Sample records for technology security plan

  1. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  2. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  3. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  4. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  5. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  6. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  7. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  8. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  9. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  10. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  11. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  12. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  13. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  14. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  15. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-29

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...

  16. National Security Technology Incubation Strategic Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achievingmore » sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to succeed, it must have sustainable competitive advantages in seven key areas: geography, products and businesses, distribution, sales and service culture, efficiency, brand, and most important, people. The four strategic goals of the plan are to: 1. Identify and recruit small businesses with technology applications for national security. 2. Design and implement a national security incubator program that provides incubator services and physical space for the targeted businesses. 3. Provide business assistance and technical leadership to NSTI clients to assist in bringing their products to market. 4. Construct a new multi-tenant facility with dedicated physical space for businesses with technology applications for national security.« less

  17. Information Resource Management Planning in the Office of the Under Secretary of Defense (Acquisition)

    DTIC Science & Technology

    1989-08-01

    Include in this plan the role of the Defense Technical Information Center (DTIC), the Defense Technology Security Administration ( DTSA ), and ODDR&E’s...DTIC = Defense Technical Information Center DTSA = Defense Technology Security Administration DUSD = Deputy Under Secretary of Defense Gloss. 2 DUSD...technologically sensitive requests. The Defense Technology Security Administi ation ( DTSA ) is developing a large system to track foreign military sales

  18. Marketing Plan for Demonstration and Validation Assets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    The National Security Preparedness Project (NSPP), is to be sustained by various programs, including technology demonstration and evaluation (DEMVAL). This project assists companies in developing technologies under the National Security Technology Incubator program (NSTI) through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. This report documents the DEMVAL marketing and visibility plan, which will focus on collecting information about, and expanding the visibility of, DEMVAL assets serving businesses with national security technology applications in southern New Mexico.

  19. National Security Technology Incubator Business Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with nationalmore » security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.« less

  20. Fuel Cycle Technologies 2014 Achievement Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hong, Bonnie C.

    2015-01-01

    The Fuel Cycle Technologies (FCT) program supports the Department of Energy’s (DOE’s) mission to: “Enhance U.S. security and economic growth through transformative science, technology innovation, and market solutions to meet our energy, nuclear security, and environmental challenges.” Goal 1 of DOE’s Strategic Plan is to innovate energy technologies that enhance U.S. economic growth and job creation, energy security, and environmental quality. FCT does this by investing in advanced technologies that could transform the nuclear fuel cycle in the decades to come. Goal 2 of DOE’s Strategic Plan is to strengthen national security by strengthening key science, technology, and engineering capabilities.more » FCT does this by working closely with the National Nuclear Security Administration and the U.S Department of State to develop advanced technologies that support the Nation’s nuclear nonproliferation goals.« less

  1. Marketing Plan for the National Security Technology Incubator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubatormore » program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.« less

  2. Management of the Defense Technology Security Administration Year 2000 Program

    DTIC Science & Technology

    1998-11-03

    caller is fully protected Acronyms DTSA Defense Technology Security Administration Y2K Year 2000 INSPECTOR GENERAL DEPARTMENT OF DEFENSE 400 ARMY NAVY...accordance with the DoD Management Plan Defense Technology Security Administration. The Defense Technology Security Administration ( DTSA ) was established...in 1985 as a field activity of the Office of the Secretary of Defense By establishing DTSA , the DoD role in export controls was centralized and

  3. Defense Technology Security Administration Strategic Plan 2009-2010

    DTIC Science & Technology

    2008-12-22

    NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Technology Security Administration ( DTSA ),Washington,DC 8. PERFORMING ORGANIZATION...Security Administration This document is unclassifi ed in its entirety. Photography courtesy of Defense Link and DTSA . Document printed 2009. DTSA ...STRATEGIC PLAN 2009-2010 C O N T E N T S Message from the Director 2 Envisioning 2010 3 Our Way Ahead 5 We Are DTSA 18 Metrics Matrix 24 DTSA

  4. Hazardous material transportation safety and security field operational test final detailed test plans : executive summary

    DOT National Transportation Integrated Search

    2003-09-16

    The objective of this Hazardous Material (HazMat) Transportation Safety and Security Field Operational Test (FOT) Final Detailed Test Plans evaluation is to measure the impact of technology solutions on the safety, security, and operational efficienc...

  5. Community Colleges in the Highway: Major Issues for Technology Planning.

    ERIC Educational Resources Information Center

    Moquin, Bert; Travis, Jon E.

    1999-01-01

    Rates the importance of planning topics, as identified by technology personnel at Texas community colleges, related to the information superhighway (ISH). Finds, through a Delphi study, that significant issues that should be considered in strategic technology planning include training, cost, planning, security/legal, uses and innovations,…

  6. 48 CFR 1239.70 - Solicitation provision and contract clause.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... TRANSPORTATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1239.70... 1252.239-71, Information Technology Security Plan and Accreditation, and the clause at (TAR) 48 CFR 1252.239-70, Security Requirements for Unclassified Information Technology Resources, in all...

  7. 75 FR 30875 - Hercules Technology Growth Capital, Inc.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-02

    ...] Hercules Technology Growth Capital, Inc.; Notice of Application May 26, 2010. AGENCY: Securities and.... SUMMARY: Summary of the Application: Hercules Technology Growth Capital, Inc. (``Company'' or ``Applicant... ``Amended Plan,'' and together, the ``Amended Plans''). \\1\\ Hercules Technology Growth Capital, Inc...

  8. Homeland Security Strategic Research Action Plan 2012 - 2016

    EPA Pesticide Factsheets

    EPA’s Homeland Security research plan outline and how it will address science and technological gaps and improve the Agency’s ability to carry out its responsibilities associated with preparing for and responding to, terrorist attacks, and other disasters.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Troy Hiltbrand; Daniel Jones

    As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.

  10. 47 CFR 202.0 - Objectives.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...

  11. 47 CFR 202.0 - Objectives.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...

  12. 47 CFR 202.0 - Objectives.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...

  13. 47 CFR 202.0 - Objectives.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...

  14. 47 CFR 202.0 - Objectives.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...

  15. Computer Security: Governmentwide Planning Process Had Limited Impact. Report to the Chairman, Committee on Science, Space, and Technology, House of Representatives.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC. Information Management and Technology Div.

    As required by the Computer Security Act of 1987, federal agencies have to identify systems that contain sensitive information and develop plans to safeguard them. The planning process was assessed in 10 civilian agencies as well as the extent to which they had implemented planning controls described in 22 selected plans. The National Institute of…

  16. 75 FR 38595 - Guidance to States Regarding Driver History Record Information Security, Continuity of Operation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ... Standards and Technology's (NIST) Computer Security Division maintains a Computer Security Resource Center... Regarding Driver History Record Information Security, Continuity of Operation Planning, and Disaster... (SDLAs) to support their efforts at maintaining the security of information contained in the driver...

  17. Satellite Technology Contribution to Water and Food Security

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.

    2010-01-01

    This slide presentation reviews the issue of supplies of food, the relationship to food security, the ability of all people to attain sufficient food for an active and healthy life, and the ability to use satellite technology and remote sensing to assist with planning and act as an early warning system.

  18. 78 FR 73202 - Review and Revision of the National Critical Infrastructure Security and Resilience (NCISR...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-05

    ...This Request for Information (RFI) notice informs the public that the Department of Homeland Security's (DHS) Science and Technology Directorate (S&T) is currently developing a National Critical Infrastructure Security and Resilience Research and Development Plan (NCISR R&D Plan) to conform to the requirements of Presidential Policy Directive 21, Critical Infrastructure Security and Resilience. As part of a comprehensive national review process, DHS solicits public comment on issues or language in the NCISR R&D Plan that need to be included. Critical infrastructure includes both cyber and physical components, systems, and networks for the sixteen established ``critical infrastructures''.

  19. OSD CALS Architecture Master Plan Study. Concept Paper. Security. Volume 38

    DOT National Transportation Integrated Search

    1989-07-01

    Developing and executing a well-thought-out security policy is critical to the success of CALS. Without appropriate security measures, the integration of technology, organizations, functions, and data envisioned as Phase II CALS can not occur. Theref...

  20. Desktop Security ... Now More than Ever

    ERIC Educational Resources Information Center

    Huber, Joe

    2005-01-01

    Desktop security is the foundation of your overall security plan in K-12 education. National Educational Technology Standards (NETS) mainly states that students at all grade levels should know to make changes in the default settings for the operating system and its applications.

  1. Examining Long Term Climate Related Security Risks through the Use of Gaming and Scenario Planning

    DTIC Science & Technology

    2016-10-24

    114 Examining Long-Term Climate-Related Security Risks through the Use of Gaming and Scenario Planning Catherine M. Schkoda, Shawna G. Cuan, and...E. D. McGrady Abstract: This paper examines four possible climate change-related security risks that emerged from an international game and scenario...potential for an emerging disparity between regions over the consensus and control of climate change-related technologies. Keywords: gaming , scenario

  2. The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

    DTIC Science & Technology

    2009-05-27

    technology network architecture to connect various DHS elements and promote information sharing.17 • Establish a DHS State, Local, and Regional...A Strategic Plan; training, and the implementation of a comprehensive information systems architecture .65 As part of its integration...information technology network architecture was submitted to Congress last year. See DHS I&A, Homeland Security Information Technology Network

  3. 77 FR 23662 - Notice of Request for Comments on the Feasibility of Placing Economically Significant Patents...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-20

    ....S. technologies and seize markets before the U.S. inventor is able to raise financing and secure a... develop updated criteria to evaluate the national security applications of patentable technologies [and... Orders 1. Should the USPTO institute a plan to identify patent applications relating to critical...

  4. Smart Grid Demonstration Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miller, Craig; Carroll, Paul; Bell, Abigail

    The National Rural Electric Cooperative Association (NRECA) organized the NRECA-U.S. Department of Energy (DOE) Smart Grid Demonstration Project (DE-OE0000222) to install and study a broad range of advanced smart grid technologies in a demonstration that spanned 23 electric cooperatives in 12 states. More than 205,444 pieces of electronic equipment and more than 100,000 minor items (bracket, labels, mounting hardware, fiber optic cable, etc.) were installed to upgrade and enhance the efficiency, reliability, and resiliency of the power networks at the participating co-ops. The objective of this project was to build a path for other electric utilities, and particularly electrical cooperatives,more » to adopt emerging smart grid technology when it can improve utility operations, thus advancing the co-ops’ familiarity and comfort with such technology. Specifically, the project executed multiple subprojects employing a range of emerging smart grid technologies to test their cost-effectiveness and, where the technology demonstrated value, provided case studies that will enable other electric utilities—particularly electric cooperatives— to use these technologies. NRECA structured the project according to the following three areas: Demonstration of smart grid technology; Advancement of standards to enable the interoperability of components; and Improvement of grid cyber security. We termed these three areas Technology Deployment Study, Interoperability, and Cyber Security. Although the deployment of technology and studying the demonstration projects at coops accounted for the largest portion of the project budget by far, we see our accomplishments in each of the areas as critical to advancing the smart grid. All project deliverables have been published. Technology Deployment Study: The deliverable was a set of 11 single-topic technical reports in areas related to the listed technologies. Each of these reports has already been submitted to DOE, distributed to co-ops, and posted for universal access at www.nreca.coop/smartgrid. This research is available for widespread distribution to both cooperative members and non-members. These reports are listed in Table 1.2. Interoperability: The deliverable in this area was the advancement of the MultiSpeak™ interoperability standard from version 4.0 to version 5.0, and improvement in the MultiSpeak™ documentation to include more than 100 use cases. This deliverable substantially expanded the scope and usability of MultiSpeak, ™ the most widely deployed utility interoperability standard, now in use by more than 900 utilities. MultiSpeak™ documentation can be accessed only at www.multispeak.org. Cyber Security: NRECA’s starting point was to develop cyber security tools that incorporated succinct guidance on best practices. The deliverables were: cyber security extensions to MultiSpeak,™ which allow more security message exchanges; a Guide to Developing a Cyber Security and Risk Mitigation Plan; a Cyber Security Risk Mitigation Checklist; a Cyber Security Plan Template that co-ops can use to create their own cyber security plans; and Security Questions for Smart Grid Vendors.« less

  5. Securing the High Ground: Dominant Combat Air Force for America. 2008 Combat Air Force Strategic Plan

    DTIC Science & Technology

    2008-07-28

    continue to be beyond our technical ability to realize aggresively pursue advanced technical solutions to stay at the leading edge of technological...inherent to each caf Way and to seek continual improvement through exploration of innovative concepts, advanced capabilities, game -changing...available online at the air force portal: https://wwwd.my.af.mil/afknprod/strat_plan COMBAT AIR FORCE STRATEGIC PLAN Points of Contact securing the high

  6. Measuring Stability and Security in Iraq

    DTIC Science & Technology

    2010-03-01

    development, generating 27 signed investment licenses totaling $2 billion for the tourism and hospitality industries, with 13 projects under...continue to plan and execute the responsible drawdown of U.S. military forces from Iraq. By August 31, 2010, U.S. forces will have transitioned... planning and budgeting, procurement, and information technology. In summary, political, rule-of-law, economic and energy, and security trends in Iraq

  7. Sandia National Laboratories: News: Publications: Strategic Plan

    Science.gov Websites

    Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios

  8. A Multi-Pronged Plan

    ERIC Educational Resources Information Center

    Starkman, Neal

    2007-01-01

    As schools adopt new and varied technologies to protect the campus community, the need to look at security tools in terms of a comprehensive, layered, and integrated strategy, becomes clear. This article discusses how schools are using these security tools.

  9. Safe teleradiology: information assurance as project planning methodology

    NASA Astrophysics Data System (ADS)

    Collmann, Jeff R.; Alaoui, Adil; Nguyen, Dan; Lindisch, David

    2003-05-01

    This project demonstrates use of OCTAVE, an information security risk assessment method, as an approach to the safe design and planning of a teleradiology system. By adopting this approach to project planning, we intended to provide evidence that including information security as an intrinsic component of project planning improves information assurance and that using information assurance as a planning tool produces and improves the general system management plan. Several considerations justify this approach to planning a safe teleradiology system. First, because OCTAVE was designed as a method for retrospectively assessing and proposing enhancements for the security of existing information management systems, it should function well as a guide to prospectively designing and deploying a secure information system such as teleradiology. Second, because OCTAVE provides assessment and planning tools for use primarily by interdisciplinary teams from user organizations, not consultants, it should enhance the ability of such teams at the local level to plan safe information systems. Third, from the perspective of sociological theory, OCTAVE explicitly attempts to enhance organizational conditions identified as necessary to safely manage complex technologies. Approaching information system design from the perspective of information security risk management proactively integrates health information assurance into a project"s core. This contrasts with typical approaches that perceive "security" as a secondary attribute to be "added" after designing the system and with approaches that identify information assurance only with security devices and user training. The perspective of health information assurance embraces so many dimensions of a computerized health information system"s design that one may successfully deploy a method for retrospectively assessing information security risk as a prospective planning tool. From a sociological perspective, this approach enhances the general conditions as well as establishes specific policies and procedures for reliable performance of health information assurance.

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Adams, C.; Arsenlis, T.; Bailey, A.

    Lawrence Livermore National Laboratory Campus Capability Plan for 2018-2028. Lawrence Livermore National Laboratory (LLNL) is one of three national laboratories that are part of the National Nuclear Security Administration. LLNL provides critical expertise to strengthen U.S. security through development and application of world-class science and technology that: Ensures the safety, reliability, and performance of the U.S. nuclear weapons stockpile; Promotes international nuclear safety and nonproliferation; Reduces global danger from weapons of mass destruction; Supports U.S. leadership in science and technology. Essential to the execution and continued advancement of these mission areas are responsive infrastructure capabilities. This report showcases each LLNLmore » capability area and describes the mission, science, and technology efforts enabled by LLNL infrastructure, as well as future infrastructure plans.« less

  11. Trends in Education.

    ERIC Educational Resources Information Center

    School Planning & Management, 2002

    2002-01-01

    Several architects, planners, administrators, and contractors answer questions about trends related to school construction, interior design, business, security, and technology. Trends concern funding issues, specialized designs, planning for safety, technological integration, and equity in services. (EV)

  12. The Next Step: Managing Your District's Technology Operations.

    ERIC Educational Resources Information Center

    Pereus, Stephen C.

    2001-01-01

    Discusses benefits and especially risks involved with educational technology: unexpected costs; possible negative effects on student achievement; legal, ethical, and security issues; and resistance to change. Success ensues from providing leadership and vision, updating technology planning, evaluating alternatives, setting standards, involving…

  13. 77 FR 6135 - Agency Information Collection Activities: Cargo Manifest/Declaration, Stow Plan, Container Status...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-07

    ... Activities: Cargo Manifest/ Declaration, Stow Plan, Container Status Messages and Importer Security Filing... the Paperwork Reduction Act: Cargo Manifest/Declaration, Stow Plan, Container Status Messages and..., mechanical, or other technological techniques or other forms of information. Title: Cargo Manifest...

  14. System security in the space flight operations center

    NASA Technical Reports Server (NTRS)

    Wagner, David A.

    1988-01-01

    The Space Flight Operations Center is a networked system of workstation-class computers that will provide ground support for NASA's next generation of deep-space missions. The author recounts the development of the SFOC system security policy and discusses the various management and technology issues involved. Particular attention is given to risk assessment, security plan development, security implications of design requirements, automatic safeguards, and procedural safeguards.

  15. Enhancing infrastructure resilience through business continuity planning.

    PubMed

    Fisher, Ronald; Norman, Michael; Klett, Mary

    2017-01-01

    Critical infrastructure is crucial to the functionality and wellbeing of the world around us. It is a complex network that works together to create an efficient society. The core components of critical infrastructure are dependent on one another to function at their full potential. Organisations face unprecedented environmental risks such as increased reliance on information technology and telecommunications, increased infrastructure interdependencies and globalisation. Successful organisations should integrate the components of cyber-physical and infrastructure interdependencies into a holistic risk framework. Physical security plans, cyber security plans and business continuity plans can help mitigate environmental risks. Cyber security plans are becoming the most crucial to have, yet are the least commonly found in organisations. As the reliance on cyber continues to grow, it is imperative that organisations update their business continuity and emergency preparedness activities to include this.

  16. Advanced Education and Technology Business Plan, 2007-10

    ERIC Educational Resources Information Center

    Alberta Enterprise and Advanced Education, 2007

    2007-01-01

    The Government of Alberta Strategic Business Plan addresses significant opportunities and challenges facing Alberta over the next three years and positions Alberta to make the most of its economic, social and natural advantages. It is a plan to strategically manage growth and plan for a sustainable and secure future. Advanced Education and…

  17. Instructional Television Facilities: A Planning Guide.

    ERIC Educational Resources Information Center

    Witherspoon, John P.; Kessler, William J.

    When planning an instructional television (ITV) system, it is suggested that educational objectives should outweigh technological considerations and that expert advice be secured before the planning process is far advanced. In line with the latter suggestion, the book offers a background of technical knowledge aimed at educational administrators…

  18. Keys to a Safe, Secure School.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2002-01-01

    Outlines 10 steps that school administrators can take to make their schools safer and more secure for students and staff. These steps encompass crime prevention through environmental design, crisis planning, entrances, lighting, police presence, prevention programs, rapport with students, smaller schools, technology implementation, and staff…

  19. 47 CFR 202.2 - Criteria and guidance.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...

  20. 47 CFR 202.2 - Criteria and guidance.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...

  1. 47 CFR 202.2 - Criteria and guidance.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...

  2. 47 CFR 202.2 - Criteria and guidance.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...

  3. Hazardous material transportation safety and security field operational test final evaluation plan : executive summary

    DOT National Transportation Integrated Search

    2003-03-17

    The purpose of this effort is to independently evaluate the Battelle Operational Test Team to test methods for leveraging technology and operations to improve HAZMAT transport security, safety, and operational efficiency. As such, the preceding techn...

  4. Acquisition Systems Protection Planning the Manhatten Project: A Case Study

    DTIC Science & Technology

    1994-06-03

    This study examines the counterintelligence and security programs of the Manhattan Project , the United States acquisition of the atomic bomb, using...assessment methodology and counterintelligence techniques and procedures. Acquisition systems, Program protection, Manhattan Project , Atomic bomb, Technology protection, Counterintelligence, Security.

  5. Budgeting for Computer Technology in the Small College Library

    ERIC Educational Resources Information Center

    Axford, H. William

    1978-01-01

    Addresses the need for liberal arts colleges and the use of available technology/automation to help secure their survival. Some factors to be considered in planning and budgeting for automation are discussed. (Author/MBR)

  6. The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

    DTIC Science & Technology

    2010-03-19

    network architecture to connect various DHS elements and promote information sharing.17 • Establish a DHS State, Local, and Regional Fusion Center...of reports; the I&A Strategic Plan; training, and the implementation of a comprehensive information systems architecture .73 As part of its...comprehensive information technology network architecture was submitted to Congress last year. See DHS I&A, Homeland Security Information Technology Network

  7. 47 CFR 214.4 - Planned actions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Planned actions. 214.4 Section 214.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.4 Planned actions. (a) Whenever it is...

  8. 47 CFR 214.4 - Planned actions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Planned actions. 214.4 Section 214.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.4 Planned actions. (a) Whenever it is...

  9. 47 CFR 214.4 - Planned actions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Planned actions. 214.4 Section 214.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.4 Planned actions. (a) Whenever it is...

  10. 47 CFR 214.4 - Planned actions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Planned actions. 214.4 Section 214.4 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND COORDINATION OF THE RADIO SPECTRUM DURING A WARTIME EMERGENCY § 214.4 Planned actions. (a) Whenever it is...

  11. ICRP Publication 125: Radiological Protection in Security Screening.

    PubMed

    Cool, D A; Lazo, E; Tattersall, P; Simeonov, G; Niu, S

    2014-07-01

    The use of technologies to provide security screening for individuals and objects has been increasing rapidly, in keeping with the significant increase in security concerns worldwide. Within the spectrum of technologies, the use of ionizing radiation to provide backscatter and transmission screening capabilities has also increased. The Commission has previously made a number of statements related to the general topic of deliberate exposures of individuals in non-medical settings. This report provides advice on how the radiological protection principles recommended by the Commission should be applied within the context of security screening. More specifically, the principles of justification, optimisation of protection, and dose limitation for planned exposure situations are directly applicable to the use of ionising radiation in security screening. In addition, several specific topics are considered in this report, including the situation in which individuals may be exposed because they are concealed (‘stowaways’) in a cargo container or conveyance that may be subject to screening. The Commission continues to recommend that careful justification of screening should be considered before decisions are made to employ the technology. If a decision is made that its use is justified, the framework for protection as a planned exposure situation should be employed, including optimization of protection with the use of dose constraints and the appropriate provisions for authorisation and inspection.

  12. 48 CFR 639.107-70 - DOSAR solicitation provision and contract clause.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... DEPARTMENT OF STATE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 639.107... provision at 652.239-70, Information Technology Security Plan and Accreditation, in solicitations that include information technology resources or services in which the contractor will have physical or...

  13. [The Mexican Institute of Social Security Institute (IMSS) in Numbers. Functional inventory of imaging medical equipment, 2003].

    PubMed

    2005-01-01

    Medical technology is a fundamental instrument for the provision of health services in the Mexican Institute of Social Security (IMSS) and as a support for diagnostic and therapeutic interventions. The inventory of relevant medical equipment describes the needs for upgrading the technological infrastructure, organize its distribution and plan its renovation in order to guarantee the quality of health services. In this report we describe the type of equipment used in radiology and other imaging services, its geographical distribution, median age in operation and its productivity. The inventory reported 2091 pieces of equipment, ultrasonography and radiology were the most common types (31%) followed by fluoroscopic equipment (20%). Follow-up in the inventory should help in planning the acquisition and maintenance of sophisticated technology used for medical purposes.

  14. Corporate Perspective: An Interview with John Sculley.

    ERIC Educational Resources Information Center

    Temares, M. Lewis

    1989-01-01

    John Sculley, the chairman of the board of Apple Computer, Inc., discusses information technology management, management strategies, network management, the Chief Information Officer, strategic planning, back-to-the-future planning, business and university joint ventures, and security issues. (MLW)

  15. An HIT Solution for Clinical Care and Disaster Planning: How One health Center in Joplin, MO Survived a Tornado and Avoided a Health Information Disaster.

    PubMed

    Shin, Peter; Jacobs, Feygele

    2012-01-01

    Since taking office, President Obama has made substantial investments in promoting the diffusion of health information technology (IT). The objective of the national health IT program is, generally, to enable health care providers to better manage patient care through secure use and sharing of health information. Through the use of technologies including electronic health records, providers can better maintain patient care information and facilitate communication, often improving care outcomes. The recent tornado in Joplin, MO highlights the importance of health information technology in the health center context, and illustrates the importance of secure electronic health information systems as a crucial element of disaster and business continuity planning. This article examines the experience of a community health center in the aftermath of the major tornado that swept through the American Midwest in the spring of 2011, and provides insight into the planning for disaster survival and recovery as it relates to patient records and health center data.

  16. An HIT Solution for Clinical Care and Disaster Planning: How One health Center in Joplin, MO Survived a Tornado and Avoided a Health Information Disaster

    PubMed Central

    Shin, Peter; Jacobs, Feygele

    2012-01-01

    Since taking office, President Obama has made substantial investments in promoting the diffusion of health information technology (IT). The objective of the national health IT program is, generally, to enable health care providers to better manage patient care through secure use and sharing of health information. Through the use of technologies including electronic health records, providers can better maintain patient care information and facilitate communication, often improving care outcomes. The recent tornado in Joplin, MO highlights the importance of health information technology in the health center context, and illustrates the importance of secure electronic health information systems as a crucial element of disaster and business continuity planning. This article examines the experience of a community health center in the aftermath of the major tornado that swept through the American Midwest in the spring of 2011, and provides insight into the planning for disaster survival and recovery as it relates to patient records and health center data. PMID:23569622

  17. Survey of Collaboration Technologies in Multi-level Security Environments

    DTIC Science & Technology

    2014-04-28

    infrastructure or resources. In this research program, the security implications of the US Air Force GeoBase (the US The problem is that in many cases...design structure. ORA uses a Java interface for ease of use, and a C++ computational backend . The current version ORA1.2 software is available on the...information: culture, policy, governance, economics and resources, and technology and infrastructure . This plan, the DoD Information Sharing

  18. Training in the Post-Terrorism Era.

    ERIC Educational Resources Information Center

    Caudron, Shari

    2002-01-01

    A survey of training professionals revealed how the terrorist attacks of September 11, 2001 changed employee attitudes toward training. Decreased travel, increased use of distance technologies, development of security and evacuation plans, and emphasis on such topics as diversity, stress management, and security are some of the changes. (JOW)

  19. KSOS Secure Unix Verification Plan (Kernelized Secure Operating System).

    DTIC Science & Technology

    1980-12-01

    shall be handled as proprietary information untii 5 Apri 1978. After that time, the Government m-. distribute the document as it sees fit. UNIX and PWB...Accession For P-’(’ T.’i3 :- NTI G.;:’... &I : " \\ " Y: Codes mdlc/or 71!O lii WDL-TR7809 KSOS VERIFICATION PLAN SECTION I INTRODUCTION "’The purpose...funding, additional tools may be available by the time they are needed for FSOS verification. We intend to use the best available technology in

  20. 47 CFR 202.3 - Plans preparation and execution.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 202.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL... Emergencies Act (50 U.S.C. 1601). (2) The Director of the Office of Science and Technology Policy shall direct... direction of the activities of the NCS. (2) The Director of the Office of Science and Technology Policy...

  1. 47 CFR 202.3 - Plans preparation and execution.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 202.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL... Emergencies Act (50 U.S.C. 1601). (2) The Director of the Office of Science and Technology Policy shall direct... direction of the activities of the NCS. (2) The Director of the Office of Science and Technology Policy...

  2. 47 CFR 202.3 - Plans preparation and execution.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 202.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL... Emergencies Act (50 U.S.C. 1601). (2) The Director of the Office of Science and Technology Policy shall direct... direction of the activities of the NCS. (2) The Director of the Office of Science and Technology Policy...

  3. 47 CFR 202.3 - Plans preparation and execution.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 202.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL... Emergencies Act (50 U.S.C. 1601). (2) The Director of the Office of Science and Technology Policy shall direct... direction of the activities of the NCS. (2) The Director of the Office of Science and Technology Policy...

