain of the Port Lake Michigan; Technical Amendment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-22
... ACTION: Final rule. SUMMARY: The Coast Guard is revising the contact information for Security Zones in... Federal holidays. FOR FURTHER INFORMATION CONTACT: If you have questions on this rule, contact or email... exist in 33 CFR 165.910. Persons desiring to transit the areas of these security zones must contact the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-01
... at the present time, and urged FINRA to study data collected on Asset-Backed Securities before making... to a recent rule change to the Rule 6700 Series,\\7\\ Agency Debt Securities and certain primary market... corporate debt securities;\\12\\ and \\12\\ See id. (14) In Rule 6700 Series, incorporate certain technical...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Adem Esmail, Blal, E-mail: blal.ademesmail@unitn.it; Geneletti, Davide
Watershed investments, whose main aim is to secure water for cities, represent a promising opportunity for large-scale sustainability transitions in the near future. If properly designed, they promote activities in the watershed that enhance ecosystem services while protecting nature and biodiversity, as well as achieving other societal goals. In this paper, we build on the concepts of ecosystem services and boundary work, to develop and test an operative approach for designing and assessing the impact of watershed investments. The approach is structured to facilitate negotiations among stakeholders. Its strategic component includes setting the agenda; defining investment scenarios; and assessing themore » performance of watershed investments as well as planning for a follow-up. Its technical component concerns data processing; tailoring spatially explicit ecosystem service models; hence their application to design a set of “investment portfolios”, generate future land use scenarios, and model impacts on selected ecosystem services. A case study illustrates how the technical component can be developed in a data scarce context in sub-Saharan Africa in a way that is functional to support the steps of the strategic component. The case study addresses soil erosion and water scarcity-related challenges affecting Asmara, a medium-sized city in Eritrea, and considers urban water security and rural poverty alleviation as two illustrative objectives, within a ten-year planning horizon. The case study results consist in spatially explicit data (investment portfolio, land use scenario, impact on ecosystem services), which were aggregated to quantitatively assess the performance of different watershed investments scenarios, in terms of changes in soil erosion control. By addressing stakeholders' concerns of credibility, saliency, and legitimacy, the approach is expected to facilitate negotiation of objectives, definition of scenarios, and assessment of alternative watershed investments, ultimately, to contribute to implementing an adaptive watershed management.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Seward, Amy M.; Toomey, Christopher; Ford, Benjamin E.
2011-11-14
For several years, Pacific Northwest National Laboratory (PNNL) has been assessing the reliability of nuclear fuel supply in support of the U.S. Department of Energy/National Nuclear Security Administration. Three international low enriched uranium reserves, which are intended back up the existing and well-functioning nuclear fuel market, are currently moving toward implementation. These backup reserves are intended to provide countries credible assurance that of the uninterrupted supply of nuclear fuel to operate their nuclear power reactors in the event that their primary fuel supply is disrupted, whether for political or other reasons. The efficacy of these backup reserves, however, may bemore » constrained without redundant fabrication services. This report presents the findings of a recent PNNL study that simulated outages of varying durations at specific nuclear fuel fabrication plants. The modeling specifically enabled prediction and visualization of the reactors affected and the degree of fuel delivery delay. The results thus provide insight on the extent of vulnerability to nuclear fuel supply disruption at the level of individual fabrication plants, reactors, and countries. The simulation studies demonstrate that, when a reasonable set of qualification criteria are applied, existing fabrication plants are technically qualified to provide backup fabrication services to the majority of the world's power reactors. The report concludes with an assessment of the redundancy of fuel supply in the nuclear fuel market, and a description of potential extra-market mechanisms to enhance the security of fuel supply in cases where it may be warranted. This report is an assessment of the ability of the existing market to respond to supply disruptions that occur for technical reasons. A forthcoming report will address political disruption scenarios.« less
TCIA Secure Cyber Critical Infrastructure Modernization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keliiaa, Curtis M.
The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nikkel, Daniel J.; Meisner, Robert
The Advanced Simulation and Computing Campaign, herein referred to as the ASC Program, is a core element of the science-based Stockpile Stewardship Program (SSP), which enables assessment, certification, and maintenance of the safety, security, and reliability of the U.S. nuclear stockpile without the need to resume nuclear testing. The use of advanced parallel computing has transitioned from proof-of-principle to become a critical element for assessing and certifying the stockpile. As the initiative phase of the ASC Program came to an end in the mid-2000s, the National Nuclear Security Administration redirected resources to other urgent priorities, and resulting staff reductions inmore » ASC occurred without the benefit of analysis of the impact on modern stockpile stewardship that is dependent on these new simulation capabilities. Consequently, in mid-2008 the ASC Program management commissioned a study to estimate the essential size and balance needed to sustain advanced simulation as a core component of stockpile stewardship. The ASC Program requires a minimum base staff size of 930 (which includes the number of staff necessary to maintain critical technical disciplines as well as to execute required programmatic tasks) to sustain its essential ongoing role in stockpile stewardship.« less
Counter-Terrorism Contributions from the National Labs
NASA Astrophysics Data System (ADS)
Davis, Jay
2002-04-01
The DOD and NNSA laboratories have significant technical capabilities that can contribute to counter-terrorism and homeland security. Maximizing those contributions, however, requires that laboratory staff engage the doctrinal and operational issues of these problems as well. The broader interagency community needs support in these components of the problem as much as in the technical components. The speaker's experiences as director of the DoD Defense Threat Reduction Agency, established in 1998 to address DoD's role in defense against weapons of mass destruction in all venues, have given him a somewhat unique perspective on this problem. Examples of issues identified in scenario play at Cabinet level in the last Admistration will be given to illustrate the breadth of this problem, as will the speaker's assessment of the grand challenges in deterring use of WMD against the Homeland.
Second Line of Defense Spares Program Assessment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Henderson, Dale L.; Muller, George; Mercier, Theresa M.
2012-11-20
The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financialmore » and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.« less
The Role of Physicists in Anti-Terrorism: Transportation
NASA Astrophysics Data System (ADS)
Fainberg, Anthony
2002-04-01
Physicists, along with many other categories of scientists, participate in efforts against terrorism in a multitude of ways, including developing explosive detectors, sensors, security procedures, technical analyses, and decision tools. Transportation, especially civil aviation, is a field of focus within the anti- and counterterrorism arenas. The most spectacular terrorist acts have generally aimed at this sector and this trend is likely to continue. Physicists play their roles in all sectors: government, private industry, and even academia. Defense against terrorism has become a national priority in the United States, and one may expect the roles of scientific experts to become more important. The tactics of terrorists will change and develop, so it will become necessary to develop ever more sophisticated measures to fight them. Technology is part of the answer, but human factors, vulnerability analyses, threat assessment, and security procedures are equally important.
Guidelines for producing training films and videos.
Harper, P B
1991-01-01
Drawing from experience in producing a film on the surgical procedure of female sterilization, 4 guidelines to technical film production for training purposes are presented and discussed in this paper. In order of presentation in the text, the paper 1st encourages identifying and securing a technical expert, then clearly identifying steps of the technical procedure, involving trainees and trainers in the production process, and working with experienced producers, scriptwriters, and crew members. Returning to the 1st guideline, the technical advisor will have a central presence during all photography and editing, and ideally should not have any personal investment in the procedure being shown. Prior to script finalization and sorting, research is urged to ensure concrete procedural steps. Printed materials, slides, interviews of experienced clinicians, procedure observation, and test videotape shooting may be called upon and employed as parts of the research phase. Trainees should participate during preliminary research, script development, and pretesting of early film versions, their suggestions for change incorporated where appropriate in the final version. On the final point of securing experienced workers, country nationals sensitive to relevant cultural and background dynamics should be included in the team. The special concerns of airport security regulation and customs requirements knowledge are essential, as well as their attention to assuring adequate on-site electricity for camera equipment.
Trends in Microfabrication Capabilities & Device Architectures.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bauer, Todd; Jones, Adam; Lentine, Anthony L.
The last two decades have seen an explosion in worldwide R&D, enabling fundamentally new capabilities while at the same time changing the international technology landscape. The advent of technologies for continued miniaturization and electronics feature size reduction, and for architectural innovations, will have many technical, economic, and national security implications. It is important to anticipate possible microelectronics development directions and their implications on US national interests. This report forecasts and assesses trends and directions for several potentially disruptive microfabrication capabilities and device architectures that may emerge in the next 5-10 years.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-11
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0006] Agency Information Collection Activities: Cybersecurity and Communications Technical Assistance Request and Evaluation AGENCY: National... Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), Office of Emergency...
Case Study: Creation of a Degree Program in Computer Security. White Paper.
ERIC Educational Resources Information Center
Belon, Barbara; Wright, Marie
This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…
The Natural Hospital Environment: a Socio-Technical-Material perspective.
Fernando, Juanita; Dawson, Linda
2014-02-01
This paper introduces two concepts into analyses of information security and hospital-based information systems-- a Socio-Technical-Material theoretical framework and the Natural Hospital Environment. The research is grounded in a review of pertinent literature with previously published Australian (Victoria) case study data to analyse the way clinicians work with privacy and security in their work. The analysis was sorted into thematic categories, providing the basis for the Natural Hospital Environment and Socio-Technical-Material framework theories discussed here. Natural Hospital Environments feature inadequate yet pervasive computer use, aural privacy shortcomings, shared workspace, meagre budgets, complex regulation that hinders training outcomes and out-dated infrastructure and are highly interruptive. Working collaboratively in many cases, participants found ways to avoid or misuse security tools, such as passwords or screensavers for patient care. Workgroup infrastructure was old, architecturally limited, haphazard in some instances, and was less useful than paper handover sheets to ensure the quality of patient care outcomes. Despite valiant efforts by some participants, they were unable to control factors influencing the privacy of patient health information in public hospital settings. Future improvements to hospital-based organisational frameworks for e-health can only be made when there is an improved understanding of the Socio-Technical-Material theoretical framework and Natural Hospital Environment contexts. Aspects within control of clinicians and administrators can be addressed directly although some others are beyond their control. An understanding and acknowledgement of these issues will benefit the management and planning of improved and secure hospital settings. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
American perspectives on security : energy, environment, nuclear weapons, and terrorism : 2010.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Herron, Kerry Gale; Jenkins-Smith, Hank C.; Silva, Carol L.
2011-03-01
We report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2010 on US energy and environmental security. Key areas of investigation include public perceptions shaping the context for debate about a comprehensive national energy policy, and what levels of importance are assigned to various prospective energy technologies. Additionally, we investigate how public views on global climate change are evolving, how the public assesses the risks and benefits of nuclear energy, preferences for managing used nuclear fuel, and public trust in sources of scientific and technical information. We also report findingsmore » from a national Internet survey and a subset of questions administered by telephone in mid-2010 on public views of the relevance of US nuclear weapons today, support for strategic arms control, and assessments of the potential for nuclear abolition. Additionally, we analyze evolving public views of the threat of terrorism, assessments of progress in the struggle against terrorism, and tolerance for intrusive antiterror policies. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.« less
Security analysis of RSA cryptosystem algorithm and it’s properties
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Chenglian; Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com
2014-10-06
The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles tomore » discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.« less
Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K
2013-08-09
Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-02
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting; Rescheduled The Sensors and Instrumentation... that affect the level of export controls applicable to sensors [[Page 66179
77 FR 24178 - Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-23
... and Introductions 2. Working Group Reports 3. Industry Presentation: E-beam Lithography 4. Industry Presentation: ENC Threshold for Satellite Modem 5. Industry Presentation: Semiconductor Manufacturing Equipment... DEPARTMENT OF COMMERCE Bureau of Industry and Security Information Systems Technical Advisory...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schurman, D.L.; Datesman, G.H. Jr; Truitt, J.O.
The report presents a system for evaluating and correcting deficiencies in security-force effectiveness in licensed nuclear facilities. There are four checklists which security managers can copy directly, or can use as guidelines for developing their own checklists. The checklists are keyed to corrective-action guides found in the body of the report. In addition to the corrective-action guides, the report gives background information on the nature of security systems and discussions of various special problems of the licensed nuclear industry.
Separation Kernel Protection Profile Revisited: Choices and Rationale
2010-12-01
provide the most stringent protection and rigorous security countermeasures” [ IATF ]. In other words, robustness is not the same as assurance. Figure 3... IATF Information Assurance Technical Framework, Chapter 4, Release 3.1, National Security Agency, September 2002. Karjoth01 G. Karjoth, “The
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2011 CFR
2011-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2010 CFR
2010-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2012 CFR
2012-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
7 CFR 610.24 - Responsibilities of State Technical Committees.
Code of Federal Regulations, 2013 CFR
2013-01-01
... programs under Title XII of the Food Security Act of 1985 including, but not limited to, the Conservation Reserve Program, Wetlands Reserve Program, Conservation Security Program, Conservation Stewardship Program, Farm and Ranch Lands Protection Program, Grassland Reserve Program, Environmental Quality Incentives...
36 CFR 1008.6 - Assuring integrity of records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... subject to the Privacy Act be maintained with appropriate administrative, technical and physical...) Records security. Whether maintained in physical or electronic form, records subject to the Privacy Act... the system of records. The Privacy Act Officer will periodically review these security measures to...
78 FR 57839 - Request for Information on Computer Security Incident Coordination (CSIC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... Institute of Standards and Technology (NIST), United States Department of Commerce. ACTION: Notice, extension of comment period. SUMMARY: NIST is extending the deadline for submitting comments relating to Computer Security Incident Coordination. NIST experienced technical difficulties with receiving email...
45 CFR 164.312 - Technical safeguards.
Code of Federal Regulations, 2012 CFR
2012-10-01
... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... that maintain electronic protected health information to allow access only to those persons or software... specifications: (i) Unique user identification (Required). Assign a unique name and/or number for identifying and...
HIPAA--a real world perspective.
Nulan, C
2001-01-01
An effective and realistic approach to HIPAA compliance requires healthcare organizations to achieve a fundamental shift in attitude, awareness, habits and capabilities in the areas of privacy and security. They must create a sense of accountability among staff, and even patients, for the safeguarding of patient information. Only when this culture shift has occurred, along with the required technological advancements, can HIPAA compliance be realistically achieved. There is still ample time to create the organizational shift necessary, along with technological enhancements, to meet HIPAA requirements. Beyond compliance, HIPAA will benefit the healthcare industry by promoting administrative simplification--the original intention of the Act. And it will require the healthcare industry, in an abbreviated timeframe, to upgrade its level of sophistication in managing information. HIPAA certification springs from an organizational compliance method that has been underway in government for the past two decades. The HIPAA playbook is taken lock, stock and barrel from other Federal guidelines. HIPAA's legislative lineage includes the Healthcare Reform Act of 1993, Paperwork Reduction Act of 1980, Computer Security Act of 1987 and the Privacy Act of 1974. HIPAA means that public and private sector healthcare organizations are going to be required by law to adopt the same information-handling practices that have been in effect in the Federal government for years. That boils down to two things: Standardized formatting of data electronically exchanged between providers, payers and business partners (EDI) Federalization of security and privacy practices within private-sector healthcare information management The key to making HIPAA compliance achievable within a practical timeframe, as well as instituting the culture changes that go with enhanced privacy and security standards, is a process that is largely unfamiliar in the private sector, called administrative certification and accreditation. Certification is an organizational change-management methodology that drives accountability for security down to that level in the organization where it will concretely and tangibly get done. It is a comprehensive managerial assessment of the technical and non-technical security features and other safeguards of a system associated with its use and environment. The assessment seeks to establish and document the extent to which a particular system meets a set of specified security requirements. HIPAA accreditation occurs when all functional managers in an organization have completed reports of what they know they need to do in their areas. They submit that information to an executive official within the organization who functions as the accrediting official for the organization. Accreditation is the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of safeguards and should be strongly based on the solvable vulnerabilities and residual risks identified during certification. Institutionalizing a practical and formal HIPAA certification program is important to support business activities and can provide several benefits including increased communication within an organization.