  4. 47 CFR 202.3 - Plans preparation and execution.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 202.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL... Emergencies Act (50 U.S.C. 1601). (2) The Director of the Office of Science and Technology Policy shall direct... direction of the activities of the NCS. (2) The Director of the Office of Science and Technology Policy...

  5. Security concept in 'MyAngelWeb' a website for the individual patient at risk of emergency.

    PubMed

    Pinciroli, F; Nahaissi, D; Boschini, M; Ferrari, R; Meloni, G; Camnasio, M; Spaggiari, P; Carnerone, G

    2000-11-01

    We describe the Security Plan for the 'MyAngelWeb' service. The different actors involved in the service are subject to different security procedures. The core of the security system is implemented at the host site by means of a DBMS and standard Information Technology tools. Hardware requirements for sustainable security are needed at the web-site construction sites. They are not needed at the emergency physician's site. At the emergency physician's site, a two-way authentication system (password and test phrase method) is implemented.

  6. Security concept in 'MyAngelWeb((R))' a website for the individual patient at risk of emergency.

    PubMed

    Pinciroli; Nahaissi; Boschini; Ferrari; Meloni; Camnasio; Spaggiari; Carnerone

    2000-11-01

    We describe the Security Plan for the 'MyAngelWeb' service. The different actors involved in the service are subject to different security procedures. The core of the security system is implemented at the host site by means of a DBMS and standard Information Technology tools. Hardware requirements for sustainable security are needed at the web-site construction sites. They are not needed at the emergency physician's site. At the emergency physician's site, a two-way authentication system (password and test phrase method) is implemented.

  7. Research on the information security system in electrical gis system in mobile application

    NASA Astrophysics Data System (ADS)

    Zhou, Chao; Feng, Renjun; Jiang, Haitao; Huang, Wei; Zhu, Daohua

    2017-05-01

    With the rapid development of social informatization process, the demands of government, enterprise, and individuals for spatial information becomes larger. In addition, the combination of wireless network technology and spatial information technology promotes the generation and development of mobile technologies. In today’s rapidly developed information technology field, network technology and mobile communication have become the two pillar industries by leaps and bounds. They almost absorbed and adopted all the latest information, communication, computer, electronics and so on new technologies. Concomitantly, the network coverage is more and more big, the transmission rate is faster and faster, the volume of user’s terminal is smaller and smaller. What’s more, from LAN to WAN, from wired network to wireless network, from wired access to mobile wireless access, people’s demand for communication technology is increasingly higher. As a result, mobile communication technology is facing unprecedented challenges as well as unprecedented opportunities. When combined with the existing mobile communication network, it led to the development of leaps and bounds. However, due to the inherent dependence of the system on the existing computer communication network, information security problems cannot be ignored. Today’s information security has penetrated into all aspects of life. Information system is a complex computer system, and it’s physical, operational and management vulnerabilities constitute the security vulnerability of the system. Firstly, this paper analyzes the composition of mobile enterprise network and information security threat. Secondly, this paper puts forward the security planning and measures, and constructs the information security structure.

  8. Advanced planning surveys using automatic license plate reading equipment and evaluation of automatic license plate reading equipment for advanced planning

    DOT National Transportation Integrated Search

    1998-05-01

    Recent technological advances in computer hardware, software, and image processing have led to the development of automated license plate reading equipment. This equipment has primarily been developed for enforcement and security applications, such a...

  9. Safety and Security: Lessons Learned from 9/11.

    ERIC Educational Resources Information Center

    Schmitz, William J.

    2002-01-01

    Discusses issues faced by the Borough of Manhattan Community College following the September 11th terrorist attacks: the expense of recovery and budgeting for it, developing an emergency preparedness plan, the characteristics of emergency management and disaster recovery plans, technology and its role in emergency management, being prepared for…

  10. Legal issues of the electronic dental record: security and confidentiality.

    PubMed

    Szekely, D G; Milam, S; Khademi, J A

    1996-01-01

    Computer-based, electronic dental record keeping involves complex issues of patient privacy and the dental practitioner's ethical duty of confidentiality. Federal and state law is responding to the new legal issues presented by computer technology. Authenticating the electronic record in terms of ensuring its reliability and accuracy is essential in order to protect its admissibility as evidence in legal actions. Security systems must be carefully planned to limit access and provide for back-up and storage of dental records. Carefully planned security systems protect the patient from disclosure without the patient's consent and also protect the practitioner from the liability that would arise from such disclosure. Human errors account for the majority of data security problems. Personnel security is assured through pre-employment screening, employment contracts, policies, and staff education. Contracts for health information systems should include provisions for indemnification and ensure the confidentiality of the system by the vendor.

  11. Security Is Not an Option--Learning in a Safe Environment. FEDA Paper.

    ERIC Educational Resources Information Center

    Coe, Beatrice

    1997-01-01

    A study examined what further education colleges in Britain were doing about security and what they planned for the future. A literature search found that a PEST (Political/legal, Economic, Sociocultural, and Technological) analysis was one way to examine the differential impact of external influences. A PEST analysis offered a strategy for…

  12. Transition Plan For the Technology Demonstration of the Joint Network Defence and Management System (JNDMS)

    DTIC Science & Technology

    2009-11-01

    Technology Demonstration of the Joint Network Defence and Management System (JNDMS) Brett Trask; Novembre 2009. Dès le départ, nous avons mis au point le... 13 5.1 System Specification... 13 5.1.1 Scope ............................................................................................................. 13 5.2 Security

  13. The Ingenuity Imperative

    ERIC Educational Resources Information Center

    Hansen, John W.

    2005-01-01

    The author discusses three threats to the American way of life: the first threat is related to human and technological growth; the second is a new division of labor; and the third threat is security and safety. The author suggests two solutions to address these challenges: (1) better technological planning and decisions based on technological…

  14. 75 FR 62399 - Office of the National Coordinator for Health Information Technology; HIT Standards Committee...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-08

    ..., implementation, and privacy and security. HIT Standards Committee Schedule for the Assessment of HIT Policy... recommendations received from the HIT Policy Committee regarding health information technology standards...), section 3003. Erin Poetter, Office of Policy and Planning, Office of the National Coordinator for Health...

  15. LANL continuity of operations plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Senutovitch, Diane M

    2010-12-22

    The Los Alamos National Laboratory (LANL) is a premier national security research institution, delivering scientific and engineering solutions for the nation's most crucial and complex problems. Our primary responsibility is to ensure the safety, security, and reliability of the nation's nuclear stockpile. LANL emphasizes worker safety, effective operational safeguards and security, and environmental stewardship, outstanding science remains the foundation of work at the Laboratory. In addition to supporting the Laboratory's core national security mission, our work advances bioscience, chemistry, computer science, earth and environmental sciences, materials science, and physics disciplines. To accomplish LANL's mission, we must ensure that the Laboratorymore » EFs continue to be performed during a continuity event, including localized acts of nature, accidents, technological or attack-related emergencies, and pandemic or epidemic events. The LANL Continuity of Operations (COOP) Plan documents the overall LANL COOP Program and provides the operational framework to implement continuity policies, requirements, and responsibilities at LANL, as required by DOE 0 150.1, Continuity Programs, May 2008. LANL must maintain its ability to perform the nation's PMEFs, which are: (1) maintain the safety and security of nuclear materials in the DOE Complex at fixed sites and in transit; (2) respond to a nuclear incident, both domestically and internationally, caused by terrorist activity, natural disaster, or accident, including mobilizing the resources to support these efforts; and (3) support the nation's energy infrastructure. This plan supports Continuity of Operations for Los Alamos National Laboratory (LANL). This plan issues LANL policy as directed by the DOE 0 150.1, Continuity Programs, and provides direction for the orderly continuation of LANL EFs for 30 days of closure or 60 days for a pandemic/epidemic event. Initiation of COOP operations may be required to support an allhazards event, including a national security emergency, major fire, catastrophic natural disaster, man-made disaster, terrorism event, or technological disaster by rendering LANL buildings, infrastructure, or Technical Areas unsafe, temporarily unusable, or inaccessible.« less

  16. National Center for Combating Terrorism Strategic Plan, September 2003

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bechtel Nevada

    2003-09-01

    National Center for Combating Terrorism Strategic Plan is to document the mission, vision, and goals for success; define the build plan; and describe initiatives that support the U.S. Department of Homeland Security, U.S. Department of Defense, U.S. Department of Energy, U.S. Department of Justice, intelligence community, National Governors Association, and other organizations or departments with combating terrorism training, testing, and technology responsibilities.

  17. 76 FR 57026 - Air Force Scientific Advisory Board Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-15

    ... and Technology plan emphasizing next generation energy, autonomy, sustainment, cyber, and ISR... secure cyber ops; acquisition challenges amid new era of defense policy and lessons learned from...

  18. The international politics of geoengineering: The feasibility of Plan B for tackling climate change

    PubMed Central

    Corry, Olaf

    2017-01-01

    Geoengineering technologies aim to make large-scale and deliberate interventions in the climate system possible. A typical framing is that researchers are exploring a ‘Plan B’ in case mitigation fails to avert dangerous climate change. Some options are thought to have the potential to alter the politics of climate change dramatically, yet in evaluating whether they might ultimately reduce climate risks, their political and security implications have so far not been given adequate prominence. This article puts forward what it calls the ‘security hazard’ and argues that this could be a crucial factor in determining whether a technology is able, ultimately, to reduce climate risks. Ideas about global governance of geoengineering rely on heroic assumptions about state rationality and a generally pacific international system. Moreover, if in a climate engineered world weather events become something certain states can be made directly responsible for, this may also negatively affect prospects for ‘Plan A’, i.e. an effective global agreement on mitigation. PMID:29386754

  19. Implementing an Information Security Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to covermore » information security best practices, planning for an information security management system, and implementing security controls for information security.« less

  20. Homeland security: sharing and managing critical incident information

    NASA Astrophysics Data System (ADS)

    Ashley, W. R., III

    2003-09-01

    Effective critical incident response for homeland security requires access to real-time information from many organizations. Command and control, as well as basic situational awareness, are all dependant on quickly communicating a dynamically changing picture to a variety of decision makers. For the most part, critical information management is not unfamiliar or new to the public safety community. However, new challenges present themselves when that information needs to be seamlessly shared across multiple organizations at the local, state and federal level in real-time. The homeland security problem does not lend itself to the traditional military joint forces planning model where activities shift from a deliberate planning process to a crisis action planning process. Rather, the homeland security problem is more similar to a traditional public safety model where the current activity state moves from complete inactivity or low-level attention to immediate crisis action planning. More often than not the escalation occurs with no warning or baseline information. This paper addresses the challenges of sharing critical incident information and the impacts new technologies will have on this problem. The value of current and proposed approaches will be critiqued for operational value and areas will be identified for further development.

  1. Aerospace Communications Security Technologies Demonstrated

    NASA Technical Reports Server (NTRS)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to the intercom system for audio surveillance. Audio, video, and "black box" data were simultaneously streamed to the ground, where they were displayed to a Glenn audience of senior management and aviation security team members.

  2. Laboratory Directed Research and Development FY2011 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig, W; Sketchley, J; Kotta, P

    2012-03-22

    A premier applied-science laboratory, Lawrence Livermore National Laboratory (LLNL) has earned the reputation as a leader in providing science and technology solutions to the most pressing national and global security problems. The LDRD Program, established by Congress at all DOE national laboratories in 1991, is LLNL's most important single resource for fostering excellent science and technology for today's needs and tomorrow's challenges. The LDRD internally directed research and development funding at LLNL enables high-risk, potentially high-payoff projects at the forefront of science and technology. The LDRD Program at Livermore serves to: (1) Support the Laboratory's missions, strategic plan, and foundationalmore » science; (2) Maintain the Laboratory's science and technology vitality; (3) Promote recruiting and retention; (4) Pursue collaborations; (5) Generate intellectual property; and (6) Strengthen the U.S. economy. Myriad LDRD projects over the years have made important contributions to every facet of the Laboratory's mission and strategic plan, including its commitment to nuclear, global, and energy and environmental security, as well as cutting-edge science and technology and engineering in high-energy-density matter, high-performance computing and simulation, materials and chemistry at the extremes, information systems, measurements and experimental science, and energy manipulation. A summary of each project was submitted by the principal investigator. Project summaries include the scope, motivation, goals, relevance to DOE/NNSA and LLNL mission areas, the technical progress achieved in FY11, and a list of publications that resulted from the research. The projects are: (1) Nuclear Threat Reduction; (2) Biosecurity; (3) High-Performance Computing and Simulation; (4) Intelligence; (5) Cybersecurity; (6) Energy Security; (7) Carbon Capture; (8) Material Properties, Theory, and Design; (9) Radiochemistry; (10) High-Energy-Density Science; (11) Laser Inertial-Fusion Energy; (12) Advanced Laser Optical Systems and Applications; (12) Space Security; (13) Stockpile Stewardship Science; (14) National Security; (15) Alternative Energy; and (16) Climatic Change.« less

  3. Fingerprints in Place of Passwords: A Study of Technology Adoption in the Nursing Profession

    ERIC Educational Resources Information Center

    Francisco, James R.

    2010-01-01

    Health care is one of the most highly regulated industries in the United States. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates the implementation of information systems security to protect the personal information of patients. Properly planned implementations ease the process of introducing new technologies like…

  4. Information Technology: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    DTIC Science & Technology

    2007-05-01

    services by implementing a disaster recovery plan to restore an organization’s critical business functions. (DRII 2004). ISO 27001 An information...the International Organization for Standardization ( ISO )), the IT SSP bases the terms and definitions on those in the NIPP because the SSP is an annex...International Organization for Standardization/International Electrotechnical Commission ( ISO /IEC) 27000 Series, Information technology—Security

  5. [Study on network architecture of a tele-medical information sharing platform].

    PubMed

    Pan, Lin; Yu, Lun; Chen, Jin-xiong

    2006-07-01

    In the article,a plan of network construction which satisfies the demand of applications for a telemedical information sharing platform is proposed. We choice network access plans in view of user actual situation, through the analysis of the service demand and many kinds of network access technologies. Hospital servers that locate in LAN link sharing platform with node servers, should separate from the broadband network of sharing platform in order to ensure the security of the internal hospital network and the administration management. We use the VPN technology to realize the safe transmission of information in the platform network. Preliminary experiments have proved the plan is practicable.

  6. 78 FR 72873 - Availability of 2014-2018 Draft Strategic Plan and Request for Public Comment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-04

    ... energy, environmental, and nuclear security of the United States; promoting scientific and technological innovation in support of that mission; sponsoring basic research in the physical sciences; [[Page 72874

  7. The QUANTGRID Project (RO)—Quantum Security in GRID Computing Applications

    NASA Astrophysics Data System (ADS)

    Dima, M.; Dulea, M.; Petre, M.; Petre, C.; Mitrica, B.; Stoica, M.; Udrea, M.; Sterian, R.; Sterian, P.

    2010-01-01

    The QUANTGRID Project, financed through the National Center for Programme Management (CNMP-Romania), is the first attempt at using Quantum Crypted Communications (QCC) in large scale operations, such as GRID Computing, and conceivably in the years ahead in the banking sector and other security tight communications. In relation with the GRID activities of the Center for Computing & Communications (Nat.'l Inst. Nucl. Phys.—IFIN-HH), the Quantum Optics Lab. (Nat.'l Inst. Plasma and Lasers—INFLPR) and the Physics Dept. (University Polytechnica—UPB) the project will build a demonstrator infrastructure for this technology. The status of the project in its incipient phase is reported, featuring tests for communications in classical security mode: socket level communications under AES (Advanced Encryption Std.), both proprietary code in C++ technology. An outline of the planned undertaking of the project is communicated, highlighting its impact in quantum physics, coherent optics and information technology.

  8. FlySec: a risk-based airport security management system based on security as a service concept

    NASA Astrophysics Data System (ADS)

    Kyriazanos, Dimitris M.; Segou, Olga E.; Zalonis, Andreas; Thomopoulos, Stelios C. A.

    2016-05-01

    Complementing the ACI/IATA efforts, the FLYSEC European H2020 Research and Innovation project (http://www.fly-sec.eu/) aims to develop and demonstrate an innovative, integrated and end-to-end airport security process for passengers, enabling a guided and streamlined procedure from the landside to airside and into the boarding gates, and offering for an operationally validated innovative concept for end-to-end aviation security. FLYSEC ambition turns through a well-structured work plan into: (i) innovative processes facilitating risk-based screening; (ii) deployment and integration of new technologies and repurposing existing solutions towards a risk-based Security paradigm shift; (iii) improvement of passenger facilitation and customer service, bringing security as a real service in the airport of tomorrow;(iv) achievement of measurable throughput improvement and a whole new level of Quality of Service; and (v) validation of the results through advanced "in-vitro" simulation and "in-vivo" pilots. On the technical side, FLYSEC achieves its ambitious goals by integrating new technologies on video surveillance, intelligent remote image processing and biometrics combined with big data analysis, open-source intelligence and crowdsourcing. Repurposing existing technologies is also in the FLYSEC objectives, such as mobile application technologies for improved passenger experience and positive boarding applications (i.e. services to facilitate boarding and landside/airside way finding) as well as RFID for carry-on luggage tracking and quick unattended luggage handling. In this paper, the authors will describe the risk based airport security management system which powers FLYSEC intelligence and serves as the backend on top of which FLYSEC's front end technologies reside for security services management, behaviour and risk analysis.

  9. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  10. Modeling and Simulation Roadmap to Enhance Electrical Energy Security of U.S. Naval Bases

    DTIC Science & Technology

    2012-03-01

    evaluating power system architectures and technologies and, therefore, can become a valuable tool for the implementation of the described plan for Navy...a well validated and consistent process for evaluating power system architectures and technologies and, therefore, can be a valuable tool for the...process for evaluating power system architectures and component technologies is needed to support the development and implementation of these new

  11. Twenty-Five Year Site Plan FY2013 - FY2037

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jones, William H.

    2012-07-12

    Los Alamos National Laboratory (the Laboratory) is the nation's premier national security science laboratory. Its mission is to develop and apply science and technology to ensure the safety, security, and reliability of the United States (U.S.) nuclear stockpile; reduce the threat of weapons of mass destruction, proliferation, and terrorism; and solve national problems in defense, energy, and the environment. The fiscal year (FY) 2013-2037 Twenty-Five Year Site Plan (TYSP) is a vital component for planning to meet the National Nuclear Security Administration (NNSA) commitment to ensure the U.S. has a safe, secure, and reliable nuclear deterrent. The Laboratory also usesmore » the TYSP as an integrated planning tool to guide development of an efficient and responsive infrastructure that effectively supports the Laboratory's missions and workforce. Emphasizing the Laboratory's core capabilities, this TYSP reflects the Laboratory's role as a prominent contributor to NNSA missions through its programs and campaigns. The Laboratory is aligned with Nuclear Security Enterprise (NSE) modernization activities outlined in the NNSA Strategic Plan (May 2011) which include: (1) ensuring laboratory plutonium space effectively supports pit manufacturing and enterprise-wide special nuclear materials consolidation; (2) constructing the Chemistry and Metallurgy Research Replacement Nuclear Facility (CMRR-NF); (3) establishing shared user facilities to more cost effectively manage high-value, experimental, computational and production capabilities; and (4) modernizing enduring facilities while reducing the excess facility footprint. Th is TYSP is viewed by the Laboratory as a vital planning tool to develop an effi cient and responsive infrastructure. Long range facility and infrastructure development planning are critical to assure sustainment and modernization. Out-year re-investment is essential for sustaining existing facilities, and will be re-evaluated on an annual basis. At the same time, major modernization projects will require new line-item funding. This document is, in essence, a roadmap that defines a path forward for the Laboratory to modernize, streamline, consolidate, and sustain its infrastructure to meet its national security mission.« less

  12. 77 FR 43662 - Notice of Open Meetings To Prepare and Release 2012 Annual Report to Congress

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... ``regarding the national security implications and impact of the bilateral trade and economic relationship... and its 5-year plan, technology transfers, and outsourcing. China's activities directly affecting U.S...

  13. 77 FR 53965 - Notice of Open Meetings To Prepare and Release 2012 Annual Report to Congress

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-04

    ... national security implications and impact of the bilateral trade and economic relationship between the... and its 5-year plan, technology transfers, and outsourcing. China's activities directly affecting U.S...

  14. Five-Year Research and Development Plan, Fiscal Years 2008-2013

    DTIC Science & Technology

    2008-08-01

    protect our interior 1.l.1 Deploy a mix of infrastructure, technology, and personnel on the Southwest border to ensure all illegal activity along...requirements into a systems model. FY 2009: • Review the System of Systems model and ensure it correctly addresses SBI requirements. FY 2010... on a ship). This security architecture provides the framework within which DHS will incorporate their near-term CSD and future container security

  15. Risk management. National Aeronautics and Space Administration (NASA). Interim rule adopted as final with changes.

    PubMed

    2000-11-22

    This is a final rule amending the NASA FAR Supplement (NFS) to emphasize considerations of risk management, including safety, security (including information technology security), health, export control, and damage to the environment, within the acquisition process. This final rule addresses risk management within the context of acquisition planning, selecting sources, choosing contract type, structuring award fee incentives, administering contracts, and conducting contractor surveillance.

  16. Colleges and universities: survival in the information age

    NASA Astrophysics Data System (ADS)

    Huff, Warren D.

    2000-07-01

    Coping with information technology (IT) planning is one of the more important, expensive, time-consuming and potentially disastrous exercises an academic institution can undertake. Those institutions that are successful in establishing administrative and academic frameworks within which rapid technological change and adaptation can occur will survive and those who stubbornly adhere to archaic styles of management and decision-making will not. IT strategies, priorities and plans must be driven by and integrated with on-going academic planning. Cross-department/unit collaboration must be encouraged and facilitated by university resources and processes. Long-range planning and identification of reasonable and attainable goals requires a leadership and governance structure in which all major stakeholders participate in setting information technology strategies, priorities, plans, standards and performance measures. A successful technology funding strategy must ensure budgeting for adequate network facilities, including assets and the people and processes to support them. Accompanying these administrative procedures should be an open dialogue on the issues brought about by apparent conflicts between University wide standardization of basic policy, procedures and technologies and the pedagogical and research initiatives which address unique collegiate or departmental needs. Network capabilities should be integrated, timely, accurate, secure and easily accessible to all who need it.

  17. 47 CFR 211.0 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.0 Purpose. This part establishes policies and procedures.... 820), policies, plans, and procedures developed pursuant to the Executive order shall be in consonance...

  18. 47 CFR 211.0 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.0 Purpose. This part establishes policies and procedures.... 820), policies, plans, and procedures developed pursuant to the Executive order shall be in consonance...

  19. 47 CFR 211.0 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.0 Purpose. This part establishes policies and procedures.... 820), policies, plans, and procedures developed pursuant to the Executive order shall be in consonance...

  20. 47 CFR 211.0 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.0 Purpose. This part establishes policies and procedures.... 820), policies, plans, and procedures developed pursuant to the Executive order shall be in consonance...

  1. 47 CFR 211.0 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION PRIORITY PROCEDURES FOR TELECOMMUNICATIONS SERVICES § 211.0 Purpose. This part establishes policies and procedures.... 820), policies, plans, and procedures developed pursuant to the Executive order shall be in consonance...

  2. Secure and private sensing for driver authentication and transportation safety : final report.

    DOT National Transportation Integrated Search

    2017-08-01

    Recent technology trends have allowed affordable and efficient collection of driver data. This has enabled a variety of potential applications, including more accurate pricing determinations for insurance and finer grained traffic planning for improv...

  3. Cyber Science, Biometrics and Digital Forensics: Workshop on Emerging Cyber Techniques and Technologies

    DTIC Science & Technology

    2016-09-07

    and the University of Southern California through have been collaborating on a proposal led by Florida International University’s School of Computing...security. We will develop an action plan to identify needs, assess vulnerabilities and address disruptive technologies that could clearly provide a ...Institute of Technology and his Bachelor of Science degree in Aerospace Engineering, Polytechnic University of New York. Mr. Hurtado is a member of the

  4. Food Security, Institutional Framework and Technology: Examining the Nexus in Nigeria Using ARDL Approach

    PubMed Central

    Osabohien, Romanus; Osabuohien, Evans; Urhie, Ese

    2018-01-01

    Background: Growth in agricultural science and technology is deemed essential for in-creasing agricultural output; reduce the vulnerability of rural poverty and in turn, food security. Food security and growth in agricultural output depends on technological usages, which enhances the pro-ductive capacity of the agricultural sector. The indicators of food security utilised in this study in-clude: dietary energy supply, average value of food production, prevalence of food inadequacy, among others. Objective: In this paper, we examined the level of technology and how investment in the agriculture and technology can improve technical know-how in Nigeria with a view to achieving food security. Method: We carried out the analysis on how investment in technology and institutional framework can improve the level of food availability (a key component of food security) in Nigeria using econ-ometric technique based on Autoregressive Distribution Lag (ARDL) framework. Results: The results showed, inter alia, that in Nigeria, there is a high level of food insecurity as a result of low attention on food production occasioned by the pervasive influence of oil that become the major export product. Conclusion: It was noted that the availability of arable land was one of the major factors to increase food production to solve the challenge of food insecurity. Thus, the efforts of reducing the rate of food insecurity are essential in this regards. This can also be achieved, among others, by active interactions between government and farmers, to make contribution to important planning issues that relate to food production in the country and above all, social protection policies should be geared or channelled to agricultural sector to protect farmers who are vulnerable to shocks and avert risks associated with agriculture. PMID:29853816

  5. Food Security, Institutional Framework and Technology: Examining the Nexus in Nigeria Using ARDL Approach.

    PubMed

    Osabohien, Romanus; Osabuohien, Evans; Urhie, Ese

    2018-04-01

    Growth in agricultural science and technology is deemed essential for in-creasing agricultural output; reduce the vulnerability of rural poverty and in turn, food security. Food security and growth in agricultural output depends on technological usages, which enhances the pro-ductive capacity of the agricultural sector. The indicators of food security utilised in this study in-clude: dietary energy supply, average value of food production, prevalence of food inadequacy, among others. In this paper, we examined the level of technology and how investment in the agriculture and technology can improve technical know-how in Nigeria with a view to achieving food security. We carried out the analysis on how investment in technology and institutional framework can improve the level of food availability (a key component of food security) in Nigeria using econ-ometric technique based on Autoregressive Distribution Lag (ARDL) framework. The results showed, inter alia, that in Nigeria, there is a high level of food insecurity as a result of low attention on food production occasioned by the pervasive influence of oil that become the major export product. It was noted that the availability of arable land was one of the major factors to increase food production to solve the challenge of food insecurity. Thus, the efforts of reducing the rate of food insecurity are essential in this regards. This can also be achieved, among others, by active interactions between government and farmers, to make contribution to important planning issues that relate to food production in the country and above all, social protection policies should be geared or channelled to agricultural sector to protect farmers who are vulnerable to shocks and avert risks associated with agriculture.

  6. Unofficial Technology Marvel of the Millennium.

    ERIC Educational Resources Information Center

    Ricart, Glenn

    2000-01-01

    Discusses the impact of the Internet, particularly on higher education. Highlights include a history of the development of the Internet; a leadership plan for higher education; authentication of personal identity; security; information quality; the concept of Internet time; and future possibilities. (LRW)

  7. Building Your Campus Portal: Advice from the Field.

    ERIC Educational Resources Information Center

    Krebs, Arlene

    2001-01-01

    Discusses portal technology in higher education, including planning, design, technical, and financial issues. Highlights include determining the customers; marketing possibilities for the university; ownership issues; data design; effective cost structuring; security issues; adaptability; content; and customer input and feedback. (LRW)

  8. 33 CFR 103.510 - Area Maritime Security (AMS) Plan review and approval.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Area Maritime Security (AMS) Plan... HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.510 Area Maritime Security (AMS) Plan review and approval. Each AMS Plan will be submitted...

  9. New Advanced Technologies to Provide Decentralised and Secure Access to Medical Records: Case Studies in Oncology

    PubMed Central

    Quantin, Catherine; Coatrieux, Gouenou; Allaert, François André; Fassa, Maniane; Bourquard, Karima; Boire, Jean-Yves; de Vlieger, Paul; Maigne, Lydia; Breton, Vincent

    2009-01-01

    The main problem for health professionals and patients in accessing information is that this information is very often distributed over many medical records and locations. This problem is particularly acute in cancerology because patients may be treated for many years and undergo a variety of examinations. Recent advances in technology make it feasible to gain access to medical records anywhere and anytime, allowing the physician or the patient to gather information from an “ephemeral electronic patient record”. However, this easy access to data is accompanied by the requirement for improved security (confidentiality, traceability, integrity, ...) and this issue needs to be addressed. In this paper we propose and discuss a decentralised approach based on recent advances in information sharing and protection: Grid technologies and watermarking methodologies. The potential impact of these technologies for oncology is illustrated by the examples of two experimental cases: a cancer surveillance network and a radiotherapy treatment plan. It is expected that the proposed approach will constitute the basis of a future secure “google-like” access to medical records. PMID:19718446

  10. An open, interoperable, and scalable prehospital information technology network architecture.

    PubMed

    Landman, Adam B; Rokos, Ivan C; Burns, Kevin; Van Gelder, Carin M; Fisher, Roger M; Dunford, James V; Cone, David C; Bogucki, Sandy

    2011-01-01

    Some of the most intractable challenges in prehospital medicine include response time optimization, inefficiencies at the emergency medical services (EMS)-emergency department (ED) interface, and the ability to correlate field interventions with patient outcomes. Information technology (IT) can address these and other concerns by ensuring that system and patient information is received when and where it is needed, is fully integrated with prior and subsequent patient information, and is securely archived. Some EMS agencies have begun adopting information technologies, such as wireless transmission of 12-lead electrocardiograms, but few agencies have developed a comprehensive plan for management of their prehospital information and integration with other electronic medical records. This perspective article highlights the challenges and limitations of integrating IT elements without a strategic plan, and proposes an open, interoperable, and scalable prehospital information technology (PHIT) architecture. The two core components of this PHIT architecture are 1) routers with broadband network connectivity to share data between ambulance devices and EMS system information services and 2) an electronic patient care report to organize and archive all electronic prehospital data. To successfully implement this comprehensive PHIT architecture, data and technology requirements must be based on best available evidence, and the system must adhere to health data standards as well as privacy and security regulations. Recent federal legislation prioritizing health information technology may position federal agencies to help design and fund PHIT architectures.

  11. Key issues and technical route of cyber physical distribution system

    NASA Astrophysics Data System (ADS)

    Zheng, P. X.; Chen, B.; Zheng, L. J.; Zhang, G. L.; Fan, Y. L.; Pei, T.

    2017-01-01

    Relying on the National High Technology Research and Development Program, this paper introduced the key issues in Cyber Physical Distribution System (CPDS), mainly includes: composite modelling method and interaction mechanism, system planning method, security defence technology, distributed control theory. Then on this basis, the corresponding technical route is proposed, and a more detailed research framework along with main schemes to be adopted is also presented.

  12. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  13. Laboratory security and emergency response guidance for laboratories working with select agents. Centers for Disease Control and Prevention.

    PubMed

    Richmond, Jonathan Y; Nesby-O'Dell, Shanna L

    2002-12-06

    In recent years, concern has increased regarding use of biologic materials as agents of terrorism, but these same agents are often necessary tools in clinical and research microbiology laboratories. Traditional biosafety guidelines for laboratories have emphasized use of optimal work practices, appropriate containment equipment, well-designed facilities, and administrative controls to minimize risk of worker injury and to ensure safeguards against laboratory contamination. The guidelines discussed in this report were first published in 1999 (U.S. Department of Health and Human Services/CDC and National Institutes of Health. Biosafety in microbiological and biomedical laboratories [BMBL]. Richmond JY, McKinney RW, eds. 4th ed. Washington, DC: US Department of Health and Human Services, 1999 [Appendix F]). In that report, physical security concerns were addressed, and efforts were focused on preventing unauthorized entry to laboratory areas and preventing unauthorized removal of dangerous biologic agents from the laboratory. Appendix F of BMBL is now being revised to include additional information regarding personnel risk assessments, and inventory controls. The guidelines contained in this report are intended for laboratories working with select agents under biosafety-level 2, 3, or 4 conditions as described in Sections II and III of BMBL. These recommendations include conducting facility risk assessments and developing comprehensive security plans to minimize the probability of misuse of select agents. Risk assessments should include systematic, site-specific reviews of 1) physical security; 2) security of data and electronic technology systems; 3) employee security; 4) access controls to laboratory and animal areas; 5) procedures for agent inventory and accountability; 6) shipping/transfer and receiving of select agents; 7) unintentional incident and injury policies; 8) emergency response plans; and 9) policies that address breaches in security. The security plan should be an integral part of daily operations. All employees should be well-trained and equipped, and the plan should be reviewed annually, at least.

  14. Notification: Follow-Up on Significant Information Technology Security Findings and Recommendations

    EPA Pesticide Factsheets

    Project #OA-FY14-0056, January 17, 2014. The EPA OIG plans to begin preliminary research to follow up on recommendations issued in its final reports between specific fiscal years, and reports associated with the FY 2013 OIG Management Challenges memo.

  15. 77 FR 58101 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-19

    ... information technology. DATES: Consideration will be given to all comments received by November 19, 2012... to SNPMIS Project Officer, DHSS, 7700 Arlington Boulevard, Falls Church, VA 22042-2902 or call 703... activities data including referral, evaluation, eligibility, and service plans. The Computer Security Act of...

  16. 47 CFR 211.1 - Authority.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Authority. 211.1 Section 211.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION... Communications Act of 1934, as amended. (47 U.S.C. 606). (b) Authority to develop plans policies, and procedures...

  17. 47 CFR 211.1 - Authority.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Authority. 211.1 Section 211.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION... Communications Act of 1934, as amended. (47 U.S.C. 606). (b) Authority to develop plans policies, and procedures...

  18. 47 CFR 211.1 - Authority.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Authority. 211.1 Section 211.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION... Communications Act of 1934, as amended. (47 U.S.C. 606). (b) Authority to develop plans policies, and procedures...

  19. 47 CFR 211.1 - Authority.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Authority. 211.1 Section 211.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION... Communications Act of 1934, as amended. (47 U.S.C. 606). (b) Authority to develop plans policies, and procedures...

  20. 47 CFR 211.1 - Authority.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Authority. 211.1 Section 211.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EMERGENCY RESTORATION... Communications Act of 1934, as amended. (47 U.S.C. 606). (b) Authority to develop plans policies, and procedures...

  1. 3S (Safeguards, Security, Safety) based pyroprocessing facility safety evaluation plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ku, J.H.; Choung, W.M.; You, G.S.

    The big advantage of pyroprocessing for the management of spent fuels against the conventional reprocessing technologies lies in its proliferation resistance since the pure plutonium cannot be separated from the spent fuel. The extracted materials can be directly used as metal fuel in a fast reactor, and pyroprocessing reduces drastically the volume and heat load of the spent fuel. KAERI has implemented the SBD (Safeguards-By-Design) concept in nuclear fuel cycle facilities. The goal of SBD is to integrate international safeguards into the entire facility design process since the very beginning of the design phase. This paper presents a safety evaluationmore » plan using a conceptual design of a reference pyroprocessing facility, in which 3S (Safeguards, Security, Safety)-By-Design (3SBD) concept is integrated from early conceptual design phase. The purpose of this paper is to establish an advanced pyroprocessing hot cell facility design concept based on 3SBD for the successful realization of pyroprocessing technology with enhanced safety and proliferation resistance.« less

  2. 6 CFR 37.41 - Security plan.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in paragraph (b) of this section and must submit the security plan as part of its REAL ID certification under § 37...

  3. Public attitudes toward programs of large-scale technological changes: Some reflections and policy prescriptions, appendix E

    NASA Technical Reports Server (NTRS)

    Shostak, A. B.

    1973-01-01

    The question of how ready the public is for the implementation of large-scale programs of technological change is considered. Four vital aspects of the issue are discussed which include: (1) the ways in which the public mis-perceives the change process, (2) the ways in which recent history impacts on public attitudes, (3) the ways in which the public divides among itself, and (4) the fundamentals of public attitudes towards change. It is concluded that nothing is so critical in the 1970's to securing public approval for large-scale planned change projects as is securing the approval by change-agents of the public.

  4. Technology Against Terrorism: The Federal Effort

    DTIC Science & Technology

    1991-07-01

    control appli - control and airport security plans. Some difficulties cations, irises of those seeking entry would be have arisen: now that specific...Washington International Air- tion. Among more advanced technologies are four of port as a test-bed. Sandia is applying to airport interest: voice...and 300 by 1999. criteria as well as evaluation standards and proce- In further tests carried out at JFK Airport in New dures for future EDS devices

  5. Laser Imaging Video Camera Sees Through Fire, Fog, Smoke

    NASA Technical Reports Server (NTRS)

    2015-01-01

    Under a series of SBIR contracts with Langley Research Center, inventor Richard Billmers refined a prototype for a laser imaging camera capable of seeing through fire, fog, smoke, and other obscurants. Now, Canton, Ohio-based Laser Imaging through Obscurants (LITO) Technologies Inc. is demonstrating the technology as a perimeter security system at Glenn Research Center and planning its future use in aviation, shipping, emergency response, and other fields.

  6. Science and Strategic - Climate Implications

    NASA Astrophysics Data System (ADS)

    Tindall, J. A.; Moran, E. H.

    2008-12-01

    Energy of weather systems greatly exceeds energy produced and used by humans. Variation in this energy causes climate variability potentially resulting in local, national, and/or global catastrophes beyond our ability to deter the loss of life and economic destabilization. Large scale natural disasters routinely result in shortages of water, disruption of energy supplies, and destruction of infrastructure. The resulting unforeseen and disastrous events occurring beyond national emergency preparation, as related to climate variability, could insight civil unrest due to dwindling and/or inaccessible resources necessary for survival. Lack of these necessary resources in impacted countries often leads to wars. Climate change coupled with population growth, which exposes more of the population to potential risks associated with climate and environmental change, demands faster technological response. Understanding climate/associated environmental changes, the relation to human activity and behavior, and including this in national and international emergency/security management plans would alleviate shortcomings in our present and future technological status. The scale of environmental change will determine the potential magnitude of civil unrest at the local, national, and/or global level along with security issues at each level. Commonly, security issues related to possible civil unrest owing to temporal environmental change is not part of a short and/or long-term strategy, yet recent large-scale disasters are reminders that system failures (as in hurricane Katrina) include acknowledged breaches to individual, community, and infrastructure security. Without advance planning and management concerning environmental change, oncoming and climate related events will intensify the level of devastation and human catastrophe. Depending upon the magnitude and period of catastrophic events and/or environmental changes, destabilization of agricultural systems, energy supplies, and other lines of commodities often results in severely unbalanced supply and demand ratios, which eventually affect the entire global community. National economies potentially risk destabilization, which is especially important since economics plays a major role in strategic planning. This presentation will address these issues and the role that science can play in human sustainability and local, national, and international security.

  7. Preparedness for emergency response: guidelines for the emergency planning process.

    PubMed

    Perry, Ronald W; Lindell, Michael K

    2003-12-01

    Especially since the terrorist attacks of 11 September 2001, governments worldwide have invested considerable resources in the writing of terrorism emergency response plans. Particularly in the United States, the federal government has created new homeland security organisations and urged state and local governments to draw up plans. This emphasis on the written plan tends to draw attention away from the process of planning itself and the original objective of achieving community emergency preparedness. This paper reviews the concepts of community preparedness and emergency planning, and their relationships with training, exercises and the written plan. A series of 10 planning process guidelines are presented that draw upon the preparedness literature for natural and technological disasters, and can be applied to any environmental threat.

  8. Descriptive Model of Generic WAMS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hauer, John F.; DeSteese, John G.

    The Department of Energy’s (DOE) Transmission Reliability Program is supporting the research, deployment, and demonstration of various wide area measurement system (WAMS) technologies to enhance the reliability of the Nation’s electrical power grid. Pacific Northwest National Laboratory (PNNL) was tasked by the DOE National SCADA Test Bed Program to conduct a study of WAMS security. This report represents achievement of the milestone to develop a generic WAMS model description that will provide a basis for the security analysis planned in the next phase of this study.

  9. Assessing the Alignment of Information Security with Strategic Business, and Strategic Information System Planning: A Department of Defense Perspective

    DTIC Science & Technology

    2010-06-01

    Wolfgang. "Appraisal of the effectivness and efficiency of an Information Security Management System based on ISO 27001 ." International Conference on...of corporate information resources (Doherty and 29 Fulford, 2006) ( ISO /IEC 17799, 2005). Both public and private sectors of business have...Science Ltd, 2002. Iacovou, Charalambos L. "The IPACS project: when IT hits the fan." Journal of Information Technology, 1999: 267-275. ISO /IEC 17799

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rhodie, K B; Mailhiot, C; Eaglesham, D

    Lawrence Livermore National Laboratory's mission is as clear today as it was in 1952 when the Laboratory was founded--to ensure our country's national security and the safety and reliability of its nuclear deterrent. As a laboratory pursuing applied science in the national interest, we strive to accomplish our mission through excellence in science and technology. We do this while developing and implementing sound and robust business practices in an environment that emphasizes security and ensures our safety and the safety of the community around us. Our mission as a directorate derives directly from the Laboratory's charter. When I accepted themore » assignment of Associate Director for Chemistry and Materials Science (CMS), I talked to you about the need for strategic balance and excellence in all our endeavors. We also discussed how to take the directorate to the next level. The long-range CMS strategic plan presented here was developed with this purpose in mind. It also aligns with the Lab's institutional long-range science and technology plan and its 10-year facilities and infrastructure site plan. The plan is aimed at ensuring that we fulfill our directorate's two governing principles: (1) delivering on our commitments to Laboratory programs and sponsors, and (2) anticipating change and capitalizing on opportunities through innovation in science and technology. This will require us to attain a new level of creativity, agility, and flexibility as we move forward. Moreover, a new level of engagement in partnerships with other directorates across the Laboratory as well as with universities and other national labs will also be required. The group of managers and staff that I chartered to build a strategic plan identified four organizing themes that define our directorate's work and unite our staff with a set of common goals. The plan presented here explains how we will proceed in each of these four theme areas: (1) Materials properties and performance under extreme conditions--Fundamental investigations of the properties and performance of states of matter under extreme dynamic, environmental, and nanoscale conditions, with an emphasis on materials of interest to Laboratory programs and mission needs. (2) Chemistry under extreme conditions and chemical engineering to support national security programs--Insights into the chemical reactions of energetic materials in the nuclear stockpile through models of molecular response to extreme conditions of temperature and pressure, advancing a new technique for processing energetic materials by using sol-gel chemistry, providing materials for NIF optics, and furthering developments to enhance other high-power lasers. (3) Science supporting national objectives at the intersection of chemistry, materials science, and biology--Multidisciplinary research for developing new technologies to combat chemical and biological terrorism, to monitor changes in the nation's nuclear stockpile, and to enable the development and application of new physical-science-based methodologies and tools for fundamental biology studies and human health applications. (4) Applied nuclear science for human health and national security: Nuclear science research that is used to develop new methods and technologies for detecting and attributing nuclear materials, assisting Laboratory programs that require nuclear and radiochemical expertise in carrying out their missions, discovering new elements in the periodic table, and finding ways of detecting and understanding cellular response to radiation.« less

  11. 76 FR 27741 - 60-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-12

    ... includes technical data, within a foreign business entity, foreign governmental entity, or international...: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of Respondents: 100,000... by the Directorate of Defense Trade Controls (DDTC) in accordance with the International Traffic in...

  12. 75 FR 18246 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-09

    ... be issued in connection with employee benefit plans. We estimate that Form S-8 takes approximately 24... techniques or other forms of information technology. Consideration will be given to comments and suggestions... Boucher, Director/ CIO, Securities and Exchange Commission, C/O Shirley Martinson, 6432 General Green Way...

  13. 75 FR 44810 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-29

    ... techniques or other forms of information technology, e.g., permitting electronic submission of responses... 4, 2009, President Obama signed the Children's Health Insurance Program Reauthorization Act of 2009... XIX of the Social Security Act (SSA), or child health assistance under a State child health plan under...

  14. Use of a wireless local area network in an orthodontic clinic.

    PubMed

    Mupparapu, Muralidhar; Binder, Robert E; Cummins, John M

    2005-06-01

    Radiographic images and other patient records, including medical histories, demographics, and health insurance information, can now be stored digitally and accessed via patient management programs. However, digital image acquisition and diagnosis and treatment planning are independent tasks, and each is time consuming, especially when performed at different computer workstations. Networking or linking the computers in an office enhances access to imaging and treatment planning tools. Access can be further enhanced if the entire network is wireless. Thanks to wireless technology, stand-alone, desk-bound personal computers have been replaced with mobile, hand-held devices that can communicate with each other and the rest of the world via the Internet. As with any emerging technology, some issues should be kept in mind when adapting to the wireless environment. Foremost is network security. Second is the choice of mobile hardware devices that are used by the orthodontist, office staff, and patients. This article details the standards and choices in wireless technology that can be implemented in an orthodontic clinic and suggests how to select suitable mobile hardware for accessing or adding data to a preexisting network. The network security protocols discussed comply with HIPAA regulations and boost the efficiency of a modern orthodontic clinic.

  15. 49 CFR 172.802 - Components of a security plan.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 2 2013-10-01 2013-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...

  16. 49 CFR 172.802 - Components of a security plan.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 2 2014-10-01 2014-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...

  17. 49 CFR 172.802 - Components of a security plan.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 2 2011-10-01 2011-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...

  18. 49 CFR 172.802 - Components of a security plan.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 2 2012-10-01 2012-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...

  19. Measuring Information Security: Guidelines to Build Metrics

    NASA Astrophysics Data System (ADS)

    von Faber, Eberhard

    Measuring information security is a genuine interest of security managers. With metrics they can develop their security organization's visibility and standing within the enterprise or public authority as a whole. Organizations using information technology need to use security metrics. Despite the clear demands and advantages, security metrics are often poorly developed or ineffective parameters are collected and analysed. This paper describes best practices for the development of security metrics. First attention is drawn to motivation showing both requirements and benefits. The main body of this paper lists things which need to be observed (characteristic of metrics), things which can be measured (how measurements can be conducted) and steps for the development and implementation of metrics (procedures and planning). Analysis and communication is also key when using security metrics. Examples are also given in order to develop a better understanding. The author wants to resume, continue and develop the discussion about a topic which is or increasingly will be a critical factor of success for any security managers in larger organizations.

  20. Integrating security in multiple, remote, and diverse facilities: how major health systems are meeting today's and tomorrow's technological and organizational challenges.

    PubMed

    1996-11-01

    As the trend to mergers and diversification of healthcare facilities grows, so too does the challenge to security directors to effectively and efficiently protect not only acute care, emergency, and outpatient facilities, but physician office buildings, parking garages, long-term-care units, medical schools, technical service units, and even health clubs. Besides the different security and communications problems posed by each type of facility, the problem of distance between facilities and their geographic location must also be met. In this report, we'll update you on the approaches being taken by security and planning executives at three leading health systems and how they are dealing with current and future problems.

  1. 33 CFR 103.500 - General.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.500 General. (a) The Area Maritime... with the National Maritime Transportation Security Plan and the National Transportation Security Plan...

  2. Low-Cost, Robust, Threat-aware Wireless Sensor Network for Assuring the Nation's Energy Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carlos H. Rentel

    2007-03-31

    The objective of this project was to create a low-cost, robust anticipatory wireless sensor network (A-WSN) to ensure the security and reliability of the United States energy infrastructure. This document highlights Eaton Corporation's plan to bring these technologies to market.

  3. Design Tool for Planning Permanganate Injection Systems

    DTIC Science & Technology

    2010-08-01

    Chemical Spill 10 CSTR continuously stirred tank reactors CT contact time EDB ethylene dibromide ESTCP Environmental Security Technology...63 6.2 Simulating Oxidant Distribution Using a Series of CSTRs ...ER- 0625. 6.2 SIMULATING OXIDANT DISTRIBUTION USING A SERIES OF CSTRS 6.2.1 MODEL DEVELOPMENT The transport and consumption of permanganate

  4. 14 CFR 1212.605 - Safeguarding information in systems of records.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Safeguarding information in systems of records. 1212.605 Section 1212.605 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION... system manager in a written plan approved by the Center Security Officer or Center Information Technology...

  5. Business Services and Technology. Advanced Finance Instructional Guide.

    ERIC Educational Resources Information Center

    Eastern Michigan Univ., Ypsilanti.

    This guide contains 15 lesson plans on financial topics for high school students. The lessons cover the following: (1) securities in the U.S. economy; (2) careers in finance; (3) commercial banking interest rates; (4) understanding financial statements; (5) newspaper stock tables; (6) financial institution operations; (7) foundation…

  6. Contemporary Responses to Violent Attacks on College Campuses

    ERIC Educational Resources Information Center

    Sulkowski, Michael L.; Lazarus, Philip J.

    2011-01-01

    In this article, the authors review efforts to increase the availability of crime data to students and parents, utilize security technologies on campus, allow members of campus communities to carry concealed weapons, use criminal or potential shooter profiling, employ threat assessment techniques, and implement emergency response plans to address…

  7. 78 FR 25322 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-30

    ... securities to be issued in connection with an employee benefit plan. We estimate that Form S-8 takes... forms of information technology. Consideration will be given to comments and suggestions submitted in... Exchange Commission, c/o Remi Pavlik-Simon, 6432 General Green Way, Alexandria, Virginia 22312; or send an...

  8. New CD-ROM Technologies Help the Unemployed Search for Jobs.

    ERIC Educational Resources Information Center

    Fries, James R.; Dow, Ronald F.

    1992-01-01

    Describes the use of CD-ROM products containing company and industrial information for job searches and career planning. Examples of potential applications are provided, and search capabilities are examined. Brief descriptions of several products are presented, including a database of Security and Exchange Commission filings, Disclosure, Lotus One…

  9. Academic Computing Vulnerabilities: Another View of the Roof

    ERIC Educational Resources Information Center

    Cohn, Ellen R.; Klinzing, George; Frieze, Irene Hanson; Sereika, Susan M.; Stone, Clement A.; Vana, Clara M.

    2004-01-01

    In anticipation of Y2K, and later as a result of heightened security concerns following the events of September 11, 2001, numerous colleges and universities developed formal planning documents to guide their responses to unexpected network outages. Typically, vigilant institutional financial auditors or information technology directors initiate…

  10. Space station needs, attributes and architectural options. Volume 1, attachment 1: Executive summary NASA

    NASA Technical Reports Server (NTRS)

    1983-01-01

    User alignment plan, physical and life sciences and applications, commercial requirements national security, space operations, user needs, foreign contacts, mission scenario analysis and architectural concepts, alternative systems concepts, mission operations architectural development, architectural analysis trades, evolution, configuration, and technology development are discussed.

  11. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...

  12. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...

  13. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) A cyber security plan in accordance with the criteria set forth in § 73.54 of this chapter; (iv) A... cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan, shall protect the plans and...

  14. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...

  15. Practice improvement, part II: update on patient communication technologies.

    PubMed

    Roett, Michelle A; Coleman, Mary Thoesen

    2013-11-01

    Patient portals (ie, secure web-based services for patient health record access) and secure messaging to health care professionals are gaining popularity slowly. Advantages of web portals include timely communication and instruction, access to appointments and other services, and high patient satisfaction. Limitations include inappropriate use, security considerations, organizational costs, and exclusion of patients who are uncomfortable with or unable to use computers. Attention to the organization's strategic plan and office policies, patient and staff expectations, workflow and communication integration, training, marketing, and enrollment can facilitate optimal use of this technology. Other communication technologies that can enhance patient care include automated voice or text reminders and brief electronic communications. Social media provide another method of patient outreach, but privacy and access are concerns. Incorporating telehealthcare (health care provided via telephone or Internet), providing health coaching, and using interactive health communication applications can improve patient knowledge and clinical outcomes and provide social support. Written permission from the American Academy of Family Physicians is required for reproduction of this material in whole or in part in any form or medium.

  16. Nuclear Security Education Program at the Pennsylvania State University

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Uenlue, Kenan; The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304; Jovanovic, Igor

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basismore » of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory.« less

  17. Practical Pocket PC Application w/Biometric Security

    NASA Technical Reports Server (NTRS)

    Logan, Julian

    2004-01-01

    I work in the Flight Software Engineering Branch, where we provide design and development of embedded real-time software applications for flight and supporting ground systems to support the NASA Aeronautics and Space Programs. In addition, this branch evaluates, develops and implements new technologies for embedded real-time systems, and maintains a laboratory for applications of embedded technology. The majority of microchips that are used in modern society have been programmed using embedded technology. These small chips can be found in microwaves, calculators, home security systems, cell phones and more. My assignment this summer entails working with an iPAQ HP 5500 Pocket PC. This top-of-the-line hand-held device is one of the first mobile PC's to introduce biometric security capabilities. Biometric security, in this case a fingerprint authentication system, is on the edge of technology as far as securing information. The benefits of fingerprint authentication are enormous. The most significant of them are that it is extremely difficult to reproduce someone else's fingerprint, and it is equally difficult to lose or forget your own fingerprint as opposed to a password or pin number. One of my goals for this summer is to integrate this technology with another Pocket PC application. The second task for the summer is to develop a simple application that provides an Astronaut EVA (Extravehicular Activity) Log Book capability. The Astronaut EVA Log Book is what an astronaut would use to report the status of field missions, crew physical health, successes, future plans, etc. My goal is to develop a user interface into which these data fields can be entered and stored. The applications that I am developing are created using eMbedded Visual C++ 4.0 with the Pocket PC 2003 Software Development Kit provided by Microsoft.

  18. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  19. Network Speech Systems Technology Program

    NASA Astrophysics Data System (ADS)

    Weinstein, C. J.

    1980-09-01

    This report documents work performed during FY 1980 on the DCA-sponsored Network Speech Systems Technology Program. The areas of work reported are: (1) communication systems studies in Demand-Assignment Multiple Access (DAMA), voice/data integration, and adaptive routing, in support of the evolving Defense Communications System (DCS) and Defense Switched Network (DSN); (2) a satellite/terrestrial integration design study including the functional design of voice and data interfaces to interconnect terrestrial and satellite network subsystems; and (3) voice-conferencing efforts dealing with support of the Secure Voice and Graphics Conferencing (SVGC) Test and Evaluation Program. Progress in definition and planning of experiments for the Experimental Integrated Switched Network (EISN) is detailed separately in an FY 80 Experiment Plan Supplement.

  20. Design of a national distributed health data network.

    PubMed

    Maro, Judith C; Platt, Richard; Holmes, John H; Strom, Brian L; Hennessy, Sean; Lazarus, Ross; Brown, Jeffrey S

    2009-09-01

    A distributed health data network is a system that allows secure remote analysis of separate data sets, each comprising a different medical organization's or health plan's records. Distributed health data networks are currently being planned that could cover millions of people, permitting studies of comparative clinical effectiveness, best practices, diffusion of medical technologies, and quality of care. These networks could also support assessment of medical product safety and other public health needs. Distributed network technologies allow data holders to control all uses of their data, which overcomes many practical obstacles related to confidentiality, regulation, and proprietary interests. Some of the challenges and potential methods of operation of a multipurpose, multi-institutional distributed health data network are described.

  1. A Counter-IED Preparedness Methodology for Large Event Planning

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Payne, Patricia W; Koch, Daniel B

    Since 2009, Oak Ridge National Laboratory (ORNL) has been involved in a project sponsored by the Department of Homeland Security Science and Technology Directorate aimed at improving preparedness against Improvised Explosive Devices (IED) at large sporting events. Led by the University of Southern Mississippi (USM) as part of the Southeast Region Research Initiative, the project partners have been developing tools and methodologies for use by security personnel and first responders at sports stadiums. ORNL s contribution has been to develop an automated process to gather and organize disparate data that is usually part of an organization s security plan. Themore » organized data informs a table-top exercise (TTX) conducted by USM using additional tools developed by them and their subcontractors. After participating in several pilot TTXs, patterns are beginning to emerge that would enable improvements to be formulated to increase the level of counter-IED preparedness. This paper focuses on the data collection and analysis process and shares insights gained to date.« less

  2. FY2017 Analysis Annual Progress Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    During fiscal year 2017, the U.S. Department of Energy Vehicle Technologies Office (VTO) funded analysis projects supportive of VTO’s goals to pursue early stage research in vehicle and mobility system technologies to reduce petroleum dependence, increase energy reliability and security, improve transportation affordability, and promote economic growth. VTO analysis projects result in a foundation of data, analytical models, and applied analyses that provide insights into critical transportation energy problems and assist in research investment prioritization and portfolio planning.