,
2000-01-01
Oil and natural gas account for approximately 63 percent of the world’s total energy consumption. The U.S. Geological Survey periodically estimates the amount of oil and gas remaining to be found in the world. Since 1981, each of the last four of these assessments has shown a slight increase in the combined volume of identified reserves and undiscovered resources. The latest assessment estimates the volume of technically recoverable conventional oil and gas that may be added to the world's reserves, exclusive of the United States, in the next 30 years. The USGS World Petroleum Assessment 2000 reports an increase in global petroleum resources, including a 20-percent increase in undiscovered oil and a 14-percent decrease in undiscovered natural gas compared to the previous assessment (table 1). These results have important implications for energy prices, policy, security, and the global resource balance.
LPTA Versus Tradeoff: Analysis of Contract Source Selection Strategies and Performance Outcomes
2016-06-01
methodologies contracting professionals employ to acquire what the DOD needs. Contracting professionals may use lowest price technically acceptable (LPTA) and...contract management process, source selection, lowest price technically acceptable, tradeoff 15. NUMBER OF PAGES 69 16. PRICE CODE 17. SECURITY...use lowest price technically acceptable (LPTA) and tradeoff strategies to procure requirements to maximize the overall best value to the government
Maude: A Wide Spectrum Language for Secure Active Networks
2002-08-01
AFRL-IF-RS-TR-2002-197 Final Technical Report August 2002 MAUDE: A WIDE SPECTRUM LANGUAGE FOR SECURE ACTIVE NETWORKS SRI...MAUDE: A WIDE SPECTRUM FORMAL LANGUAGE FOR SECURE ACTIVE NETWORKS 6. AUTHOR(S) Jose Meseguer and Carolyn Talcott 5. FUNDING NUMBERS C...specifications to address this challenge. We also show how, using the Maude rewriting logic language and tools, active network systems, languages , and
Orchestrating BMD Control in Extended BPEL
2008-05-21
Orchestration of secure WebMail , Technical Report ISE-TR-06-08, George Mason University, Fairfax, VA, August 2006. [9] E. Christensen, F. Curbera...methods to access and dissemination control, securing circuit switched (SS7) and IP based telecommunication (VoIP) systems, multimedia, security ...decorating the Business Process Execution Language (BPEL) with Quality of Service (QoS), Measures of Performance (MoP), Measures of Effectiveness (MoE
MIT Lincoln Laboratory Annual Report 2007: Technology in Support of National Security
2007-01-01
technical innovation and scientific discoveries. MISSION: TechnoLogy In SupporT of naTIonaL SecurITy 2007 Dr. Claude R. Canizares Vice president for...problems. The Lincoln Laboratory New Technology Initiatives Program is one of several internal technology innovation mechanisms. Technologies emerging...externships. LIFT2, an innovative professional learning program for science, technology , and math teachers, serves Massachusetts metro south/west region
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-23
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Sensors and Instrumentation Technical Advisory Committee; Notice of Partially Closed Meeting ``Rescheduled'' The Sensors and Instrumentation... that affect the level of export controls applicable to sensors and instrumentation equipment and...
48 CFR 1435.010 - Scientific and technical reports.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SPECIAL CATEGORIES OF CONTRACTING RESEARCH AND DEVELOPMENT CONTRACTING 1435.010 Scientific and technical reports. If a Research and Development (R&D) contract results involve classified or national security... available. Copies of publications and reports are also required to be sent to the DOI Departmental Library...
48 CFR 1435.010 - Scientific and technical reports.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SPECIAL CATEGORIES OF CONTRACTING RESEARCH AND DEVELOPMENT CONTRACTING 1435.010 Scientific and technical reports. If a Research and Development (R&D) contract results involve classified or national security... available. Copies of publications and reports are also required to be sent to the DOI Departmental Library...
48 CFR 1435.010 - Scientific and technical reports.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SPECIAL CATEGORIES OF CONTRACTING RESEARCH AND DEVELOPMENT CONTRACTING 1435.010 Scientific and technical reports. If a Research and Development (R&D) contract results involve classified or national security... available. Copies of publications and reports are also required to be sent to the DOI Departmental Library...
48 CFR 1435.010 - Scientific and technical reports.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SPECIAL CATEGORIES OF CONTRACTING RESEARCH AND DEVELOPMENT CONTRACTING 1435.010 Scientific and technical reports. If a Research and Development (R&D) contract results involve classified or national security... available. Copies of publications and reports are also required to be sent to the DOI Departmental Library...
48 CFR 1435.010 - Scientific and technical reports.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SPECIAL CATEGORIES OF CONTRACTING RESEARCH AND DEVELOPMENT CONTRACTING 1435.010 Scientific and technical reports. If a Research and Development (R&D) contract results involve classified or national security... available. Copies of publications and reports are also required to be sent to the DOI Departmental Library...
78 FR 77606 - Security Requirements for Facilities Storing Spent Nuclear Fuel
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-24
... regulatory basis; availability of responses to public comments. SUMMARY: The U.S. Nuclear Regulatory... to Carol Gallagher; telephone: 301-287- 3422; email: [email protected] . For technical... Nuclear Security and Incident Response, U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001...
48 CFR 5.102 - Availability of solicitations.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Disclosure would compromise the national security (e.g., would result in disclosure of classified information, or information subject to export controls) or create other security risks. The fact that access to... information that requires additional controls to monitor access and distribution (e.g., technical data...
Sandia National Laboratories: Malware Technical Exchange Meeting (MTEM)
Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Against Malware Detection of Malware Malware Research Malware in Mobile Devices Malware Attack Trends Malware Malware Research Malware in Mobile Devices Malware Attack Trends Success Stories of COTS Products
45 CFR 164.312 - Technical safeguards.
Code of Federal Regulations, 2013 CFR
2013-10-01
... REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health... persons or software programs that have been granted access rights as specified in § 164.308(a)(4). (2) Implementation specifications: (i) Unique user identification (Required). Assign a unique name and/or number for...
Enenkel, Markus; See, Linda; Karner, Mathias; Álvarez, Mònica; Rogenhofer, Edith; Baraldès-Vallverdú, Carme; Lanusse, Candela; Salse, Núria
2015-01-01
The Central African Republic is one of the world’s most vulnerable countries, suffering from chronic poverty, violent conflicts and weak disaster resilience. In collaboration with Doctors without Borders/Médecins Sans Frontières (MSF), this study presents a novel approach to collect information about socio-economic vulnerabilities related to malnutrition, access to resources and coping capacities. The first technical test was carried out in the North of the country (sub-prefecture Kabo) in May 2015. All activities were aimed at the investigation of technical feasibility, not at operational data collection, which requires a random sampling strategy. At the core of the study is an open-source Android application named SATIDA COLLECT that facilitates rapid and simple data collection. All assessments were carried out by local MSF staff after they had been trained for one day. Once a mobile network is available, all assessments can easily be uploaded to a database for further processing and trend analysis via MSF in-house software. On one hand, regularly updated food security assessments can complement traditional large-scale surveys, whose completion can take up to eight months. Ideally, this leads to a gain in time for disaster logistics. On the other hand, recording the location of every assessment via the smart phones’ GPS receiver helps to analyze and display the coupling between drought risk and impacts over many years. Although the current situation in the Central African Republic is mostly related to violent conflict it is necessary to consider information about drought risk, because climatic shocks can further disrupt the already vulnerable system. SATIDA COLLECT can easily be adapted to local conditions or other applications, such as the evaluation of vaccination campaigns. Most importantly, it facilitates the standardized collection of information without pen and paper, as well as straightforward sharing of collected data with the MSF headquarters or other aid organizations. PMID:26581042
Enenkel, Markus; See, Linda; Karner, Mathias; Álvarez, Mònica; Rogenhofer, Edith; Baraldès-Vallverdú, Carme; Lanusse, Candela; Salse, Núria
2015-01-01
The Central African Republic is one of the world's most vulnerable countries, suffering from chronic poverty, violent conflicts and weak disaster resilience. In collaboration with Doctors without Borders/Médecins Sans Frontières (MSF), this study presents a novel approach to collect information about socio-economic vulnerabilities related to malnutrition, access to resources and coping capacities. The first technical test was carried out in the North of the country (sub-prefecture Kabo) in May 2015. All activities were aimed at the investigation of technical feasibility, not at operational data collection, which requires a random sampling strategy. At the core of the study is an open-source Android application named SATIDA COLLECT that facilitates rapid and simple data collection. All assessments were carried out by local MSF staff after they had been trained for one day. Once a mobile network is available, all assessments can easily be uploaded to a database for further processing and trend analysis via MSF in-house software. On one hand, regularly updated food security assessments can complement traditional large-scale surveys, whose completion can take up to eight months. Ideally, this leads to a gain in time for disaster logistics. On the other hand, recording the location of every assessment via the smart phones' GPS receiver helps to analyze and display the coupling between drought risk and impacts over many years. Although the current situation in the Central African Republic is mostly related to violent conflict it is necessary to consider information about drought risk, because climatic shocks can further disrupt the already vulnerable system. SATIDA COLLECT can easily be adapted to local conditions or other applications, such as the evaluation of vaccination campaigns. Most importantly, it facilitates the standardized collection of information without pen and paper, as well as straightforward sharing of collected data with the MSF headquarters or other aid organizations.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Farnham, Irene; Rehfeldt, Kenneth
Preemptive reviews (PERs) of Underground Test Area (UGTA) Activity corrective action unit (CAU) studies are an important and long-maintained quality improvement process. The CAU-specific PER committees provide internal technical review of ongoing work throughout the CAU lifecycle. The reviews, identified in the UGTA Quality Assurance Plan (QAP) (Sections 1.3.5.1 and 3.2), assure work is comprehensive, accurate, in keeping with the state of the art, and consistent with CAU goals. PER committees review various products, including data, documents, software/codes, analyses, and models. PER committees may also review technical briefings including Federal Facility Agreement and Consent Order (FFACO)-required presentations to the Nevadamore » Division of Environmental Protection (NDEP) and presentations supporting key technical decisions (e.g., investigation plans and approaches). PER committees provide technical recommendations to support regulatory decisions that are the responsibility of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and NDEP.« less
ATHENA: system design and implementation for a next generation x-ray telescope
NASA Astrophysics Data System (ADS)
Ayre, M.; Bavdaz, M.; Ferreira, I.; Wille, E.; Lumb, D.; Linder, M.
2015-08-01
ATHENA, Europe's next generation x-ray telescope, has recently been selected for the 'L2' slot in ESA's Cosmic Vision Programme, with a mandate to address the 'Hot and Energetic Universe' Cosmic Vision science theme. The mission is currently in the Assessment/Definition Phase (A/B1), with a view to formal adoption after a successful System Requirements Review in 2019. This paper will describe the reference mission architecture and spacecraft design produced during Phase 0 by the ESA Concurrent Design Facility (CDF), in response to the technical requirements and programmatic boundary conditions. The main technical requirements and their mapping to resulting design choices will be presented, at both mission and spacecraft level. An overview of the spacecraft design down to subsystem level will then be presented (including the telescope and instruments), remarking on the critically-enabling technologies where appropriate. Finally, a programmatic overview will be given of the on-going Assessment Phase, and a snapshot of the prospects for securing the `as-proposed' mission within the cost envelope will be given.
Draft secure medical database standard.
Pangalos, George
2002-01-01
Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.
Household food security and adequacy of child diet in the food insecure region north in Ghana.
Agbadi, Pascal; Urke, Helga Bjørnøy; Mittelmark, Maurice B
2017-01-01
Adequate diet is of crucial importance for healthy child development. In food insecure areas of the world, the provision of adequate child diet is threatened in the many households that sometimes experience having no food at all to eat (household food insecurity). In the context of food insecure northern Ghana, this study investigated the relationship between level of household food security and achievement of recommended child diet as measured by WHO Infant and Young Child Feeding Indicators. Using data from households and 6-23 month old children in the 2012 Feed the Future baseline survey (n = 871), descriptive analyses assessed the prevalence of minimum meal frequency; minimum dietary diversity, and minimum acceptable diet. Logistic regression analysis was used to examine the association of minimum acceptable diet with household food security, while accounting for the effects of child sex and age, maternal -age, -dietary diversity, -literacy and -education, household size, region, and urban-rural setting. Household food security was assessed with the Household Hunger Scale developed by USAID's Food and Nutrition Technical Assistance Project. Forty-nine percent of children received minimum recommended meal frequency, 31% received minimum dietary diversity, and 17% of the children received minimum acceptable diet. Sixty-four percent of the children lived in food secure households, and they were significantly more likely than children in food insecure households to receive recommended minimum acceptable diet [O.R = 0.53; 95% CI: 0.35, 0.82]. However, in 80% of food secure households, children did not receive a minimal acceptable diet by WHO standards. Children living in food secure households were more likely than others to receive a minimum acceptable diet. Yet living in a food secure household was no guarantee of child dietary adequacy, since eight of 10 children in food secure households received less than a minimum acceptable diet. The results call for research into factors besides household food security in the search for determinants of child diet adequacy. In this study at least, household food security was a very weak marker of child diet adequacy. This finding is of significance to public health practice, since it calls into question any assumption that having enough food in a household necessarily results in adequately fed children.
Household food security and adequacy of child diet in the food insecure region north in Ghana
Agbadi, Pascal; Urke, Helga Bjørnøy; Mittelmark, Maurice B.
2017-01-01
Background and objectives Adequate diet is of crucial importance for healthy child development. In food insecure areas of the world, the provision of adequate child diet is threatened in the many households that sometimes experience having no food at all to eat (household food insecurity). In the context of food insecure northern Ghana, this study investigated the relationship between level of household food security and achievement of recommended child diet as measured by WHO Infant and Young Child Feeding Indicators. Methods Using data from households and 6–23 month old children in the 2012 Feed the Future baseline survey (n = 871), descriptive analyses assessed the prevalence of minimum meal frequency; minimum dietary diversity, and minimum acceptable diet. Logistic regression analysis was used to examine the association of minimum acceptable diet with household food security, while accounting for the effects of child sex and age, maternal -age, -dietary diversity, -literacy and -education, household size, region, and urban-rural setting. Household food security was assessed with the Household Hunger Scale developed by USAID’s Food and Nutrition Technical Assistance Project. Results Forty-nine percent of children received minimum recommended meal frequency, 31% received minimum dietary diversity, and 17% of the children received minimum acceptable diet. Sixty-four percent of the children lived in food secure households, and they were significantly more likely than children in food insecure households to receive recommended minimum acceptable diet [O.R = 0.53; 95% CI: 0.35, 0.82]. However, in 80% of food secure households, children did not receive a minimal acceptable diet by WHO standards. Conclusions Children living in food secure households were more likely than others to receive a minimum acceptable diet. Yet living in a food secure household was no guarantee of child dietary adequacy, since eight of 10 children in food secure households received less than a minimum acceptable diet. The results call for research into factors besides household food security in the search for determinants of child diet adequacy. In this study at least, household food security was a very weak marker of child diet adequacy. This finding is of significance to public health practice, since it calls into question any assumption that having enough food in a household necessarily results in adequately fed children. PMID:28494024
DOE Office of Scientific and Technical Information (OSTI.GOV)
Windsor, Lindsay K.; Kessler, Carol E.
An exceptional number of Middle Eastern and North African nations have recently expressed interest in developing nuclear energy for peaceful purposes. Many of these countries have explored nuclear research in limited ways in the past, but the current focused interest and application of resources towards developing nuclear-generated electricity and nuclear-powered desalination plants is unprecedented. Consequently, questions arise in response to this emerging trend: What instigated this interest? To what end(s) will a nuclear program be applied? Does the country have adequate technical, political, legislative, nonproliferation, and safety infrastructure required for the capability desired? If so, what are the next stepsmore » for a country in preparation for a future nuclear program? And if not, what collaboration efforts are possible with the United States or others? This report provides information on the capabilities and interests of 13 countries in the region in nuclear energy programs in light of safety, nonproliferation and security concerns. It also provides information useful for determining potential for offering technical collaboration, financial aid, and/or political support.« less
Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R
2013-01-01
In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardwaremore » and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.« less
HIPAA: update on rule revisions and compliance requirements.
Maddox, P J
2002-01-01
Due to the highly technical requirements for HIPAA compliance and the numerous administrative and clinical functions and processes involved, guidance from experts who are knowledgeable about systems design and use to secure private data is necessary. In health care organizations, this will require individuals who are knowledgeable about clinical processes and those who understand health information technology, security, and privacy to work together to establish an entity's compliance plans and revise operations and practices accordingly. As a precondition of designing such systems, it is essential that covered entities understand the HIPAA's statutory requirements and timeline for compliance. An organization's success in preparing for HIPAA will depend upon an active program of assessment, planning, and implementation. Compliance with security and privacy standards can be expected to increase costs initially. However, greater use of EDI is expected to reduce costs and enhance revenues in the long run if processes and systems are improved. NOTE: Special protection for psychotherapy notes holds them to a higher standard of protection. Notes used only by a psychotherapist are not intended to be shared with anyone and are not considered part of the medical record.
NASA Astrophysics Data System (ADS)
Cottes, Jeffrey Jacob
Between 1998 and 2008, the promise of biofuels to increase rural development, enhance energy security, and reduce greenhouse gas emissions stimulated their diffusion across international markets. This rapid expansion of ethanol and biodiesel encouraged many jurisdictions to implement biofuels expansion policies and programs. Global biofuels, characterised by mass production and international trade of ethanol and biodiesel, occurred despite their long history as marginal technologies on the fringe of the petroleum-based transportation energy regime. The first purpose of this dissertation is to examine the global expansion of ethanol and biodiesel to understand how these recurrent socio-technological failures co-evolved with petroleum transportation fuels. Drawing from the field of socio-technical transitions, this dissertation also assesses the global expansion of ethanol and biodiesel to determine whether or not these first generation biofuels are sustainable. Numerous studies have assessed the technical effects of ethanol and biodiesel, but effects-based technical assessments of transport biofuels are unable to explain the interaction of wider system elements. The configuration of multi-level factors (i.e., niche development, the technological regime, and the socio-technical landscape) informs the present and emerging social functions of biofuels, which become relevant when determining how biofuels might become a sustainable energy option. The biofuels regimes that evolved in Brazil, the United States, and the European Union provide case studies show how ethanol and biodiesel expanded from fringe fuels to global commodities. The production infrastructures within these dominant biofuels regimes contribute to a persistence of unsustainable first generation biofuels that can inhibit the technical development and sustainability of biofuels. However, new and emerging ethanol and biodiesel markets are relatively small in comparison to the dominant regimes, and can readily adapt to technical and regulatory change. This dissertation argues that dominant biofuels regimes have not produced a sustainable energy option. It explores the Canadian case to evaluate the opportunities for niche development, and suggests that small markets can develop niche innovations by regulating the insertion of sustainability criteria in order to de-align the dominant trajectory of global biofuels production regimes and encourage their re-alignment in a more sustainable configuration.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-05
..., Alliance Engineering, Inc., Washington Group International, Javan & Walter, Inc., Kinetic Technical... Consulting, Crown Security, Eastern Automation, Eds(Hp), Teksystems, URS Corporation, B More Industrial..., Alliance Engineering, Inc., Washington Group International, Javan & Walter, Inc., Kinetic Technical...
48 CFR 204.7301 - Definitions.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 204.7301 Definitions. As used in this subpart— Adequate security means protective measures that are... restrictions. Cyber incident means actions taken through the use of computer networks that result in an actual.... Technical information means technical data or computer software, as those terms are defined in the clause at...
Enhancing Tribal Energy Security and Clean Energy (Fact Sheet)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
This fact provides information on the Strategic Technical Assistance Response Team (START) Program, a U.S. Department of Energy Office of Indian Energy Policy and Programs (DOE-IE) initiative to provide technical expertise to support the development of next-generation energy projects in Indian Country.
Radio Frequency Based Programmable Logic Controller Anomaly Detection
2013-09-01
include wireless radios, IEEE 802.15 Blue- tooth devices, cellular phones, and IEEE 802.11 WiFi networking devices. While wireless communication...MacKenzie, H. Shamoon Malware and SCADA Security What are the Im- pacts? . Technical Report, Tofino Security, Sep 2012. 61. Mateti,P. Hacking Techniques
15 CFR Supplement No. 2 to Part 730 - Technical Advisory Committees
Code of Federal Regulations, 2011 CFR
2011-01-01
... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS GENERAL..., materials, or supplies, including technology, software, and other information, that are subject to export controls, or are being considered for such controls because of their significance to the national security...
Department of Defense Intelligence Information System (DoDIIS). Instructions 2000
2000-02-01
DIA, November 1993, DoDIIS Site Certifier’s Guide, SC-2610-143-93. e) DIA, June 1995, DoDIIS Security Architecture Guidance and Directions ( SAGD ), Draft...Plan S&T Scientific & Technical SAGD Security Architecture Guidance and Directions SBU Sensitive But Unclassified SCI Sensitive Compartmented
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-15
...-02] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...) National Cybersecurity Center of Excellence (NCCoE) invited organizations to provide products and technical.... companies to enter into ``National Cybersecurity Excellence Partnerships'' (NCEPs) in furtherance of the...
19. SITE BUILDING 002 SCANNER BUILDING AIR POLICE ...
19. SITE BUILDING 002 - SCANNER BUILDING - AIR POLICE SITE SECURITY OFFICE WITH "SITE PERIMETER STATUS PANEL" AND REAL TIME VIDEO DISPLAY OUTPUT FROM VIDEO CAMERA SYSTEM AT SECURITY FENCE LOCATIONS. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
Pakistan’s Nuclear Weapons: Proliferation and Security Issues
2009-10-15
and technical measures to prevent unauthorized or accidental use of nuclear weapons, as well as contribute to physical security of storage ...Talks On Nuclear Security,” The Boston Globe, May 5, 2009. 79 Abdul Mannan, “Preventing Nuclear Terrorism in Pakistan: Sabotage of a Spent Fuel Cask or...a Commercial Irradiation Source in Transport ,” in Pakistan’s Nuclear Future, 2008; Martellini, 2008. 80 Martellini, 2008. 81 For more information
Geostationary Orbital Crowding: An Analysis of Problems and Solutions
1990-05-16
PAGES 237 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF...later chapters. Those with technical backgrounds may still wish to skim this chapter as kind of a refresher of rarely used information. The purpose of...increased, by economic reason, so must supply. Basically, when prices are high the market will drive the availability of new resources 5 through
Reliable Video Analysis Helps Security Company Grow
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meurer, Dave; Furgal, Dave; Hobson, Rick
Armed Response Team (ART) has grown to become the largest locally owned security company in New Mexico. With technical assistance from Sandia National Laboratories through the New Mexico Small Business Assistance (NMSBA) Program, ART got help so they could quickly bring workable video security solutions to market. By offering a reliable video analytic camera system, they’ve been able to reduce theft, add hundreds of clients, and increase their number of employees.
NASA Astrophysics Data System (ADS)
Wang, Shan; Jiang, Zhi-Qiang; Li, Sai-Ping; Zhou, Wei-Xing
2015-12-01
Technical trading rules have a long history of being used by practitioners in financial markets. The profitable ability and efficiency of technical trading rules are yet controversial. In this paper, we test the performance of more than seven thousand traditional technical trading rules on the Shanghai Securities Composite Index (SSCI) from May 21, 1992 through June 30, 2013 and China Securities Index 300 (CSI 300) from April 8, 2005 through June 30, 2013 to check whether an effective trading strategy could be found by using the performance measurements based on the return and Sharpe ratio. To correct for the influence of the data-snooping effect, we adopt the Superior Predictive Ability test to evaluate if there exists a trading rule that can significantly outperform the benchmark. The result shows that for SSCI, technical trading rules offer significant profitability, while for CSI 300, this ability is lost. We further partition the SSCI into two sub-series and find that the efficiency of technical trading in sub-series, which have exactly the same spanning period as that of CSI 300, is severely weakened. By testing the trading rules on both indexes with a five-year moving window, we find that during the financial bubble from 2005 to 2007, the effectiveness of technical trading rules is greatly improved. This is consistent with the predictive ability of technical trading rules which appears when the market is less efficient.
Technical Secondary Education in Togo and Cameroon--Research Note.
ERIC Educational Resources Information Center
Paul, Jean-Jacques
1990-01-01
Evaluates technical secondary education in Togo and Cameroon from the market perspective, using tracer study data. To help overcome difficulties in finding employment after training, many individuals secure work in the low-paying informal sector. One solution is to stimulate and enhance the role of informal training through apprentice training…
77 FR 55216 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-07
..., due to technical difficulties, the documents associated with the information collection request were not made available to the public until August 14, 2012. Because of the technical difficulties, CMS is... Social Security Act (SSA) requires Medicare health plans to provide enrollees with a written notice in...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-01
... Laboratory Accreditation for External Dosimetry AGENCY: Office of Health, Safety and Security, Department of... Department) is issuing Technical Standard DOE-STD-1095-2011, Department of Energy Laboratory Accreditation... part, to determine whether to accredit dosimetry programs in accordance with the DOE Laboratory...
20 CFR 438.205 - Professional and technical services.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Section 438.205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION RESTRICTIONS ON LOBBYING Activities by... influence made by a professional (such as a licensed lawyer) or a technical person (such as a licensed..., communications with the intent to influence made by a lawyer that do not provide legal advice or analysis...
20 CFR 438.205 - Professional and technical services.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 438.205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION RESTRICTIONS ON LOBBYING Activities by... influence made by a professional (such as a licensed lawyer) or a technical person (such as a licensed..., communications with the intent to influence made by a lawyer that do not provide legal advice or analysis...
Code of Federal Regulations, 2013 CFR
2013-10-01
... record systems. The Chief Information Officer has the responsibility of maintaining adequate technical... the Chief Information Officer. The log shall be maintained at all times. (6) The Institute shall... identifiable personal information. Such safeguards must be sufficient to prevent negligent, accidental, or...
Code of Federal Regulations, 2012 CFR
2012-10-01
... record systems. The Chief Information Officer has the responsibility of maintaining adequate technical... the Chief Information Officer. The log shall be maintained at all times. (6) The Institute shall... identifiable personal information. Such safeguards must be sufficient to prevent negligent, accidental, or...
Code of Federal Regulations, 2014 CFR
2014-10-01
... record systems. The Chief Information Officer has the responsibility of maintaining adequate technical... the Chief Information Officer. The log shall be maintained at all times. (6) The Institute shall... identifiable personal information. Such safeguards must be sufficient to prevent negligent, accidental, or...
Code of Federal Regulations, 2011 CFR
2011-10-01
... record systems. The Chief Information Officer has the responsibility of maintaining adequate technical... the Chief Information Officer. The log shall be maintained at all times. (6) The Institute shall... identifiable personal information. Such safeguards must be sufficient to prevent negligent, accidental, or...
Code of Federal Regulations, 2013 CFR
2013-04-01
... data communications between system components? 547.15 Section 547.15 Indians NATIONAL INDIAN GAMING... AND EQUIPMENT § 547.15 What are the minimum technical standards for electronic data communications between system components? (a) Sensitive data. Communication of sensitive data must be secure from...
Code of Federal Regulations, 2014 CFR
2014-04-01
... data communications between system components? 547.15 Section 547.15 Indians NATIONAL INDIAN GAMING... AND EQUIPMENT § 547.15 What are the minimum technical standards for electronic data communications between system components? (a) Sensitive data. Communication of sensitive data must be secure from...
Space lab system analysis: Advanced Solid Rocket Motor (ASRM) communications networks analysis
NASA Technical Reports Server (NTRS)
Ingels, Frank M.; Moorhead, Robert J., II; Moorhead, Jane N.; Shearin, C. Mark; Thompson, Dale R.
1990-01-01
A synopsis of research on computer viruses and computer security is presented. A review of seven technical meetings attended is compiled. A technical discussion on the communication plans for the ASRM facility is presented, with a brief tutorial on the potential local area network media and protocols.
10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.
Code of Federal Regulations, 2010 CFR
2010-01-01
... the security and privacy of personal data. (4) The disposal and disposition of identifiable personal... contained in a system of records are adequately trained to protect the security and privacy of such records....114 Section 1304.114 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.114...
Energy Relations in Russia: Administration, Politics and Security
ERIC Educational Resources Information Center
Makarychev, Andrey
2005-01-01
This chapter analyses energy relations through a prism of three interlinked concepts: administration, politics and security. This triad describes the basic approaches to questions about technical, politicised and securitised energy. These three concepts are logically linked to one another and represent an elementary matrix; a prism through which…
Channels: Runtime System Infrastructure for Security-typed Languages
2008-10-01
Milan , Italy, September 2005. Springer-Verlag. [2] D. E. Bell and L. J. LaPadula. Secure computer system: Uni- fied exposition and Multics...Proceedings of the USENIX Annual Technical Conference, Santa Clara, CA, USA, June 2007. To appear. [9] S. Kamara, S. Fahmy, E. Schultz , F. Kerschbaum, and
GINSU: Guaranteed Internet Stack Utilization
2005-11-01
Computer Architecture Data Links, Internet , Protocol Stacks 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY...AFRL-IF-RS-TR-2005-383 Final Technical Report November 2005 GINSU: GUARANTEED INTERNET STACK UTILIZATION Trusted... Information Systems, Inc. Sponsored by Defense Advanced Research Projects Agency DARPA Order No. ARPS APPROVED FOR PUBLIC
22 CFR 1003.4 - Inter-American Foundation system of records requirements.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., technical, and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in..., retention, and disposal of the records; (6) The title and business address of the Inter-American Foundation...
Security of Personal Computer Systems: A Management Guide.
ERIC Educational Resources Information Center
Steinauer, Dennis D.
This report describes management and technical security considerations associated with the use of personal computer systems as well as other microprocessor-based systems designed for use in a general office environment. Its primary objective is to identify and discuss several areas of potential vulnerability and associated protective measures. The…
NASA Astrophysics Data System (ADS)
Orłowski, Z.; Radziejowska, A.; Orłowski, M.
2017-10-01
In the article the authors consider one of the basic aspects of sustainable construction regarding the social utility of a building. According to standard PN-EN 16309+A1:2014-12 during evaluating the social aspect should be assessed six categories: accessibility, adaptability, comfort and health, neighborhood, maintenance, safety and security. The authors present the evaluation criteria witch should be taken into account in the assessment of the second of them. Adaptability has been divided into three categories: The buidling’s ability to accomodate the change of user requirements, The buidling’s ability to accomodate technical changes, The buidling’s ability to accomodate the change of use. Each subcategory has been further elaborated by the criteria for which authors present proposal for the scale of assessments. The authors present a part of a work to construct a method for assessing the social characteristics of the residential buildings.
Technical Efficiency of Hospitals in Tehran, Iran.