  3. NASA's Research in Aircraft Vulnerability Mitigation

    NASA Technical Reports Server (NTRS)

    Allen, Cheryl L.

    2005-01-01

    Since its inception in 1958, the National Aeronautics and Space Administration s (NASA) role in civil aeronautics has been to develop high-risk, high-payoff technologies to meet critical national aviation challenges. Following the events of Sept. 11, 2001, NASA recognized that it now shared the responsibility for improving homeland security. The NASA Strategic Plan was modified to include requirements to enable a more secure air transportation system by investing in technologies and collaborating with other agencies, industry, and academia. NASA is conducting research to develop and advance innovative and commercially viable technologies that will reduce the vulnerability of aircraft to threats or hostile actions, and identify and inform users of potential vulnerabilities in a timely manner. Presented in this paper are research plans and preliminary status for mitigating the effects of damage due to direct attacks on civil transport aircraft. The NASA approach to mitigation includes: preventing loss of an aircraft due to a hit from man-portable air defense systems; developing fuel system technologies that prevent or minimize in-flight vulnerability to small arms or other projectiles; providing protection from electromagnetic energy attacks by detecting directed energy threats to aircraft and on/off-board systems; and minimizing the damage due to high-energy attacks (explosions and fire) by developing advanced lightweight, damage-resistant composites and structural concepts. An approach to preventing aircraft from being used as weapons of mass destruction will also be discussed.

  4. Wireless local area network for the dental office.

    PubMed

    Mupparapu, Muralidhar

    2004-01-01

    Dental offices are no exception to the implementation of new and advanced technology, especially if it enhances productivity. In a rapidly transforming digital world, wireless technology has a special place, as it has truly "retired the wire" and contributed to the ease and efficient access to patient data and other software-based applications for diagnosis and treatment. If the office or the clinic is networked, access to patient management software, imaging software and treatment planning tools is enhanced. Access will be further enhanced and unrestricted if the entire network is wireless. As with any new, emerging technology, there will be issues that should be kept in mind before adapting to the wireless environment. Foremost is the network security involved in the installation and use of these wireless networks. This short, technical manuscript deals with standards and choices in wireless technology currently available for implementation within a dental office. The benefits of each network security protocol available to protect patient data and boost the efficiency of a modern dental office are discussed.

  5. CERT(Restricted) Resilience Management Model (CERT(Restricted)-RMM) V1.1: NIST Special Publication 800-66 Crosswalk

    DTIC Science & Technology

    2013-10-01

    Technology Assets • EXD:SG2 Manage Risks Due to External Dependencies (SP1-SP2) • EXD:SG3.SP4 Formalize Relationships 5 . Data Backup Plan and...Information Access Management (C.E.R. § 164.308(a)(4)) 11 4.5. Security Awareness and Training (C.E.R. § 164.308(a)( 5 )) 13 4.6. Security Incident Procedures...for managing operational resilience. It has two primary objectives: • Establish the convergence of operational risk and resilience management

  6. Notification: EPA's Processes for Preserving Emails and Text Messages, and Responding to Freedom of Information Act Requests

    EPA Pesticide Factsheets

    Project #OA&E-FY18-0217, May 17, 2018. The OIG plans to begin fieldwork to follow up on significant information technology security findings and recommendations noted in OIG reports, as well as to look into a hotline allegation received in FY 2018.

  7. "Educate to Innovate": How the Obama Plan for STEM Education Falls Short. Backgrounder. No. 2504

    ERIC Educational Resources Information Center

    Burke, Lindsey M.; McNeill, Jena Baker

    2011-01-01

    President Obama's Educate to Innovate initiative has provided billions in additional federal funding for science, technology, engineering, and mathematics (STEM) education programs across the country. The Administration's recognition of the importance of STEM education-- for global competitiveness as well as for national security--is good and…

  8. 75 FR 70923 - Office of the National Coordinator for Health Information Technology; HIT Policy Committee...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-19

    ... Federal Health IT Strategic Plan and that includes recommendations on the areas in which standards... & Security Tiger Team, the Information Exchange Workgroup, the Enrollment Workgroup, and the Governance Workgroup. ONC intends to make background material available to the public no later than two (2) business...

  9. The Faculty of the Future: Leaner, Meaner, More Innovative, Less Secure

    ERIC Educational Resources Information Center

    Chronicle of Higher Education, 2009

    2009-01-01

    The faculty workplace has changed significantly in the last 20 years: More women, minority professors, and adjuncts have joined the professoriate. Information technology has led to new opportunities and expectations. The economic crisis has complicated long-term planning for scholars and institutions alike. Seven scholars from several fields and…

  10. Homeland Security Strategic Plan for the Non-Major Local Law Enforcement Agency

    DTIC Science & Technology

    2011-09-01

    The Los Angeles Police ... the community, which allows the police department to be more efficient and effective in keeping citizens safe. Technology continues to change and...saving hundreds of manhours per year in crime data collection. Although the Independence Missouri Police Department made an effort to use Web

  11. Cyberspace modernization. An interest protocol planning advisory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keliiaa, Curtis M.; McLane, Victor N.

    A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internetmore » of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.« less

  12. Land Ecological Security Evaluation of Guangzhou, China

    PubMed Central

    Xu, Linyu; Yin, Hao; Li, Zhaoxue; Li, Shun

    2014-01-01

    As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES) plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES), has been introduced with the city of Guangzhou, China, as a case study, which evaluates the LES in regional and unit scales for reasonable and specific urban planning. In the evaluation process with this method, we have combined the material security with the spiritual security that is inevitably associated with LES. Some new coefficients of land-security supply/demand distribution and technology contribution for LES evaluation have also been introduced for different spatial scales, including the regional and the unit scales. The results for Guangzhou indicated that, temporally, the LES supply indices were 0.77, 0.84 and 0.77 in 2000, 2006 and 2009 respectively, while LES demand indices for the city increased in 2000, 2006 and 2009 from 0.57 to 0.95, which made the LES level decreased slowly in this period. Spatially, at the regional scale, the urban land ecological security (ULES) level decreased from 0.2 (marginal security) to −0.18 (marginal insecurity) as a whole; in unit scale, areas in the north and in parts of the east were relatively secure and the security area was shrinking with time, but the central and southern areas turned to be marginal insecurity, especially in 2006 and 2009. This study proposes that DLES evaluation should be conducted for targeted and efficient urban planning and management, which can reflect the LES level of study area in general and in detail. PMID:25321873

  13. Land ecological security evaluation of Guangzhou, China.

    PubMed

    Xu, Linyu; Yin, Hao; Li, Zhaoxue; Li, Shun

    2014-10-15

    As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES) plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES), has been introduced with the city of Guangzhou, China, as a case study, which evaluates the LES in regional and unit scales for reasonable and specific urban planning. In the evaluation process with this method, we have combined the material security with the spiritual security that is inevitably associated with LES. Some new coefficients of land-security supply/demand distribution and technology contribution for LES evaluation have also been introduced for different spatial scales, including the regional and the unit scales. The results for Guangzhou indicated that, temporally, the LES supply indices were 0.77, 0.84 and 0.77 in 2000, 2006 and 2009 respectively, while LES demand indices for the city increased in 2000, 2006 and 2009 from 0.57 to 0.95, which made the LES level decreased slowly in this period. Spatially, at the regional scale, the urban land ecological security (ULES) level decreased from 0.2 (marginal security) to -0.18 (marginal insecurity) as a whole; in unit scale, areas in the north and in parts of the east were relatively secure and the security area was shrinking with time, but the central and southern areas turned to be marginal insecurity, especially in 2006 and 2009. This study proposes that DLES evaluation should be conducted for targeted and efficient urban planning and management, which can reflect the LES level of study area in general and in detail.

  14. Final rules relating to use of electronic communication and recordkeeping technologies by employee pension and welfare benefit plans. Notice of final rulemaking.

    PubMed

    2002-04-09

    This document contains final rules under Title I of the Employee Retirement Income Security Act of 1974, as amended (ERISA), concerning the disclosure of certain employee benefit plan information through electronic media, and the maintenance and retention of employee benefit plan records in electronic form. The rules establish a safe harbor pursuant to which all pension and welfare benefit plans covered by Title I of ERISA may use electronic media to satisfy disclosure obligations under Title I of ERISA. The rules also provide standards concerning the use of electronic media in the maintenance and retention of records required by sections 107 and 209 of ERISA. The rules affect employee pension and welfare benefit plans, including group health plans, plan sponsors, administrators and fiduciaries, and plan participants and beneficiaries.

  15. Extended outlook: description, utilization, and daily applications of cloud technology in radiology.

    PubMed

    Gerard, Perry; Kapadia, Neil; Chang, Patricia T; Acharya, Jay; Seiler, Michael; Lefkovitz, Zvi

    2013-12-01

    The purpose of this article is to discuss the concept of cloud technology, its role in medical applications and radiology, the role of the radiologist in using and accessing these vast resources of information, and privacy concerns and HIPAA compliance strategies. Cloud computing is the delivery of shared resources, software, and information to computers and other devices as a metered service. This technology has a promising role in the sharing of patient medical information and appears to be particularly suited for application in radiology, given the field's inherent need for storage and access to large amounts of data. The radiology cloud has significant strengths, such as providing centralized storage and access, reducing unnecessary repeat radiologic studies, and potentially allowing radiologic second opinions more easily. There are significant cost advantages to cloud computing because of a decreased need for infrastructure and equipment by the institution. Private clouds may be used to ensure secure storage of data and compliance with HIPAA. In choosing a cloud service, there are important aspects, such as disaster recovery plans, uptime, and security audits, that must be considered. Given that the field of radiology has become almost exclusively digital in recent years, the future of secure storage and easy access to imaging studies lies within cloud computing technology.

  16. Defence Industrial Policies and Their Impact on Acquisition Outcomes: A Comparative Analysis of the United Kingdom and Australia

    DTIC Science & Technology

    2012-09-01

    this case, there is a price premium relative to globally least-cost purchases if such capabilities exist elsewhere and are being employed at a level of...operational sovereignty and security, and the technology areas where MOD would rely on international defence cooperation or open global technology...planning assumptions (i.e. future budgets) • What was required for retention in the UK industrial base 10 • Overview of the global defence market

  17. 49 CFR 659.21 - System security plan: general requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: general requirements. 659.21... State Oversight Agency § 659.21 System security plan: general requirements. (a) The oversight agency shall require the rail transit agency to implement a system security plan that, at a minimum, complies...

  18. Safe Grid

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)

    2003-01-01

    The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote access from outside of NASA centers. A SAFE enabled IPG can enable IPG capabilities to be available to NASA mission design teams across different NASA center and partner company firewalls. This paper will first discuss some of the potential security issues for IPG to work across NASA center firewalls. We will then present the SAFE federated security model. Finally we will present the concept of the architecture of a SAFE enabled IPG and how it can benefit NASA mission development.

  19. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    NASA Astrophysics Data System (ADS)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  20. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  1. Laboratory Directed Research and Development Program FY 2008 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    editor, Todd C Hansen

    2009-02-23

    The Ernest Orlando Lawrence Berkeley National Laboratory (Berkeley Lab or LBNL) is a multi-program national research facility operated by the University of California for the Department of Energy (DOE). As an integral element of DOE's National Laboratory System, Berkeley Lab supports DOE's missions in fundamental science, energy resources, and environmental quality. Berkeley Lab programs advance four distinct goals for DOE and the nation: (1) To perform leading multidisciplinary research in the computing sciences, physical sciences, energy sciences, biosciences, and general sciences in a manner that ensures employee and public safety and protection of the environment. (2) To develop and operatemore » unique national experimental facilities for qualified investigators. (3) To educate and train future generations of scientists and engineers to promote national science and education goals. (4) To transfer knowledge and technological innovations and to foster productive relationships among Berkeley Lab's research programs, universities, and industry in order to promote national economic competitiveness. Berkeley Lab's research and the Laboratory Directed Research and Development (LDRD) program support DOE's Strategic Themes that are codified in DOE's 2006 Strategic Plan (DOE/CF-0010), with a primary focus on Scientific Discovery and Innovation. For that strategic theme, the Fiscal Year (FY) 2008 LDRD projects support each one of the three goals through multiple strategies described in the plan. In addition, LDRD efforts support the four goals of Energy Security, the two goals of Environmental Responsibility, and Nuclear Security (unclassified fundamental research that supports stockpile safety and nonproliferation programs). The LDRD program supports Office of Science strategic plans, including the 20-year Scientific Facilities Plan and the Office of Science Strategic Plan. The research also supports the strategic directions periodically under consideration and review by the Office of Science Program Offices, such as LDRD projects germane to new research facility concepts and new fundamental science directions. Berkeley Lab LDRD program also play an important role in leveraging DOE capabilities for national needs. The fundamental scientific research and development conducted in the program advances the skills and technologies of importance to our Work For Others (WFO) sponsors. Among many directions, these include a broad range of health-related science and technology of interest to the National Institutes of Health, breast cancer and accelerator research supported by the Department of Defense, detector technologies that should be useful to the Department of Homeland Security, and particle detection that will be valuable to the Environmental Protection Agency. The Berkeley Lab Laboratory Directed Research and Development Program FY2008 report is compiled from annual reports submitted by principal investigators following the close of the fiscal year. This report describes the supported projects and summarizes their accomplishments. It constitutes a part of the LDRD program planning and documentation process that includes an annual planning cycle, project selection, implementation, and review.« less

  2. Implementing the DoD Joint Operation Planning Process for Private Industry Enterprise Security

    DTIC Science & Technology

    2011-09-01

    Standards Organization’s ( ISO ) ISO 27001 ( ISO 27002 defines the controls), and the IT Service Management Forum’s Information Technology Infrastructure...27001 certification. 24 Alberto Bastos and Rosangela Caubit, ISO 27001 and 27002 : Information...includes: 90,000 records lost from Booz Allen Hamilton; 90,000,000 26 ISO /IEC 27002 , 19 December

  3. Interagency Biological Restoration Demonstration (IBRD): a collaborative approach to biological incident recovery.

    PubMed

    Crockett, Katie

    2011-09-01

    Following the terrorist attacks in 2001, much time and effort has been put toward improving catastrophic incident response. But recovery--the period following initial response that focuses on the long-term viability of the affected area--has received less attention. Recognizing the importance of being able to recover an area following a catastrophic incident, the Department of Defense, through its Defense Threat Reduction Agency (DTRA), and the Department of Homeland Security, through its Science and Technology Directorate (DHS S&T), created the Interagency Biological Restoration Demonstration (IBRD) program. IBRD was a 4-year program jointly managed and funded by DTRA and DHS S&T, the goal of which was to reduce the time and resources necessary to recover a wide urban area from an intentional release of Bacillus anthracis. Specific program objectives included understanding the social, economic, and operational interdependencies that affect recovery; establishing long-term coordination between the Departments of Defense and Homeland Security; developing strategic recovery/restoration plans; identifying and demonstrating technologies that support recovery; and exercising recovery activities and technology solutions. IBRD has made important first steps toward improving national preparedness in the area biological incident recovery. Specifically, IBRD has helped enhance the efficacy and efficiency of recovering large urban areas by developing consequence management guidance; identifying key S&T capabilities and integrating them with planning and guidance documents; and establishing key relationships across the federal interagency, federal-to-regional, civilian-to-military, and public-to-private stakeholders. Upon completion of IBRD in fall 2010, both DTRA and DHS S&T planned follow-on programs.

  4. 45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection... of the security standards. (a) Health plan. (1) A health plan that is not a small health plan must...

  5. Computer Security for Commercial Nuclear Power Plants - Literature Review for Korea Hydro Nuclear Power Central Research Institute

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duran, Felicia Angelica; Waymire, Russell L.

    2013-10-01

    Sandia National Laboratories (SNL) is providing training and consultation activities on security planning and design for the Korea Hydro and Nuclear Power Central Research Institute (KHNPCRI). As part of this effort, SNL performed a literature review on computer security requirements, guidance and best practices that are applicable to an advanced nuclear power plant. This report documents the review of reports generated by SNL and other organizations [U.S. Nuclear Regulatory Commission, Nuclear Energy Institute, and International Atomic Energy Agency] related to protection of information technology resources, primarily digital controls and computer resources and their data networks. Copies of the key documentsmore » have also been provided to KHNP-CRI.« less

  6. Underground Test Area Fiscal Year 2013 Annual Quality Assurance Report Nevada National Security Site, Nevada, Revision 0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Krenzien, Susan; Marutzky, Sam

    This report is required by the Underground Test Area (UGTA) Quality Assurance Plan (QAP) and identifies the UGTA quality assurance (QA) activities for fiscal year (FY) 2013. All UGTA organizations—U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO); Desert Research Institute (DRI); Lawrence Livermore National Laboratory (LLNL); Los Alamos National Laboratory (LANL); Navarro-Intera, LLC (N-I); National Security Technologies, LLC (NSTec); and the U.S. Geological Survey (USGS)—conducted QA activities in FY 2013. The activities included conducting assessments, identifying findings and completing corrective actions, evaluating laboratory performance, and publishing documents. In addition, integrated UGTA required reading and correctivemore » action tracking was instituted.« less

  7. The peer review system (PRS) for quality assurance and treatment improvement in radiation therapy

    NASA Astrophysics Data System (ADS)

    Le, Anh H. T.; Kapoor, Rishabh; Palta, Jatinder R.

    2012-02-01

    Peer reviews are needed across all disciplines of medicine to address complex medical challenges in disease care, medical safety, insurance coverage handling, and public safety. Radiation therapy utilizes technologically advanced imaging for treatment planning, often with excellent efficacy. Since planning data requirements are substantial, patients are at risk for repeat diagnostic procedures or suboptimal therapeutic intervention due to a lack of knowledge regarding previous treatments. The Peer Review System (PRS) will make this critical radiation therapy information readily available on demand via Web technology. The PRS system has been developed with current Web technology, .NET framework, and in-house DICOM library. With the advantages of Web server-client architecture, including IIS web server, SOAP Web Services and Silverlight for the client side, the patient data can be visualized through web browser and distributed across multiple locations by the local area network and Internet. This PRS will significantly improve the quality, safety, and accessibility, of treatment plans in cancer therapy. Furthermore, the secure Web-based PRS with DICOM-RT compliance will provide flexible utilities for organization, sorting, and retrieval of imaging studies and treatment plans to optimize the patient treatment and ultimately improve patient safety and treatment quality.

  8. Spatio-temporal modelling of electrical supply systems to optimize the site planning process for the "power to mobility" technology

    NASA Astrophysics Data System (ADS)

    Karl, Florian; Zink, Roland

    2016-04-01

    The transformation of the energy sector towards decentralized renewable energies (RE) requires also storage systems to ensure security of supply. The new "Power to Mobility" (PtM) technology is one potential solution to use electrical overproduction to produce methane for i.e. gas vehicles. Motivated by these fact, the paper presents a methodology for a GIS-based temporal modelling of the power grid, to optimize the site planning process for the new PtM-technology. The modelling approach is based on a combination of the software QuantumGIS for the geographical and topological energy supply structure and OpenDSS for the net modelling. For a case study (work in progress) of the city of Straubing (Lower Bavaria) the parameters of the model are quantified. The presentation will discuss the methodology as well as the first results with a view to the application on a regional scale.

  9. 33 CFR 104.405 - Format of the Vessel Security Plan (VSP).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Communications; (9) Security systems and equipment maintenance; (10) Security measures for access control... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Format of the Vessel Security... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Plan (VSP) § 104.405 Format of the...

  10. Closure Plan for the Area 5 Radioactive Waste Management Site at the Nevada Test Site

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NSTec Environmental Management

    The Area 5 Radioactive Waste Management Site (RMWS) at the Nevada Test Site (NTS) is managed and operated by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This document is the first update of the preliminary closure plan for the Area 5 RWMS at the NTS that was presented in the Integrated Closure and Monitoring Plan (DOE, 2005a). The major updates to the plan include a new closure schedule, updated closure inventory, updated site and facility characterization data, the Title II engineering cover design, and the closure processmore » for the 92-Acre Area of the RWMS. The format and content of this site-specific plan follows the Format and Content Guide for U.S. Department of Energy Low-Level Waste Disposal Facility Closure Plans (DOE, 1999a). This interim closure plan meets closure and post-closure monitoring requirements of the order DOE O 435.1, manual DOE M 435.1-1, Title 40 Code of Federal Regulations (CFR) Part 191, 40 CFR 265, Nevada Administrative Code (NAC) 444.743, and Resource Conservation and Recovery Act (RCRA) requirements as incorporated into NAC 444.8632. The Area 5 RWMS accepts primarily packaged low-level waste (LLW), low-level mixed waste (LLMW), and asbestiform low-level waste (ALLW) for disposal in excavated disposal cells.« less

  11. HIPAA: update on rule revisions and compliance requirements.

    PubMed

    Maddox, P J

    2002-01-01

    Due to the highly technical requirements for HIPAA compliance and the numerous administrative and clinical functions and processes involved, guidance from experts who are knowledgeable about systems design and use to secure private data is necessary. In health care organizations, this will require individuals who are knowledgeable about clinical processes and those who understand health information technology, security, and privacy to work together to establish an entity's compliance plans and revise operations and practices accordingly. As a precondition of designing such systems, it is essential that covered entities understand the HIPAA's statutory requirements and timeline for compliance. An organization's success in preparing for HIPAA will depend upon an active program of assessment, planning, and implementation. Compliance with security and privacy standards can be expected to increase costs initially. However, greater use of EDI is expected to reduce costs and enhance revenues in the long run if processes and systems are improved. NOTE: Special protection for psychotherapy notes holds them to a higher standard of protection. Notes used only by a psychotherapist are not intended to be shared with anyone and are not considered part of the medical record.

  12. Integrating information technologies as tools for surgical research.

    PubMed

    Schell, Scott R

    2005-10-01

    Surgical research is dependent upon information technologies. Selection of the computer, operating system, and software tool that best support the surgical investigator's needs requires careful planning before research commences. This manuscript presents a brief tutorial on how surgical investigators can best select these information technologies, with comparisons and recommendations between existing systems, software, and solutions. Privacy concerns, based upon HIPAA and other regulations, now require careful proactive attention to avoid legal penalties, civil litigation, and financial loss. Security issues are included as part of the discussions related to selection and application of information technology. This material was derived from a segment of the Association for Academic Surgery's Fundamentals of Surgical Research course.

  13. Development of a Design Tool for Planning Aqueous Amendment Injection Systems Permanganate Design Tool

    DTIC Science & Technology

    2010-08-01

    CSTR continuously stirred tank reactors CT contact time EDB ethylene dibromide ESTCP Environmental Security Technology Certification Program...63 6.2 Simulating Oxidant Distribution Using a Series of CSTRs -------------------- 63 6.2.1 Model...SIMULATING OXIDANT DISTRIBUTION USING A SERIES OF CSTRS 6.2.1 MODEL DEVELOPMENT The transport and consumption of permanganate are simulated within the

  14. Telephone Primer

    DTIC Science & Technology

    1990-09-01

    consequences contributed to the plan of universal service. Although the Communication Act of 1934 embraced the idea of regulation that provided market security...electronic communication device in use today. Because of this, the military is heavily reliant on the telephone system and considers it the primary voice... communications medium. Furthermore, % recent technological advances will dramatically change the telephone as we know it today. This thesis will take

  15. Information Technology Strategic Plan 2009-2013

    DTIC Science & Technology

    2009-01-01

    and the absence of Enterprise funding models for shared services . Also, though progress has been made within the DHS IT community regarding...security access regulations for shared services ; and difficulties associated with 3 Office of the Chief Information Officer...infrastructure and shared services is the vision for the Infrastructure Transformation Program at DHS and is the means by which to reduce IT commodity

  16. Evolving the US Army Research Laboratory (ARL) Technical Communication Strategy

    DTIC Science & Technology

    2016-10-01

    of added value and enhanced tech transfer, and strengthened relationships with academic and industry collaborators. In support of increasing ARL’s...communication skills; and Prong 3: Promote a Stakeholder Database to implement a stakeholder database (including names and preferences) and use a...Group, strategic planning, communications strategy, stakeholder database , workforce improvement, science and technology, S&T 16. SECURITY

  17. Broad Overview of Energy Efficiency and Renewable Energy Opportunities for Department of Defense Installations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, E.; Antkowiak, M.; Butt, R.

    The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report ismore » the deliverable for these tasks.« less

  18. 33 CFR 106.405 - Format and content of the Facility Security Plan (FSP).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...; (9) Security systems and equipment maintenance; (10) Security measures for access control; (11... Facility Security Plan (FSP). 106.405 Section 106.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES...

  19. 29 CFR 2509.75-3 - Interpretive bulletin relating to investments by employee benefit plans in securities of...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... Interpretive bulletin relating to investments by employee benefit plans in securities of registered investment.... That section provides that an investment by an employee benefit plan in securities issued by an...

  20. 49 CFR 1542.301 - Contingency plan.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Contingency plan. 1542.301 Section 1542.301..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...

  1. 33 CFR 103.520 - Recordkeeping.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 103.520 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime Security (AMS) Plan § 103.520 Recordkeeping. (a) All records pertaining to the Area Maritime Security (AMS) Assessment and AMS Plan will be retained by...

  2. 33 CFR 103.510 - Area Maritime Security (AMS) Plan review and approval.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Area Maritime Security (AMS) Plan review and approval. 103.510 Section 103.510 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF...) Plan § 103.510 Area Maritime Security (AMS) Plan review and approval. Each AMS Plan will be submitted...

  3. 75 FR 10328 - Wolf Creek Nuclear Operating Corporation, Wolf Creek Generating Station; Exemption

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-05

    ... Plan, Safeguards Contingency Plan, and Cyber Security Plan referred to collectively hereafter as... its security plans. Pursuant to 10 CFR 51.32, ``Finding of no significant impact,'' the Commission has... by designing and implementing comprehensive site security programs. The amendments to 10 CFR 73.55...

  4. Integration of the SSPM and STAGE with the MPACT Virtual Facility Distributed Test Bed.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cipiti, Benjamin B.; Shoman, Nathan

    The Material Protection Accounting and Control Technologies (MPACT) program within DOE NE is working toward a 2020 milestone to demonstrate a Virtual Facility Distributed Test Bed. The goal of the Virtual Test Bed is to link all MPACT modeling tools, technology development, and experimental work to create a Safeguards and Security by Design capability for fuel cycle facilities. The Separation and Safeguards Performance Model (SSPM) forms the core safeguards analysis tool, and the Scenario Toolkit and Generation Environment (STAGE) code forms the core physical security tool. These models are used to design and analyze safeguards and security systems and generatemore » performance metrics. Work over the past year has focused on how these models will integrate with the other capabilities in the MPACT program and specific model changes to enable more streamlined integration in the future. This report describes the model changes and plans for how the models will be used more collaboratively. The Virtual Facility is not designed to integrate all capabilities into one master code, but rather to maintain stand-alone capabilities that communicate results between codes more effectively.« less

  5. 6 CFR 37.41 - Security plan.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities § 37.41...

  6. 6 CFR 37.41 - Security plan.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities § 37.41...

  7. Implementing healthcare information security: standards can help.

    PubMed

    Orel, Andrej; Bernik, Igor

    2013-01-01

    Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.

  8. Long-term energy security in a national scale using LEAP. Application to de-carbonization scenarios in Andorra

    NASA Astrophysics Data System (ADS)

    Travesset-Baro, Oriol; Jover, Eric; Rosas-Casals, Marti

    2016-04-01

    This paper analyses the long-term energy security in a national scale using Long-range Energy Alternatives Planning System (LEAP) modelling tool. It builds the LEAP Andorra model, which forecasts energy demand and supply for the Principality of Andorra by 2050. It has a general bottom-up structure, where energy demand is driven by the technological composition of the sectors of the economy. The technological model is combined with a top-down econometric model to take into account macroeconomic trends. The model presented in this paper provides an initial estimate of energy demand in Andorra segregated into all sectors (residential, transport, secondary, tertiary and public administration) and charts a baseline scenario based on historical trends. Additional scenarios representing different policy strategies are built to explore the country's potential energy savings and the feasibility to achieve the Intended Nationally Determined Contribution (INDC) submitted in April 2015 to UN. In this climatic agreement Andorra intends to reduce net greenhouse gas emissions (GHG) by 37% as compared to a business-as-usual scenario by 2030. In addition, current and future energy security is analysed in this paper under baseline and de-carbonization scenarios. Energy security issues are assessed in LEAP with an integrated vision, going beyond the classic perspective of security of supply, and being closer to the sustainability's integrative vision. Results of scenarios show the benefits of climate policies in terms of national energy security and the difficulties for Andorra to achieving the de-carbonization target by 2030.

  9. 49 CFR 1542.301 - Contingency plan.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...

  10. 49 CFR 1542.301 - Contingency plan.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...

  11. 49 CFR 1542.301 - Contingency plan.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...

  12. 49 CFR 1542.301 - Contingency plan.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...

  13. Kilopower: Small and Affordable Fission Power Systems for Space

    NASA Technical Reports Server (NTRS)

    Mason, Lee; Palac, Don; Gibson, Marc

    2017-01-01

    The Nuclear Systems Kilopower Project was initiated by NASA's Space Technology Mission Directorate Game Changing Development Program in fiscal year 2015 to demonstrate subsystem-level technology readiness of small space fission power in a relevant environment (Technology Readiness Level 5) for space science and human exploration power needs. The Nuclear Systems Kilopower Project centerpiece is the Kilopower Reactor Using Stirling Technology (KRUSTY) test, which consists of the development and testing of a fission ground technology demonstrator of a 1 kWe-class fission power system. The technologies to be developed and validated by KRUSTY are extensible to space fission power systems from 1 to 10 kWe, which can enable higher power future potential deep space science missions, as well as modular surface fission power systems for exploration. The Kilopower Project is cofounded by NASA and the Department of Energy National Nuclear Security Administration (NNSA).KRUSTY include the reactor core, heat pipes to transfer the heat from the core to the power conversion system, and the power conversion system. Los Alamos National Laboratory leads the design of the reactor, and the Y-12 National Security Complex is fabricating it. NASA Glenn Research Center (GRC) has designed, built, and demonstrated the balance of plant heat transfer and power conversion portions of the KRUSTY experiment. NASA MSFC developed an electrical reactor simulator for non-nuclear testing, and the design of the reflector and shielding for nuclear testing. In 2016, an electrically heated non-fissionable Depleted Uranium (DU) core was tested at GRC in a configuration identical to the planned nuclear test. Once the reactor core has been fabricated and shipped to the Device Assembly Facility at the NNSAs Nevada National Security Site, the KRUSTY nuclear experiment will be assembled and tested. Completion of the KRUSTY experiment will validate the readiness of 1 to 10 kWe space fission technology for NASAs future requirements for sunlight-independent space power. An early opportunity for demonstration of In-Situ Resource Utilization (ISRU) capability on the surface of Mars is currently being considered for 2026 launch. Since a space fission system is the leading option for power generation for the first Mars human outpost, a smaller version of a planetary surface fission power system could be built to power the ISRU demonstration and ensure its end-to-end validity. Planning is underway to start the hardware development of this subscale flight demonstrator in 2018.

  14. The Use of Space Technology for Environmental Security, Disaster Rehabilitation and Sustainable Development in Afghanistan and Iraq

    NASA Astrophysics Data System (ADS)

    Lovett, Kian

    Since the dawn of time, humans have engaged in war. In the last 5,600 years of recorded history 14,600 wars have been waged1. The United Nations has sought to save succeeding generations from the scourge of war and to foster peace. Wars have recently taken place in Afghanistan and Iraq. Both countries are now faced with a range of complex problems. In-depth country assessments reveal significant shortcomings in the areas of water, sanitation, health, security and natural resource management. These are key factors when examining environmental security, sustainable development and trans-boundary problems, all of which are issues relevant to the Middle East and Central Asian states. Space technology can be applied to support the reconstruction and development plans for Afghanistan and Iraq; however, there needs to be an investigation and open discussion of how these resources can best be used. Already, agencies within the United Nations possess considerable expertise in the use of space technologies in the area of disaster management. If this capability is to be used, there will need to be inter-agency coordination, not to mention a further expansion and development of the United Nations role in both Afghanistan and Iraq.

  15. 75 FR 63867 - DTE Energy; Enrico Fermi Atomic Power Plant Unit 1, Exemption From Certain Security Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-18

    ... procedures, physical security plan, guard training and qualification plan, or cyber security plan for the... Power Plant Unit 1, Exemption From Certain Security Requirements 1.0 Background DTE Energy (DTE) is the... atmospheric pressure. In November 1972, the Power Reactor Development Company (PRDC), the licensee at that...

  16. 17 CFR 247.776 - Exemption from the definition of “broker” for banks effecting certain excepted or exempted...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... for its employee benefit plans. 247.776 Section 247.776 Commodity and Securities Exchanges SECURITIES... effecting certain excepted or exempted transactions in a company's securities for its employee benefit plans... benefit of an employee benefit plan account; (3) Any such security is obtained directly from: (i) The...

  17. Understanding Country Planning: A Guide for Air Force Component Planners

    DTIC Science & Technology

    2012-01-01

    TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND...example, Jefferson P. Marquis, Richard E. Darilek, Jasen J. Castillo, Cathryn Quantic Thurston, Anny Wong, Cynthia Huger, Andrea Mejia, Jennifer D. P...2006; Jennifer D. P. Moroney, Jefferson P. Marquis, Cathryn Quantic Thurston, and Gregory F. Treverton, A Framework to Assess Programs for Building

  18. Nuclear Weapons. National Nuclear Security Administration’s Plans for Its Uranium Processing Facility Should Better Reflect Funding Estimates and Technology Readiness

    DTIC Science & Technology

    2010-11-01

    metal. Recovery extraction centrifugal contactors A process that uses solvent to extract uranium for purposes of purification. Agile machining A...extraction centrifugal contactors 5 6 Yes 6 No Agile machining 5 5 No 6 No Chip management 5 6 Yes 6 No Special casting 3 6 Yes 6 No Source: GAO

  19. An Analysis of IT Governance Practices in the Federal Government: Protecting U.S. Critical Infrastructure from Cyber Terrorist Attacks

    ERIC Educational Resources Information Center

    Johnson, R. LeWayne

    2012-01-01

    Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country's IT infrastructure. Critics contend that the DHS has failed to address planning and…

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jacobs, R

    The Physics and Advanced Technologies (PAT) Directorate was created in July 2000 by Bruce Tarter, Director of Lawrence Livermore National Laboratory (LLNL). The Director called for the new organization to execute and support programs that apply cutting-edge physics and advanced technology to develop integrated solutions to problems in national security, fusion energy, information science, health care, and other national grand challenges. When I was appointed a year later as the PAT Directorate's first Associate Director, I initiated a strategic planning project to develop a vision, mission, and long-term goals for the Directorate. We adopted the goal of becoming a leadermore » in frontier physics and technology for twenty-first-century national security missions: Stockpile Stewardship, homeland security, energy independence, and the exploration of space. Our mission is to: (1) Help ensure the scientific excellence and vitality of the major LLNL programs through its leadership role in performing basic and applied multidisciplinary research and development with programmatic impact, and by recruiting and retaining science and technology leaders; (2) Create future opportunities and directions for LLNL and its major programs by growing new program areas and cutting-edge capabilities that are synergistic with, and supportive of, its national security mission; (3) Provide a direct conduit to the academic and high-tech industrial sectors for LLNL and its national security programs, through which the Laboratory gains access to frontier science and technology, and can impact the science and technology communities; (4) Leverage unique Laboratory capabilities, to advance the state universe. This inaugural PAT Annual Report begins a series that will chronicle our progress towards fulfilling this mission. I believe the report demonstrates that the PAT Directorate has a strong base of capabilities and accomplishments on which to build in meeting its goals. Some of the highlights include: (1) Leadership of the Laboratory's Physical Data Research Program that provides fundamental physics information for the Stockpile Stewardship Program. (2) Development of the handheld Microbead Immunoassay Dipstick System that will allow relatively untrained first-responders to run sophisticated onsite diagnostics for pathogens, including those associated with biowarfare agents, by using a simple, one-step measurement. (3) Major advances in target design for inertial fusion energy research using both laser and ion-beam drivers. (4) Development of the Advanced Technology Kill Vehicle concept for use as a high-performance interceptor in a broad range of missile defense programs. Over the course of the past decade, the Laboratory has seen its major program evolve from weapons research, development, and testing, to Stockpile Stewardship. Today, the country's national security priorities are changing rapidly: nuclear security is becoming a broader set of missions, and the Laboratory is being asked to contribute to a range of new mission areas from countering bioterrorism to ensuring information security. As we embark on the twenty-first century, the new PAT Directorate is poised to help lead the Laboratory's response to the country's changing national security needs.« less

  1. Caring capacity in the management of the nutrition crisis in infants, young children and women in Nigeria.

    PubMed

    Igbedioh, S O

    1996-01-01

    Nigeria's nutrition crisis has been shown to have a considerable negative impact on infants, young children and women. Available evidence suggests that 'caring capacity' when properly planned and targeted at the most-at-risk can help. Strategies that can achieve this care are increasing women's income and control over income, increasing investment in women's education and improving access to credit facilities. Others are the aggressive promotion of gender-biased labour saving technology, increasing women's access to basic health and family planning services and implementing reforms in land ownership while instituting social security for women.

  2. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...

  3. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...

  4. 6 CFR 27.245 - Review and approval of site security plans.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  5. 6 CFR 27.245 - Review and approval of site security plans.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  6. 6 CFR 27.245 - Review and approval of site security plans.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  7. 6 CFR 27.245 - Review and approval of site security plans.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  8. 6 CFR 27.245 - Review and approval of site security plans.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  9. Analyzing crime scene videos

    NASA Astrophysics Data System (ADS)

    Cunningham, Cindy C.; Peloquin, Tracy D.

    1999-02-01

    Since late 1996 the Forensic Identification Services Section of the Ontario Provincial Police has been actively involved in state-of-the-art image capture and the processing of video images extracted from crime scene videos. The benefits and problems of this technology for video analysis are discussed. All analysis is being conducted on SUN Microsystems UNIX computers, networked to a digital disk recorder that is used for video capture. The primary advantage of this system over traditional frame grabber technology is reviewed. Examples from actual cases are presented and the successes and limitations of this approach are explored. Suggestions to companies implementing security technology plans for various organizations (banks, stores, restaurants, etc.) will be made. Future directions for this work and new technologies are also discussed.

  10. 33 CFR 128.300 - What is required to be in a Terminal Security Plan?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false What is required to be in a Terminal Security Plan? 128.300 Section 128.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF... for Terminal Security § 128.300 What is required to be in a Terminal Security Plan? (a) If your...

  11. 33 CFR 128.300 - What is required to be in a Terminal Security Plan?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false What is required to be in a Terminal Security Plan? 128.300 Section 128.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF... for Terminal Security § 128.300 What is required to be in a Terminal Security Plan? (a) If your...

  12. 33 CFR 128.300 - What is required to be in a Terminal Security Plan?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false What is required to be in a Terminal Security Plan? 128.300 Section 128.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF... for Terminal Security § 128.300 What is required to be in a Terminal Security Plan? (a) If your...

  13. 17 CFR 230.416 - Securities to be issued as a result of stock splits, stock dividends and anti-dilution provisions...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... to certain employee benefit plans. 230.416 Section 230.416 Commodity and Securities Exchanges... provisions and interests to be issued pursuant to certain employee benefit plans. (a) If a registration... pursuant to an employee benefit plan, including interests in such plan that constitute separate securities...

  14. Key Future Engineering Capabilities for Human Capital Retention

    NASA Astrophysics Data System (ADS)

    Sivich, Lorrie

    Projected record retirements of Baby Boomer generation engineers have been predicted to result in significant losses of mission-critical knowledge in space, national security, and future scientific ventures vital to high-technology corporations. No comprehensive review or analysis of engineering capabilities has been performed to identify threats related to the specific loss of mission-critical knowledge posed by the increasing retirement of tenured engineers. Archival data from a single diversified Fortune 500 aerospace manufacturing engineering company's engineering career database were analyzed to ascertain whether relationships linking future engineering capabilities, engineering disciplines, and years of engineering experience could be identified to define critical knowledge transfer models. Chi square, logistic, and linear regression analyses were used to map patterns of discipline-specific, mission-critical knowledge using archival data of engineers' perceptions of engineering capabilities, key developmental experiences, and knowledge learned from their engineering careers. The results from the study were used to document key engineering future capabilities. The results were then used to develop a proposed human capital retention plan to address specific key knowledge gaps of younger engineers as veteran engineers retire. The potential for social change from this study involves informing leaders of aerospace engineering corporations on how to build better quality mentoring or succession plans to fill the void of lost knowledge from retiring engineers. This plan can secure mission-critical knowledge for younger engineers for current and future product development and increased global competitiveness in the technology market.

  15. 49 CFR 1544.301 - Contingency plan.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND... notified of any changes. (c) Participate in an airport-sponsored exercise of the airport contingency plan...

  16. 49 CFR 1544.301 - Contingency plan.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND... notified of any changes. (c) Participate in an airport-sponsored exercise of the airport contingency plan...

  17. 49 CFR 1544.301 - Contingency plan.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND... notified of any changes. (c) Participate in an airport-sponsored exercise of the airport contingency plan...

  18. 49 CFR 1544.301 - Contingency plan.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND... notified of any changes. (c) Participate in an airport-sponsored exercise of the airport contingency plan...

  19. Domestic water and sanitation as water security: monitoring, concepts and strategy

    PubMed Central

    Bradley, David J.; Bartram, Jamie K.

    2013-01-01

    Domestic water and sanitation provide examples of a situation where long-term, target-driven efforts have been launched with the objective of reducing the proportion of people who are water-insecure, most recently through the millennium development goals (MDGs) framework. Impacts of these efforts have been monitored by an increasingly evidence-based system, and plans for the next period of international policy, which are likely to aim at universal coverage with basic water and sanitation, are being currently developed. As distinct from many other domains to which the concept of water security is applied, domestic or personal water security requires a perspective that incorporates the reciprocal notions of provision and risk, as the current status of domestic water and sanitation security is dominated by deficiency This paper reviews the interaction of science and technology with policies, practice and monitoring, and explores how far domestic water can helpfully fit into the proposed concept of water security, how that is best defined, and how far the human right to water affects the situation. It is considered that they fit well together in terms both of practical planning of targets and indicators and as a conceptual framework to help development. The focus needs to be broad, to extend beyond households, to emphasize maintenance as well as construction and to increase equity of access. International and subnational monitoring need to interact, and monitoring results need to be meaningful to service providers as well as users. PMID:24080628

  20. 50 CFR 37.14 - Bonding.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... WILDLIFE REFUGE SYSTEM GEOLOGICAL AND GEOPHYSICAL EXPLORATION OF THE COASTAL PLAIN, ARCTIC NATIONAL... a surety bond of not less than $100,000, or other security satisfactory to the Service, to secure... needed to secure performance of its exploration plan and plan(s) of operation and compliance with the...

  1. 42 CFR 73.11 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...

  2. 9 CFR 121.11 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  3. 9 CFR 121.11 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  4. 42 CFR 73.11 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...

  5. 7 CFR 331.11 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 5 2013-01-01 2013-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. Link... register under this part must develop and implement a written security plan. The security plan must be...

  6. 42 CFR 73.11 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...

  7. 42 CFR 73.11 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...

  8. 9 CFR 121.11 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 9 Animals and Animal Products 1 2014-01-01 2014-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  9. 9 CFR 121.11 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  10. 17 CFR 239.16b - Form S-8, for registration under the Securities Act of 1933 of securities to be offered to...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... under the Securities Act of 1933 of securities to be offered to employees pursuant to employee benefit... employee benefit plans. (a) Any registrant that, immediately prior to the time of filing a registration... benefit plan. The form also is available for the exercise of employee benefit plan options by an employee...

  11. Safety and Security Interface Technology Initiative

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme)more » includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ‘tool box’ of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems’ essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.« less

  12. 78 FR 15797 - Service Delivery Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-12

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0048] Service Delivery Plan AGENCY: Social... information, such as Social Security numbers or medical information. 1. Internet: We strongly recommend that... Regulations and Reports Clearance, Social Security Administration, 107 Altmeyer Building, 6401 Security...

  13. The Design of Data Disaster Recovery of National Fundamental Geographic Information System

    NASA Astrophysics Data System (ADS)

    Zhai, Y.; Chen, J.; Liu, L.; Liu, J.

    2014-04-01

    With the development of information technology, data security of information system is facing more and more challenges. The geographic information of surveying and mapping is fundamental and strategic resource, which is applied in all areas of national economic, defence and social development. It is especially vital to national and social interests when such classified geographic information is directly concerning Chinese sovereignty. Several urgent problems that needs to be resolved for surveying and mapping are how to do well in mass data storage and backup, establishing and improving the disaster backup system especially after sudden natural calamity accident, and ensuring all sectors rapidly restored on information system will operate correctly. For overcoming various disaster risks, protect the security of data and reduce the impact of the disaster, it's no doubt the effective way is to analysis and research on the features of storage and management and security requirements, as well as to ensure that the design of data disaster recovery system suitable for the surveying and mapping. This article analyses the features of fundamental geographic information data and the requirements of storage management, three site disaster recovery system of DBMS plan based on the popular network, storage and backup, data replication and remote switch of application technologies. In LAN that synchronous replication between database management servers and the local storage of backup management systems, simultaneously, remote asynchronous data replication between local storage backup management systems and remote database management servers. The core of the system is resolving local disaster in the remote site, ensuring data security and business continuity of local site. This article focuses on the following points: background, the necessity of disaster recovery system, the analysis of the data achievements and data disaster recovery plan. Features of this program is to use a hardware-based data hot backup, and remote online disaster recovery support for Oracle database system. The achievement of this paper is in summarizing and analysing the common characteristics of disaster of surveying and mapping business system requirements, while based on the actual situation of the industry, designed the basic GIS disaster recovery solutions, and we also give the conclusions about key technologies of RTO and RPO.

  14. LANL Multiyear Strategy Performance Improvement (MYSPI), Fiscal Years 2017–2021

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leasure, Craig Scott

    2016-05-03

    Los Alamos National Laboratory (LANL) protects the nation and the world using innovative science, technology, and engineering through an integrated approach that harnesses the strength of our people, capabilities, and operations. The Laboratory’s Strategic Plan and Purpose statement provide the framework for scientific excellence and operational excellence now and in the future. Our Strategic Plan and Purpose help position Los Alamos for continuing mission success that ensures the safety, security, and effectiveness of the nation’s deterrent; protects the nation from nuclear and emerging threats through our larger global security missions; provides energy security to the nation; and ensures that themore » nation’s scientific reputation and capabilities remain robust enough to assure our allies and deter our adversaries. Moreover, we use these principles and guidance to ensure that Los Alamos is successful in attracting, recruiting, and retaining the next generation of world-class talent, while creating an efficient, environmentally responsible workplace that provides our employees with access to modern scientific tools and resources. Using this guidance and its underlying principles, we are continuing to restore credibility and operational effectiveness to the Laboratory, deliver mission success and continuing scientific excellence, and protect our employees and the nation’s secrets.« less

  15. LANL Multiyear Strategy Performance Improvement (MYSPI), Fiscal Years 2018-2022

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leasure, Craig Scott

    Los Alamos National Laboratory (LANL) protects the nation and the world using innovative science, technology, and engineering through an integrated approach that harnesses the strength of our people, capabilities, and operations. The Laboratory’s Strategic Plan and Purpose statement provide the framework for scientific excellence and operational excellence now and in the future. Our Strategic Plan and Purpose help position Los Alamos for continuing mission success that ensures the safety, security, and effectiveness of the nation’s deterrent; protects the nation from nuclear and emerging threats through our larger global security missions; provides energy security to the nation; and ensures that themore » nation’s scientific reputation and capabilities remain robust enough to assure our allies and deter our adversaries. Moreover, we use these principles and guidance to ensure that Los Alamos is successful in attracting, recruiting, and retaining the next generation of excellent talent, while creating an efficient, environmentally responsible workplace that provides our employees with access to modern scientific tools and resources. Using this guidance and its underlying principles, we are continuing to restore credibility and operational effectiveness to the Laboratory, deliver mission success and continuing scientific excellence, and protect our employees and the nation’s secrets.« less

  16. Protecting software agents from malicious hosts using quantum computing

    NASA Astrophysics Data System (ADS)

    Reisner, John; Donkor, Eric

    2000-07-01

    We evaluate how quantum computing can be applied to security problems for software agents. Agent-based computing, which merges technological advances in artificial intelligence and mobile computing, is a rapidly growing domain, especially in applications such as electronic commerce, network management, information retrieval, and mission planning. System security is one of the more eminent research areas in agent-based computing, and the specific problem of protecting a mobile agent from a potentially hostile host is one of the most difficult of these challenges. In this work, we describe our agent model, and discuss the capabilities and limitations of classical solutions to the malicious host problem. Quantum computing may be extremely helpful in addressing the limitations of classical solutions to this problem. This paper highlights some of the areas where quantum computing could be applied to agent security.

  17. Storage media for computers in radiology.

    PubMed

    Dandu, Ravi Varma

    2008-11-01

    The introduction and wide acceptance of digital technology in medical imaging has resulted in an exponential increase in the amount of data produced by the radiology department. There is an insatiable need for storage space to archive this ever-growing volume of image data. Healthcare facilities should plan the type and size of the storage media that they needed, based not just on the volume of data but also on considerations such as the speed and ease of access, redundancy, security, costs, as well as the longevity of the archival technology. This article reviews the various digital storage media and compares their merits and demerits.

  18. Wireless networking for the dental office: current wireless standards and security protocols.

    PubMed

    Mupparapu, Muralidhar; Arora, Sarika

    2004-11-15

    Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.

  19. Multi-Agent Coordination Techniques for Naval Tactical Combat Resources Management

    DTIC Science & Technology

    2008-07-01

    resource coordination and cooperation problems. The combat resource allocation planning problem is treated in the companion report [2]. 2.3 Resource...report focuses on the resource coordination problem, while allocation algorithms are discussed in the companion report [2]. First, coordination in...classification of each should be indicated as with the title.) Canada’s Leader in Defence and National Security Science and Technology Chef de file au Canada en

  20. Utilizing Android and the Cloud Computing Environment to Increase Situational Awareness for a Mobile Distributed Response

    DTIC Science & Technology

    2012-03-01

    by using a common communication technology there is no need to develop a complicated communications plan and generate an ad - hoc communications...DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words) Maintaining an accurate Common Operational Picture (COP) is a strategic requirement for...TERMS Android Programming, Cloud Computing, Common Operating Picture, Web Programing 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT

  1. Joint Information Environment: DOD Needs to Strengthen Governance and Management

    DTIC Science & Technology

    2016-07-01

    provide fast and secure connections to any application or service from any authorized network at any time Software application rationalization and...deployment at all sites. DOD further defines an automated information system as a system of computer hardware, computer software , data or telecommunications ...Why GAO Did This Study For fiscal year 2017, DOD plans to spend more than $38 billion on information technology to support thousands of networks and

  2. Experiences in Eliciting Security Requirements

    DTIC Science & Technology

    2006-12-01

    FODA ) FODA is a domain analysis and engineer- ing method that focuses on developing reusable assets [9]. By examining related software systems and...describe a trade-off analysis that we used to select a suitable requirements elici- tation method and present results detailed from a case study of one...disaster planning, and how to improve Medicare. Eventually, technology-oriented problems may emerge from these soft problems, but much more analysis is

  3. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  4. [Compliance with guidelines by state plans for food and nutritional security in Brazil].

    PubMed

    Machado, Mick Lennon; Gabriel, Cristine Garcia; Soar, Claudia; Mamed, Gisele Rockenbach; Machado, Patrícia Maria de Oliveira; Lacerda, Josimari Telino de; Martins, Milena Corrêa; Marcon, Maria Cristina

    2018-02-05

    A descriptive and documental study was performed from August to October 2016 to analyze compliance by state plans for food and nutritional security (PlanSAN) with the guidelines set by the Brazilian National Policy for Food and Nutritional Security (PNSAN). The state plans were accessed via the websites of the Inter-Ministerial Chamber for Food and Nutritional Security (CAISAN) or the state governments, plus complementary data collection at the state level. All the states of Brazil joined the National System for Food and Nutritional Security (SISAN), while fewer than half (13 states, 48%) had drafted their plans. Of these, 5 (38%) of the PlanSAN had schedules that coincided with the same state's pluriannual plan, 5 (38%) of the PlanSAN specified the budget requirements for meeting the proposed targets, 7 (54%) specified mechanisms for monitoring the plan, and only 2 (15%) defined methodologies for monitoring food and nutritional security. The recent existence of (and adherence to) the CAISAN appear to be related to the lack of state plans in half the states. Although most of the states that did have plans met some of the guidelines laid out by the PNSAN, these mechanisms become weak and impractical when they lack earmarked budget funds to meet their targets. Since the PNSAN is structurally inter-sectorial, the development of plans requires collective work by various government departments. Importantly, the items analyzed here are all guidelines, which implies the need for mechanisms to monitor their actual implementation.

  5. FAA bulk technology overview for explosives detection

    NASA Astrophysics Data System (ADS)

    Novakoff, Alan K.

    1993-04-01

    The Federal Aviation Administration (FAA) is the leading federal agency responsible for encouraging and fostering the development of a safe, secure, and efficient national airspace system (NAS). Our goal is to establish an operating environment that ensures a threat-free system to preclude acts of terrorism and fatalities. As part of the process to meet this goal, our research and development activities continually search for technologies to ensure aviation security. Recent acts of terrorism against the aviation community have demonstrated an increasing level of sophistication in the design and deployment of explosive devices. In order to prevent the introduction of explosives onto an aircraft they must be detected prior to passenger and baggage loading. The Bulk Detection program is one method of developing a number of technologies that 'see' into and 'alarm' on suspect baggage. These detection devices must be capable of providing this serve with a confidence commensurate with the state-of-the- art available today. This program utilizes the expertise of government agencies, universities and industries working toward constructing their plans and executing their designs to produce the best available equipment.

  6. Uncovering patterns of technology use in consumer health informatics

    PubMed Central

    Hung, Man; Conrad, Jillian; Hon, Shirley D.; Cheng, Christine; Franklin, Jeremy D.; Tang, Philip

    2014-01-01

    Internet usage and accessibility has grown at a staggering rate, influencing technology use for healthcare purposes. The amount of health information technology (Health IT) available through the Internet is immeasurable and growing daily. Health IT is now seen as a fundamental aspect of patient care as it stimulates patient engagement and encourages personal health management. It is increasingly important to understand consumer health IT patterns including who is using specific technologies, how technologies are accessed, factors associated with use, and perceived benefits. To fully uncover consumer patterns it is imperative to recognize common barriers and which groups they disproportionately affect. Finally, exploring future demand and predictions will expose significant opportunities for health IT. The most frequently used health information technologies by consumers are gathering information online, mobile health (mHealth) technologies, and personal health records (PHRs). Gathering health information online is the favored pathway for healthcare consumers as it is used by more consumers and more frequently than any other technology. In regard to mHealth technologies, minority Americans, compared with White Americans utilize social media, mobile Internet, and mobile applications more frequently. Consumers believe PHRs are the most beneficial health IT. PHR usage is increasing rapidly due to PHR integration with provider health systems and health insurance plans. Key issues that have to be explicitly addressed in health IT are privacy and security concerns, health literacy, unawareness, and usability. Privacy and security concerns are rated the number one reason for the slow rate of health IT adoption. PMID:24904713

  7. 49 CFR 172.802 - Components of a security plan.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... from origin to destination, including shipments stored incidental to movement. (b) The security plan must also include the following: (1) Identification by job title of the senior management official... business and must make the security plan available upon request, at a reasonable time and location, to an...

  8. 41 CFR 102-192.80 - How do we develop written security policies and plans?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... service and/or the Federal Protective Service to develop agency mail security policies and plans. The... written security policies and plans? 102-192.80 Section 102-192.80 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...

  9. 41 CFR 102-192.80 - How do we develop written security policies and plans?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... service and/or the Federal Protective Service to develop agency mail security policies and plans. The... written security policies and plans? 102-192.80 Section 102-192.80 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...

  10. 41 CFR 102-192.80 - How do we develop written security policies and plans?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... service and/or the Federal Protective Service to develop agency mail security policies and plans. The... written security policies and plans? 102-192.80 Section 102-192.80 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...

  11. 41 CFR 102-192.80 - How do we develop written security policies and plans?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... service and/or the Federal Protective Service to develop agency mail security policies and plans. The... written security policies and plans? 102-192.80 Section 102-192.80 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...