Kakeman, Edris; Rahimi Forushani, Abbas; Dargahi, Hossein
2016-04-01
Nowadays, restriction on access and optimum use of resources is the main challenge of development in all organizations. Therefore, the aim of this study was to determine the technical efficiency and its factors, influencing hospitals of Tehran. This research was a descriptive-analytical and retrospective study conducted in 2014-2015. Fifty two hospitals with public, private, and social security ownership type were selected for this study. The required data was collected by a researcher-made check list in 3 sections of background data, inputs and outputs. The data was analyzed by DEAP 1.0.2, and STATA-13 technique. Seventeen (31/48) of hospitals had the efficiency score of 1 as the highest technical efficiency. The highest average score of efficiency was related to social security hospitals as 84.32, and then the public and private hospitals with the average of 84.29 and 79.64 respectively. Tobit regression results showed that the size, type of practice, and ownership of hospitals were effective on the degree of their technical efficiency. However, there was no significant correlation between teaching / non-teaching hospitals with technical efficiency. Establishment of competition system among hospitals, constitution of medium size hospitals and allocation of budget to hospitals based on national accreditation system are recommended.
National Technology Center and photonics
NASA Astrophysics Data System (ADS)
Vlannes, Nickolas P.
1992-05-01
A National Technology Center is proposed in order to meet the international challenges to the economy and security of the United States. This center would be tasked with the acquisition, analysis, assessment, and dissemination of worldwide scientific and technical information and data; technology transfer to the United States; and research and development in information and library sciences and technology. The National Technology Center would form a national network linking centers of excellence and expertise, and maintain a national technology library. With these functions, the National Technology Center has inherent requirements for technologies based on photonics, and will further motivate developments in this field.
Moudy, Robin M; Ingerson-Mahar, Michael; Kanter, Jordan; Grant, Ashley M; Fisher, Dara R; Jones, Franca R
2014-01-01
In 2011, President Obama addressed the United Nations General Assembly and urged the global community to come together to prevent, detect, and fight every kind of biological danger, whether a pandemic, terrorist threat, or treatable disease. Over the past decade, the United States and key international partners have addressed these dangers through a variety of programs and strategies aimed at developing and enhancing countries' capacity to rapidly detect, assess, report, and respond to acute biological threats. Despite our collective efforts, however, an increasingly interconnected world presents heightened opportunities for human, animal, and zoonotic diseases to emerge and spread globally. Further, the technical capabilities required to develop biological agents into a weapon are relatively low. The launch of the Global Health Security Agenda (GHSA) provides an opportunity for the international community to enhance the linkages between the health and security sectors, accelerating global efforts to prevent avoidable epidemics and bioterrorism, detect threats early, and respond rapidly and effectively to biological threats. The US Department of Defense (DoD) plays a key role in achieving GHSA objectives through its force health protection, threat reduction, and biodefense efforts at home and abroad. This article focuses on GHSA activities conducted in the DoD Office of the Assistant Secretary of Defense for Nuclear, Chemical, and Biological Defense.
An accountability server for health care information systems.
Kowalski, S
1994-02-01
The paper starts off by first briefly discussing the necessary ethical, legal and administrative/management controls that are required before the mechanisms of accountability controls can be implemented in automated clinical patient record systems. After these social aspects are discussed the technical aspects of the ALS are outlined. The security concepts of the ECMA framework are reviewed and used to explain the technical design of the ALS. A walk-through of the server in a typical patient record transaction is used to explain the operations of the server. The paper concludes with a general discussion of the usefulness of accountability mechanisms in making security in health care information work in practice.
NASA Astrophysics Data System (ADS)
McCamey, Rotorua
The current economic and security challenges placed an additional burden on U.S. airlines to provide optimum service at reasonable costs to the flying public. In efforts to stay competitive, U.S. airlines increased foreign-based outsourcing of aircraft major repair and overhaul (MRO) mainly to reduce labor costs and conserve capital. This concentrated focus on outsourcing and restructuring, ignored job dissatisfaction among remaining employees which could reduce and or eliminate an airline's competitiveness. The purpose of this quantitative study was (a) to assess the relationship between increased levels of foreign-based MRO outsourcing and aviation professionals' job satisfaction (Y1); (b) to assess the influence of increased levels of foreign-based outsourcing on MRO control (Y2), MRO error rate (Y3), and MRO technical punctuality (Y4) as perceived by aviation professionals; and (c) to assess the influence of increased levels of foreign-based MRO outsourcing on technical skills (Y5) and morale ( Y6) as perceived by aviation professionals. The survey instrument was utilized based on Paul Spector's Job Satisfaction Questionnaire and MRO specific questions. A random sample of 300 U.S. airline participants was requested via MarketTools to meet required sample size of 110 as determined through a priori power analysis. Study data rendered 198 useable surveys of 213 total responses, and correlation, multiple regression, and ANOVA methods were used to test study hypotheses. The Spearman's rho for (Y 1) was statistically significant, p = .010 and multiple regression was statistically significant, p < .001. A one-way ANOVA indicated participants differed in their opinions of (Y2) through (Y6), Recommendations for future research include contrasting domestic and global MRO providers, and examining global aircraft parts suppliers and aviation technical training.
Steady state security assessment in deregulated power systems
NASA Astrophysics Data System (ADS)
Manjure, Durgesh Padmakar
Power system operations are undergoing changes, brought about primarily due to deregulation and subsequent restructuring of the power industry. The primary intention of the introduction of deregulation in power systems was to bring about competition and improved customer focus. The underlying motive was increased economic benefit. Present day power system analysis is much different than what it was earlier, essentially due to the transformation of the power industry from being cost-based to one that is price-based and due to open access of transmission networks to the various market participants. Power is now treated as a commodity and is traded in an open market. The resultant interdependence of the technical criteria and the economic considerations has only accentuated the need for accurate analysis in power systems. The main impetus in security analysis studies is on efficient assessment of the post-contingency status of the system, accuracy being of secondary consideration. In most cases, given the time frame involved, it is not feasible to run a complete AC load flow for determining the post-contingency state of the system. Quite often, it is not warranted as well, as an indication of the state of the system is desired rather than the exact quantification of the various state variables. With the inception of deregulation, transmission networks are subjected to a host of multilateral transactions, which would influence physical system quantities like real power flows, security margins and voltage levels. For efficient asset utilization and maximization of the revenue, more often than not, transmission networks are operated under stressed conditions, close to security limits. Therefore, a quantitative assessment of the extent to which each transaction adversely affects the transmission network is required. This needs to be done accurately as the feasibility of the power transactions and subsequent decisions (execution, curtailment, pricing) would depend upon the outcome of the analysis. Also considering the large number of transactions occurring in the power market, and the massive sizes of transmission networks, the need for efficient analysis techniques is further highlighted. Thus on the whole, for present-day power systems, security assessment has acquired predominant importance. The primary emphasis of the work done in this dissertation is on development of techniques for fast assessment of the state of the transmission network following credible contingencies in traditional and deregulated power systems. In addition, methodologies for optimal correction strategies in the event of violation of security limits are also proposed. The work done can be enumerated as: (1) development of fast methods to assess the state of the transmission network from the point of view of loading margin and power flows, following increased loading conditions and line outages; (2) development of a comprehensive scheme to assess the impact of bilateral transactions on the operating state of the network; (3) optimal rescheduling of generation and curtailable loads for relieving the system of congestion and simultaneously maximizing the security margins.
Properties of some statistics for AR-ARCH model with application to technical analysis
NASA Astrophysics Data System (ADS)
Huang, Xudong; Liu, Wei
2009-03-01
In this paper, we investigate some popular technical analysis indexes for AR-ARCH model as real stock market. Under the given conditions, we show that the corresponding statistics are asymptotically stationary and the law of large numbers hold for frequencies of the stock prices falling out normal scope of these technical analysis indexes under AR-ARCH, and give the rate of convergence in the case of nonstationary initial values, which give a mathematical rationale for these methods of technical analysis in supervising the security trends.
The Challenges of Seeking Security While Respecting Privacy
NASA Astrophysics Data System (ADS)
Kantor, Paul B.; Lesk, Michael E.
Security is a concern for persons, organizations, and nations. For the individual members of organizations and nations, personal privacy is also a concern. The technologies for monitoring electronic communication are at the same time tools to protect security and threats to personal privacy. Participants in this workshop address the interrelation of personal privacy and national or societal security, from social, technical and legal perspectives. The participants represented industry, the academy and the United States Government. The issues addressed have become, if anything, even more pressing today than they were when the conference was held.
Implementing secure laptop-based testing in an undergraduate nursing program: a case study.
Tao, Jinyuan; Lorentz, B Chris; Hawes, Stacey; Rugless, Fely; Preston, Janice
2012-07-01
This article presents the implementation of secure laptop-based testing in an undergraduate nursing program. Details on how to design, develop, implement, and secure tests are discussed. Laptop-based testing mode is also compared with the computer-laboratory-based testing model. Five elements of the laptop-based testing model are illustrated: (1) it simulates the national board examination, (2) security is achievable, (3) it is convenient for both instructors and students, (4) it provides students hands-on practice, (5) continuous technical support is the key.
Potential uses of a wireless network in physical security systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Witzke, Edward L.
2010-07-01
Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing physical security is first given. Next, numerous applications of a wireless network are brought forth. The technical issues that arise when using a wireless network to support these applications are then discussed. Finally, a summary is presented.
Why robots should not be delegated with the decision to kill
NASA Astrophysics Data System (ADS)
Sharkey, Noel
2017-04-01
The EPSRC first principle of robotics, "robots should not be designed solely or primarily to kill or harm humans, except in the interests of national security", is challenged in detail here. Focusing on security and armed conflict, arguments are marshalled against the principle on ethical, legal, technical and security grounds. A new principle is proposed that robots should never be delegated with the decision to apply violent force to humans.
Reliable Video Analysis Helps Security Company Grow
Meurer, Dave; Furgal, Dave; Hobson, Rick
2018-05-11
Armed Response Team (ART) has grown to become the largest locally owned security company in New Mexico. With technical assistance from Sandia National Laboratories through the New Mexico Small Business Assistance (NMSBA) Program, ART got help so they could quickly bring workable video security solutions to market. By offering a reliable video analytic camera system, theyâve been able to reduce theft, add hundreds of clients, and increase their number of employees.
Test and Evaluation of Video Teleconferencing at 56 kbps.
1985-03-01
ll-ll - - llI .. -.. . .- - UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (Whan Date BAnterd _________________ jREPORT DOCUMENTATION PAGE BFR...NUMBER OFPAGES Washington, D.C. 20305-2010 123 1.MONITORING AGENCY NAME h ADDRESS(tI different from Controlling Office) IS. SECURITY CLASS. (of this... SECURITY CL ASSIICA1 ION OF TH13 PAGEWM~ DOOM EfntenE) -7- 7. NCS TECHNICAL INFORMATION BULLETIN 85-3 TEST AND EVALUATION OF VIDEO TELECONFERENCING AT 56
Operating in the Gray Zone: An Alternative Paradigm for U.S. Military Strategy
2016-04-01
labeling, or re-labeling, may have been to draw the attention of busy policymakers to rapidly emerging security issues , it has evolved into something... issues affecting the national security community. The Peacekeeping and Stability Operations Institute provides subject matter expertise, technical...SSI) is part of the U.S. Army War College and is the strategic-level study agent for issues related to national security and military strategy with
Challenges and Security in Cloud Computing
NASA Astrophysics Data System (ADS)
Chang, Hyokyung; Choi, Euiin
People who live in this world want to solve any problems as they happen then. An IT technology called Ubiquitous computing should help the situations easier and we call a technology which makes it even better and powerful cloud computing. Cloud computing, however, is at the stage of the beginning to implement and use and it faces a lot of challenges in technical matters and security issues. This paper looks at the cloud computing security.
Nonlinear Interactions between Laser Radiation and Spin-Aligned Carriers in Semiconductors.
1980-11-25
Massachusetts 02154 AIR FORCE OFFICEK OF SCIWMTIFIC RESWACHi (AISC) NOTICE OF TRJAZSMITTAL TO DDC This techniical raouti has been reviewed an I approved...f’or PuAli release JAN A.FR 190-12 (7b). Distribution is wilimited. &. D. BLOSA Technical Inorwatiom Oftlee UNCLASSIFIED SECURITY CLASSIFICATION OF...well. The material of choice D I 1473 UNCLASSIFIED.6- SECURITY CLASSIFICATION OF THIS PAGE (mien Deta Entered) UNCLASSIFIED SECURITY CLASSIFICATION OF
Research on information security system of waste terminal disposal process
NASA Astrophysics Data System (ADS)
Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei
2017-05-01
Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.
Towards Dynamic Authentication in the Grid — Secure and Mobile Business Workflows Using GSet
NASA Astrophysics Data System (ADS)
Mangler, Jürgen; Schikuta, Erich; Witzany, Christoph; Jorns, Oliver; Ul Haq, Irfan; Wanek, Helmut
Until now, the research community mainly focused on the technical aspects of Grid computing and neglected commercial issues. However, recently the community tends to accept that the success of the Grid is crucially based on commercial exploitation. In our vision Foster's and Kesselman's statement "The Grid is all about sharing." has to be extended by "... and making money out of it!". To allow for the realization of this vision the trust-worthyness of the underlying technology needs to be ensured. This can be achieved by the use of gSET (Gridified Secure Electronic Transaction) as a basic technology for trust management and secure accounting in the presented Grid based workflow. We present a framework, conceptually and technically, from the area of the Mobile-Grid, which justifies the Grid infrastructure as a viable platform to enable commercially successful business workflows.
REMOVAL OF LEGACY PLUTONIUM MATERIALS FROM SWEDEN
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dunn, Kerry A.; Bellamy, J. Steve; Chandler, Greg T.
2013-08-18
U.S. Department of Energy’s National Nuclear Security Administration (NNSA) Office of Global Threat Reduction (GTRI) recently removed legacy plutonium materials from Sweden in collaboration with AB SVAFO, Sweden. This paper details the activities undertaken through the U.S. receiving site (Savannah River Site (SRS)) to support the characterization, stabilization, packaging and removal of legacy plutonium materials from Sweden in 2012. This effort was undertaken as part of GTRI’s Gap Materials Program and culminated with the successful removal of plutonium from Sweden as announced at the 2012 Nuclear Security Summit. The removal and shipment of plutonium materials to the United States wasmore » the first of its kind under NNSA’s Global Threat Reduction Initiative. The Environmental Assessment for the U.S. receipt of gap plutonium material was approved in May 2010. Since then, the multi-year process yielded many first time accomplishments associated with plutonium packaging and transport activities including the application of the of DOE-STD-3013 stabilization requirements to treat plutonium materials outside the U.S., the development of an acceptance criteria for receipt of plutonium from a foreign country, the development and application of a versatile process flow sheet for the packaging of legacy plutonium materials, the identification of a plutonium container configuration, the first international certificate validation of the 9975 shipping package and the first intercontinental shipment using the 9975 shipping package. This paper will detail the technical considerations in developing the packaging process flow sheet, defining the key elements of the flow sheet and its implementation, determining the criteria used in the selection of the transport package, developing the technical basis for the package certificate amendment and the reviews with multiple licensing authorities and most importantly integrating the technical activities with the Swedish partners.« less
ERIC Educational Resources Information Center
BEARD, H.G.
THIRTY-THREE STATE-LEVEL LEADERS WITH RESEARCH RESPONSIBILITIES IN VOCATIONAL-TECHNICAL EDUCATION FROM 23 STATES AND TERRITORIES ATTENDED THE SEMINAR WHICH HAD THE OBJECTIVES TO -- (1) SECURE A BETTER UNDERSTANDING OF THE PROBLEMS AND DECISIONS FACING EDUCATIONAL POLICYMAKERS, PROGRAM PLANNERS, ADMINISTRATORS, AND TEACHERS, (2) DEVELOP A…
Higher Education in Kazakhstan and the Bologna Process
ERIC Educational Resources Information Center
Piven, G.; Pak, I.U.
2006-01-01
The constantly rising role of higher education in the twenty-first century goes hand in hand with scientific and technical progress and the global technologization of the developed countries of the world. A country's level of technical and technological development determines its economic condition, its national security, and its role in the world…
19 CFR 115.65 - Technical requirements for road vehicles by design type.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 19 Customs Duties 1 2012-04-01 2012-04-01 false Technical requirements for road vehicles by design type. 115.65 Section 115.65 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO...