  12. 77 FR 55864 - Applications and Amendments to Facility Operating Licenses and Combined Licenses Involving...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    .... ML111940200), which approved the RBS Cyber Security Plan and associated implementation milestone schedule. The Cyber Security Plan Implementation Schedule contained in the licensee's letter dated April 4, 2011... consequences of an accident previously evaluated? Response: No. The proposed change to the Cyber Security Plan...

  13. 33 CFR 104.415 - Amendment and audit.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Amendment and audit. 104.415 Section 104.415 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Plan (VSP) § 104.415 Amendment and audit. (a) Amendments. (1) Amendments to a Vessel Security Plan...

  14. Federal Plan for Cyber Security and Information Assurance Research and Development

    DTIC Science & Technology

    2006-04-01

    Security Systems 103 varieties of the BB84 scheme have been developed, and other forms of quantum key distribution have been proposed. Rapid progress has led... key . Capability Gaps Existing quantum cryptographic protocols may also have weaknesses. Although BB84 is generally regarded as secure , researchers...complement agency-specific prioritization and R&D planning efforts in cyber security and information assurance. The Plan also describes the key Federal

  15. Climate change and food security in East Asia.

    PubMed

    Su, Yi-Yuan; Weng, Yi-Hao; Chiu, Ya-Wen

    2009-01-01

    Climate change causes serious food security risk for East Asian countries. The United Nations Framework Convention on Climate Change (UNFCCC) has recognized that the climate change will impact agriculture and all nations should prepare adaptations to the impacts on food security. This article reviews the context of adaptation rules and current policy development in East Asian region. The UNFCCC and Kyoto Protocol have established specific rules for countries to develop national or regional adaptation policies and measurements. The current development of the ASEAN Strategic Plan on food security is inspiring, but the commitments to implementation by its members remain an issue of concern. We suggest that the UNFCCC enhances co-operation with the Food and Agriculture Organization (FAO) and other international organizations to further develop methodologies and technologies for all parties. Our findings suggest that agriculture is one of the most vulnerable sectors in terms of risks associated with climate change and distinct programmatic initiatives are necessary. It's imperative to promote co-operation among multilateral organizations, including the UNFCCC, FAO, World Health Organization, and others.

  16. Applications Using High Flux LCS gamma-ray Beams: Nuclear Security and Contributions to Fukushima

    NASA Astrophysics Data System (ADS)

    Fujiwara, Mamoru

    2014-09-01

    Nuclear nonproliferation and security are an important issue for the peaceful use of nuclear energy. Many countries now collaborate together for preventing serious accidents from nuclear terrorism. Detection of hidden long-lived radioisotopes and fissionable nuclides in a non-destructive manner is useful for nuclear safeguards and management of nuclear wastes as well as nuclear security. After introducing the present situation concerning the nuclear nonproliferation and security in Japan, we plan to show the present activities of JAEA to detect the hidden nuclear materials by means of the nuclear resonance fluorescence with energy-tunable, monochromatic gamma-rays generated by Laser Compton Scattering (LCS) with an electron beam. The energy recovery linac (ERL) machine is now under development with the KEK-JAEA collaboration for realizing the new generation of gamma-ray sources. The detection technologies of nuclear materials are currently developed using the existing electron beam facilities at Duke University and at NewSubaru. These developments in Japan will contribute to the nuclear security program in Japan and to the assay of melted nuclear fuels in the Fukushima Daiichi nuclear power plants.

  17. Securing your financial future.

    PubMed

    Kachalia, Parag R

    2009-04-01

    Securing one's financial future requires dedication and planning. A clear plan must be implemented and continually re-examined to assure an individual remains on track to achieve this security. True success of the plan will be dependent upon taking the appropriate steps to protecting one's assets against unfortunate events along with building assets with a clear end goal in mind. This article will cover the fundamental steps an individual can take to secure their financial future.

  18. 75 FR 9622 - Southern Nuclear Operating Company, Inc.; Vogtle Electric Generating Plant, Units 1 and 2; Exemption

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-03

    ... requirements similar to those previously imposed by Commission orders issued after the terrorist attacks of... Security Plan, Training and Qualification Plan, Safeguards Contingency Plan, and Cyber Security Plan...

  19. 17 CFR 230.701 - Exemption for offers and sales of securities pursuant to certain compensatory benefit plans and...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation E-Exemption for Securities of Small Business... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption for offers and sales of securities pursuant to certain compensatory benefit plans and contracts relating to compensation...

  20. 45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... of Electronic Protected Health Information § 164.318 Compliance dates for the initial implementation of the security standards. (a) Health plan. (1) A health plan that is not a small health plan must... the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES...

  1. 45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... of Electronic Protected Health Information § 164.318 Compliance dates for the initial implementation of the security standards. (a) Health plan. (1) A health plan that is not a small health plan must... the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES...

  2. Information security management system planning for CBRN facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  3. 75 FR 51490 - Notice; Applications and Amendments to Facility Operating Licenses Involving Proposed No...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-20

    ...). The proposed amendment would approve the cyber security plan and implementation schedule, and revise... maintain in effect all provisions of the NRC-approved cyber security plan. Basis for proposed no... [facility operating license] to implement and maintain a Cyber Security Plan as part of Energy Northwest's...

  4. 75 FR 68831 - Notice; Applications and Amendments to Facility Operating Licenses Involving Proposed No...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-09

    ...-safeguards information (SUNSI). The amendments would approve the proposed Cyber Security Plan and... Commission-approved Cyber Security Plan as required by 10 CFR 73.54. Basis for proposed no significant... Facility Operating License (FOL) to implement and maintain a Cyber Security Plan as part of the facility's...

  5. Integrated agricultural energy system

    NASA Astrophysics Data System (ADS)

    Taylor, R. M.

    1985-08-01

    The purpose of this program is to show New England farmers and other New England energy users how they can use alternative energy sources to reduce their energy cost and dependency on conventional sources. The project demonstrates alternative energy technologies in solar, alcohol and methane. Dissemination is planned through tours to be conducted by the Worcester County Extension Service. Most of these goals were completed as planned. A few things have yet to be completed. The solar panels and solar hot water tanks have to be installed. The fermenter's agitating and cooling system have to be secured inside the fermenter. Once these items are complete tours will begin early in the spring.

  6. 78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-20

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...: Notice of Cancellation of the Federal Advisory Committee Meeting for Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The meeting of the Homeland Security Science and Technology...

  7. Selecting Security Technology Providers

    ERIC Educational Resources Information Center

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  8. Brookhaven National Laboratory Institutional Plan FY2001--FY2005

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davis, S.

    Brookhaven National Laboratory is a multidisciplinary laboratory in the Department of Energy National Laboratory system and plays a lead role in the DOE Science and Technology mission. The Laboratory also contributes to the DOE missions in Energy Resources, Environmental Quality, and National Security. Brookhaven strives for excellence in its science research and in facility operations and manages its activities with particular sensitivity to environmental and community issues. The Laboratory's programs are aligned continuously with the goals and objectives of the DOE through an Integrated Planning Process. This Institutional Plan summarizes the portfolio of research and capabilities that will assure successmore » in the Laboratory's mission in the future. It also sets forth BNL strategies for our programs and for management of the Laboratory. The Department of Energy national laboratory system provides extensive capabilities in both world class research expertise and unique facilities that cannot exist without federal support. Through these national resources, which are available to researchers from industry, universities, other government agencies and other nations, the Department advances the energy, environmental, economic and national security well being of the US, provides for the international advancement of science, and educates future scientists and engineers.« less

  9. Web Application Software for Ground Operations Planning Database (GOPDb) Management

    NASA Technical Reports Server (NTRS)

    Lanham, Clifton; Kallner, Shawn; Gernand, Jeffrey

    2013-01-01

    A Web application facilitates collaborative development of the ground operations planning document. This will reduce costs and development time for new programs by incorporating the data governance, access control, and revision tracking of the ground operations planning data. Ground Operations Planning requires the creation and maintenance of detailed timelines and documentation. The GOPDb Web application was created using state-of-the-art Web 2.0 technologies, and was deployed as SaaS (Software as a Service), with an emphasis on data governance and security needs. Application access is managed using two-factor authentication, with data write permissions tied to user roles and responsibilities. Multiple instances of the application can be deployed on a Web server to meet the robust needs for multiple, future programs with minimal additional cost. This innovation features high availability and scalability, with no additional software that needs to be bought or installed. For data governance and security (data quality, management, business process management, and risk management for data handling), the software uses NAMS. No local copy/cloning of data is permitted. Data change log/tracking is addressed, as well as collaboration, work flow, and process standardization. The software provides on-line documentation and detailed Web-based help. There are multiple ways that this software can be deployed on a Web server to meet ground operations planning needs for future programs. The software could be used to support commercial crew ground operations planning, as well as commercial payload/satellite ground operations planning. The application source code and database schema are owned by NASA.

  10. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    Commission (IEC). “Information technology — Security techniques — Code of practice for information security management ( ISO /IEC 27002 ...Information technology — Security techniques — Information security management systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security...was a draft ISO standard on Systems and software engineering, Systems and software assurance [18]. Created by systems engineers for systems

  11. Considerations for an Integrated UAS CNS Architecture

    NASA Technical Reports Server (NTRS)

    Templin, Fred L.; Jain, Raj; Sheffield, Greg; Taboso-Bellesteros, Pedro; Ponchak, Denise

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) is investigating revolutionary and advanced universal, reliable, always available, cyber secure and affordable Communication, Navigation, Surveillance (CNS) options for all altitudes of UAS operations. In Spring 2015, NASA issued a Call for Proposals under NASA Research Announcements (NRA) NNH15ZEA001N, Amendment 7 Subtopic 2.4. Boeing was selected to conduct a study with the objective to determine the most promising candidate technologies for Unmanned Air Systems (UAS) air-to-air and air-to-ground data exchange and analyze their suitability in a post-NextGen NAS environment. The overall objectives are to develop UAS CNS requirements and then develop architectures that satisfy the requirements for UAS in both controlled and uncontrolled air space. This contract is funded under NASAs Aeronautics Research Mission Directorates (ARMD) Aviation Operations and Safety Program (AOSP) Safe Autonomous Systems Operations (SASO) project and proposes technologies for the Unmanned Air Systems Traffic Management (UTM) service.There is a need for accommodating large-scale populations of Unmanned Air Systems (UAS) in the national air space. Scale obviously impacts capacity planning for Communication, Navitation, and Surveillance (CNS) technologies. For example, can wireless communications data links provide the necessary capacity for accommodating millions of small UASs (sUAS) nationwide? Does the communications network provide sufficient Internet Protocol (IP) address space to allow air traffic control to securely address both UAS teams as a whole as well as individual UAS within each team? Can navigation and surveillance approaches assure safe route planning and safe separation of vehicles even in crowded skies?Our objective is to identify revolutionary and advanced CNS alternatives supporting UASs operating at all altitudes and in all airspace while accurately navigating in the absence of navigational aids. These CNS alternatives must be reliable, redundant, always available, cyber-secure, and affordable for all types of vehicles including small UAS to large transport category aircraft. The approach will identify CNS technology candidates that can meet the needs of the range of UAS missions to specific air traffic management applications where they will be most beneficial and cost effective.

  12. Considerations for an Integrated UAS CNS Architecture

    NASA Technical Reports Server (NTRS)

    Templin, Fred L.; Jain, Raj; Sheffield, Greg; Taboso-Bellesteros, Pedro; Ponchak, Denise

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) is investigating revolutionary and advanced universal, reliable, always available, cyber secure and affordable Communication, Navigation, Surveillance (CNS) options for all altitudes of UAS operations. In Spring 2015, NASA issued a Call for Proposals under NASA Research Announcements (NRA) NNH15ZEA001N, Amendment 7 Subtopic 2.4. Boeing was selected to conduct a study with the objective to determine the most promising candidate technologies for Unmanned Air Systems (UAS) air-to-air and air-to-ground data exchange and analyze their suitability in a post-NextGen NAS environment. The overall objectives are to develop UAS CNS requirements and then develop architectures that satisfy the requirements for UAS in both controlled and uncontrolled air space. This contract is funded under NASAs Aeronautics Research Mission Directorates (ARMD) Aviation Operations and Safety Program (AOSP) Safe Autonomous Systems Operations (SASO) project and proposes technologies for the Unmanned Air Systems Traffic Management (UTM) service.There is a need for accommodating large-scale populations of Unmanned Air Systems (UAS) in the national air space. Scale obviously impacts capacity planning for Communication, Navigation, and Surveillance (CNS) technologies. For example, can wireless communications data links provide the necessary capacity for accommodating millions of small UASs (sUAS) nationwide? Does the communications network provide sufficient Internet Protocol (IP) address space to allow air traffic control to securely address both UAS teams as a whole as well as individual UAS within each team? Can navigation and surveillance approaches assure safe route planning and safe separation of vehicles even in crowded skies?Our objective is to identify revolutionary and advanced CNS alternatives supporting UASs operating at all altitudes and in all airspace while accurately navigating in the absence of navigational aids. These CNS alternatives must be reliable, redundant, always available, cyber-secure, and affordable for all types of vehicles including small UAS to large transport category aircraft. The approach will identify CNS technology candidates that can meet the needs of the range of UAS missions to specific air traffic management applications where they will be most beneficial and cost effective.

  13. FY 2016 - Stockpile Stewardship and Management Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2015-03-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  14. Strategic Shift: Appraising Recent Changes in U.S. Defense Plans and Priorities

    DTIC Science & Technology

    2013-04-29

    NDU Press, 2012). 9 Neyla Arnas and Warren Fishbein, Actionable Foresight Project, Center for Technology and National Security Policy, in...management, At the same time, leaders had to account for changes in warfare. This included changes across the range of combat bred by the...into account the ongoing stability operations in Iraq and Afghanistan. In it, U.S. forces would be sized in order to: a. Conduct a major

  15. Managing the Security of Nursing Data in the Electronic Health Record

    PubMed Central

    Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud

    2015-01-01

    Background: The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. Methods: This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts’ opinions and Cronbach’s alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. Results: The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Conclusions: Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research. PMID:25870490

  16. Managing the security of nursing data in the electronic health record.

    PubMed

    Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud

    2015-02-01

    The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts' opinions and Cronbach's alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research.

  17. 78 FR 10211 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Securities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-13

    ... for OMB Review; Comment Request; Securities Lending by Employee Benefit Plans ACTION: Notice. SUMMARY...) sponsored information collection request (ICR) titled, ``Securities Lending by Employee Benefit Plans,'' [email protected] . Authority: 44 U.S.C. 3507(a)(1)(D). SUPPLEMENTARY INFORMATION: The Securities Lending by...

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    B. Gardiner; L.Graton; J.Longo

    Classified removable electronic media (CREM) are tracked in several different ways at the Laboratory. To ensure greater security for CREM, we are creating a single, Laboratory-wide system to track CREM. We are researching technology that can be used to electronically tag and detect CREM, designing a database to track the movement of CREM, and planning to test the system at several locations around the Laboratory. We focus on affixing ''smart tags'' to items we want to track and installing gates at pedestrian portals to detect the entry or exit of tagged items. By means of an enterprise database, the systemmore » will track the entry and exit of tagged items into and from CREM storage vaults, vault-type rooms, access corridors, or boundaries of secure areas, as well as the identity of the person carrying an item. We are considering several options for tracking items that can give greater security, but at greater expense.« less

  19. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...

  20. The research of network database security technology based on web service

    NASA Astrophysics Data System (ADS)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  1. A terrorism response plan for hospital security and safety officers.

    PubMed

    White, Donald E

    2002-01-01

    Security and Safety managers in today's healthcare facilities need to factor terrorism response into their emergency management plans, separate from the customary disaster plans and the comparatively recent security plans. Terrorism incidents will likely be security occurrences that use a weapon of mass destruction to magnify the incidents into disasters. Facility Y2K Plans can provide an excellent framework for the detailed contingency planning needed for terrorism response by healthcare facilities. Tabbed binder notebooks, with bulleted procedures and contact points for each functional section, can provide security and safety officers with at-a-glance instructions for quick 24/7 implementation. Each functional section should focus upon what activities or severity levels trigger activation of the backup processes. Network with your countywide, regional, and/or state organizations to learn what your peers are doing. Comprehensively inventory your state, local, and commercial resources so that you have alternate providers readily available 24/7 to assist your facility upon disasters.

  2. Marine data security based on blockchain technology

    NASA Astrophysics Data System (ADS)

    Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang

    2018-03-01

    With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.

  3. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  4. Digital security technology simplified.

    PubMed

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  5. Port Security: A National Planning Guide

    DOT National Transportation Integrated Search

    1997-01-01

    Port Security: A National Planning Guide has been produced for the purpose of conveying the United States Department of Transportations policy perspective on port security to the maritime community. This guide provides an overview of the essential as...

  6. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  7. Storage media for computers in radiology

    PubMed Central

    Dandu, Ravi Varma

    2008-01-01

    The introduction and wide acceptance of digital technology in medical imaging has resulted in an exponential increase in the amount of data produced by the radiology department. There is an insatiable need for storage space to archive this ever-growing volume of image data. Healthcare facilities should plan the type and size of the storage media that they needed, based not just on the volume of data but also on considerations such as the speed and ease of access, redundancy, security, costs, as well as the longevity of the archival technology. This article reviews the various digital storage media and compares their merits and demerits. PMID:19774182

  8. Environmental Security Technology Certification Program (ESTCP), Technology Demonstration Plan, MTADS Airborne and Vehicular Survey of Target S1 at Isleta Pueblo, Albuquerque, NM, 17 February - 2 March, 2003

    DTIC Science & Technology

    2004-03-31

    include the black widow and the brown or violin spiders. The black widow is a coal-black bulbous spider 3/4 to 1 1/2 inches in length, with a bright red...pupils and generalized swelling of face and extremities. The brown recluse, or violin spider, is brownish to tan in color, rather flat, 1/2 to 5/8 inches...long with a dark brown “ violin ” marking on the underside. There are three varieties of the brown spider, which present a problem to site personnel

  9. 47 CFR 87.395 - Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...

  10. 47 CFR 87.395 - Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...

  11. 47 CFR 87.395 - Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...

  12. 47 CFR 87.395 - Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...

  13. 47 CFR 87.395 - Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...

  14. 12 CFR 218.776 - Exemption from the definition of “broker” for banks effecting certain excepted or exempted...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... certain excepted or exempted transactions in a company's securities for its employee benefit plans. (a) A... an employee benefit plan account; (3) Any such security is obtained directly from: (i) The company; or (ii) An employee benefit plan of the company; and (4) Any such security is transferred only to: (i...

  15. Y-12 Site Sustainability Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Spencer, Charles G

    2012-12-01

    The accomplishments to date and the long-range planning of the Y-12 Energy Management and Sustainability and Stewardship programs support the U.S. Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) vision for a commitment to energy effi ciency and sustainability and to achievement of the Guiding Principles. Specifi cally, the Y-12 vision is to support the Environment, Safety and Health Policy and the DOE Strategic Sustainability Performance Plan, while promoting overall sustainability and reduction of greenhouse gas emissions. The mission of the Y-12 Energy Management program is to incorporate energy-effi cient technologies site-wide and to position Y-12 tomore » meet NNSA energy requirement needs through 2025 and beyond. The plan addresses greenhouse gases, buildings, fleet management, water use, pollution prevention, waste reduction, sustainable acquisition, electronic stewardship and data centers, site innovation and government-wide support.« less

  16. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  17. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  18. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  19. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  20. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  1. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-12

    ... Technology Advisory Committee AGENCY: Science and Technology Directorate, DHS. ACTION: Committee Management; notice of closed Federal Advisory Committee meeting SUMMARY: The Homeland Security Science and Technology.... DATES: The Homeland Security Science and Technology Advisory Committee will meet April 20, 2010 from 8...

  2. Seniors-on-line: introducing older people to technology.

    PubMed

    Irizarry, C; Downing, A; Elford, C

    1997-03-01

    Retired Engineers are playing an important role in ensuring that older people are not excluded from the benefits of technological advances. Technology is playing an increasingly important role in the lives of older people as it is incorporated into assistive devices, home security, access to health care, banking, communication and many other areas. However, if older people are unfamiliar with new technologies and find them daunting, they may not benefit fully from these advances. In order to minimize difficulties arising from unfamiliarity with technology, an introductory computer course was offered to people aged 55 and over. Teaching methods appropriate to the needs of older people were used: small classes, students and instructors from same age cohort, slow pace of presentation and ample opportunity to ask questions. Retired Engineers make up the majority of instructors. Three hundred and sixty nine older people have participated in the course and most plan to continue using a computer.

  3. Ensuring reliability in expansion schemes.

    PubMed

    Kamal-Uddin, Abu Sayed; Williams, Donald Leigh

    2005-01-01

    Existing electricity power supplies must serve, or be adapted to serve, the expansion of hospital buildings. With the existing power supply assets of many hospitals being up to 20 years old, assessing the security and reliability of the power system must be given appropriate priority to avoid unplanned outages due to overloads and equipment failures. It is imperative that adequate contingency is planned for essential and non-essential electricity circuits. This article describes the methodology undertaken, and the subsequent recommendations that were made, when evaluating the security and reliability of electricity power supplies to a number of major London hospitals. The methodology described aligns with the latest issue of NHS Estates HTM 2011 'Primary Electrical Infrastructure Emergency Electrical Services Design Guidance' (to which ERA Technology has contributed).

  4. Uncertainty and Risk Management in Cyber Situational Awareness

    NASA Astrophysics Data System (ADS)

    Li, Jason; Ou, Xinming; Rajagopalan, Raj

    Handling cyber threats unavoidably needs to deal with both uncertain and imprecise information. What we can observe as potential malicious activities can seldom give us 100% confidence on important questions we care about, e.g. what machines are compromised and what damage has been incurred. In security planning, we need information on how likely a vulnerability can lead to a successful compromise to better balance security and functionality, performance, and ease of use. These information are at best qualitative and are often vague and imprecise. In cyber situational awareness, we have to rely on such imperfect information to detect real attacks and to prevent an attack from happening through appropriate risk management. This chapter surveys existing technologies in handling uncertainty and risk management in cyber situational awareness.

  5. Pacific Northwest National Laboratory institutional plan FY 1997--2002

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1996-10-01

    Pacific Northwest National Laboratory`s core mission is to deliver environmental science and technology in the service of the nation and humanity. Through basic research fundamental knowledge is created of natural, engineered, and social systems that is the basis for both effective environmental technology and sound public policy. Legacy environmental problems are solved by delivering technologies that remedy existing environmental hazards, today`s environmental needs are addressed with technologies that prevent pollution and minimize waste, and the technical foundation is being laid for tomorrow`s inherently clean energy and industrial processes. Pacific Northwest National Laboratory also applies its capabilities to meet selected nationalmore » security, energy, and human health needs; strengthen the US economy; and support the education of future scientists and engineers. Brief summaries are given of the various tasks being carried out under these broad categories.« less

  6. Alternate Futures for 2025. Security Planning to Avoid Surprise.

    DTIC Science & Technology

    1996-09-01

    our thanks go to the 2025 study chairman, Lt Gen Jay W. Kelley, who provided great leadership and many helpful comments throughout the Alternate...Futures development. Also providing great leadership and countless hours of work to improve our product was the study director, Col Richard Szafranski. Dr...affairs. A Global worldview implies the US will seek a world leadership role. A TeK TeK was defined as the ability to employ technology. A TeK

  7. Hypersonic Technology for Military Application

    DTIC Science & Technology

    1989-04-14

    United Kingdom , and Japan. All but one NASA Langley Research Center - the half dozen were built in the 1950s and "quiet supersonic tunnel". Present plans...NUMBERS PROGRAM PROJECT ITASK WORK UNIT ELEMENT NO. INO. INO. IACCESSION NO. Andrews AFE, ’-D 20330 n/ n/ Ia /I11. TITLE (Inciude Security...work under Contract No. F49620-87-C-0122 be.ween the United States Air Force and the National Academy of Sciences. Coopies of this repoit are available

  8. Use of Information Technology for Management of U.S. Postal Service Facilities.

    DTIC Science & Technology

    1996-05-01

    change closeout status, request for proposal log) Projected income and expenses of a U.S. Postal Service facility Direct capitalization model Tax...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 15. NUMBER OF PAGES 107 16. PRICE CODE 20. LIMITATION OF ABSTRACT UL NSN 7540-01...time and at the right price is a huge and complex job. In any one year, the USPS Facilities organization may acquire more than 100 sites, plan

  9. GLOBECOM '87 - Global Telecommunications Conference, Tokyo, Japan, Nov. 15-18, 1987, Conference Record. Volumes 1, 2, & 3

    NASA Astrophysics Data System (ADS)

    The present conference on global telecommunications discusses topics in the fields of Integrated Services Digital Network (ISDN) technology field trial planning and results to date, motion video coding, ISDN networking, future network communications security, flexible and intelligent voice/data networks, Asian and Pacific lightwave and radio systems, subscriber radio systems, the performance of distributed systems, signal processing theory, satellite communications modulation and coding, and terminals for the handicapped. Also discussed are knowledge-based technologies for communications systems, future satellite transmissions, high quality image services, novel digital signal processors, broadband network access interface, traffic engineering for ISDN design and planning, telecommunications software, coherent optical communications, multimedia terminal systems, advanced speed coding, portable and mobile radio communications, multi-Gbit/second lightwave transmission systems, enhanced capability digital terminals, communications network reliability, advanced antimultipath fading techniques, undersea lightwave transmission, image coding, modulation and synchronization, adaptive signal processing, integrated optical devices, VLSI technologies for ISDN, field performance of packet switching, CSMA protocols, optical transport system architectures for broadband ISDN, mobile satellite communications, indoor wireless communication, echo cancellation in communications, and distributed network algorithms.

  10. 75 FR 29588 - Office of New Reactors: Proposed NUREG-0800; Standard Review Plan Section 13.6.6, Draft Revision...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-26

    ... NUCLEAR REGULATORY COMMISSION [NRC-2010-0184] Office of New Reactors: Proposed NUREG-0800; Standard Review Plan Section 13.6.6, Draft Revision 0 on Cyber Security Plan AGENCY: Nuclear Regulatory... Plants,'' on a proposed Standard Review Plan (SRP) Section 13.6.6 on ``Cyber Security Plan'' (Agencywide...

  11. 29 CFR 2530.201-2 - Plans covered by part 2530.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... employee welfare benefit plan as defined in section 3(1) of the Act and § 2510.3-1; (b) A plan which is... Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR MINIMUM STANDARDS FOR EMPLOYEE PENSION BENEFIT PLANS UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY...

  12. 76 FR 34886 - General Services Administration Acquisition Regulation; Implementation of Information Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-15

    ... Acquisition Regulation; Implementation of Information Technology Security Provision AGENCY: Office of... information technology (IT) supplies, services and systems with security requirements. DATES: Effective Date... effective date that include information technology (IT) supplies, services and systems with security...

  13. 76 FR 4079 - Information Technology (IT) Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-24

    ... Technology (IT) Security AGENCY: National Aeronautics and Space Administration. ACTION: Final rule. SUMMARY: NASA is revising the NASA FAR Supplement (NFS) to update requirements related to Information Technology... Security clause. However, due to the critical importance of protecting the Agency's Information Technology...

  14. Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

    NASA Astrophysics Data System (ADS)

    Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr

    2018-05-01

    The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations.

  15. Technology-Enabled Crime, Policing and Security

    ERIC Educational Resources Information Center

    McQuade, Sam

    2006-01-01

    Crime, policing and security are enabled by and co-evolve with technologies that make them possible. As criminals compete with security and policing officials for technological advantage perpetually complex crime, policing and security results in relatively confusing and therefore unmanageable threats to society. New, adaptive and ordinary crimes…

  16. 17 CFR 200.552 - NEPA planning.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false NEPA planning. 200.552 Section 200.552 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Protection of the Environment...

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  18. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  19. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  20. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  1. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  2. Automated Support for Rapid Coordination of Joint UUV Operation

    DTIC Science & Technology

    2015-03-01

    automata , dead-reckoning, static plan, nmtime plan, rapid deployment, GPS 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...STATE MACHINES, MOORE AUTOMATA ..........................................9 A. MOORE AUTOMATA ...9 B. UUV PLANS AS MOORE AUTOMATA ...................................................11 C. SAMPLING RATE

  3. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  4. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  5. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  6. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  7. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  8. Implementing HIPAA security in a membership organization.