19 CFR 115.65 - Technical requirements for road vehicles by design type.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 19 Customs Duties 1 2011-04-01 2011-04-01 false Technical requirements for road vehicles by design type. 115.65 Section 115.65 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO...
19 CFR 115.65 - Technical requirements for road vehicles by design type.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 19 Customs Duties 1 2013-04-01 2013-04-01 false Technical requirements for road vehicles by design type. 115.65 Section 115.65 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO...
19 CFR 115.65 - Technical requirements for road vehicles by design type.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 19 Customs Duties 1 2014-04-01 2014-04-01 false Technical requirements for road vehicles by design type. 115.65 Section 115.65 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO...
19 CFR 115.65 - Technical requirements for road vehicles by design type.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 19 Customs Duties 1 2010-04-01 2010-04-01 false Technical requirements for road vehicles by design type. 115.65 Section 115.65 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-14
... DEPARTMENT OF HOMELAND SECURITY U. S. Customs and Border Protection 19 CFR Part 141 [USCBP-2008-0062; CBP Dec. 10-34] RIN 1515-AD61 (Formerly 1505-AB96) Technical Correction: Completion of Entry and Entry Summary-- Declaration of Value; Correction AGENCY: Customs and Border Protection, Department of...
75 FR 47738 - Acknowledgment Letters for Customer Funds and Secured Amount Funds
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-09
... of foreign futures or foreign options customers, and certain technical changes. DATES: Submit... foreign futures and foreign options customers. \\1\\ See 17 CFR 1.3(gg) (defining the term ``customer funds...-199. \\5\\ See 17 CFR 1.3(rr) (defining the term ``foreign futures or foreign options secured amount...
A Delicate Balance: National Security vs. Public Access
ERIC Educational Resources Information Center
Klein, Bonnie; Schwalb, Sandy
2005-01-01
Sometimes people want to see data that the government thinks should be kept under wraps. How does the Department of Defense balance the scales of justice while still ensuring information security? In the aftermath of September 11, 2001, the Defense Technical Information Center (DTIC) found itself in the spotlight as journalists, academics, and…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-02
...: Paper records are stored in file folders, binders, computer files (eLaw) and computer disks. Electronic records, including computer files, are stored on the Commission's network and other electronic media as... physical security measures. Technical security measures within CFTC include restrictions on computer access...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-27
...://www.treasurydirect.gov . Paper Comments Send paper comments to Bureau of the Public Debt, Government... includes commercial paper, which, in order to receive the more favorable haircut treatment of Treasury..., each in regard to commercial paper. NRSROs are credit rating agencies that are subject to Securities...
75 FR 1709 - Security Zone; Escorted U.S. Navy Submarines in Sector Seattle Captain of the Port Zone
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-13
... means reasonably available. Dated: December 16, 2009. G.T. Blore, Rear Admiral, U.S. Coast Guard... or otherwise impractical. Voluntary consensus standards are technical standards (e.g., specifications... (34)(g), of the Instruction. This rule involves the establishment of a security zone. An environmental...
Security challenges in integration of a PHR-S into a standards based national EHR.
Mense, Alexander; Hoheiser Pförtner, Franz; Sauermann, Stefan
2014-01-01
Health related data provided by patients themselves is expected to play a major role in future healthcare. Data from personal health devices, vaccination records, health diaries or observations of daily living, for instance, is stored in personal health records (PHR) which are maintained by personal health record systems (PHR-S). Combining this information with medical records provided by healthcare providers in electronic health records (EHR) is one of the next steps towards "personal care". Austria currently sets up a nationwide EHR system that incorporates all healthcare providers and is technically based on international standards (IHE, HL7, OASIS, ...). Looking at the expected potential of merging PHR and EHR data it is worth to analyse integration approaches. Although knowing that an integration requires the coordination of processes, information models and technical architectures, this paper specifically focuses on security issues by evaluating general security requirements for a PHR-S (based on HL7 PHR-S FM), comparing them with the information security specifications for the Austrian's national EHR (based on ISO/IES 27000 series) and identifying the main challenges as well as possible approaches.
Final Technical Report. Project Boeing SGS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bell, Thomas E.
Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less
Jahn, Michelle A; Porter, Brian W; Patel, Himalaya; Zillich, Alan J; Simon, Steven R; Russ, Alissa L
2018-04-01
Web-based patient portals feature secure messaging systems that enable health care providers and patients to communicate information. However, little is known about the usability of these systems for clinical document sharing. This article evaluates the usability of a secure messaging system for providers and patients in terms of its ability to support sharing of electronic clinical documents. We conducted usability testing with providers and patients in a human-computer interaction laboratory at a Midwestern U.S. hospital. Providers sent a medication list document to a fictitious patient via secure messaging. Separately, patients retrieved the clinical document from a secure message and returned it to a fictitious provider. We collected use errors, task completion, task time, and satisfaction. Twenty-nine individuals participated: 19 providers (6 physicians, 6 registered nurses, and 7 pharmacists) and 10 patients. Among providers, 11 (58%) attached and sent the clinical document via secure messaging without requiring assistance, in a median (range) of 4.5 (1.8-12.7) minutes. No patients completed tasks without moderator assistance. Patients accessed the secure messaging system within 3.6 (1.2-15.0) minutes; retrieved the clinical document within 0.8 (0.5-5.7) minutes; and sent the attached clinical document in 6.3 (1.5-18.1) minutes. Although median satisfaction ratings were high, with 5.8 for providers and 6.0 for patients (scale, 0-7), we identified 36 different use errors. Physicians and pharmacists requested additional features to support care coordination via health information technology, while nurses requested features to support efficiency for their tasks. This study examined the usability of clinical document sharing, a key feature of many secure messaging systems. Our results highlight similarities and differences between provider and patient end-user groups, which can inform secure messaging design to improve learnability and efficiency. The observations suggest recommendations for improving the technical aspects of secure messaging for clinical document sharing. Schattauer GmbH Stuttgart.
Defining Information Security.
Lundgren, Björn; Möller, Niklas
2017-11-15
This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.
NASA Astrophysics Data System (ADS)
Brown, Willie L., Jr.
Global terrorism continues to persist despite the great efforts of various countries to protect and safely secure their citizens. As airports form the entry and exit ports of a country, they are one of the most vulnerable locations to terror attacks. Managers of international airports constantly face similar challenges in developing and implementing airport security protocols. Consequently, the technological advances of today have brought both positive and negative impacts on security and terrorism of airports, which are mostly managed by the airport managers. The roles of the managers have greatly increased over the years due to technological advances. The developments in technology have had different roles in security, both in countering terrorism and, at the same time, increasing the communication methods of the terrorists. The purpose of this qualitative multiple case study was to investigate the perspectives of airport managers with regard to societal security and social interactions in the socio-technical systems of the National Terrorism Advisory System (NTAS). Through the data gained regarding managers' perception and experiences, the researcher hoped to enable the development of security measures and policies that are appropriate for airports as socio-technical systems. The researcher conducted interviews with airport managers to gather relevant data to fulfill the rationale of the study. Ten to twelve airport managers based in three commercial aviation airports in Maryland, United States participated in the study. The researcher used a qualitative thematic analysis procedure to analyze the data responses of participants in the interview sessions.
Organizing safety: conditions for successful information assurance programs.
Collmann, Jeff; Coleman, Johnathan; Sostrom, Kristen; Wright, Willie
2004-01-01
Organizations must continuously seek safety. When considering computerized health information systems, "safety" includes protecting the integrity, confidentiality, and availability of information assets such as patient information, key components of the technical information system, and critical personnel. "High Reliability Theory" (HRT) argues that organizations with strong leadership support, continuous training, redundant safety mechanisms, and "cultures of high reliability" can deploy and safely manage complex, risky technologies such as nuclear weapons systems or computerized health information systems. In preparation for the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the Office of the Assistant Secretary of Defense (Health Affairs), the Offices of the Surgeons General of the United States Army, Navy and Air Force, and the Telemedicine and Advanced Technology Research Center (TATRC), US Army Medical Research and Materiel Command sponsored organizational, doctrinal, and technical projects that individually and collectively promote conditions for a "culture of information assurance." These efforts include sponsoring the "P3 Working Group" (P3WG), an interdisciplinary, tri-service taskforce that reviewed all relevant Department of Defense (DoD), Miliary Health System (MHS), Army, Navy and Air Force policies for compliance with the HIPAA medical privacy and data security regulations; supporting development, training, and deployment of OCTAVE(sm), a self-directed information security risk assessment process; and sponsoring development of the Risk Information Management Resource (RIMR), a Web-enabled enterprise portal about health information assurance.
A Study on the Interrelations between the Security-Related Antecedents of Customers' Online Trust
NASA Astrophysics Data System (ADS)
Peikari, Hamid Reza
Despite the wide attention of previous studies to explore the influence of different security-related factors on customers' online trust, the interrelations between such factors and their direct and indirect influences on customers' trust have been neglected. This study investigates the direct and indirect interrelations between the factors authentication, encryption, technical protection and externally provided assurances including third party security and privacy seals with customers' trust in the business-to-customer (B2C) environment. The data was collected from 238 respondents and after the test of reliability and validity of the scale, the hypotheses were tested using structural equation modeling. The results showed that customers' perception of encryption and authentication mechanisms implemented by a Website have a positive significant influence on their perceived technical protection while technical protection was found to significantly influence customers' trust to the Website. However, the analysis did not find any relation between the third party assurance and customers' trust, indicating that despite the high expenses companies involve to obtain such assurances from reputed third parties, such mechanisms and assurances do not have any direct or indirect significant influence on customers' trust; which raises questions on the value of such mechanisms .finally, after discussing the findings and implication of this study for both academic and business worlds, suggestions for future studies were made to have a better understanding of the dimensions of the interrelations between the security-related factors.
33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...
33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...
33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...
33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...
33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The...
2013-01-01
Background Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient’s TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Methods Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO’s standard for information security risk management. Results A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Conclusions Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy. PMID:23937965
Focus on Resiliency: A Process-Oriented Approach to Security
2005-11-01
by ANSI Std Z39-18 © 2005 Carnegie Mellon University CSI v1.0 2 Agenda About the SEI Characterizing the problem Security, resiliency, and risk A...2005 Carnegie Mellon University CSI v1.0 5 SEI Technical Programs Product Line Systems Dynamic Systems Software Engineering Process Management...University CSI v1.0 7 What is the problem? Is your organization’s security capability sufficient to identify and manage risks that result from failed
Jiménez Calvo, J; Hualde Alfaro, A; Raigoso Ortega, O; Cebrian Lostal, J L; Alvarez Bandres, S; Jiménez Parra, J; Montesino Semper, M; Santiago Gonzalez de Garibay, A
2008-01-01
The purpose of this publication is to describe the surgical technique, assess complications and short-term results of TVT secur and MiniArc tapes. From October 2006 to August 2007 it was carried out the surgical correction with TVT Secur,Women's Health & Urology, Ethicon, Johnson & Johnson, placing the tape as a hammock, to 51 patients, 38 of them with pure stress incontinence and 13 with mixed incontinence and with an average age of 57 years. From September 2007 to February 2008 41 patients, 33 of them with pure stress incontinence and 8 with mixed incontinence, with an average of age of 58 years were operated with AMS Miniarc swing system tape, posted on hammock. All procedures were performed with sedoanalgesia and Ambulatory Surgery regime. Patients were monitored in outpatient visits one month, 3 months and one year after surgical procedure. Medical history and questionnaire and ICIQ-SF, to which we added a question to quantify the degree of satisfaction, as well as physical examination, were done. We compared the results of both technical procedures and statistical survey was conducted by Student test. [Analysis with SPSS software (V14.0)]. The median follow-up in TVT secur group was 328 days (range 163-522 days) and 101 days (range 41-209 days) inthe MiniArc group. We only had one (TVT secur group) surgical complication in all the series (92 patients) being a bladder perforation. Taking into account that we read a negative test effort as an objective cure in the TVT secur group, 80.4% patients are cured and 90.2% inthe MiniArc group without significant difference between both groups (p 0095). To assess the subjective healing we utilized the ICIQ-SF test and the satisfaction extra-question and we noted that there is no significant difference between the first and third month controls. (90% of patients satisfied). 80% of patients were completely satisfied in the first year control that was only performed to TVT secur group. These new tapes show fewer complications that the TVT-O and TOT tapes and allow the possibility of placement with local anesthesia but further studies are needed.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for... SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.15 Access to cargo: Security threat... must successfully complete a security threat assessment or comparable security threat assessment...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
When trust defies common security sense.
Williams, Patricia A H
2008-09-01
Primary care medical practices fail to recognize the seriousness of security threats to their patient and practice information. This can be attributed to a lack of understanding of security concepts, underestimation of potential threats and the difficulty in configuration of security technology countermeasures. To appreciate the factors contributing to such problems, research into general practitioner security practice and perceptions of security was undertaken. The investigation focused on demographics, actual practice, issues and barriers, and practitioner perception. Poor implementation, lack of relevant knowledge and inconsistencies between principles and practice were identified as key themes. Also the results revealed an overwhelming reliance on trust in staff and in computer information systems. This clearly identified that both cultural and technical attributes contribute to the deficiencies in information security practice. The aim of this research is to understand user needs and problems when dealing with information security practice.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, G.; Mansur, D.L.; Ruhter, W.D.
1994-01-01
The Lawrence Livermore National Laboratory (LLNL) carries out safeguards and security activities for the Department of Energy (DOE), Office of Safeguards and Security (OSS), as well as other organizations, both within and outside the DOE. This document summarizes the activities conducted for the OSS during the first quarter of fiscal year 1994 (October through December, 1993). The nature and scope of the activities carried out for OSS at LLNL require a broad base of technical expertise. To assure projects are staffed and executed effectively, projects are conducted by the organization at LLNL best able to supply the needed technical expertise.more » These projects are developed and managed by senior program managers. Institutional oversight and coordination is provided through the LLNL Deputy Director`s office. At present, the Laboratory is supporting OSS in five areas: (1) Safeguards Technology, (2) Safeguards and Decision Support, (3) Computer Security, (4) DOE Automated Physical Security, and (5) DOE Automated Visitor Access Control System. This report describes the activities in each of these five areas. The information provided includes an introduction which briefly describes the activity, summary of major accomplishments, task descriptions with quarterly progress, summaries of milestones and deliverables and publications published this quarter.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, G.; Mansur, D.L.; Ruhter, W.D.
The Lawrence Livermore National Laboratory (LLNL) carries out safeguards and security activities for the Department of Energy (DOE), Office of Safeguards and Security (OSS), as well as other organizations, both within and outside the DOE. This document summarizes the activities conducted for the OSS during the First Quarter of Fiscal Year 1997 (October through December, 1996). The nature and scope of the activities carried out for OSS at LLNL require a broad base of technical expertise. To assure projects are staffed and executed effectively, projects are conducted by the organization at LLNL best able to supply the needed technical expertise.more » These projects are developed and managed by senior program managers. Institutional oversight and coordination is provided through the LLNL Deputy Director`s office. At present, the Laboratory is supporting OSS in four areas: (1) safeguards technology; (2) safeguards and material accountability; (3) computer security--distributed systems; and (4) physical and personnel security support. The remainder of this report describes the activities in each of these four areas. The information provided includes an introduction which briefly describes the activity, summary of major accomplishments, task descriptions with quarterly progress, summaries of milestones and deliverables and publications published this quarter.« less
Defending Against Advanced Persistent Threats Using Game-Theory.
Rass, Stefan; König, Sandra; Schauer, Stefan
2017-01-01
Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.