    PubMed

    Hillabrant, L P; Gaignard, K E

    2000-01-01

    The upcoming HIPAA security regulations are forcing a change in business and operating procedures that many, if not most, healthcare organizations are ill-prepared to tackle. Of all healthcare organizational structures, membership organizations will most likely face the greatest number of obstacles in preparing for and implementing the HIPAA security regulations. This is because the membership organization as a whole must find a way to accommodate the disparate technologies, business and operating methodologies and processes, and available, limited resources of its individual member organizations, and integrate these into a uniform implementation plan. Compounding these obvious difficulties is the unique challenge of enforcement authority. The individual member organizations are autonomous business entities, whereas the membership organization as a whole merely acts as an advisor or consultant, and has only limited enforcement authority over any individual member organization. This article explores this unique situation in depth. We focus on PROMINA Health System, a nonprofit healthcare membership organization that consists of five disparate member healthcare organizations. We examine the challenges PROMINA has encountered in its quest to institute an organization-wide HIPAA security program and its methodology for accomplishing program implementation.

  9. Securing Information Technology in Healthcare

    PubMed Central

    Anthony, Denise; Campbell, Andrew T.; Candon, Thomas; Gettinger, Andrew; Kotz, David; Marsch, Lisa A.; Molina-Markham, Andrés; Page, Karen; Smith, Sean W.; Gunter, Carl A.; Johnson, M. Eric

    2014-01-01

    Dartmouth College’s Institute for Security, Technology, and Society conducted three workshops on securing information technology in healthcare, attended by a diverse range of experts in the field. This article summarizes the three workshops. PMID:25379030

  10. A review of security of electronic health records.

    PubMed

    Win, Khin Than

    The objective of this study is to answer the research question, "Are current information security technologies adequate for electronic health records (EHRs)?" In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.

  11. Planning high security/high profile events.

    PubMed

    McCafferty, Mike

    2013-01-01

    The author who has lead in the planning and implementation of some of the most notorious trials and events, both in Canada and internationally, describes how such these experiences could be applied to focused high security planning in the health care industry.

  12. Execution of a self-directed risk assessment methodology to address HIPAA data security requirements

    NASA Astrophysics Data System (ADS)

    Coleman, Johnathan

    2003-05-01

    This paper analyzes the method and training of a self directed risk assessment methodology entitled OCTAVE (Operationally Critical Threat Asset and Vulnerability Evaluation) at over 170 DOD medical treatment facilities. It focuses specifically on how OCTAVE built interdisciplinary, inter-hierarchical consensus and enhanced local capabilities to perform Health Information Assurance. The Risk Assessment Methodology was developed by the Software Engineering Institute at Carnegie Mellon University as part of the Defense Health Information Assurance Program (DHIAP). The basis for its success is the combination of analysis of organizational practices and technological vulnerabilities. Together, these areas address the core implications behind the HIPAA Security Rule and can be used to develop Organizational Protection Strategies and Technological Mitigation Plans. A key component of OCTAVE is the inter-disciplinary composition of the analysis team (Patient Administration, IT staff and Clinician). It is this unique composition of analysis team members, along with organizational and technical analysis of business practices, assets and threats, which enables facilities to create sound and effective security policies. The Risk Assessment is conducted in-house, and therefore the process, results and knowledge remain within the organization, helping to build consensus in an environment of differing organizational and disciplinary perspectives on Health Information Assurance.

  13. High-Surety Telemedicine in a Distributed, 'Plug-andPlan' Environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craft, Richard L.; Funkhouser, Donald R.; Gallagher, Linda K.

    1999-05-17

    Commercial telemedicine systems are increasingly functional, incorporating video-conferencing capabilities, diagnostic peripherals, medication reminders, and patient education services. However, these systems (1) rarely utilize information architectures which allow them to be easily integrated with existing health information networks and (2) do not always protect patient confidentiality with adequate security mechanisms. Using object-oriented methods and software wrappers, we illustrate the transformation of an existing stand-alone telemedicine system into `plug-and-play' components that function in a distributed medical information environment. We show, through the use of open standards and published component interfaces, that commercial telemedicine offerings which were once incompatible with electronic patient recordmore » systems can now share relevant data with clinical information repositories while at the same time hiding the proprietary implementations of the respective systems. Additionally, we illustrate how leading-edge technology can secure this distributed telemedicine environment, maintaining patient confidentiality and the integrity of the associated electronic medical data. Information surety technology also encourages the development of telemedicine systems that have both read and write access to electronic medical records containing patient-identifiable information. The win-win approach to telemedicine information system development preserves investments in legacy software and hardware while promoting security and interoperability in a distributed environment.« less

  14. Secure and Resilient Cloud Computing for the Department of Defense

    DTIC Science & Technology

    2015-07-21

    that addresses that threat model, and (3) integrate the technology into a usable, secure, resilient cloud test bed. Underpinning this work is the...risks for the DoD’s acquisition of secure, resilient cloud technology by providing proofs of concept, technology maturity, integration demonstrations...we need a strategy for integrating LLSRC technology with the cloud services and applications that need to be secured. The LLSRC integration

  15. Social Security Administration

    MedlinePlus

    ... Plan Costs my Social Security Check out your Social Security Statement , change your address & manage your benefits online today. Social Security Number Your Social Security number remains your ...

  16. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  17. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  18. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  19. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  20. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  1. 49 CFR 15.7 - Covered persons.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...

  2. 49 CFR 15.7 - Covered persons.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...

  3. 49 CFR 15.7 - Covered persons.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...

  4. 49 CFR 15.7 - Covered persons.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...

  5. 49 CFR 15.7 - Covered persons.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.7 Covered... owners, charterers, and operators, required to have a security plan under Federal or International law. (d) Each owner or operator of a maritime facility required to have a security plan under the Maritime...

  6. Advanced Demonstration and Test Reactor Options Study

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Petti, David Andrew; Hill, R.; Gehin, J.

    Global efforts to address climate change will require large-scale decarbonization of energy production in the United States and elsewhere. Nuclear power already provides 20% of electricity production in the United States (U.S.) and is increasing in countries undergoing rapid growth around the world. Because reliable, grid-stabilizing, low emission electricity generation, energy security, and energy resource diversity will be increasingly valued, nuclear power’s share of electricity production has a potential to grow. In addition, there are non electricity applications (e.g., process heat, desalination, hydrogen production) that could be better served by advanced nuclear systems. Thus, the timely development, demonstration, and commercializationmore » of advanced nuclear reactors could diversify the nuclear technologies available and offer attractive technology options to expand the impact of nuclear energy for electricity generation and non-electricity missions. The purpose of this planning study is to provide transparent and defensible technology options for a test and/or demonstration reactor(s) to be built to support public policy, innovation and long term commercialization within the context of the Department of Energy’s (DOE’s) broader commitment to pursuing an “all of the above” clean energy strategy and associated time lines. This planning study includes identification of the key features and timing needed for advanced test or demonstration reactors to support research, development, and technology demonstration leading to the commercialization of power plants built upon these advanced reactor platforms. This planning study is consistent with the Congressional language contained within the fiscal year 2015 appropriation that directed the DOE to conduct a planning study to evaluate “advanced reactor technology options, capabilities, and requirements within the context of national needs and public policy to support innovation in nuclear energy”. Advanced reactors are defined in this study as reactors that use coolants other than water. Advanced reactor technologies have the potential to expand the energy applications, enhance the competitiveness, and improve the sustainability of nuclear energy.« less

  7. The Chain-Link Fence Model: A Framework for Creating Security Procedures

    ERIC Educational Resources Information Center

    Houghton, Robert F.

    2013-01-01

    A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…

  8. Geographic Information System Technology Leveraged for Crisis Planning, Emergency, Response, and Disaster Management

    NASA Astrophysics Data System (ADS)

    Ross, A.; Little, M. M.

    2013-12-01

    NASA's Atmospheric Science Data Center (ASDC) is piloting the use of Geographic Information System (GIS) technology that can be leveraged for crisis planning, emergency response, and disaster management/awareness. Many different organizations currently use GIS tools and geospatial data during a disaster event. ASDC datasets have not been fully utilized by this community in the past due to incompatible data formats that ASDC holdings are archived in. Through the successful implementation of this pilot effort and continued collaboration with the larger Homeland Defense and Department of Defense emergency management community through the Homeland Infrastructure Foundation-Level Data Working Group (HIFLD WG), our data will be easily accessible to those using GIS and increase the ability to plan, respond, manage, and provide awareness during disasters. The HIFLD WG Partnership has expanded to include more than 5,900 mission partners representing the 14 executive departments, 98 agencies, 50 states (and 3 territories), and more than 700 private sector organizations to directly enhance the federal, state, and local government's ability to support domestic infrastructure data gathering, sharing and protection, visualization, and spatial knowledge management.The HIFLD WG Executive Membership is lead by representatives from the Department of Defense (DoD) Office of the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs - OASD (HD&ASA); the Department of Homeland Security (DHS), National Protection and Programs Directorate's Office of Infrastructure Protection (NPPD IP); the National Geospatial-Intelligence Agency (NGA) Integrated Working Group - Readiness, Response and Recovery (IWG-R3); the Department of Interior (DOI) United States Geological Survey (USGS) National Geospatial Program (NGP), and DHS Federal Emergency Management Agency (FEMA).

  9. MIT Lincoln Laboratory Annual Report 2007: Technology in Support of National Security

    DTIC Science & Technology

    2007-01-01

    technical innovation and scientific discoveries. MISSION: TechnoLogy In SupporT of naTIonaL SecurITy 2007 Dr. Claude R. Canizares Vice president for...problems. The Lincoln Laboratory New Technology Initiatives Program is one of several internal technology innovation mechanisms. Technologies emerging...externships. LIFT2, an innovative professional learning program for science, technology , and math teachers, serves Massachusetts metro south/west region

  10. Focusing America’s National Powers

    DTIC Science & Technology

    2006-04-14

    governments with market economies. 15. SUBJECT TERMS National Security, National Powers, Sources of Power, National Security Council, National Security... Strategy , Six-phased Campaign Plan, JIACG, DIME 16. SECURITY CLASSIFICATION OF: Unclassified 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME...satisfaction of the requirements of a Master of Science Degree in Joint Campaign Planning and Strategy . The contents of this paper reflect my own

  11. Technical Steps to Support Nuclear Arsenal Downsizing: A Report by the APS Panel on Public Affairs

    DTIC Science & Technology

    2010-02-01

    play a critical role in advancing the US plan to balance deter- rence with downsizing the US nuclear arsenal. In particular, S&T are essential to enable...nuclear-armed nations must be assured that they will continue to be able to meet those critical security needs. While individual nuclear-armed...steps are essential to progress towards the eventual elimination of nuclear arsenals. Science and technology (S&T) will play a critical role in

  12. A study of space station needs, attributes and architectural options. Volume 2: Technical. Book 1: Mission requirements

    NASA Technical Reports Server (NTRS)

    Steinbronn, O.

    1983-01-01

    The following types of space missions were evaluated to determine those that require, or will be benefited materially, by a manned space station: (1) science and applications, (2) commercial, (3) technology development, (4) space operations, and (5) national security. Integrated mission requirements for man-operated and man-tended free-flying missions were addressed. A manned space station will provide major performance and economic benefits to a wide range of missions planned for the 1990s.

  13. New Directions in U.S. National Security Strategy, Defense Plans, and Diplomacy -- A Review of Official Strategic Documents

    DTIC Science & Technology

    2011-07-01

    demand capabilities, a force-generation model that provides sufficient strategic depth, and a comprehensive study on the future balance between Active...career, and use of bonuses and credits to reward critical specialties and outstanding perfor- mance. They also include a continuum-of-service model that...development projects (for instance, the F–22) typically try to produce major leaps in technology and performance in a single step. A better model , it

  14. Analysis of Marine Corps Renewable Energy Planning to Meet Installation Energy Security Requirements

    DTIC Science & Technology

    2013-12-03

    experimentation eventually gives way to the era of ferment . A few new technologies break through in the industry and are applied to a growing number of niche...experimentation and ferment eventually give way to an era of incremental change, where the industry down-selects to the most successful and efficient...clearly in the later part of the era of incremental change. Most renewables, however, are only just now moving into the second phase, the era of ferment

  15. Evolved Expendable Launch Vehicle: The Air Force Needs to Adopt an Incremental Approach to Future Acquisition Planning to Enable Incorporation of Lessons Learned

    DTIC Science & Technology

    2015-08-01

    expressed interest in competing for national security launches, including ULA, Space Exploration Technologies, Inc. ( SpaceX ), and Orbital Sciences...launch offices, and launch service providers including ULA, SpaceX , and Orbital Sciences Corporation. We also reviewed past GAO reports on EELV...launch until 2019 at the earliest, and will still have to become certified. SpaceX earned certification for its Falcon 9 launch vehicle in May 2015, but

  16. On determining specifications and selections of alternative technologies for airport checked-baggage security screening.

    PubMed

    Feng, Qianmei

    2007-10-01

    Federal law mandates that every checked bag at all commercial airports be screened by explosive detection systems (EDS), explosive trace detection systems (ETD), or alternative technologies. These technologies serve as critical components of airport security systems that strive to reduce security risks at both national and global levels. To improve the operational efficiency and airport security, emerging image-based technologies have been developed, such as dual-energy X-ray (DX), backscatter X-ray (BX), and multiview tomography (MVT). These technologies differ widely in purchasing cost, maintenance cost, operating cost, processing rate, and accuracy. Based on a mathematical framework that takes into account all these factors, this article investigates two critical issues for operating screening devices: setting specifications for continuous security responses by different technologies; and selecting technology or combination of technologies for efficient 100% baggage screening. For continuous security responses, specifications or thresholds are used for classifying threat items from nonthreat items. By investigating the setting of specifications on system security responses, this article assesses the risk and cost effectiveness of various technologies for both single-device and two-device systems. The findings provide the best selection of image-based technologies for both single-device and two-device systems. Our study suggests that two-device systems outperform single-device systems in terms of both cost effectiveness and accuracy. The model can be readily extended to evaluate risk and cost effectiveness of multiple-device systems for airport checked-baggage security screening.

  17. 17 CFR 200.26a - Office of Information Technology.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  18. 17 CFR 200.26a - Office of Information Technology.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  19. 17 CFR 200.26a - Office of Information Technology.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  20. 14 CFR § 1274.937 - Security requirements for unclassified information technology resources.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information technology resources. § 1274.937 Section § 1274.937 Aeronautics and Space NATIONAL AERONAUTICS... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  1. 17 CFR 200.26a - Office of Information Technology.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  2. 17 CFR 200.26a - Office of Information Technology.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Office of Information Technology. 200.26a Section 200.26a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Organization § 200.26a Office of Information Technology. The Office of Information Technology is responsible...

  3. 49 CFR 659.23 - System security plan: contents.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 7 2014-10-01 2014-10-01 false System security plan: contents. 659.23 Section 659.23 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL TRANSIT ADMINISTRATION, DEPARTMENT OF TRANSPORTATION RAIL FIXED GUIDEWAY SYSTEMS; STATE SAFETY OVERSIGHT Role of the State Oversight Agency § 659.23 System security...

  4. 17 CFR 230.405 - Definitions of terms.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... purchased for the account of plan participants, at prices not in excess of current market prices at the time... specified in the plan and based upon average or current market prices at the time of purchase. Electronic... maintain a market for the registrant's securities. Equity security. The term equity security means any...

  5. 17 CFR 230.405 - Definitions of terms.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... purchased for the account of plan participants, at prices not in excess of current market prices at the time... specified in the plan and based upon average or current market prices at the time of purchase. Electronic... maintain a market for the registrant's securities. Equity security. The term equity security means any...

  6. 17 CFR 230.405 - Definitions of terms.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... purchased for the account of plan participants, at prices not in excess of current market prices at the time... specified in the plan and based upon average or current market prices at the time of purchase. Electronic... maintain a market for the registrant's securities. Equity security. The term equity security means any...

  7. 78 FR 43230 - Agency Information Collection Activities: Submission to OMB for Reinstatement, Without Change, of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-19

    ... Insured Credit Unions to maintain an information security program and an incident response plan that... Federally Insured Credit Unions to maintain an information security program and an incident response plan... credit unions to develop a written security program to safeguard sensitive member information. This...

  8. 78 FR 66788 - Joint Industry Plan; Order Approving Amendment No. 30 to the Joint Self-Regulatory Organization...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-06

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70793; File No. S7-24-89] Joint Industry Plan..., Consolidation and Dissemination of Quotation and Transaction Information for Nasdaq-Listed Securities Traded on... Exchange, Inc., Financial Industry Regulatory Authority, Inc., International Securities Exchange LLC...

  9. National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook

    NASA Technical Reports Server (NTRS)

    Roback, E.

    1991-01-01

    The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.

  10. 77 FR 45354 - Notification of Single Source Cooperative Agreement Award for Project Hope

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-31

    ... Support of National Health Security Strategy (2009) and Implementation Plan (2012) and Homeland Security... Directive-21 (2007) and the National Health Security Strategy (2009) and Implementation Plan (2012). In the... of a Health Affairs thematic issue that will identify, explore and propose policy options for...

  11. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  12. Opportunities and challenges of cloud computing to improve health care services.

    PubMed

    Kuo, Alex Mu-Hsing

    2011-09-21

    Cloud computing is a new way of delivering computing resources and services. Many managers and experts believe that it can improve health care services, benefit health care research, and change the face of health information technology. However, as with any innovation, cloud computing should be rigorously evaluated before its widespread adoption. This paper discusses the concept and its current place in health care, and uses 4 aspects (management, technology, security, and legal) to evaluate the opportunities and challenges of this computing model. Strategic planning that could be used by a health organization to determine its direction, strategy, and resource allocation when it has decided to migrate from traditional to cloud-based health services is also discussed.

  13. Advanced Research Projects Agency counterdrug program

    NASA Astrophysics Data System (ADS)

    Pennella, John J.

    1994-03-01

    The Department of Defense (DoD), in support of the National Drug Control Strategy, has designated that detecting and countering the production, trafficking and use of illegal drugs is a high priority national security mission. The Advanced Research Projects Agency (ARPA) Counterdrug Program is assisting DoD in this objective by developing technology and prototype systems to enhance the capabilities of the DoD and civilian law enforcement agencies, consistent with the DoD mission and the supply reduction goals of the National Drug Control Strategy. The objective of this paper is to summarize the current ARPA Counterdrug Program, with special emphasis on the current efforts and future plans for developing technology to meet the National needs for Non-Intrusive Inspection.

  14. The application of data encryption technology in computer network communication security

    NASA Astrophysics Data System (ADS)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  15. The new color of money: safer, smarter, more secure

    NASA Astrophysics Data System (ADS)

    DiNunzio, Lisa A.; Clarke, Lenore

    2004-06-01

    Approximately 60% of U.S. currency notes circulate abroad. As the most widely used currency in the world, U.S. notes are the most likely to be counterfeited. Since 1996, the United States has been issuing currency with new security features. These features make U.S. currency easier to recognize as genuine and more secure against advancing computer technology that could be used for counterfeiting. Currency counterfeiters are increasingly turning to digital methods, as advances in technology make digital counterfeiting of currency easier and cheaper. In 1995, for example, less than one percent of counterfeit notes detected in the U.S. were digitally produced. By 2002, that number had grown to nearly 40 percent, according to the Secret Service. Yet despite the efforts of counterfeiters, U.S. currency counterfeiting has been kept at low levels. According to current estimates, between 0.01 and 0.02 percent of notes in circulation are counterfeit, or about 1-2 notes in every 10,000 genuine notes. The strategy for maintaining the security of Federal Reserve notes is to enhance the design of U.S. currency every seven to ten years. One objective of introducing the new currency is to emphasize the number of features available to the public for authenticating bills. The most-talked-about aspect of the redesigned currency is the subtle introduction of background colors to the bills. While color itself is not a security feature, the use of color provides the opportunity to add features that could assist in deterring counterfeiting. Color will also help people to better distinguish their notes. Security features for the newly designed currency include a security thread, a watermark, and a more distinct color-shifting ink. The new 20 note was issued in fall 2003, with the 50 and 100 notes scheduled to follow 12 to 18 months later. Plans to redesign the 10 and 5 are still under consideration, but there are no plans to redesign the 2 and 1 notes. As was the case with the redesigned 20 note issued in 1998, the new design will co-circulate with the current design. As notes return to the Federal Reserve from depository institutions, the Federal Reserve will only destroy the unfit notes introduced since 1998. Designs older than the Series 1996 are destroyed when returned to the Federal Reserve regardless of condition. To ensure a smooth introduction of the new currency, a five-year international public education effort was launched in 2002 to inform the public and target audiences, including financial institutions, law enforcement, and the vending industry of the transition to the new design. The public is the first line of defense against counterfeiting. So, it's important the public has the tools to recognize the new and modified security features in the redesigned notes.

  16. The Relationship of Social Security Benefits and the Military Survivors Benefit Plan.

    DTIC Science & Technology

    1980-07-09

    profound effect on the social security offset from the military survivors benefit plan (SBP). This study demonstrates the new social security computation...AD-ABO 088 AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB ON SCHOOL-ETC F/B 513 THE RELATIONSHIP OF SOCIAL SECURITY BENEFITS AND THE MILITARY S-ETC(U...JUL 80 W C LETZKUS. C R MARGENTHALER UNCLASSIFIED AFIT-LS-80-3 I fllflfflffl..fl fl ’IilllllNO] LEVE1L 0 9THE RELATIONSHIP OF SOCIAL SECURITY BENEFITS

  17. Staying Secure for School Safety

    ERIC Educational Resources Information Center

    Youngkin, Minu

    2012-01-01

    Proper planning and preventive maintenance can increase school security and return on investment. Preventive maintenance begins with planning. Through careful planning, education institutions can determine what is working and if any equipment, hardware or software needs to be replaced or upgraded. When reviewing a school's safety and security…

  18. The Threat of Security: Hindering Technology Integration in the Classroom

    ERIC Educational Resources Information Center

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  19. Information technology security system engineering methodology

    NASA Technical Reports Server (NTRS)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  20. Comparing replacement rates under private and federal retirement systems.

    PubMed

    Martin, Patricia P

    One measure of the adequacy of retirement income is replacement rate - the percentage of pre-retirement salary that is available to a worker in retirement. This article compares salary replacement rates for private-sector employees of medium and large private establishments with those for federal employees under the Civil Service Retirement System and the Federal Employees Retirement System. Because there is no standard benefit formula to represent the variety of formulas available in the private sector, a composite defined benefit formula was developed using the characteristics of plans summarized in the Bureau of Labor Statistics Medium and Large Employer Plan Survey. The resulting "typical" private-sector defined benefit plan, with an accompanying defined contribution plan, was then compared with the two federal systems. The Civil Service Retirement System (CSRS) is a stand-alone defined benefit plan whose participants are not covered by Social Security. Until passage of the 1983 Amendments to Social Security Act, it was the only retirement plan for most federal civilian employees. Provisions of the 1983 Amendments were designed to restore long-term financial stability to the Social Security trust funds. One provision created the Federal Employees Retirement System (FERS), which covers federal employees hired after 1983. It was one of the provisions designed to restore long-term financial stability to the Social Security trust funds. FERS employees contribute to and are covered by Social Security. FERS, which is a defined benefit plan, also includes a basic benefit and a 401(k)-type plan known as the Thrift Savings Plan (TSP). To compare how retirees would fare under the three different retirement systems, benefits of employees retiring at age 65 with 35 years of service were calculated using hypothetical workers with steady earnings. Workers were classified according to a percentage of the average wage in the economy: low earners (45 percent), average earners (100 percent) high earners (160 percent), and maximum earners (earnings at the taxable maximum amount). Overall, this analysis found that: Excluding Social Security benefits and TSP and defined contribution annuities, CSRS retirees have a higher pre-retirement salary replacement rate than either FERS or private-sector retirees. Private-sector retirees, however, have higher replacement rate than their FERS counterparts. Including Social Security benefits but not TSP and defined contribution plan annuities, CSRS retirees who are maximum earners have a higher pre-retirement salary replacement rate (despite receiving no Social Security benefits) than FERS retirees with the same earnings. Private-sector retirees in all earnings categories have a higher replacement rate than federal retirees with the same earnings. Including Social Security and TSP and defined contribution plan annuities, private-sector retirees in all earnings categories have a higher replacement rate than federal retirees, but their rate is close to that of FERS retirees. The rate is higher for FERS retirees than for CSRS retirees in all earnings categories. This analysis shows that replacement creates could exceed 100 percent for FERS employees who contribute who contribute 6 percent of earnings to the TSP over full working career. Private-sector replacement rates were quite similar for those with both a defined benefit and a defined contribution pension plan. Social Security replacement rates make up the highest proportion of benefits for th private sector's lowest income quartile group. The replacement rate for 401(k) plans and the TSP account for a higher proportion of benefits than does Social Security for all other income groups, assuming the absence of a defined benefit plan.

  1. Automated power management and control

    NASA Technical Reports Server (NTRS)

    Dolce, James L.

    1991-01-01

    A comprehensive automation design is being developed for Space Station Freedom's electric power system. A joint effort between NASA's Office of Aeronautics and Exploration Technology and NASA's Office of Space Station Freedom, it strives to increase station productivity by applying expert systems and conventional algorithms to automate power system operation. The initial station operation will use ground-based dispatches to perform the necessary command and control tasks. These tasks constitute planning and decision-making activities that strive to eliminate unplanned outages. We perceive an opportunity to help these dispatchers make fast and consistent on-line decisions by automating three key tasks: failure detection and diagnosis, resource scheduling, and security analysis. Expert systems will be used for the diagnostics and for the security analysis; conventional algorithms will be used for the resource scheduling.

  2. 48 CFR 1804.470-2 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 1804.470-2 Policy. NASA IT security...) 2810, Security of Information Technology; NASA Procedural Requirements (NPR) 2810, Security of Information Technology; and interim policy updates in the form of NASA Information Technology Requirements...

  3. Information superhighway: Issues affecting development

    NASA Astrophysics Data System (ADS)

    1994-09-01

    Technological advances in the transmission of voice, video, and data are fostering fundamental changes in the telecommunications industry. For example, large local telephone companies plan to offer video services in competition with cable and broadcast television, while cable television companies plan to offer local telephone service over their wires in competition with the local telephone companies. The administration believes that these technological changes provide the opportunity to develop an 'Information Superhighway' that could provide every element of society with ready access to data, voice, and video communications. Concurrently, the Congress is considering sweeping changes to telecommunications regulations to keep pace with this dynamic industry. GAO prepared this report to serve as an overview of three key issues that decisionmakers may face as they deliberate telecommunications legislation; it focuses on three pivotal issues they face in formulating new telecommunications legislation: (1) managing the transition to a more competitive local telecommunications marketplace; (2) ensuring that all consumers have access to affordable telecommunications as competition develops; and (3) ensuring that the Information Superhighway provides adequate security, privacy, reliability, and interoperability.

  4. Optimizing Security of Cloud Computing within the DoD

    DTIC Science & Technology

    2010-12-01

    information security governance and risk management; application security; cryptography; security architecture and design; operations security; business ...governance and risk management; application security; cryptography; security architecture and design; operations security; business continuity...20 7. Operational Security (OPSEC).........................................................20 8. Business Continuity Planning (BCP) and Disaster

  5. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  6. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  7. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  8. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  9. Persian Gulf: U.S. Agencies Need to Improve Licensing Data and to Document Reviews of Arms Transfers for U.S. Foreign Policy and National Security Goals

    DTIC Science & Technology

    2010-09-01

    of Defense DTSA Defense Technology Security Administration FMS Foreign Military Sales GSD Gulf Security Dialogue LOA Letter of Offer and...may refer license applications to the Defense Technology Security Administration ( DTSA ) to determine if the United States should release the...requested technology to the requesting foreign government. Specifically, DTSA assesses the sale’s impact on preserving critical U.S. military technological

  10. 21 CFR 1311.08 - Incorporation by reference.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... of Standards and Technology, Computer Security Division, Information Technology Laboratory, National... standards are available from the National Institute of Standards and Technology, Computer Security Division... 140-2, Security Requirements for Cryptographic Modules, May 25, 2001, as amended by Change Notices 2...

  11. 31 CFR 10.6 - Enrollment as an enrolled agent or enrolled retirement plan agent.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... or enrolled retirement plan agent's name, prior address, new address, social security number or tax... individuals licensed to practice before the Internal Revenue Service who have a social security number or tax... Internal Revenue Service who have a social security number or tax identification number that ends with the...