Career Technical Education: Keeping Adult Learners Competitive for High-Demand Jobs
ERIC Educational Resources Information Center
National Association of State Directors of Career Technical Education Consortium, 2011
2011-01-01
In today's turbulent economy, how can adult workers best position themselves to secure jobs in high-demand fields where they are more likely to remain competitive and earn more? Further, how can employers up-skill current employees so that they meet increasingly complex job demands? Research indicates that Career Technical Education (CTE) aligned…
Pellissippi State Technical Community College Five-Year Strategic Planning Directions, 1998-2003.
ERIC Educational Resources Information Center
Pellissippi State Technical Community Coll., Knoxville, TN.
The document contains the strategic plan for Pellissippi State Technical Community College (Tennessee). The previous five-year strategic plan, "The Pathfinder Project," was prepared in 1994 but was out of date before the end of the five-year planning cycle. To secure information for projecting new five-year strategic directions and goals…
ERIC Educational Resources Information Center
Long, Bridget A.
2012-01-01
As of 2012, 35,064 Missourians have filed for unemployment benefits and technical institutes are providing training that is becoming vitally important to secure employment in the 21st century. Marketing as a way of attracting prospective students to attend a vocational college is dependent on recruitment incentives. Consequently, the purpose of…
DOT National Transportation Integrated Search
2011-11-01
This report identifies the security approach associated with a communications data delivery system that supports vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. The report describes the risks associated with communication...
Collegiate Cyber Defense Competition Effort
2018-03-01
Energy – an electrical utility company. • 2016 : ODIN Security – a small aerospace and defense contracting firm Approved for Public Release...to secure supervisory control and data acquisition (SCADA) networks. Approved for Public Release; Distribution Unlimited 7 During the 2016 NCCDC...COLLEGIATE CYBER DEFENSE COMPETITION EFFORT UNIVERSITY OF TEXAS AT SAN ANTONIO MARCH 2018 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE
Science of Security Lablet - Scalability and Usability
2014-12-16
mobile computing [19]. However, the high-level infrastructure design and our own implementation (both described throughout this paper) can easily...critical and infrastructural systems demands high levels of sophistication in the technical aspects of cybersecurity, software and hardware design...Forget, S. Komanduri, Alessandro Acquisti, Nicolas Christin, Lorrie Cranor, Rahul Telang. "Security Behavior Observatory: Infrastructure for Long-term
2016 Emerging Technology Domains Risk Survey
2016-04-05
2016 Emerging Technology Domains Risk Survey Christopher King Dan Klinedinst Todd Lewellen Garret Wassermann April 2016 TECHNICAL REPORT...Unlimited [Checkoway 2011] Checkoway, Stephen; McCoy, Damon; Kantor, Brian; Anderson, Danny; Shacham, Hovav; Savage, Stefan. Comprehensive Experimental ...Koscher 2010] Koscher, Karl et al. “ Experimental Security Analysis of a Modern Automobile,” 447-462. IEEE Symposium on Security and Privacy
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... fees for real- time and historic data sets of transactions in TRACE-Eligible Securities \\5\\ that are... data sets; and (3) make other technical amendments. \\5\\ The term TRACE-Eligible Security is defined in... transactions and to establish real-time and historic data sets for Rule 144A transactions. The effective date...
Achieving Youth Employment and National Security in Nigeria: TVET Imperatives
ERIC Educational Resources Information Center
Ogbuanya, T. C.; Ofonmbuk, Michael
2015-01-01
The rate of unemployment in Nigeria is alarming and could promote social vices some of which are kidnapping, armed robbery, child trafficking, Cultism, Drug peddling and ritual killing. These social vices could in no small measure constitute a threat to national security as a matter of fact. Therefore, the development of a workable Technical and…
Climate science and famine early warning
Verdin, James P.; Funk, Chris; Senay, Gabriel B.; Choularton, R.
2005-01-01
Food security assessment in sub-Saharan Africa requires simultaneous consideration of multiple socio-economic and environmental variables. Early identification of populations at risk enables timely and appropriate action. Since large and widely dispersed populations depend on rainfed agriculture and pastoralism, climate monitoring and forecasting are important inputs to food security analysis. Satellite rainfall estimates (RFE) fill in gaps in station observations, and serve as input to drought index maps and crop water balance models. Gridded rainfall time-series give historical context, and provide a basis for quantitative interpretation of seasonal precipitation forecasts. RFE are also used to characterize flood hazards, in both simple indices and stream flow models. In the future, many African countries are likely to see negative impacts on subsistence agriculture due to the effects of global warming. Increased climate variability is forecast, with more frequent extreme events. Ethiopia requires special attention. Already facing a food security emergency, troubling persistent dryness has been observed in some areas, associated with a positive trend in Indian Ocean sea surface temperatures. Increased African capacity for rainfall observation, forecasting, data management and modelling applications is urgently needed. Managing climate change and increased climate variability require these fundamental technical capacities if creative coping strategies are to be devised.
Climate science and famine early warning.
Verdin, James; Funk, Chris; Senay, Gabriel; Choularton, Richard
2005-11-29
Food security assessment in sub-Saharan Africa requires simultaneous consideration of multiple socio-economic and environmental variables. Early identification of populations at risk enables timely and appropriate action. Since large and widely dispersed populations depend on rainfed agriculture and pastoralism, climate monitoring and forecasting are important inputs to food security analysis. Satellite rainfall estimates (RFE) fill in gaps in station observations, and serve as input to drought index maps and crop water balance models. Gridded rainfall time-series give historical context, and provide a basis for quantitative interpretation of seasonal precipitation forecasts. RFE are also used to characterize flood hazards, in both simple indices and stream flow models. In the future, many African countries are likely to see negative impacts on subsistence agriculture due to the effects of global warming. Increased climate variability is forecast, with more frequent extreme events. Ethiopia requires special attention. Already facing a food security emergency, troubling persistent dryness has been observed in some areas, associated with a positive trend in Indian Ocean sea surface temperatures. Increased African capacity for rainfall observation, forecasting, data management and modelling applications is urgently needed. Managing climate change and increased climate variability require these fundamental technical capacities if creative coping strategies are to be devised.
Climate science and famine early warning
Verdin, James; Funk, Chris; Senay, Gabriel; Choularton, Richard
2005-01-01
Food security assessment in sub-Saharan Africa requires simultaneous consideration of multiple socio-economic and environmental variables. Early identification of populations at risk enables timely and appropriate action. Since large and widely dispersed populations depend on rainfed agriculture and pastoralism, climate monitoring and forecasting are important inputs to food security analysis. Satellite rainfall estimates (RFE) fill in gaps in station observations, and serve as input to drought index maps and crop water balance models. Gridded rainfall time-series give historical context, and provide a basis for quantitative interpretation of seasonal precipitation forecasts. RFE are also used to characterize flood hazards, in both simple indices and stream flow models. In the future, many African countries are likely to see negative impacts on subsistence agriculture due to the effects of global warming. Increased climate variability is forecast, with more frequent extreme events. Ethiopia requires special attention. Already facing a food security emergency, troubling persistent dryness has been observed in some areas, associated with a positive trend in Indian Ocean sea surface temperatures. Increased African capacity for rainfall observation, forecasting, data management and modelling applications is urgently needed. Managing climate change and increased climate variability require these fundamental technical capacities if creative coping strategies are to be devised. PMID:16433101
Martín-Ruíz, María Luisa; Fernández-Aller, Celia; Portillo, Eloy; Malagón, Javier; Del Barrio, Cristina
2017-08-16
EDUCERE (Ubiquitous Detection Ecosystem to Care and Early Stimulation for Children with Developmental Disorders) is a government funded research and development project. EDUCERE objectives are to investigate, develop, and evaluate innovative solutions for society to detect changes in psychomotor development through the natural interaction of children with toys and everyday objects, and perform stimulation and early attention activities in real environments such as home and school. In the EDUCERE project, an ethical impact assessment is carried out linked to a minors' data protection rights. Using a specific methodology, the project has achieved some promising results. These include use of a prototype of smart toys to detect development difficulties in children. In addition, privacy protection measures which take into account the security concerns of health data, have been proposed and applied. This latter security framework could be useful in other Internet of Things related projects. It consists of legal and technical measures. Special attention has been placed in the transformation of bulk data such as acceleration and jitter of toys into health data when patterns of atypical development are found. The article describes the different security profiles in which users are classified.
1984-06-20
AD-A162 ±88 FEASIBILITY STUDY FOR A COMPUTERIZED SERIALS CONTROL 1/1 SYSTEM IN THE DEFENS (U) DEFENSE COMMUNICATIONS AGENCY WASHINGTON DC TECHNICAL...NATIONAL BUREAU OF STANDARDS- 1963-A 0FEASIBILITY STUDY FOR A COMPUTERIZED SERIALS CONTROL SYSTEM IN THE DEFENSE COMMUNICATIONS 0AGENCY TECHNICAL AND...ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION UNCLASSIFIED/UNLIMITED R1 SAME AS RPT. 0 DTIC USERS 0 UNCLASSIFIED 22&. NAME OF RESPONSIBLE INDIVIDUAL 22b
1993-12-01
Iaporta .. y be definitive for the tubjoct proaentod, exploratory in natura, or an evaluation of critical Aubayato• or of technical problema , 4...International Security 9 Social and Natural Science Studies Field 41 Edit: (Type 3) -Entry of an invalid code when Performance Type is "C" or "M" will...analysis SF Foreign area social science research SP Foreign area policy planAing research BF Identifies databases with data on foreign forces or
1988-09-01
Test and Evaluation Report Test and Evaluation of the Navy Technical Information Presentation System (NTIPS) F-14A Field Test Results by .0 Joseph J...PROGRAM PROJECT TASK WORK UNIT Washington, D.C. 20361 ELEMENT NO. NO. NO. ACCESSION NO. OMN 1820 11. TITLE (Include Security Classification) TEST AND...EVALUATION OF THE NAVY TECHNICAL INFORMATION PRESENTATION SYSTEM (NTIPS) F-14A FIELD TEST RESULTS 12. PERSONAL AUTHOR(S) Fuller, Joseph F. (DTRC) Post
1989-10-13
and other non -technical aspects of the system). System-wide Perspective. The systerm that is being designed and engineered must include not just the...specifications and is regarded as the lowest-level (implementation) of detail.-’ Ihis decomposition follows the typical "top down" design methodology ...formal verification process has contributed to the security and correctness of the TCB design and implementation. FORMUL METHODOLOGY DESCRIPTION The
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1984-01-01
Guidance is presented to NASA Computer Security Officials for determining the acceptability or unacceptability of ADP security risks based on the technical, operational and economic feasibility of potential safeguards. The risk management process is reviewed as a specialized application of the systems approach to problem solving and information systems analysis and design. Reporting the results of the risk reduction analysis to management is considered. Report formats for the risk reduction study are provided.
1983-03-01
have both a Federal and a State mission. The State mission is to provide protection of life and property and to preserve peace and public safety. The...logistics system is basically the same and will be integrated into the active system in wartime. Financial man- agement support consists of financial...the entire system is security. ErS is on contract to furnish basic security as well as a higher type of security known as the enhanced version
Spaceflight Operations Services Grid (SOSG) Project
NASA Technical Reports Server (NTRS)
Bradford, Robert; Lisotta, Anthony
2004-01-01
The motivation, goals, and objectives of the Space Operations Services Grid Project (SOSG) are covered in this viewgraph presentation. The goals and objectives of SOSG include: 1) Developing a grid-enabled prototype providing Space-based ground operations end user services through a collaborative effort between NASA, academia, and industry to assess the technical and cost feasibility of implementation of Grid technologies in the Space Operations arena; 2) Provide to space operations organizations and processes, through a single secure portal(s), access to all the information technology (Grid and Web based) services necessary for program/project development, operations and the ultimate creation of new processes, information and knowledge.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Taylor, Antoniette J
Los Alamos National Laboratory (LANL) uses external peer review to measure and continuously improve the quality of its science, technology and engineering (STE). LANL uses capability reviews to assess the STE quality and institutional integration and to advise Laboratory Management on the current and future health of the STE. Capability reviews address the STE integration that LANL uses to meet mission requirements. STE capabilities are define to cut across directorates providing a more holistic view of the STE quality, integration to achieve mission requirements, and mission relevance. The scope of these capabilities necessitate that there will be significant overlap inmore » technical areas covered by capability reviews (e.g ., materials research and weapons science and engineering). In addition, LANL staff may be reviewed in different capability reviews because of their varied assignments and expertise. LANL plans to perform a complete review of the Laboratory's STE capabilities (hence staff) in a three-year cycle. The principal product of an external review is a report that includes the review committee's assessments, commendations, and recommendations for STE. The Capability Review Committees serve a dual role of providing assessment of the Laboratory's technical contributions and integration towards its missions and providing advice to Laboratory Management. The assessments and advice are documented in reports prepared by the Capability Review Committees that are delivered to the Director and to the Principal Associate Director for Science, Technology and Engineering (PADSTE). This report will be used by Laboratory Management for STE assessment and planning. The report is also provided to the Department of Energy (DOE) as part of LANL's Annual Performance Plan and to the Los Alamos National Security (LANS) LLC's Science and Technology Committee (STC) as part of its responsibilities to the LANS Board of Governors. LANL has defined fourteen STE capabilities. Table 1 lists the five STE capabilities that LANL Management (Director, PADSTE, technical Associate Directors) have identified for review in Fiscal Year (FY) 2009.« less
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215... FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...-risk, the facility must complete a Security Vulnerability Assessment. A Security Vulnerability...
Hao, Shuxin; Lü, Yiran; Liu, Jie; Liu, Yue; Xu, Dongqun
2018-01-01
To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system. According to the relevant national standards and requirements for the information system security classified protection, and the professional characteristics of the information system, to design and implement the security architecture of information system, also to determine the protection level of information system. Basic security measures for the information system were developed in the technical safety and management safety aspects according to the protection levels, which effectively prevented the security risk of the information system. The information system established relatively complete information security protection measures, to enhanced the security of professional information and system service, and to ensure the safety of air pollution and health impact monitoring project carried out smoothly.
49 CFR 1540.203 - Security threat assessment.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Security threat assessment. 1540.203 Section 1540... Security Threat Assessments § 1540.203 Security threat assessment. (a) Each operator subject to this subpart must ensure that each of the following undergoes a security threat assessment or a comparable...
Schilling, Lisa M.; Kwan, Bethany M.; Drolshagen, Charles T.; Hosokawa, Patrick W.; Brandt, Elias; Pace, Wilson D.; Uhrich, Christopher; Kamerick, Michael; Bunting, Aidan; Payne, Philip R.O.; Stephens, William E.; George, Joseph M.; Vance, Mark; Giacomini, Kelli; Braddy, Jason; Green, Mika K.; Kahn, Michael G.
2013-01-01
Introduction: Distributed Data Networks (DDNs) offer infrastructure solutions for sharing electronic health data from across disparate data sources to support comparative effectiveness research. Data sharing mechanisms must address technical and governance concerns stemming from network security and data disclosure laws and best practices, such as HIPAA. Methods: The Scalable Architecture for Federated Translational Inquiries Network (SAFTINet) deploys TRIAD grid technology, a common data model, detailed technical documentation, and custom software for data harmonization to facilitate data sharing in collaboration with stakeholders in the care of safety net populations. Data sharing partners host TRIAD grid nodes containing harmonized clinical data within their internal or hosted network environments. Authorized users can use a central web-based query system to request analytic data sets. Discussion: SAFTINet DDN infrastructure achieved a number of data sharing objectives, including scalable and sustainable systems for ensuring harmonized data structures and terminologies and secure distributed queries. Initial implementation challenges were resolved through iterative discussions, development and implementation of technical documentation, governance, and technology solutions. PMID:25848567
Schilling, Lisa M; Kwan, Bethany M; Drolshagen, Charles T; Hosokawa, Patrick W; Brandt, Elias; Pace, Wilson D; Uhrich, Christopher; Kamerick, Michael; Bunting, Aidan; Payne, Philip R O; Stephens, William E; George, Joseph M; Vance, Mark; Giacomini, Kelli; Braddy, Jason; Green, Mika K; Kahn, Michael G
2013-01-01
Distributed Data Networks (DDNs) offer infrastructure solutions for sharing electronic health data from across disparate data sources to support comparative effectiveness research. Data sharing mechanisms must address technical and governance concerns stemming from network security and data disclosure laws and best practices, such as HIPAA. The Scalable Architecture for Federated Translational Inquiries Network (SAFTINet) deploys TRIAD grid technology, a common data model, detailed technical documentation, and custom software for data harmonization to facilitate data sharing in collaboration with stakeholders in the care of safety net populations. Data sharing partners host TRIAD grid nodes containing harmonized clinical data within their internal or hosted network environments. Authorized users can use a central web-based query system to request analytic data sets. SAFTINet DDN infrastructure achieved a number of data sharing objectives, including scalable and sustainable systems for ensuring harmonized data structures and terminologies and secure distributed queries. Initial implementation challenges were resolved through iterative discussions, development and implementation of technical documentation, governance, and technology solutions.
ERIC Educational Resources Information Center
Luger, Herbert P.; Booser, Ronald J.
A survey of the literature in the last ten years and interviews with library and security personnel indicated: (1)the problems of handling classified information in libraries have been scanted; (2) there is wide divergence in policies and practices of disseminating such materials; (3)interlibrary cooperation with respect to classified holdings is…
2017-11-01
MOKA WITH RISTRETTO ASSURED INFORMATION SECURITY, INC. NOVEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED...STINFO COPY AIR FORCE RESEARCH LABORATORY INFORMATION DIRECTORATE AFRL-RI-RS-TR-2017-223 UNITED STATES AIR FORCE ROME, NY 13441 AIR FORCE...report is available to the general public, including foreign nations. Copies may be obtained from the Defense Technical Information Center (DTIC
Review of Supervisory Control and Data Acquisition (SCADA) Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Reva Nickelson; Briam Johnson; Ken Barnes
2004-01-01
A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.
75 FR 501 - Self-Regulatory Organizations; NASDAQ OMX PHLX, Inc.; Notice of Filing and Immediate...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-05
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61258; File No. SR-Phlx-2009-107] Self-Regulatory Organizations; NASDAQ OMX PHLX, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to a Technical Change to the Exchange's Complex Order Program December 30, 2009. Pursuant to Section 19(b)(1) of the Securities...
A burr hole button to secure the electrode cable in depth electrode placement. Technical note.
Kamiryo, T; Laws, E R
1997-05-01
A simple magnetic resonance imaging-compatible buttonlike device was devised to fix a depth electrode cable securely in the burr hole used for its insertion during surgery for depth electrode placement. The button is tightly fixed in the burr hole and it holds the cable without allowing protrusion or tension on the wound.
2004-07-01
Melissa ) is created in the controlled environment and propagated. The students learn how viruses are written, how they are propagated via mediums like...vulnerabilities and threats, establishing disaster response and recovery procedures. Joseph Giordano , Technical Advisor, Information Warfare Branch, AFRL 60 The
Can Economics Provide Insights into Trust Infrastructure?
NASA Astrophysics Data System (ADS)
Vishik, Claire
Many security technologies require infrastructure for authentication, verification, and other processes. In many cases, viable and innovative security technologies are never adopted on a large scale because the necessary infrastructure is slow to emerge. Analyses of such technologies typically focus on their technical flaws, and research emphasizes innovative approaches to stronger implementation of the core features. However, an observation can be made that in many cases the success of adoption pattern depends on non-technical issues rather than technology-lack of economic incentives, difficulties in finding initial investment, inadequate government support. While a growing body of research is dedicated to economics of security and privacy in general, few theoretical studies in this area have been completed, and even fewer that look at the economics of “trust infrastructure” beyond simple “cost of ownership” models. This exploratory paper takes a look at some approaches in theoretical economics to determine if they can provide useful insights into security infrastructure technologies and architectures that have the best chance to be adopted. We attempt to discover if models used in theoretical economics can help inform technology developers of the optimal business models that offer a better chance for quick infrastructure deployment.
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...
49 CFR 1540.209 - Fees for security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Fees for security threat assessment. 1540.209...: GENERAL RULES Security Threat Assessments § 1540.209 Fees for security threat assessment. This section describes the payment process for completion of the security threat assessments required under subpart. (a...
The Importance of International Technical Nuclear Forensics to Deter Illicit Trafficking
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, D K
2007-01-30
Illicit trafficking of nuclear materials is a transboundary problem that requires a cooperative approach involving international nuclear forensics to ensure all states understand the threat posed by nuclear smuggling as well as a means to best deter the movement of nuclear contraband. To achieve the objectives, all cases involving illicit trafficking of nuclear and radiological materials must be vigorously pursued and prosecuted when appropriate. The importance of outreach and formal government-to-government relationships with partner nations affected by nuclear trafficking cannot be under-estimated. States that are situated on smuggling routes may be well motivated to counter nuclear crimes to bolster theirmore » own border and transportation security as well as strengthen their economic and political viability. National law enforcement and atomic energy agencies in these states are aggressively pursuing a comprehensive strategy to counter nuclear smuggling through increasing reliance on technical nuclear forensics. As part of these activities, it is essential that these organizations be given adequate orientation to the best practices in this emerging discipline including the categorization of interdicted nuclear material, collection of traditional and nuclear forensic evidence, data analysis using optimized analytical protocols, and how to best fuse forensics information with reliable case input to best develop a law enforcement or national security response. The purpose of formalized USG relationship is to establish an institutional framework for collaboration in international forensics, improve standards of forensics practice, conduct joint exercises, and pursue case-work that benefits international security objectives. Just as outreach and formalized relationships are important to cultivate international nuclear forensics, linking nuclear forensics to ongoing national assistance in border and transpiration security, including port of entry of entry monitoring, nuclear safeguards, and emerging civilian nuclear power initiatives including the Global Nuclear Energy Partnership are crucial components of a successful nuclear detection and security architecture. Once illicit shipments of nuclear material are discovered at a border, the immediate next question will be the nature and the source of the material, as well as the identity of the individual(s) involved in the transfer as well as their motivations. The Nuclear Smuggling International Technical Working Group (ITWG) is a forum for the first responder, law enforcement, policy, and diplomatic community to partner with nuclear forensics experts worldwide to identify requirements and develop technical solutions in common. The ITWG was charted in 1996 and since that time approximately 30 member states and organizations have participated in 11 annual international meetings. The ITWG also works closely with the IAEA to provide countries with support for forensic analyses. Priorities include the development of common protocols for the collection of nuclear forensic evidence and laboratory investigations, organization of forensic round-robin analytical exercises and technical forensic assistance to requesting nations. To promote the science of nuclear forensics within the ITWG the Nuclear Forensics Laboratory Group was organized in 2004. A Model Action Plan for nuclear forensics was developed by the ITWG and published as an IAEA Nuclear security Series document to guide member states in their own forensics investigations. Through outreach, formalized partnerships, common approaches and security architectures, and international working groups, nuclear forensics provides an important contribution to promoting nuclear security and accountability.« less
77 FR 14955 - DoD Information Assurance Scholarship Program (IASP)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-14
... IA and information technology (IT) management, technical, digital and multimedia forensics, cyber..., digital and multimedia forensics, electrical engineering, electronics engineering, information security...
Kirtland Operations progress report, April--June 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Kirtland Operations (KO) is an integral part of EG G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy's (DOE's) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia's weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to othermore » federal agencies, primarily in weapons testing and safeguards. This report documents our support to these programs from April to June 1991.« less
Kirtland Operations progress report, January--March 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
Kirtland Operations (KO) is an integral part of EG G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy's (DOE's) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia's weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to othermore » federal agencies, primarily in weapons testing and safeguards. This report documents our support to these porgrams from January to March 1991.« less
Kirtland Operations progress report, October--December 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Kirtland Operations (KO) is an integral part of EG G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy's (DOE's) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia's weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to othermore » federal agencies, primarily in weapons testing and safeguards. This report documents our support to these programs from October to December 1991.« less
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1984-01-01
The Office of Management and Budget (OMB) Circular A-71, transmittal Memorandum No. 1, requires that each agency establish a management control process to assure that appropriate administrative, physical and technical safeguards are incorporated into all new computer applications. In addition to security specifications, the management control process should assure that the safeguards are adequate for the application. The security activities that should be integral to the system development process are examined. The software quality assurance process to assure that adequate and appropriate controls are incorporated into sensitive applications is also examined. Security for software packages is also discussed.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program ADMINISTRATIVE HEARING PROCEDURES... Judge who are qualified in the technical field of flood elevation determinations. The Judge shall...
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program ADMINISTRATIVE HEARING PROCEDURES... Judge who are qualified in the technical field of flood elevation determinations. The Judge shall...
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program ADMINISTRATIVE HEARING PROCEDURES... Judge who are qualified in the technical field of flood elevation determinations. The Judge shall...
Do You Ignore Information Security in Your Journal Website?
Dadkhah, Mehdi; Borchardt, Glenn; Lagzian, Mohammad
2017-08-01
Nowadays, web-based applications extend to all businesses due to their advantages and easy usability. The most important issue in web-based applications is security. Due to their advantages, most academic journals are now using these applications, with papers being submitted and published through their websites. As these websites are resources for knowledge, information security is primary for maintaining their integrity. In this opinion piece, we point out vulnerabilities in certain websites and introduce the potential for future threats. We intend to present how some journals are vulnerable and what will happen if a journal can be infected by attackers. This opinion is not a technical manual in information security, it is a short inspection that we did to improve the security of academic journals.
Security Protection on Trust Delegated Data in Public Mobile Networks
NASA Astrophysics Data System (ADS)
Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin
This paper provides detailed solutions for trust delegation and security protection for medical records in public mobile communication networks. The solutions presented in this paper enable the development of software for mobile devices that can be used by emergency medical units in urgent need of sensitive personal information about unconscious patients. In today's world, technical improvements in mobile communication systems mean that users can expect to have access to data at any time regardless of their location. This paper presents a token-based procedure for the data security at a mobile device and delegation of trust between a requesting mobile unit and secure medical data storage. The data security at the mobile device is enabled using identity based key generation methodology.
Nuclear Security Education Program at the Pennsylvania State University
DOE Office of Scientific and Technical Information (OSTI.GOV)
Uenlue, Kenan; The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304; Jovanovic, Igor
The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basismore » of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory.« less
Privacy, confidentiality, and electronic medical records.
Barrows, R C; Clayton, P D
1996-01-01
The enhanced availability of health information in an electronic format is strategic for industry-wide efforts to improve the quality and reduce the cost of health care, yet it brings a concomitant concern of greater risk for loss of privacy among health care participants. The authors review the conflicting goals of accessibility and security for electronic medical records and discuss nontechnical and technical aspects that constitute a reasonable security solution. It is argued that with guiding policy and current technology, an electronic medical record may offer better security than a traditional paper record. PMID:8653450
Center for Seismic Studies Final Technical Report, October 1992 through October 1993
1994-02-07
SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE OF ABSTRACT...Upper limit of depth error as a function of mb for estimates based on P and S waves for three netowrks : GSETr-2, ALPHA, and ALPHA + a 50 station...U 4A 4 U 4S as 1 I I I Figure 42: Upper limit of depth error as a function of mb for estimatesbased on P and S waves for three netowrk : GSETT-2o ALPHA
49 CFR 1540.205 - Procedures for security threat assessment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... threat; (ii) The basis for the determination; (iii) Information about how the applicant may appeal the... 49 Transportation 9 2010-10-01 2010-10-01 false Procedures for security threat assessment. 1540... SECURITY: GENERAL RULES Security Threat Assessments § 1540.205 Procedures for security threat assessment...
44 CFR 78.7 - Grant application procedures.
Code of Federal Regulations, 2011 CFR
2011-10-01
... OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION ASSISTANCE § 78.7 Grant application procedures. States will apply for Technical Assistance and...
44 CFR 78.7 - Grant application procedures.
Code of Federal Regulations, 2013 CFR
2013-10-01
... OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION ASSISTANCE § 78.7 Grant application procedures. States will apply for Technical Assistance and...
44 CFR 78.7 - Grant application procedures.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION ASSISTANCE § 78.7 Grant application procedures. States will apply for Technical Assistance and...
44 CFR 78.7 - Grant application procedures.
Code of Federal Regulations, 2012 CFR
2012-10-01
... OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION ASSISTANCE § 78.7 Grant application procedures. States will apply for Technical Assistance and...
44 CFR 78.7 - Grant application procedures.
Code of Federal Regulations, 2014 CFR
2014-10-01
... OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION ASSISTANCE § 78.7 Grant application procedures. States will apply for Technical Assistance and...
Implementing the global health security agenda: lessons from global health and security programs.
Paranjape, Suman M; Franz, David R
2015-01-01
The Global Health Security Agenda (GHSA) describes a vision for a world that is safe and secure from infectious disease threats; it underscores the importance of developing the international capacity to prevent, detect, and respond to pandemic agents. In February 2014, the United States committed to support the GHSA by expanding and intensifying ongoing efforts across the US government. Implementing these goals will require interagency coordination and harmonization of diverse health security elements. Lessons learned from the Global Health Initiative (GHI), the President's Emergency Program for AIDS Relief (PEPFAR), and the Cooperative Threat Reduction (CTR) program underscore that centralized political, technical, and fiscal authority will be key to developing robust, sustainable, and integrated global health security efforts across the US government. In this article, we review the strengths and challenges of GHI, PEPFAR, and CTR and develop recommendations for implementing a unified US global health security program.
Key issues and technical route of cyber physical distribution system
NASA Astrophysics Data System (ADS)
Zheng, P. X.; Chen, B.; Zheng, L. J.; Zhang, G. L.; Fan, Y. L.; Pei, T.
2017-01-01
Relying on the National High Technology Research and Development Program, this paper introduced the key issues in Cyber Physical Distribution System (CPDS), mainly includes: composite modelling method and interaction mechanism, system planning method, security defence technology, distributed control theory. Then on this basis, the corresponding technical route is proposed, and a more detailed research framework along with main schemes to be adopted is also presented.
Feasibility of Developing a Protocol for Automated Protist Analysis
2010-03-01
Acquisition Directorate Research & Development Center Report No: CG-D-02-ll Feasibility of Developing a Protocol for Automated Protist Analysis...Technical Information Service, Springfield, VA 22161. March 2010 Homeland Security Feasibility of Developing a Protocol for Automated Protist ...March 21)10 Feasibility of Developing a Protocol for Automated Protist Analysis 00 00 o CM Technical Report Documentation Page 1. Report No CG-D
ERIC Educational Resources Information Center
Hirst, Russel
2016-01-01
This article describes how a special kind of academe-industry collaboration--based on a joint appointment agreement between a university and an industry site--was set up, promoted, and experienced by a professor of technical communication and his student interns. To illustrate the nature and value of this kind of collaboration, the article…
Nuclear Matters. A Practical Guide
2008-01-01
plutonium science and engineering. Figure 4.6 depicts LANL workers in Technical Area (TA)-55, the Los Alamos plutonium facility. LANL oversees...facility at Los Alamos to produce plutonium pits in a laboratory environment, with a capacity to produce a small number of pits per year . At that...Office of Secure Transportation (OST). Technical Advisors represent the following organizations: Los Alamos National Chair ATSD(NCB) Vice-Chair
A New Security Paradigm for Anti-Counterfeiting: Guidelines and an Implementation Roadmap
NASA Astrophysics Data System (ADS)
Lehtonen, Mikko
Product counterfeitingand piracy continue to plague brand and trademark owners across industry sectors. This chapter analyses the reasons for ineffectiveness of past technical anti-counterfeitingstrategies and formulates managerial guidelines for effective use of RFID in anti-counterfeiting. An implementation roadmap toward secure authentication of products tagged with EPC Gen-2 tags is proposed and possible supply chain locations for product checks are discussed.