  12. Security Considerations for Archives: Rare Book, Manuscript, and Other Special Collections.

    ERIC Educational Resources Information Center

    Cupp, Christian M.

    The first of six sections in this guide to security for special collections in archives and libraries discusses the importance of security and the difficulty of preventing theft of archival materials. The second section, which focuses on planning, recommends an inservice training program for staff, a planned communications network between library…

  13. Planning for Effective Security at Campus Special Events.

    ERIC Educational Resources Information Center

    Bromley, Max L.

    1984-01-01

    Factors to consider in assuring security for student events on campus are discussed, based on the experience of the University of South Florida, which has developed, tested, and critiqued a system of planning security. Even though special events vary significantly in type and purpose, some questions should be answered in advance, with the…

  14. 32 CFR 199.8 - Double coverage.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., except in the case of a plan administered under title XIX of the Social Security Act (42 U.S.C. 1396 et... not include: (i) Plans administered under title XIX of the Social Security Act (Medicaid); (ii... under Title XIX of the Social Security Act (Medicaid) are never considered to be available in the...

  15. 76 FR 20377 - Applications and Amendments to Facility Operating Licenses Involving Proposed No Significant...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-12

    ... amendment requests approval of the Exelon Cyber Security Plan, provides an Implementation Schedule, and adds... require Exelon to fully implement and maintain in effect all provisions of the approved Cyber Security..., Revision 6, ``Cyber Security Plan for Nuclear Power Reactors.'' Basis for proposed no significant hazards...

  16. 75 FR 62592 - Applications and Amendments to Facility Operating Licenses Involving Proposed No Significant...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-12

    ... Operating Licenses include: (1) The proposed Cyber Security Plan for CCNPP, Ginna, and NMPNS, (2) an... provisions of the Nuclear Regulatory Commission-approved Cyber Security Plan for CCNPP, Ginna, and NMPNS as... Communication Systems and Networks,'' establish the requirements for a cyber security program. This regulation...

  17. Restricted access processor - An application of computer security technology

    NASA Technical Reports Server (NTRS)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  18. 75 FR 36125 - Office of New Reactors; Proposed Revision to Standard Review Plan, Section 13.6.2, Revision 1 on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-24

    ... Standard Review Plan, Section 13.6.2, Revision 1 on Physical Security--Design Certification AGENCY: Nuclear... comment on NUREG-0800, ``Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants,'' on a proposed Revision 1 to Standard Review Plan (SRP), Section 13.6.2 on ``Physical Security...

  19. 78 FR 65733 - Joint Industry Plan; Notice of Filing and Immediate Effectiveness of Amendment to the Plan for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-01

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70764; File No. 4-443] Joint Industry Plan; Notice of Filing and Immediate Effectiveness of Amendment to the Plan for the Purpose of Developing and Implementing Procedures Designed To Facilitate the Listing and Trading of Standardized Options To Add Miami International Securities Exchange, LLC (...

  20. Ubiquitous geospatial concept in evolution of the macro and micro spatial planning

    NASA Astrophysics Data System (ADS)

    Sabri, S.; Ludin, A. N. M.; Majid, M. R.

    2014-02-01

    There are many examples of GIS application in planning such as urban land-use planning, cultural heritage conservation, coastal zone management, and the design of structure plans for sustainable economic development. All these applications are dealing with systems in which natural and human factors are interconnected. But an issue that should be addressed is to what extent the current information technology is able to connect all these parts together? Contemporary improvement in information technology made the computer so imbedded in our everyday practices that we use it without having to think about it. Thus, computing is becoming truly ubiquitous and is available anywhere anytime. Advances in the internet facilities and devices, such as high speed wireless networks, mobile middleware, and smart technologies, has pushed the concept of ubiquitous computing to the forefront of GIS research and development. There are developments in this regards, these are such as GeoWeb 2.0, voluntarily geographic Information (VGI), and Mashups, whereby the application of cloud computing was possible in visualizing urban air pollution and emergency responses to ensure the safety and security. These advancements therefore, have changed the conventional facet of macro and micro spatial planning. Every possible information system such as residential, medical, business, environmental, governmental, and the like can be linked through ubiquitous computing technologies and acts as a virtually one system which works for society. However, the journey to achieve a true ubiquitous GIS is not without challenges. Despite the current potentials there are many issues and obstacles need to be addressed before GIS can to be truly ubiquitous in planning context. Perhaps four criteria as explained by Goodchild et al (1997) can be applied to ubiquitous GIS in planning very well: the system must be distributed (data storage, processing and user interaction can occur at locations that are potentially widely scattered), disaggregated (the monolithic systems are replaced by 'plug and play' components designed to interoperate through conformance with industry-wide standards), decoupled (system must be able to access a number of components over many networks required to complete a specific task) and, interoperable (system is based on an "open" system).

  1. Archiving Data from New Survey Technologies: Lessons Learned on Enabling Research with High-Precision Data While Preserving Participant Privacy: Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gonder, J.; Burton, E.; Murakami, E.

    2014-11-01

    During the past 15 years, increasing numbers of organizations and planning agencies have begun collecting high-resolution Global Positioning System (GPS) travel data. Despite the significant effort and expense to collect it, privacy concerns often lead to underutilization of the data. To address this dilemma of providing data access while preserving privacy, the National Renewable Energy Laboratory, with support from the U.S. Department of Transportation and U.S. Department of Energy, established the Transportation Secure Data Center (TSDC). Lessons drawn from best-practice examples from other data centers have helped shape the structure and operating procedures for the TSDC, which functions under themore » philosophy of first and foremost preserving privacy, but doing so in a way that balances security with accessibility and usability of the data for legitimate research. This paper provides details about the TSDC approach toward achieving these goals, which has included creating a secure enclave with no external access for backing up and processing raw data, a publicly accessible website for downloading cleansed data, and a secure portal environment through which approved users can work with detailed spatial data using a variety of tools and reference information. This paper also describes lessons learned from operating the TSDC with respect to improvements in GPS data handling, processing, and user support, along with plans for continual enhancements to better support the needs of both data providers and users and to thus advance the research value derived from such valuable data.« less

  2. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-20

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0020] Homeland Security Science and...; Notice of Closed Federal Advisory Committee Meeting. SUMMARY: On April 12, 2010, the Homeland Security...: The Homeland Security Science and Technology Advisory Committee met on April 20, 2010 from 8:30 a.m...

  3. The Effect of China’s Scramble for Resources and African Resource Nationalism on the Supply of Strategic Southern African Minerals: What Can the United States Do?

    DTIC Science & Technology

    2010-01-01

    strategic partnerships, national security planning (and theater security cooperation) and US Africa Command (AFRICOM) in securing long term access to...A potential constraint on the supply of strategic minerals is the lack of a US industrial policy and contingency plans in case the flow of... planning for various contingencies, particularly for the 2020s and beyond. The region contains high concentrations of platinum group metals (PGMs

  4. 41 CFR 102-192.70 - What security policies and plans must we have?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... and plans must we have? 102-192.70 Section 102-192.70 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION ADMINISTRATIVE PROGRAMS... plans must we have? (a) You must have a written mail security policy that applies throughout the agency...

  5. 41 CFR 102-192.70 - What security policies and plans must we have?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and plans must we have? 102-192.70 Section 102-192.70 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION ADMINISTRATIVE PROGRAMS... plans must we have? (a) You must have a written mail security policy that applies throughout the agency...

  6. 41 CFR 102-192.70 - What security policies and plans must we have?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... and plans must we have? 102-192.70 Section 102-192.70 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION ADMINISTRATIVE PROGRAMS... plans must we have? (a) You must have a written mail security policy that applies throughout the agency...

  7. 41 CFR 102-192.70 - What security policies and plans must we have?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... and plans must we have? 102-192.70 Section 102-192.70 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION ADMINISTRATIVE PROGRAMS... plans must we have? (a) You must have a written mail security policy that applies throughout the agency...

  8. 75 FR 27927 - Diversification Requirements for Certain Defined Contribution Plans

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... section 414(l) with respect to any other defined benefit plan or defined contribution plan maintained by... disclosure of the fund's portfolio holdings (for example, Form N-CSR, ``Certified Shareholder Report of... securities, as well as a direct or indirect benefit that is conditioned on investment in employer securities...

  9. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  10. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  11. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  12. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  13. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  14. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-13

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... Science and Technology Advisory Committee (HSSTAC) ACTION: Committee Management; Notice of Federal... Committee Management Secretariat, General Services Administration. Name of Committee: Homeland Security...

  15. School Security Technologies

    ERIC Educational Resources Information Center

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  16. Input from Key Stakeholders in the National Security Technology Incubator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  17. Safe teleradiology: information assurance as project planning methodology.

    PubMed

    Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David

    2005-01-01

    The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Erhart, Steven C.; Spencer, Charles G.

    The accomplishments to date and the long-range planning of the Y-12 Energy Management and Sustainability and Stewardship programs support the U.S. Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) vision for a commitment to energy effi ciency and sustainability and to achievement of the Guiding Principles. Specifi cally, the Y-12 vision is to support the Environment, Safety and Health Policy and the DOE Strategic Sustainability Performance Plan (SSPP), while promoting overall sustainability and reduction of greenhouse gas (GHG) emissions. The mission of the Y-12 Energy Management program is to incorporate energy-efficient technologies site-wide and to position Y-12more » to meet NNSA energy requirement needs through 2025 and beyond. This plan addresses: Greenhouse Gas Reduction and Comprehensive Greenhouse Gas Inventory; Buildings, ESPC Initiative Schedule, and Regional and Local Planning; Fleet Management; Water Use Efficiency and Management; Pollution Prevention and Waste Reduction; Sustainable Acquisition; Electronic Stewardship and Data Centers; Renewable Energy; Climate Change; and Budget and Funding.« less

  19. Marketing and reputation aspects of neonatal safeguards and hospital-security systems.

    PubMed

    Smith, Alan D

    2009-01-01

    Technological advancements have migrated from personal-use electronics into the healthcare setting for security enhancements. Within maternity wards and nurseries, technology was seen as one of best way to protect newborns from abduction. The present study is a focus on what systems and methods are used in neonatal security, the security arrangements, staff training, and impacts outside the control of the hospital, customer satisfaction and customer relations management. Through hypothesis-testing and exploratory analysis, gender biases and extremely high levels of security were found within a web-enabled and professional sample of 200 respondents. The factor-based constructs were found to be, in order of the greatest explained variance: security concerns, personal technology usage, work technology applications, and demographic maturity concerns, resulting in four factor-based scores with significant combined variance of 61.5%. It was found that through a better understanding on the importance and vital need for hospitals to continue to improve on their technology-based security policies significantly enhanced their reputation in the highly competitive local healthcare industry.

  20. Integrated Modeling, Mapping, and Simulation (IMMS) Framework for Exercise and Response Planning

    NASA Technical Reports Server (NTRS)

    Mapar, Jalal; Hoette, Trisha; Mahrous, Karim; Pancerella, Carmen M.; Plantenga, Todd; Yang, Christine; Yang, Lynn; Hopmeier, Michael

    2011-01-01

    EmergenCy management personnel at federal, stale, and local levels can benefit from the increased situational awareness and operational efficiency afforded by simulation and modeling for emergency preparedness, including planning, training and exercises. To support this goal, the Department of Homeland Security's Science & Technology Directorate is funding the Integrated Modeling, Mapping, and Simulation (IMMS) program to create an integrating framework that brings together diverse models for use by the emergency response community. SUMMIT, one piece of the IMMS program, is the initial software framework that connects users such as emergency planners and exercise developers with modeling resources, bridging the gap in expertise and technical skills between these two communities. SUMMIT was recently deployed to support exercise planning for National Level Exercise 2010. Threat, casualty. infrastructure, and medical surge models were combined within SUMMIT to estimate health care resource requirements for the exercise ground truth.

  1. Comprehensive Smart Grid Planning in a Regulated Utility Environment

    NASA Astrophysics Data System (ADS)

    Turner, Matthew; Liao, Yuan; Du, Yan

    2015-06-01

    This paper presents the tools and exercises used during the Kentucky Smart Grid Roadmap Initiative in a collaborative electric grid planning process involving state regulators, public utilities, academic institutions, and private interest groups. The mandate of the initiative was to assess the existing condition of smart grid deployments in Kentucky, to enhance understanding of smart grid concepts by stakeholders, and to develop a roadmap for the deployment of smart grid technologies by the jurisdictional utilities of Kentucky. Through involvement of many important stakeholder groups, the resultant Smart Grid Deployment Roadmap proposes an aggressive yet achievable strategy and timetable designed to promote enhanced availability, security, efficiency, reliability, affordability, sustainability and safety of the electricity supply throughout the state while maintaining Kentucky's nationally competitive electricity rates. The models and methods developed for this exercise can be utilized as a systematic process for the planning of coordinated smart grid deployments.

  2. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    practice for information security management ( ISO /IEC 27002 ),” “Information technology — Security techniques — Information security management...systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security techniques — Information security risk management ( ISO /IEC 27005).” from...associated practice aids. Perhaps the most germane discovery from this effort was a draft ISO standard on Systems and software engineering, Systems and

  3. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  4. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  5. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  6. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  7. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  8. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  9. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  10. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  11. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  12. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  13. Small Technology Business Incubation Needs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    2007-12-31

    This report contains a summary of typical business incubation needs of small technology companies. This document will serve as a guide in the design and implementation of services offered by the National Security Technology Incubator (NSTI), an incubator program being designed and developed as part of the National Security Preparedness Project (NSPP), performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the methodology used to perform the needs assessment and services proposed to meet the needs of client companies. The purpose of the NSPP is to promote national security technologiesmore » through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland.« less

  14. Through-the-wall surveillance for homeland security and law enforcement

    NASA Astrophysics Data System (ADS)

    Borek, Stanley E.; Clarke, Bernard J.; Costianes, Peter J.

    2005-05-01

    The Air Force Research Laboratory Information Directorate (AFRL/IF), under sponsorship of the Department of Justice's (DOJ), National Institute of Justice (NIJ) Office of Science and Technology (OS&T), is currently developing and evaluating advanced Through the Wall Surveillance (TWS) technologies. These technologies are partitioned into two categories: inexpensive, handheld systems for locating an individual(s) behind a wall or door; and portable, personal computer (PC) based standoff systems to enable the determination of events during critical incident situations. The technologies utilized are primarily focused on active radars operating in the UHF, L, S (ultra wideband (UWB)), X, and Ku Bands. The data displayed by these systems is indicative of range (1 Dimension), or range and azimuth (2 Dimensions) to the moving individual(s). This paper will highlight the technologies employed in five (5) prototype TWS systems delivered to NIJ and AFRL/IF for test and evaluation. It will discuss the systems backgrounds, applications, current states of evolution, and future plans for enhanced assessment.

  15. Technology Requirements and Selection for Securely Partitioning OBSW

    NASA Astrophysics Data System (ADS)

    Mendham, Peter; Windsor, James; Eckstein, Knut

    2010-08-01

    The Securely Partitioning Spacecraft Computing Resources project is a current ESA TRP activity investigating the application of secure time and space partitioning (TSP) technologies to enable multi-use missions from a single platform. Secure TSP technologies are used in a number of application areas outside the space domain and an opportunity exists to 'spin-in' a suitable solution. The selection of a technology for use within space the European space industry relies on an understanding of the requirements for the application of secure TSP, of which this paper presents a summary. Further, the paper outlines the selection process taken by the project and highlights promising solutions for use today.

  16. 75 FR 36126 - Office of New Reactors; Proposed Revision to Standard Review Plan Section 13.6.3, Revision 1 on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-24

    ... Standard Review Plan Section 13.6.3, Revision 1 on Physical Security--Early Site Permit AGENCY: Nuclear... comment on NUREG-0800, ``Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants,'' on a proposed Revision 1 to Standard Review Plan (SRP), Section 13.6.3 on ``Physical Security...

  17. 75 FR 69709 - Office of New Reactors; Notice of Availability of the Final Staff Guidance; Standard Review Plan...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... the Final Staff Guidance; Standard Review Plan, Section 13.6.6, Revision 0 on Cyber Security Plan... Reports for Nuclear Power Plants,'' Section 13.6.6, Revision 0 on ``Cyber Security Plan'' (Agencywide.... Disposition: On May 13, 2010, the NRC staff issued the proposed Revision 0 on SRP Section 13.6.6 on ``Cyber...

  18. National Security Technology Incubator Evaluation Process

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages ofmore » early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.« less

  19. Strategic planning for national security: Lessons from business experience. Interim report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bracken, P.

    1990-02-01

    United States defense planning is at a crossroads and it is therefore useful to review not only discrete issues, but even basic concepts of strategic planning. This Note reviews concepts used in the business world to build insights about how to view current and prospective problems, opportunities, and choices. The author draws upon the business literature for both ideas and metaphors. He observes that U.S. national security planning could profit greatly from an approach that distinguishes among core, environmental, and hedging strategies, and that considers security analogs to such business concepts as defining the business, dealing with new competitors, controllingmore » the intensity of competition, entry and exit barriers, and the need to redeploy assets and restructure the organization. He then relates these concepts to specific problems of national security interest.« less

  20. Generating capacity in US electric utilities: How is it used? How much is needed over the decade

    NASA Astrophysics Data System (ADS)

    Keelin, T. W.; Oatman, E. N.; Gent, M. R.

    1982-10-01

    This report addresses: how US generating capacity is used to supply today's consumers with electricity; whether new capacity planned over the next decade is enough to provide a secure supply of electricity; how delays and cancellations of planned capacity would result in higher electricity costs and threaten the security of electricity supply; and how today's decisions determine electricity supply for the next decade and beyond. It is concluded that there is not an electricity supply crisis currently, but there is a planning crisis. This conclusion is based on the following: existing capacity supplies current needs, but provides little room for economic growth; new capacity is planned to provide a secure supply of electricity for the demand projected by utilities; if demand is lower, planned capacity will reduce costs and, if demand is higher, planned capacity will not be adequate; planned capacity may not be realized.

  1. Technology's Role in Security.

    ERIC Educational Resources Information Center

    Day, C. William

    1999-01-01

    Examines the use of technology to bolster the school security system, tips on selecting a security consultant, and several basic strategies to make buildings and grounds safer. Technological ideas discussed include the use of telephones in classrooms to expedite care in emergency situations, surveillance cameras to reduce crime, and metal…

  2. A taxonomy and discussion of software attack technologies

    NASA Astrophysics Data System (ADS)

    Banks, Sheila B.; Stytz, Martin R.

    2005-03-01

    Software is a complex thing. It is not an engineering artifact that springs forth from a design by simply following software coding rules; creativity and the human element are at the heart of the process. Software development is part science, part art, and part craft. Design, architecture, and coding are equally important activities and in each of these activities, errors may be introduced that lead to security vulnerabilities. Therefore, inevitably, errors enter into the code. Some of these errors are discovered during testing; however, some are not. The best way to find security errors, whether they are introduced as part of the architecture development effort or coding effort, is to automate the security testing process to the maximum extent possible and add this class of tools to the tools available, which aids in the compilation process, testing, test analysis, and software distribution. Recent technological advances, improvements in computer-generated forces (CGFs), and results in research in information assurance and software protection indicate that we can build a semi-intelligent software security testing tool. However, before we can undertake the security testing automation effort, we must understand the scope of the required testing, the security failures that need to be uncovered during testing, and the characteristics of the failures. Therefore, we undertook the research reported in the paper, which is the development of a taxonomy and a discussion of software attacks generated from the point of view of the security tester with the goal of using the taxonomy to guide the development of the knowledge base for the automated security testing tool. The representation for attacks and threat cases yielded by this research captures the strategies, tactics, and other considerations that come into play during the planning and execution of attacks upon application software. The paper is organized as follows. Section one contains an introduction to our research and a discussion of the motivation for our work. Section two contains a presents our taxonomy of software attacks and a discussion of the strategies employed and general weaknesses exploited for each attack. Section three contains a summary and suggestions for further research.

  3. The Evolving Relationship Between Technology and National Security in China: Innovation, Defense Transformation, and China’s Place in the Global Technology Order

    DTIC Science & Technology

    2016-02-12

    SECURITY CLASSIFICATION OF: This project examined China’s drive to become a world-class defense and dual -use technological and industrial power and...2211 China, science, technology, dual use, defense, security, innovation REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 10...Place in the Global Technology Order Report Title This project examined China’s drive to become a world-class defense and dual -use technological and

  4. 48 CFR 1339.107-70 - Information security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... Clause 1352.239-73, Security Requirements for Information Technology Resources, is needed, contracting... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information security. 1339...

  5. 75 FR 27847 - China Technology Global Corp.; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-18

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Technology Global Corp.; Order of Suspension of Trading May 14, 2010. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Technology Global Corp...

  6. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... 1974; Department of Homeland Security/ALL-004 General Information Technology Access Account Records..., Department of Homeland Security/ALL-004 General Information Technology Access Account Records System of... access account records. This system consists of information collected in order to provide authorized...

  7. New Technology's Surprising Security Threats. Building Digital Libraries

    ERIC Educational Resources Information Center

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  8. Office of Command Security Total Quality Management Plan

    DTIC Science & Technology

    1989-07-01

    outlines the Office of Command Security instruction for TQM implementation. Keywords: TQM (Total Quality Management ), DLA Office of Command Security, Continuous process improvement, Automatic data processing security.

  9. Making Technology Work for Campus Security

    ERIC Educational Resources Information Center

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  10. Development of Operational Free-Space-Optical (FSO) Laser Communication Systems Final Report CRADA No. TC02093.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ruggiero, A.; Orgren, A.

    This project was a collaborative effort between Lawrence Livermore National Security, LLC (formerly The Regents of the University of California)/Lawrence Livermore National Laboratory (LLNL) and LGS Innovations, LLC (formerly Lucent Technologies, Inc.), to develop long-range and mobile operational free-space optical (FSO) laser communication systems for specialized government applications. LLNL and LGS Innovations formerly Lucent Bell Laboratories Government Communications Systems performed this work for a United States Government (USG) Intelligence Work for Others (I-WFO) customer, also referred to as "Government Customer", or "Customer" and "Government Sponsor." The CRADA was a critical and required part of the LLNL technology transfer plan formore » the customer.« less

  11. Opportunities and Challenges of Cloud Computing to Improve Health Care Services

    PubMed Central

    2011-01-01

    Cloud computing is a new way of delivering computing resources and services. Many managers and experts believe that it can improve health care services, benefit health care research, and change the face of health information technology. However, as with any innovation, cloud computing should be rigorously evaluated before its widespread adoption. This paper discusses the concept and its current place in health care, and uses 4 aspects (management, technology, security, and legal) to evaluate the opportunities and challenges of this computing model. Strategic planning that could be used by a health organization to determine its direction, strategy, and resource allocation when it has decided to migrate from traditional to cloud-based health services is also discussed. PMID:21937354

  12. The complexities of HIPAA and administration simplification.

    PubMed

    Mozlin, R

    2000-11-01

    The Health Insurance Portability and Accessibility Act (HIPAA) was signed into law in 1996. Although focused on information technology issues, HIPAA will ultimately impact day-to-day operations at multiple levels within any clinical setting. Optometrists must begin to familiarize themselves with HIPAA in order to prepare themselves to practice in a technology-enriched environment. Title II of HIPAA, entitled "Administration Simplification," is intended to reduce the costs and administrative burden of healthcare by standardizing the electronic transmission of administrative and financial transactions. The Department of Health and Human Services is expected to publish the final rules and regulations that will govern HIPAA's implementation this year. The rules and regulations will cover three key aspects of healthcare delivery: electronic data interchange (EDI), security and privacy. EDI will standardize the format for healthcare transactions. Health plans must accept and respond to all transactions in the EDI format. Security refers to policies and procedures that protect the accuracy and integrity of information and limit access. Privacy focuses on how the information is used and disclosure of identifiable health information. Security and privacy regulations apply to all information that is maintained and transmitted in a digital format and require administrative, physical, and technical safeguards. HIPAA will force the healthcare industry to adopt an e-commerce paradigm and provide opportunities to improve patient care processes. Optometrists should take advantage of the opportunity to develop more efficient and profitable practices.

  13. Technology Empowerment: Security Challenges.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Warren, Drake Edward; Backus, George A.; Jones, Wendell

    “Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment willmore » continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.« less

  14. Protecting computer-based medical devices: defending against viruses and other threats.

    PubMed

    2005-07-01

    The increasing integration of computer hardware has exposed medical devices to greater risks than ever before. More and more devices rely on commercial off-the-shelf software and operating systems, which are vulnerable to the increasing proliferation of viruses and other malicious programs that target computers. Therefore, it is necessary for hospitals to take steps such as those outlined in this article to ensure that their computer-based devices are made safe and continue to remain safe in the future. Maintaining the security of medical devices requires planning, careful execution, and a commitment of resources. A team should be created to develop a process for surveying the security status of all computerized devices in the hospital and making sure that patches and other updates are applied as needed. These patches and updates should be approved by the medical system supplier before being implemented. The team should consider using virtual local area networks to isolate susceptible devices on the hospital's network. All security measures should be carefully documented, and the documentation should be kept up-to-date. Above all, care must be taken to ensure that medical device security involves a collaborative, supportive partnership between the hospital's information technology staff and biomedical engineering personnel.

  15. Guidelines for computer security in general practice.

    PubMed

    Schattner, Peter; Pleteshner, Catherine; Bhend, Heinz; Brouns, Johan

    2007-01-01

    As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice. To develop guidelines for computer security in general practice based on a literature review, an analysis of available information on current practice and a series of key stakeholder interviews. While the guideline was produced in the context of Australian general practice, we have developed a template that is also relevant for other countries. Current data on computer security measures was sought from Australian divisions of general practice. Semi-structured interviews were conducted with general practitioners (GPs), the medical software industry, senior managers within government responsible for health IT (information technology) initiatives, technical IT experts, divisions of general practice and a member of a health information consumer group. The respondents were asked to assess both the likelihood and the consequences of potential risks in computer security being breached. The study suggested that the most important computer security issues in general practice were: the need for a nominated IT security coordinator; having written IT policies, including a practice disaster recovery plan; controlling access to different levels of electronic data; doing and testing backups; protecting against viruses and other malicious codes; installing firewalls; undertaking routine maintenance of hardware and software; and securing electronic communication, for example via encryption. This information led to the production of computer security guidelines, including a one-page summary checklist, which were subsequently distributed to all GPs in Australia. This paper maps out a process for developing computer security guidelines for general practice. The specific content will vary in different countries according to their levels of adoption of IT, and cultural, technical and other health service factors. Making these guidelines relevant to local contexts should help maximise their uptake.

  16. Secure environment for real-time tele-collaboration on virtual simulation of radiation treatment planning.

    PubMed

    Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S

    2003-01-01

    A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.

  17. The Diffusion of Military Technologies to Foreign Nations: Arms Transfers Can Preserve the Defense Technological and Industrial Base

    DTIC Science & Technology

    1995-06-01

    required, the Defense Technology Security Administration ( DTSA ) will make a determination on whether or not advanced technologies are being risked by the...sale or transfer of that product. DTSA has this role whether it is a commercial or government-to-government transfer. The Joint Chiefs of Staff also...Office of Defense Relations Security Assistance DSAA Defense Security Assistance Agency DTIB Defense Technological and Industrial Base DTSA Defense

  18. A Sustainable WMD Nonproliferation Strategy for East Africa: Connecting the WMD Nonproliferation Agenda with Local Border Security Needs to Achieve Mutually Beneficial Outcomes

    DTIC Science & Technology

    2014-01-01

    Government of Kenya stakeholders with providing a framework for analysis by engaging with a wide range of border security experts from key donor states...holistic national border security action plan and gap analysis were necessary to simultaneously deal with the global WMD nonproliferation agenda and...efforts from a research and analysis vantage point. The underlying idea was that Kenya, through this border security action plan and gap analysis , would

  19. Sandia National Laboratories: National Security Missions: International

    Science.gov Websites

    Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia Licensing & Technology Transfer Browse Technology Portfolios Technology Partnerships Business, Industry

  20. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sinars, Daniel; Scott, Kimberly Carole; Edwards, M. John

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclearmore » Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the summary presents two timelines that couch the opportunities discussed here in terms of the broader strategic timelines encapsulated in the fiscal year 2017 Stockpile Stewardship Management Plan (SSMP).« less

Top