Secure Location Provenance for Mobile Devices
2015-07-01
SECURE LOCATION PROVENANCE FOR MOBILE DEVICES UNIVERSITY OF ALABAMA AT BIRMINGHAM JULY 2015 FINAL TECHNICAL REPORT...PROVENANCE FOR MOBILE DEVICES 5a. CONTRACT NUMBER FA8750-12-2-0254 5b. GRANT NUMBER N/A 5c. PROGRAM ELEMENT NUMBER 69220K 6. AUTHOR(S) Ragib Hasan...based services allow mobile device users to access various services based on the users’ current physical location information. Path-critical applications
Indicators of Suicide Found on Social Networks: Phase 2
2015-10-01
Engagement in Sport and Suicide Risk. Archives of Suicide Research . 11(4), pp375-390. Chioqueta, A. P. & Stiles, T. C. (2007). The relationship between...Approved for Public Distribution: Distribution Unlimited Defense Personnel and Security Research Center Defense Manpower Data Center Technical...Report 15-04 October 2015 Indicators of Suicide Found on Social Networks: Phase 2 Andrée E. Rose Defense Personnel and Security Research
1990-07-01
i k RAYMOND P. URTZ, JR. Technical Director Directorate of Command & Control FOR TH!E C0OKANDER: IGOR G. PLONISCH Directorate of Plans & Programs If...access controls and for thwarting inference and aggregation attacks ae generally considered inadequate for high usurance systems. Consequently, thee is...requirements was to have been based on a state-of-the-art survey involving interviews with TDBMS researchers and developers and security officers and auditors
1988-05-27
Competitive Strategies Individual Essay 6. PERFORMING ORG. REPORT NUMBER 7. AUTHOR(@) S. CONTRACT OR GRANT NUMBER( e ) Robert M. Davis, LTC, AD S...DO FOe 1473 emIotN or, Nov es IS OBSOLETE -JA I Unclassifi fed SECURITY CLASSIFICATION OF THIS PA7. E (Whrn Does Entered) Unclassified SECURITY...focus within the Department of Defense to provide technical and tactical leverage over the Soviets. Competitive Strategies are a management tool which
78 FR 51823 - Financial Responsibility Rules for Broker-Dealers
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-21
...The Securities and Exchange Commission (``Commission'') is adopting amendments to the net capital, customer protection, books and records, and notification rules for broker-dealers promulgated under the Securities Exchange Act of 1934 (``Exchange Act''). These amendments are designed to address several areas of concern regarding the financial responsibility requirements for broker-dealers. The amendments also update certain financial responsibility requirements and make certain technical amendments.
Privacy and security of patient data in the pathology laboratory.
Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.
Network systems security analysis
NASA Astrophysics Data System (ADS)
Yilmaz, Ä.°smail
2015-05-01
Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.
Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schaffner, Christian
2010-09-15
We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters.more » Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.« less
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Fees for Security Threat Assessments for Transportation Worker Identification Credential (TWIC... Transportation Worker Identification Credential and must undergo a security threat assessment under 49 CFR part...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessments for each proprietor..., or owner of the entity must successfully complete a security threat assessment or comparable security... owner of the entity has successfully completed a Security Threat Assessment under part 1540, subpart C...
78 FR 71629 - Technical Resource for Incident Prevention (TRIPwire) User Registration
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-29
...), Office of Infrastructure Protection (IP), Protective Security Coordination Division (PSCD), Office for... INFORMATION CONTACT: William Cooper, DHS/NPPD/IP/PSCD/OBP, [email protected] . SUPPLEMENTARY...
Kirtland Operations progress report, October--December 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Kirtland Operations (KO) is an integral part of EG&G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy`s (DOE`s) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia`s weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to other federalmore » agencies, primarily in weapons testing and safeguards. This report documents our support to these programs from October to December 1991.« less
Kirtland Operations progress report, April--June 1991
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Kirtland Operations (KO) is an integral part of EG&G Energy Measurements, Inc., whose primary mission is to support the US Department of Energy`s (DOE`s) programs in weapons development and testing and in nuclear safeguards and security. KO performs much of its work in close coordination with and often at the technical direction of Sandia National Laboratories. In addition to aiding Sandia`s weapons programs, KO provides a wide spectrum of technical support to other Sandia activities, particularly their safeguards, security, and treaty verification programs. Support is also provided to other elements of the Department of Energy community and to other federalmore » agencies, primarily in weapons testing and safeguards. This report documents our support to these programs from April to June 1991.« less
Evaluation of Lower East Fork Poplar Creek Mercury Sources - Model Update
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ketelle, Richard; Brandt, Craig C.; Peterson, Mark J.
The purpose of this report is to assess new data that has become available and provide an update to the evaluations and modeling presented in the Oak Ridge National Laboratory (ORNL) Technical Manuscript Evaluation of lower East Fork Poplar Creek (LEFPC) Mercury Sources (Watson et al., 2016). Primary sources of field and laboratory data for this update include multiple US Department of Energy (DOE) programs including Environmental Management (EM; e.g., Biological Monitoring and Abatement Program, Mercury Remediation Technology Development [TD], and Applied Field Research Initiative), Office of Science (Mercury Science Focus Areas [SFA] project), and the Y-12 National Security Complexmore » (Y-12) Compliance Department.« less
Automated Performance Monitoring and Assessment for DCS Digital Systems
1980-07-01
in an automated technical con-. trol environnrunt. j UNCLASSIFIED SECURITY CLASSIFICATION OF I , PAGE(Wh n O tD . E e d) ACKNOWLEDGEMENT This program...5-2 Second Level MUX TD -1193 Alarms 5-3 5-3 First Level MUX TD -1192 Alarms 5-4 5.-4 Submultiplexer TDM-1251 Alarms 5-5 5 RF Distribution System...i 0 (0: I- O)’dU 04i (0) 0 0a 04 U) (04 04r 04 r- (O 0) 0) 41 ~ 0) 0H (z (0 0) Q) 4J a r- ) -4’ iHQ ) w .41 Q) > 4-4 !O ~ -4 ) > 114 > 44 >4 UU O4 u
Hyper-Spectral Networking Concept of Operations and Future Air Traffic Management Simulations
NASA Technical Reports Server (NTRS)
Davis, Paul; Boisvert, Benjamin
2017-01-01
The NASA sponsored Hyper-Spectral Communications and Networking for Air Traffic Management (ATM) (HSCNA) project is conducting research to improve the operational efficiency of the future National Airspace System (NAS) through diverse and secure multi-band, multi-mode, and millimeter-wave (mmWave) wireless links. Worldwide growth of air transportation and the coming of unmanned aircraft systems (UAS) will increase air traffic density and complexity. Safe coordination of aircraft will require more capable technologies for communications, navigation, and surveillance (CNS). The HSCNA project will provide a foundation for technology and operational concepts to accommodate a significantly greater number of networked aircraft. This paper describes two of the HSCNA projects technical challenges. The first technical challenge is to develop a multi-band networking concept of operations (ConOps) for use in multiple phases of flight and all communication link types. This ConOps will integrate the advanced technologies explored by the HSCNA project and future operational concepts into a harmonized vision of future NAS communications and networking. The second technical challenge discussed is to conduct simulations of future ATM operations using multi-bandmulti-mode networking and technologies. Large-scale simulations will assess the impact, compared to todays system, of the new and integrated networks and technologies under future air traffic demand.
Health Information System Role-Based Access Control Current Security Trends and Challenges.
de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo
2018-01-01
This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.
Security risks in nuclear waste management: Exceptionalism, opaqueness and vulnerability.
Vander Beken, Tom; Dorn, Nicholas; Van Daele, Stijn
2010-01-01
This paper analyses some potential security risks, concerning terrorism or more mundane forms of crime, such as fraud, in management of nuclear waste using a PEST scan (of political, economic, social and technical issues) and some insights of criminologists on crime prevention. Nuclear waste arises as spent fuel from ongoing energy generation or other nuclear operations, operational contamination or emissions, and decommissioning of obsolescent facilities. In international and EU political contexts, nuclear waste management is a sensitive issue, regulated specifically as part of the nuclear industry as well as in terms of hazardous waste policies. The industry involves state, commercial and mixed public-private bodies. The social and cultural dimensions--risk, uncertainty, and future generations--resonate more deeply here than in any other aspect of waste management. The paper argues that certain tendencies in regulation of the industry, claimed to be justified on security grounds, are decreasing transparency and veracity of reporting, opening up invisible spaces for management frauds, and in doing allowing a culture of impunity in which more serious criminal or terrorist risks could arise. What is needed is analysis of this 'exceptional' industry in terms of the normal cannons of risk assessment - a task that this paper begins. Copyright 2009 Elsevier Ltd. All rights reserved.
Defending Against Advanced Persistent Threats Using Game-Theory
König, Sandra; Schauer, Stefan
2017-01-01
Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker’s incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system’s protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest. PMID:28045922
Siu, B W M; Au-Yeung, C C Y; Chan, A W L; Chan, L S Y; Yuen, K K; Leung, H W; Yan, C K; Ng, K K; Lai, A C H; Davies, S; Collins, M
Mapping forensic psychiatric services with the security needs of patients is a salient step in service planning, audit and review. A valid and reliable instrument for measuring the security needs of Chinese forensic psychiatric inpatients was not yet available. This study aimed to develop and validate the Chinese version of the Security Needs Assessment Profile for measuring the profiles of security needs of Chinese forensic psychiatric inpatients. The Security Needs Assessment Profile by Davis was translated into Chinese. Its face validity, content validity, construct validity and internal consistency reliability were assessed by measuring the security needs of 98 Chinese forensic psychiatric inpatients. Principal factor analysis for construct validity provided a six-factor security needs model explaining 68.7% of the variance. Based on the Cronbach's alpha coefficient, the internal consistency reliability was rated as acceptable for procedural security (0.73), and fair for both physical security (0.62) and relational security (0.58). A significant sex difference (p=0.002) in total security score was found. The Chinese version of the Security Needs Assessment Profile is a valid and reliable instrument for assessing the security needs of Chinese forensic psychiatric inpatients. Copyright © 2017 Elsevier Ltd. All rights reserved.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Access to cargo: Security threat assessments for...: Security threat assessments for cargo personnel in the United States. This section applies in the United...— (1) Each individual must successfully complete a security threat assessment or comparable security...
Targeting Net Zero Energy at Marine Corps Base Hawaii, Kaneohe Bay: Preprint
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burman, K.; Kandt, A.; Lisell, L.
2012-05-01
This paper summarizes the results of an NREL assessment of Marine Corps Base Hawaii (MCBH), Kaneohe Bay to appraise the potential of achieving net zero energy status through energy efficiency, renewable energy, and hydrogen vehicle integration. In 2008, the U.S. Department of Defense's U.S. Pacific Command partnered with the U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL) to assess opportunities for increasing energy security through renewable energy and energy efficiency at Hawaii military installations. DOE selected Marine Corps Base Hawaii (MCBH), Kaneohe Bay, to receive technical support for net zero energy assessment and planning funded through the Hawaiimore » Clean Energy Initiative (HCEI). NREL performed a comprehensive assessment to appraise the potential of MCBH Kaneohe Bay to achieve net zero energy status through energy efficiency, renewable energy, and hydrogen vehicle integration. This paper summarizes the results of the assessment and provides energy recommendations. The analysis shows that MCBH Kaneohe Bay has the potential to make significant progress toward becoming a net zero installation. Wind, solar photovoltaics, solar hot water, and hydrogen production were assessed, as well as energy efficiency technologies. Deploying wind turbines is the most cost-effective energy production measure. If the identified energy projects and savings measures are implemented, the base will achieve a 96% site Btu reduction and a 99% source Btu reduction. Using excess wind and solar energy to produce hydrogen for a fleet and fuel cells could significantly reduce energy use and potentially bring MCBH Kaneohe Bay to net zero. Further analysis with an environmental impact and interconnection study will need to be completed. By achieving net zero status, the base will set an example for other military installations, provide environmental benefits, reduce costs, increase energy security, and exceed its energy goals and mandates.« less
Query Storage and Relay in Research Root (LACREND RR)
2017-05-30
QUERY STORAGE AND RELAY IN RESEARCH ROOT (LACREND-RR) UNIVERSITY OF SOUTHERN CALIFORNIA MAY 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC ...exempt from public affairs security and policy review in accordance with SAF/AQR memorandum dated 10 Dec 08 and AFRL/CA policy clarification...memorandum dated 16 Jan 09. This report is available to the general public , including foreign nationals. Copies may be obtained from the Defense Technical
Alpena, Michigan. Revised Uniform Summary of Surface Weather Observations. Parts A-F.
1987-10-01
Rpoirt, Nober: USAFETACDS-87/059. 5. *mitorma Organization Report Nuber: USAIETAC/DS-87/059. Ga. Obaf of Performin Oranization: USAFETAC/OL-A Sb. Office...description of contents and Instructions for ue.- 20 DistrIbutieel/vmilability of Abstract: Same as report . 21 Abstract Security Clasalficatiem...large, or by the Defense Technical Information Center (DTIC) to the National Technical Information Service (NTIS). This document has been reviewed and
A Research Program in Computer Technology. 1987 Annual Technical Report
1990-07-01
TITLE (Indcle Security Clanificstion) 1987 Annual Technical Report: *A Research Program in Computer Technology (Unclassified) 12. PERSONAL AUTHOR(S) IS...distributed processing, survivable networks 17. NCE: distributed processing, local networks, personal computers, workstation environment 18. SC Dev...are the auw’iors and should not be Interpreted as representIng the official opinion or policy of DARPA, the U.S. Government, or any person or agency
2010-08-01
NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND...management; leads military in case of specialized survey; supervises more than 25 local civilian employees ; acts as technical expert during contract...Security Assistance Force Head- quarters Camp. I knew I could handle the job of project manager, but wondered about acting as contract manager, technical ex
Military and Security Developments Involving the People’s Republic of China 2013
2013-01-01
discussions have stalled over pricing differences. China’s Top Crude Suppliers 2011 Country Volume (1,000 barrels per day) Percentage of...the transfer or disclosure of U.S.-origin defense articles, defense services, technical data, and/or technology to China. Additionally, Public Law... transfer or export of defense articles (including technical data) and defense services. Beijing primarily conducts arms sales to enhance foreign
1996-01-01
Automated Teller Machine networks malfunction in Georgia 2000 May 20 CNN off air for 12 minutes; issues special report 2000 May 20 worm...password combinations, social security and credit card numbers, account information, health status, and innumerable other sensitive information...as follows: TW/AA Issues Recommended Technical Response Possible Implementation Obstacles 1. (re Tactical Warning) • Place automated software
Seeking Balance in Cyber Education
2015-02-01
properties that can be applied to computer systems, networks, and software. For example, in our Introduction to Cyber Security Course, given to...Below is the submittal schedule for the areas of emphasis we are looking for: Data Mining in Metrics? Jul/ JAug 2015 Issue Submission Deadline: Feb...Phone Arena. PhoneArena.com, 12 Nov. 2013. Web. 08 Aug. 2014. 8. Various. “SI110: Introduction to Cyber Security, Technical Foundations.” SI110
2002-02-01
NVLAP procedures are compatible with, among others, the most recent official publications of ISO / IEC 17025 (formally ISO / IEC Guide 25), ISO Guides 2, 30... IEC Guide 17025 and the relevant requirements of ISO 9002-1994. NVLAP Handbook 150-20 contains information that is specific to Common Criteria...Evaluation Technical Report EAP Evaluation Acceptance Package IEC International Electrotechnical Commission ISO International